Characterizing insecure JavaScript practices on the web C Yue, H Wang Proceedings of the 18th international conference on World wide web, 961-970, 2009 | 165 | 2009 |
BogusBiter: A transparent protection against phishing attacks C Yue, H Wang ACM Transactions on Internet Technology (TOIT) 10 (2), 1-31, 2010 | 135 | 2010 |
Real-time collaborative browsing C Yue, H Wang US Patent App. 12/567,295, 2010 | 111 | 2010 |
Phishing suspiciousness in older and younger adults: The role of executive functioning BE Gavett, R Zhao, SE John, CA Bussell, JR Roberts, C Yue PloS one 12 (2), e0171620, 2017 | 78 | 2017 |
Anti-phishing in offense and defense C Yue, H Wang 2008 Annual Computer Security Applications Conference (ACSAC), 345-354, 2008 | 70 | 2008 |
Attention please: Your attention check questions in survey studies can be automatically answered W Pei, A Mayer, K Tu, C Yue Proceedings of The Web Conference 2020, 1182-1193, 2020 | 52 | 2020 |
All Your Browser-saved Passwords Could Belong to Us: a Security Analysis and a Cloud-based New Design R Zhao, C Yue ACM Conference on Data and Applications Security (CODASPY), 2013 | 52 | 2013 |
An automatic HTTP cookie management system C Yue, M Xie, H Wang Computer Networks 54 (13), 2182-2198, 2010 | 46 | 2010 |
Mining least privilege attribute based access control policies MW Sanders, C Yue Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 44 | 2019 |
A comparative measurement study of web tracking on mobile and desktop environments Z Yang, C Yue Proceedings on Privacy Enhancing Technologies 2020 (2), 2020 | 42 | 2020 |
Toward a secure and usable cloud-based password manager for web browsers R Zhao, C Yue Computers & Security 46, 32-47, 2014 | 40 | 2014 |
A measurement study of insecure javascript practices on the web C Yue, H Wang ACM Transactions on the Web (TWEB) 7 (2), 1-39, 2013 | 38 | 2013 |
Visualizing and interpreting rnn models in url-based phishing detection T Feng, C Yue Proceedings of the 25th ACM Symposium on Access Control Models and …, 2020 | 32 | 2020 |
Attacking and protecting tunneled traffic of smart home devices A Alshehri, J Granley, C Yue Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 32 | 2020 |
Automatic cookie usage setting with cookiepicker C Yue, M Xie, H Wang 37th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2007 | 32 | 2007 |
Client side username/password credential protection C Yue, H Wang US Patent 8,307,433, 2012 | 29 | 2012 |
Design and evaluation of the highly insidious extreme phishing attacks R Zhao, S John, S Karas, C Bussell, J Roberts, D Six, B Gavett, C Yue Computers & Security 70, 634-647, 2017 | 28 | 2017 |
SessionMagnifier: A simple approach to secure and convenient kiosk browsing C Yue, H Wang Proceedings of the 11th international conference on Ubiquitous computing …, 2009 | 26 | 2009 |
Vulnerability and Risk Analysis of Two Commercial Browser and Cloud Based Password Managers R Zhao, C Yue, K Sun ASE Science Journal 1 (4), 1-15, 2013 | 25 | 2013 |
The Devil is Phishing: Rethinking Web Single Sign-On Systems Security C Yue USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 1-4, 2013 | 25 | 2013 |