
Yinzhi Cao
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [i6]Bo Hui, Yuchen Yang, Haolin Yuan, Philippe Burlina, Neil Zhenqiang Gong, Yinzhi Cao:
Practical Blind Membership Inference Attack via Differential Comparisons. CoRR abs/2101.01341 (2021) - [i5]William Paul, Yinzhi Cao, Miaomiao Zhang, Philippe Burlina:
Defending Medical Image Diagnostics against Privacy Attacks using Generative Methods. CoRR abs/2103.03078 (2021) - 2020
- [c32]Xiaohan Zhang, Yuan Zhang, Ming Zhong, Daizong Ding, Yinzhi Cao, Yukun Zhang, Mi Zhang, Min Yang:
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware. CCS 2020: 757-770 - [c31]Zhanhao Chen, Yinzhi Cao:
JSKernel: Fortifying JavaScript against Web Concurrency Attacks via a Kernel-Like Structure. DSN 2020: 64-75 - [c30]Chenglin Yang, Adam Kortylewski, Cihang Xie, Yinzhi Cao, Alan L. Yuille:
PatchAttack: A Black-Box Texture-Based Attack with Reinforcement Learning. ECCV (26) 2020: 681-698 - [c29]Song Li, Yinzhi Cao:
Who Touched My Browser Fingerprint?: A Large-scale Measurement Study and Classification of Fingerprint Dynamics. Internet Measurement Conference 2020: 370-385 - [c28]Faysal Hossain Shezan, Kaiming Cheng, Zhen Zhang, Yinzhi Cao, Yuan Tian:
TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications. NDSS 2020 - [c27]Yuyu He, Lei Zhang, Zhemin Yang, Yinzhi Cao, Keke Lian, Shuai Li, Wei Yang, Zhibo Zhang, Min Yang, Yuan Zhang, Haixin Duan:
TextExerciser: Feedback-driven Text Input Exercising for Android Applications. IEEE Symposium on Security and Privacy 2020: 1071-1087 - [c26]Shunfan Zhou, Zhemin Yang, Jie Xiang, Yinzhi Cao, Min Yang, Yuan Zhang:
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem. USENIX Security Symposium 2020: 2793-2810 - [i4]Chenglin Yang, Adam Kortylewski, Cihang Xie, Yinzhi Cao, Alan L. Yuille:
PatchAttack: A Black-box Texture-based Attack with Reinforcement Learning. CoRR abs/2004.05682 (2020)
2010 – 2019
- 2019
- [j4]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: automated whitebox testing of deep learning systems. Commun. ACM 62(11): 137-145 (2019) - [j3]Kexin Pei, Shiqi Wang, Yuchi Tian, Justin Whitehouse, Carl Vondrick, Yinzhi Cao, Baishakhi Ray, Suman Jana, Junfeng Yang:
Bringing Engineering Rigor to Deep Learning. ACM SIGOPS Oper. Syst. Rev. 53(1): 59-67 (2019) - [c25]Shujiang Wu, Song Li, Yinzhi Cao, Ningfei Wang:
Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting. USENIX Security Symposium 2019: 1645-1660 - 2018
- [j2]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: Automated Whitebox Testing of Deep Learning Systems. GetMobile Mob. Comput. Commun. 22(3): 36-38 (2018) - [c24]Yinzhi Cao, Alexander Fangxiao Yu, Andrew Aday, Eric Stahl, Jon Merwine, Junfeng Yang:
Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning. AsiaCCS 2018: 735-747 - [c23]Zhiheng Liu, Zhen Zhang, Yinzhi Cao, Zhaohan Xi, Shihao Jing, Humberto La Roche:
Towards a Secure Zero-rating Framework with Three Parties. USENIX Security Symposium 2018: 711-728 - [c22]Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, Yan Chen:
FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps. USENIX Security Symposium 2018: 1669-1685 - 2017
- [c21]Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu:
Deterministic Browser. CCS 2017: 163-178 - [c20]Yinzhi Cao, Song Li, Erik Wijmans:
(Cross-)Browser Fingerprinting via OS and Hardware Level Features. NDSS 2017 - [c19]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: Automated Whitebox Testing of Deep Learning Systems. SOSP 2017: 1-18 - [i3]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: Automated Whitebox Testing of Deep Learning Systems. CoRR abs/1705.06640 (2017) - [i2]Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu:
Deterministic Browser. CoRR abs/1708.06774 (2017) - [i1]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems. CoRR abs/1712.01785 (2017) - 2016
- [c18]Xiang Pan, Yinzhi Cao, Shuangping Liu, Yu Zhou, Yan Chen, Tingzhe Zhou:
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites. CCS 2016: 653-665 - 2015
- [c17]Yinzhi Cao, Xiang Pan, Yan Chen:
SafePay: Protecting against credit card forgery with existing magnetic card readers. CNS 2015: 164-172 - [c16]Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen:
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. NDSS 2015 - [c15]Xiang Pan, Yinzhi Cao, Yan Chen:
I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser. NDSS 2015 - [c14]Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen:
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android. SecureComm 2015: 256-276 - [c13]Yinzhi Cao, Junfeng Yang:
Towards Making Systems Forget with Machine Unlearning. IEEE Symposium on Security and Privacy 2015: 463-480 - [c12]Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V. N. Venkatakrishnan, Runqing Yang, Zhenrui Zhang:
Vetting SSL Usage in Applications with SSLINT. IEEE Symposium on Security and Privacy 2015: 519-534 - 2014
- [c11]Yinzhi Cao, Xiang Pan, Yan Chen, Jianwei Zhuge:
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks. ACSAC 2014: 466-475 - [c10]Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen:
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. RAID 2014: 276-298 - [c9]Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen, Guofei Gu:
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks. SecureComm (1) 2014: 582-601 - 2013
- [j1]Yao Zhao, Yinzhi Cao, Yan Chen, Ming Zhang, Anup Goyal:
Rake: Semantics Assisted Network-Based Tracing Framework. IEEE Trans. Netw. Serv. Manag. 10(1): 3-14 (2013) - [c8]Yinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, Alexander Moshchuk:
Redefining web browser principals with a Configurable Origin Policy. DSN 2013: 1-12 - [c7]Xun Lu, Jianwei Zhuge, Ruoyu Wang, Yinzhi Cao, Yan Chen:
De-obfuscation and Detection of Malicious PDF Files with High Accuracy. HICSS 2013: 4890-4899 - 2012
- [c6]Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen, Xitao Wen:
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security. AsiaCCS 2012: 8-9 - [c5]Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. NDSS 2012 - 2011
- [c4]Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
Poster: a path-cutting approach to blocking XSS worms in social web networks. CCS 2011: 745-748 - [c3]Yao Zhao, Yinzhi Cao, Yan Chen, Ming Zhang, Anup Goyal:
Rake: Semantics assisted network-based tracing framework. IWQoS 2011: 1-9 - [c2]Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu, Clint Sbisa:
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. NDSS 2011 - 2010
- [c1]Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen:
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality. CCS 2010: 654-656
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-08 11:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint