Chuan Yue
Chuan Yue
Associate Professor of Computer Science, Colorado School of Mines
Verified email at - Homepage
Cited by
Cited by
Characterizing insecure javascript practices on the web
C Yue, H Wang
Proceedings of the 18th international conference on World wide web, 961-970, 2009
BogusBiter: A transparent protection against phishing attacks
C Yue, H Wang
ACM Transactions on Internet Technology (TOIT) 10 (2), 1-31, 2010
Real-time collaborative browsing
C Yue, H Wang
US Patent App. 12/567,295, 2010
Anti-phishing in offense and defense
C Yue, H Wang
2008 Annual Computer Security Applications Conference (ACSAC), 345-354, 2008
All Your Browser-saved Passwords Could Belong to Us: a Security Analysis and a Cloud-based New Design
R Zhao, C Yue
ACM Conference on Data and Applications Security (CODASPY), 2013
Toward a secure and usable cloud-based password manager for web browsers
R Zhao, C Yue
Computers & Security 46, 32-47, 2014
An automatic HTTP cookie management system
C Yue, M Xie, H Wang
Computer Networks 54 (13), 2182-2198, 2010
A measurement study of insecure javascript practices on the web
C Yue, H Wang
ACM Transactions on the Web (TWEB) 7 (2), 1-39, 2013
Automatic cookie usage setting with cookiepicker
C Yue, M Xie, H Wang
37th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2007
Client side username/password credential protection
C Yue, H Wang
US Patent 8,307,433, 2012
SessionMagnifier: A simple approach to secure and convenient kiosk browsing
C Yue, H Wang
Proceedings of the 11th international conference on Ubiquitous computing …, 2009
Phishing suspiciousness in older and younger adults: The role of executive functioning
BE Gavett, R Zhao, SE John, CA Bussell, JR Roberts, C Yue
Plos one 12 (2), e0171620, 2017
Profit-aware admission control for overload protection in e-commerce web sites
C Yue, H Wang
2007 Fifteenth IEEE International Workshop on Quality of Service, 188-193, 2007
Vulnerability and Risk Analysis of Two Commercial Browser and Cloud Based Password Managers
R Zhao, C Yue, K Sun
ASE Science Journal 1 (4), 1-15, 2013
The Devil is Phishing: Rethinking Web Single Sign-On Systems Security
C Yue
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 1-4, 2013
Profit-aware overload protection in E-commerce Web sites
C Yue, H Wang
Journal of Network and Computer Applications 32 (2), 347-356, 2009
SafeSky: a secure cloud storage middleware for end-user applications
R Zhao, C Yue, B Tak, C Tang
2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), 21-30, 2015
Automatic detection of information leakage vulnerabilities in browser extensions
R Zhao, C Yue, Q Yi
Proceedings of the 24th International Conference on World Wide Web, 1384-1394, 2015
Design and evaluation of the highly insidious extreme phishing attacks
R Zhao, S John, S Karas, C Bussell, J Roberts, D Six, B Gavett, C Yue
Computers & Security 70, 634-647, 2017
Teaching computer science with cybersecurity education built-in
C Yue
2016 {USENIX} Workshop on Advances in Security Education ({ASE} 16), 2016
The system can't perform the operation now. Try again later.
Articles 1–20