Follow
Yinzhi Cao
Yinzhi Cao
Verified email at jhu.edu
Title
Cited by
Cited by
Year
Deepxplore: Automated whitebox testing of deep learning systems
K Pei, Y Cao, J Yang, S Jana
proceedings of the 26th Symposium on Operating Systems Principles, 1-18, 2017
16862017
Towards making systems forget with machine unlearning
Y Cao, J Yang
2015 IEEE symposium on security and privacy, 463-480, 2015
6642015
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
2492015
Trustllm: Trustworthiness in large language models
Y Huang, L Sun, H Wang, S Wu, Q Zhang, Y Li, C Gao, Y Huang, W Lyu, ...
arXiv preprint arXiv:2401.05561, 2024
2242024
Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware
X Zhang, Y Zhang, M Zhong, D Ding, Y Cao, Y Zhang, M Zhang, M Yang
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
1832020
(Cross-)Browser Fingerprinting via OS and Hardware Level Features
Y Cao, S Li, E Wijmans
Proceedings of Network & Distributed System Security Symposium (NDSS), 2017
1652017
Practical blind membership inference attack via differential comparisons
B Hui, Y Yang, H Yuan, P Burlina, NZ Gong, Y Cao
Network and Distributed System Security Symposium (NDSS 2021), 2021
1382021
Towards practical verification of machine learning: The case of computer vision systems.
K Pei, Y Cao, J Yang, S Jana
arXiv preprint arXiv:1712.01785, 2017
1352017
Patchattack: A black-box texture-based attack with reinforcement learning
C Yang, A Kortylewski, C Xie, Y Cao, A Yuille
European Conference on Computer Vision, 681-698, 2020
1132020
Vetting SSL usage in applications with SSLINT
B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, R Yang, Z Zhang
2015 IEEE Symposium on Security and Privacy, 519-534, 2015
862015
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem
S Zhou, Z Yang, J Xiang, Y Cao, M Yang, Y Zhang
29th {USENIX} Security Symposium ({USENIX} Security 20), 2793-2810, 2020
722020
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.
Y Cao, V Yegneswaran, PA Porras, Y Chen
NDSS, 2012
702012
De-obfuscation and detection of malicious PDF files with high accuracy
X Lu, J Zhuge, R Wang, Y Cao, Y Chen
2013 46th Hawaii International Conference on System Sciences, 4890-4899, 2013
682013
Sneakyprompt: Jailbreaking text-to-image generative models
Y Yang, B Hui, H Yuan, N Gong, Y Cao
2024 IEEE symposium on security and privacy (SP), 897-912, 2024
67*2024
Cspautogen: Black-box enforcement of content security policy upon real-world websites
X Pan, Y Cao, S Liu, Y Zhou, Y Chen, T Zhou
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
622016
Detecting node.js prototype pollution vulnerabilities via object lookup analysis
S Li, M Kang, J Hou, Y Cao
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
562021
FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps
X Pan, Y Cao, X Du, B He, G Fang, R Shao, Y Chen
27th USENIX Security Symposium (USENIX Security 18), 1669-1685, 2018
56*2018
Efficient repair of polluted machine learning systems via causal unlearning
Y Cao, AF Yu, A Aday, E Stahl, J Merwine, J Yang
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
512018
Mining Node.js Vulnerabilities via Object Dependence Graph and Query
S Li, M Kang, J Hou, Y Cao
Proceedings of the USENIX Security Symposium, 2022
502022
I do not know what you visited last summer: Protecting users from third-party web tracking with trackingfree browser
X Pan, Y Cao, Y Chen
Proceedings of the 2015 Annual Network and Distributed System Security …, 2015
502015
The system can't perform the operation now. Try again later.
Articles 1–20