Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces. V Rastogi, R Shao, Y Chen, X Pan, S Zou, RD Riley NDSS, 2016 | 93 | 2016 |
Cspautogen: Black-box enforcement of content security policy upon real-world websites X Pan, Y Cao, S Liu, Y Zhou, Y Chen, T Zhou Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 62 | 2016 |
{FlowCog}: Context-aware semantics extraction and analysis of information flow leaks in android apps X Pan, Y Cao, X Du, B He, G Fang, R Shao, Y Chen 27th USENIX Security Symposium (USENIX Security 18), 1669-1685, 2018 | 50 | 2018 |
I do not know what you visited last summer: Protecting users from third-party web tracking with trackingfree browser X Pan, Y Cao, Y Chen Proceedings of the 2015 Annual Network and Distributed System Security …, 2015 | 50 | 2015 |
JShield: Towards real-time and vulnerability-based detection of polluted drive-by download attacks Y Cao, X Pan, Y Chen, J Zhuge Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 34 | 2014 |
Understanding in-app ads and detecting hidden attacks through the mobile app-web interface R Shao, V Rastogi, Y Chen, X Pan, G Guo, S Zou, R Riley IEEE Transactions on Mobile Computing 17 (11), 2675-2688, 2018 | 24 | 2018 |
HogMap: Using SDNs to incentivize collaborative security monitoring X Pan, V Yegneswaran, Y Chen, P Porras, S Shin Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016 | 17 | 2016 |
Malicious code detection technologies Y Cao, X Pan, Y Chen, J Zhuge, X Qian, J Fu US Patent 9,213,839, 2015 | 14 | 2015 |
Learning based malicious web sites detection using suspicious URLs H Liu, X Pan, Z Qu Software Engineering, 2016 | 13 | 2016 |
Xuechao Du, Boyuan He, Gan Fang, Rui Shao, and Yan Chen. 2018. FlowCog: context-aware semantics extraction and analysis of information flow leaks in android apps X Pan, Y Cao 27th {USENIX} Security Symposium ({USENIX} Security 18), 1669-1685, 0 | 9 | |
SafePay: Protecting against credit card forgery with existing magnetic card readers Y Cao, X Pan, Y Chen 2015 IEEE Conference on Communications and Network Security (CNS), 164-172, 2015 | 8 | 2015 |
Flowcog: Context-aware semantic extraction and analysis of information flow leaks in android apps X Du, X Pan, Y Cao, B He, G Fan, Y Chen, D Xu IEEE Transactions on Mobile Computing 22 (11), 6460-6476, 2022 | 4 | 2022 |
Detecting hidden attacks through the mobile app-web interfaces V Rastogi, R Shao, Y Chen, X Pan, S Zou, R Riley 2016 Network and Distributed System Security Symposium (NDSS), 2016 | 4 | 2016 |