Verified email at
Cited by
Cited by
Empirical evaluation and new design for fighting evolving twitter spammers
C Yang, R Harkreader, G Gu
IEEE Transactions on Information Forensics and Security 8 (8), 1280-1293, 2013
Analyzing Spammer’s Social Networks for Fun and Profit
C Yang, R Harkreader, J Zhang, S Shin, G Gu
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers
C Yang, RC Harkreader, G Gu
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
Droidminer: Automated mining and characterization of fine-grained malicious behaviors in android applications
C Yang, Z Xu, G Gu, V Yegneswaran, P Porras
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
Attacks and design of image recognition CAPTCHAs
BB Zhu, J Yan, Q Li, C Yang, J Liu, N Xu, M Yi, K Cai
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Cats: Characterizing automation of twitter spammers
AA Amleshwaram, N Reddy, S Yadav, G Gu, C Yang
2013 Fifth International Conference on Communication Systems and Networks …, 2013
Who is peeping at your passwords at Starbucks?—To catch an evil twin access point
Y Song, C Yang, G Gu
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
Active user-side evil twin access point detection using statistical techniques
C Yang, Y Song, G Gu
IEEE Transactions on Information Forensics and Security 7 (5), 1638-1651, 2012
Nomad: Towards non-intrusive moving-target defense against web bots
S Vikram, C Yang, G Gu
2013 IEEE Conference on Communications and Network Security (CNS), 55-63, 2013
A taste of tweets: Reverse engineering twitter spammers
C Yang, J Zhang, G Gu
Proceedings of the 30th annual computer security applications conference, 86-95, 2014
Parsing façade with rank-one approximation
C Yang, T Han, L Quan, CL Tai
2012 IEEE Conference on Computer Vision and Pattern Recognition, 1720-1727, 2012
Using provenance patterns to vet sensitive behaviors in Android apps
C Yang, G Yang, A Gehani, V Yegneswaran, D Tariq, G Gu
Security and Privacy in Communication Networks: 11th EAI International …, 2015
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks
J Zhang, C Yang, Z Xu, G Gu
Detecting money-stealing apps in alternative android markets
C Yang, V Yegneswaran, P Porras, G Gu
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Understanding the market-level and network-level behaviors of the Android malware ecosystem
C Yang, J Zhang, G Gu
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
Security in wireless local area networks
L Chen, J Ji, Z Zhang, C Yang, G Gu
Wireless Network Security: Theories and Applications, 39-58, 2013
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks
Y Cao, C Yang, V Rastogi, Y Chen, G Gu
International Conference on Security and Privacy in Communication Networks …, 2015
Mining multiplex power-law distributions and retweeting patterns on twitter 1
B Jiang, C Yang, L Wang, R Li
Journal of Intelligent & Fuzzy Systems 31 (2), 1009-1016, 2016
An agent model with adaptive weight-based multi-objective algorithm for road-network congestion management
International Journal of Computer and Information Technology 3, 1188-1198, 2014
A Brownian Agent Model for Analyzing Changes in a Nation's Product Space Structure
B Jiang, C Yang, T Yamada, T Terano
International Journal of Intelligent Information Technologies (IJIIT) 11 (1 …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20