Yinzhi Cao

Yinzhi Cao

Johns Hopkins University

H-index: 26

North America-United States

About Yinzhi Cao

Yinzhi Cao, With an exceptional h-index of 26 and a recent h-index of 21 (since 2020), a distinguished researcher at Johns Hopkins University, specializes in the field of Computer Security.

His recent articles reflect a diverse array of research interests and contributions to the field:

RogueOne: Detecting Rogue Updates via Differential Data-flow Analysis Using Trust Domains

Undefined-oriented Programming: Detecting and Chaining Prototype Pollution Gadgets in Node. js Template Engines for Malicious Consequences

Sneakyprompt: Jailbreaking text-to-image generative models

Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction

Assessing Cybersecurity Vulnerabilities in Code Large Language Models

Trustllm: Trustworthiness in large language models

Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability

Squint hard enough: attacking perceptual hashing with adversarial machine learning

Yinzhi Cao Information

University

Position

___

Citations(all)

3722

Citations(since 2020)

3045

Cited By

1548

hIndex(all)

26

hIndex(since 2020)

21

i10Index(all)

38

i10Index(since 2020)

35

Email

University Profile Page

Johns Hopkins University

Google Scholar

View Google Scholar Profile

Yinzhi Cao Skills & Research Interests

Computer Security

Top articles of Yinzhi Cao

Title

Journal

Author(s)

Publication Date

RogueOne: Detecting Rogue Updates via Differential Data-flow Analysis Using Trust Domains

Raphael J Sofaer

Yaniv David

Mingqing Kang

Jianjia Yu

Yinzhi Cao

...

2024/4/12

Undefined-oriented Programming: Detecting and Chaining Prototype Pollution Gadgets in Node. js Template Engines for Malicious Consequences

Zhengyu Liu

Kecheng An

Yinzhi Cao

2024/2/1

Sneakyprompt: Jailbreaking text-to-image generative models

Yuchen Yang

Bo Hui

Haolin Yuan

Neil Gong

Yinzhi Cao

2024/2/1

Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction

Bofei Chen

Lei Zhang

Xinyou Huang

Yinzhi Cao

Keke Lian

...

2024/2/1

Assessing Cybersecurity Vulnerabilities in Code Large Language Models

arXiv preprint arXiv:2404.18567

Md Imran Hossen

Jianyi Zhang

Yinzhi Cao

Xiali Hei

2024/4/29

Trustllm: Trustworthiness in large language models

arXiv preprint arXiv:2401.05561

Lichao Sun

Yue Huang

Haoran Wang

Siyuan Wu

Qihui Zhang

...

2024/1/10

Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability

Mingqing Kang

Yichao Xu

Song Li

Rigel Gjomemo

Jianwei Hou

...

2023/5/21

Squint hard enough: attacking perceptual hashing with adversarial machine learning

Jonathan Prokos

Neil Fendley

Matthew Green

Roei Schuster

Eran Tromer

...

2023

CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation

Jianjia Yu

Song Li

Junmin Zhu

Yinzhi Cao

2023/11/15

{McFIL}: Model Counting {Functionality-Inherent} Leakage

Maximilian Zinkus

Yinzhi Cao

Matthew D Green

2023

Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps

Xiaolin Du

Zhemin Yang

Jiapeng Lin

Yinzhi Cao

Min Yang

2023/10/17

{PrivateFL}: Accurate, differentially private federated learning via personalized data transformation

Yuchen Yang

Bo Hui

Haolin Yuan

Neil Gong

Yinzhi Cao

2023

EdgeMixup: Embarrassingly Simple Data Alteration to Improve Lyme Disease Lesion Segmentation and Diagnosis Fairness

Haolin Yuan

John Aucott

Armin Hadzic

William Paul

Marcia Villegas de Flores

...

2023/10/1

Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites.

Shujiang Wu

Pengfei Sun

Yao Zhao

Yinzhi Cao

2023

Understanding the (in) security of cross-side face verification systems in mobile apps: a system perspective

Xiaohan Zhang

Haoqi Ye

Ziqi Huang

Xiao Ye

Yinzhi Cao

...

2023/5/21

CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph

Faysal Hossain Shezan

Zihao Su

Mingqing Kang

Nicholas Phair

Patrick William Thomas

...

2023

MiniTaintDev: Unveiling Mini-App Vulnerabilities through Dynamic Taint Analysis

Jianjia Yu

Zifeng Kang

Yinzhi Cao

2023/11/26

Slowing down the aging of learning-based malware detectors with api knowledge

IEEE Transactions on Dependable and Secure Computing

Xiaohan Zhang

Mi Zhang

Yuan Zhang

Ming Zhong

Xin Zhang

...

2022/1/25

Rendering contention channel made practical in web browsers

Shujiang Wu

Jianjia Yu

Min Yang

Yinzhi Cao

2022

ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities

IEEE Transactions on Dependable and Secure Computing

Ling Jin

Yinzhi Cao

Yan Chen

Di Zhang

Simone Campanoni

2022/1/7

See List of Professors in Yinzhi Cao University(Johns Hopkins University)

Co-Authors

H-index: 115
Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

H-index: 60
Yan Chen

Yan Chen

North Western University

H-index: 46
Neil Zhenqiang Gong

Neil Zhenqiang Gong

Duke University

H-index: 43
Suman Jana

Suman Jana

Columbia University in the City of New York

H-index: 40
Philippe Burlina

Philippe Burlina

Johns Hopkins University

academic-engine