Chao Yang

Affiliations:
  • Texas A&M University, Department of Computer Science and Engineering, College Station, TX, USA


According to our database1, Chao Yang authored at least 14 papers between 2010 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2015
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2015

2014
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications.
Proceedings of the Computer Security - ESORICS 2014, 2014

A taste of tweets: reverse engineering Twitter spammers.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers.
IEEE Trans. Inf. Forensics Secur., 2013

CATS: Characterizing automation of Twitter spammers.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

NOMAD: Towards non-intrusive moving-target defense against web bots.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Active User-Side Evil Twin Access Point Detection Using Statistical Techniques.
IEEE Trans. Inf. Forensics Secur., 2012

Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
Proceedings of the 21st World Wide Web Conference 2012, 2012

PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Detecting money-stealing apps in alternative Android markets.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

2010
Who is peeping at your passwords at Starbucks? - To catch an evil twin access point.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010


  Loading...