Name
Affiliation
Papers
CHUAN YUE
Coll William & Mary, Williamsburg, VA 23187 USA
50
Collaborators
Citations 
PageRank 
38
225
24.00
Referers 
Referees 
References 
508
1315
839
Search Limit
1001000
Title
Citations
PageRank
Year
Key-Based Input Transformation Defense Against Adversarial Examples00.342021
An intuitionistic fuzzy projection-based approach and application to software quality evaluation10.352020
Attention Please: Your Attention Check Questions in Survey Studies Can Be Automatically Answered00.342020
A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments.10.352020
A projection-based approach to software quality evaluation from the users’ perspectives10.352019
A normalized projection-based group decision-making method with heterogeneous decision information and application to software development effort assessment10.352019
Mining least privilege attribute based access control policies10.362019
Normalization of attribute values with interval information in group decision-making setting: with an application to software quality evaluation00.342019
Projection-based approach to group decision-making with hybrid information representations and application to software quality evaluation10.352019
An interval-valued intuitionistic fuzzy projection-based approach and application to evaluating knowledge transfer effectiveness10.352019
Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses.00.342019
Minimizing Privilege Assignment Errors in Cloud Services.10.372018
A novel approach to interval comparison and application to software quality evaluation.30.362018
Discover and Secure (DaS): An Automated Virtual Machine Security Management Framework00.342018
Normalized projection approach to group decision-making with hybrid decision information.60.392018
Two normalized projection models and application to group decision-making.50.382017
Entropy-based weights on decision makers in group decision-making setting with hybrid preference representations.110.472017
Cross-site Input Inference Attacks on Mobile Web Users.00.342017
Design and evaluation of the highly insidious extreme phishing attacks.10.362017
An Analysis Of Open Ports And Port Pairs In Ec2 Instances00.342017
Automated least privileges in cloud-based web services.00.342017
Sensor-Based Mobile Web Fingerprinting and Cross-Site Input Inference Attacks10.412016
Teaching Computer Science With Cybersecurity Education Built-in.10.362016
A geometric approach for ranking interval-valued intuitionistic fuzzy numbers with an application to group decision-making.30.392016
Automatic Detection of Information Leakage Vulnerabilities in Browser Extensions30.422015
SafeSky: A Secure Cloud Storage Middleware for End-User Applications30.652015
All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design140.742013
The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security.50.422013
A measurement study of insecure javascript practices on the web50.492013
Unveiling Privacy Setting Breaches in Online Social Networks.10.352013
A Security Analysis of Two Commercial Browser and Cloud Based Password Managers10.372013
Toward Secure and Convenient Browsing Data Management in the Cloud.10.362013
Preventing the revealing of online passwords to inappropriate websites with logininspector20.362012
A bidding strategy using genetic network programming with adjusting parameters for large-scale continuous double auction20.412012
Mitigating cross-site form history spamming attacks with domain-based ranking20.442011
Enhancing Bidding Strategy Using Genetic Network Programming In Agent-Based Multiple Round English Auction20.432011
No Time Limit And Time Limit Model Of Multiple Round Dutch Auction Based On Genetic Network Programming20.432011
BogusBiter: A transparent protection against phishing attacks291.142010
An automatic HTTP cookie management system60.532010
A bidding strategy of multiple round auctions based on Genetic Network Programming00.342010
Characterizing insecure javascript practices on the web562.602009
Secure passwords through enhanced hashing00.342009
Network intrusion detection using fuzzy class association rule mining based on genetic network programming10.402009
Profit-aware overload protection in E-commerce Web sites70.512009
SessionMagnifier: a simple approach to secure and convenient kiosk browsing50.442009
RCB: a simple and practical framework for real-time collaborative browsing20.422009
Anti-Phishing in Offense and Defense140.792008
Profit-aware Admission Control for Overload Protection in E-commerce Web Sites100.692007
Automatic Cookie Usage Setting with CookiePicker90.772007
Runtime and Programming Support for Memory Adaptation in Scientific Applications via Local Disk and Remote Memory40.492007