Chuan Yue

Orcid: 0000-0002-6095-4768

Affiliations:
  • Colorado School of Mines, Golden, CO, USA


According to our database1, Chuan Yue authored at least 82 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Data reweighting net for web fine-grained image classification.
Multim. Tools Appl., October, 2024

An entropy-based group decision-making approach for software quality evaluation.
Expert Syst. Appl., March, 2024

A software trustworthiness evaluation methodology for cloud services with picture fuzzy information.
Appl. Soft Comput., 2024

2023
A Tale of Two Communities: Privacy of Third Party App Users in Crowdsourcing - The Case of Receipt Transcription.
Proc. ACM Hum. Comput. Interact., 2023

WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Coverage and Secure Use Analysis of Content Security Policies via Clustering.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Exploring the Negotiation Behaviors of Owners and Bystanders over Data Practices of Smart Home Devices.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

PolicyChecker: Analyzing the GDPR Completeness of Mobile Apps' Privacy Policies.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A VIKOR-based group decision-making approach to software reliability evaluation.
Soft Comput., 2022

Exploring the Privacy Concerns of Bystanders in Smart Homes from the Perspectives of Both Owners and Bystanders.
Proc. Priv. Enhancing Technol., 2022

Fuzzing-based hard-label black-box attacks against machine learning models.
Comput. Secur., 2022

WTAGRAPH: Web Tracking and Advertising Detection using Graph Neural Networks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Question Answering Models for Privacy Policies of Mobile Apps: Are We There Yet?
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

SecQuant: Quantifying Container System Call Exposure.
Proceedings of the Computer Security - ESORICS 2022, 2022

Generating Content-Preserving and Semantics-Flipping Adversarial Text.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Quality Control in Crowdsourcing based on Fine-Grained Behavioral Features.
Proc. ACM Hum. Comput. Interact., 2021

Attribute Normalization Approaches to Group Decision-making and Application to Software Reliability Assessment.
Cogn. Comput., 2021

An Ensemble Intrusion Detection Method for Train Ethernet Consist Network Based on CNN and RNN.
IEEE Access, 2021

Anomaly Detection and Attack Classification for Train Real-Time Ethernet.
IEEE Access, 2021

Key-Based Input Transformation Defense Against Adversarial Examples.
Proceedings of the IEEE International Performance, 2021

2020
An intuitionistic fuzzy projection-based approach and application to software quality evaluation.
Soft Comput., 2020

A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments.
Proc. Priv. Enhancing Technol., 2020

Picture fuzzy normalized projection and extended VIKOR approach to software reliability assessment.
Appl. Soft Comput., 2020

Attention Please: Your Attention Check Questions in Survey Studies Can Be Automatically Answered.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Visualizing and Interpreting RNN Models in URL-based Phishing Detection.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Security and Privacy Analysis of Android Family Locator Apps.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Attacking and Protecting Tunneled Traffic of Smart Home Devices.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Distinguishability of adversarial examples.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses.
IEEE Trans. Inf. Forensics Secur., 2019

An interval-valued intuitionistic fuzzy projection-based approach and application to evaluating knowledge transfer effectiveness.
Neural Comput. Appl., 2019

A projection-based approach to software quality evaluation from the users' perspectives.
Int. J. Mach. Learn. Cybern., 2019

带有区间信息的软件质量评价模型 (Evaluation Model of Software Quality with Interval Data).
计算机科学, 2019

Normalization of attribute values with interval information in group decision-making setting: with an application to software quality evaluation.
J. Exp. Theor. Artif. Intell., 2019

Projection-based approach to group decision-making with hybrid information representations and application to software quality evaluation.
Comput. Ind. Eng., 2019

A normalized projection-based group decision-making method with heterogeneous decision information and application to software development effort assessment.
Appl. Intell., 2019

Mining least privilege attribute based access control policies.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Normalized projection approach to group decision-making with hybrid decision information.
Int. J. Mach. Learn. Cybern., 2018

A novel approach to interval comparison and application to software quality evaluation.
J. Exp. Theor. Artif. Intell., 2018

Effective Mobile Web User Fingerprinting via Motion Sensors.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Website Fingerprinting by Power Estimation Based Side-Channel Attacks on Android 7.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Discover and Secure (DaS): An Automated Virtual Machine Security Management Framework.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Minimizing Privilege Assignment Errors in Cloud Services.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Two normalized projection models and application to group decision-making.
J. Intell. Fuzzy Syst., 2017

Design and evaluation of the highly insidious extreme phishing attacks.
Comput. Secur., 2017

Entropy-based weights on decision makers in group decision-making setting with hybrid preference representations.
Appl. Soft Comput., 2017

Cross-site Input Inference Attacks on Mobile Web Users.
Proceedings of the Security and Privacy in Communication Networks, 2017

Automated least privileges in cloud-based web services.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

An Analysis of Open Ports and Port Pairs in EC2 Instances.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
A geometric approach for ranking interval-valued intuitionistic fuzzy numbers with an application to group decision-making.
Comput. Ind. Eng., 2016

Teaching Computer Science With Cybersecurity Education Built-in.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

Sensor-Based Mobile Web Fingerprinting and Cross-Site Input Inference Attacks.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

The Highly Insidious Extreme Phishing Attacks.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Automatic Detection of Information Leakage Vulnerabilities in Browser Extensions.
Proceedings of the 24th International Conference on World Wide Web, 2015

SafeSky: A Secure Cloud Storage Middleware for End-User Applications.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

2014
Toward a secure and usable cloud-based password manager for web browsers.
Comput. Secur., 2014

2013
A measurement study of insecure javascript practices on the web.
ACM Trans. Web, 2013

A Security Analysis of Two Commercial Browser and Cloud Based Password Managers.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Unveiling Privacy Setting Breaches in Online Social Networks.
Proceedings of the Security and Privacy in Communication Networks, 2013

The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security.
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013

Toward Secure and Convenient Browsing Data Management in the Cloud.
Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing, 2013

All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
A bidding strategy using genetic network programming with adjusting parameters for large-scale continuous double auction.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector.
Proceedings of the Strategies, 2012

2011
Enhancing Bidding Strategy Using Genetic Network Programming in Agent-Based Multiple Round English Auction.
J. Adv. Comput. Intell. Intell. Informatics, 2011

No Time Limit and Time Limit Model of Multiple Round Dutch Auction Based on Genetic Network Programming.
J. Adv. Comput. Intell. Intell. Informatics, 2011

A bidding strategy for Continuous Double Auctions based on Genetic Network Programming with generalized judgments.
Proceedings of the IEEE International Conference on Systems, 2011

Mitigating Cross-Site Form History Spamming Attacks with Domain-Based Ranking.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

2010
BogusBiter: A transparent protection against phishing attacks.
ACM Trans. Internet Techn., 2010

An automatic HTTP cookie management system.
Comput. Networks, 2010

A bidding strategy of multiple round auctions based on Genetic Network Programming.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

2009
Profit-aware overload protection in E-commerce Web sites.
J. Netw. Comput. Appl., 2009

Characterizing insecure javascript practices on the web.
Proceedings of the 18th International Conference on World Wide Web, 2009

RCB: A Simple and Practical Framework for Real-time Collaborative Browsing.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

Network Intrusion Detection using Fuzzy Class Association Rule Mining Based on Genetic Network Programming.
Proceedings of the IEEE International Conference on Systems, 2009

Secure Passwords Through Enhanced Hashing.
Proceedings of the 23rd Large Installation System Administration Conference, 2009

SessionMagnifier: a simple approach to secure and convenient kiosk browsing.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

Efficient resource management on template-based web servers.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Anti-Phishing in Offense and Defense.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Runtime and Programming Support for Memory Adaptation in Scientific Applications via Local Disk and Remote Memory.
J. Grid Comput., 2007

Profit-aware Admission Control for Overload Protection in E-commerce Web Sites.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

Automatic Cookie Usage Setting with CookiePicker.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Runtime Support for Memory Adaptation in Scientific Applications via Local Disk and Remote Memory.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006


  Loading...