Name
Papers
Collaborators
YINZHI CAO
38
102
Citations 
PageRank 
Referers 
297
18.73
1027
Referees 
References 
1148
506
Search Limit
1001000
Title
Citations
PageRank
Year
Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches00.342022
GraphTrack: A Graph-based Cross-Device Tracking Framework.00.342022
Mining Node.js Vulnerabilities via Object Dependence Graph and Query00.342022
Detecting Node.js prototype pollution vulnerabilities via object lookup analysis00.342021
Practical Blind Membership Inference Attack Via Differential Comparisons10.352021
Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks10.342021
TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications00.342020
TextExerciser: Feedback-driven Text Input Exercising for Android Applications00.342020
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware50.432020
JSKernel: Fortifying JavaScript against Web Concurrency Attacks via a Kernel-Like Structure00.342020
Who Touched My Browser Fingerprint?: A Large-scale Measurement Study and Classification of Fingerprint Dynamics00.342020
Rendered Private: Making Glsl Execution Uniform To Prevent Webgl-Based Browser Fingerprinting00.342019
Bringing Engineering Rigor to Deep Learning00.342019
Session details: Session 8C: Information Flow00.342018
Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning.00.342018
Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning.20.482018
Deterministic Browser.10.352017
DeepXplore: Automated Whitebox Testing of Deep Learning Systems.892.062017
Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems.50.462017
(Cross-)Browser Fingerprinting via OS and Hardware Level Features.130.642017
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites.80.502016
SafePay: Protecting against credit card forgery with existing magnetic card readers10.352015
Towards Making Systems Forget with Machine Unlearning170.662015
Vetting SSL Usage in Applications with SSLINT120.562015
I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser.10.352015
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.581.342015
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android.90.482015
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.30.412014
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks.00.342014
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks.100.512014
De-obfuscation and Detection of Malicious PDF Files with High Accuracy110.562013
Redefining web browser principals with a Configurable Origin Policy70.532013
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security70.472012
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.210.792012
Rake: Semantics assisted network-based tracing framework20.402011
Poster: a path-cutting approach to blocking XSS worms in social web networks00.342011
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.110.582011
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality20.382010