Yinzhi Cao
Johns Hopkins University
H-index: 26
North America-United States
Top articles of Yinzhi Cao
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
RogueOne: Detecting Rogue Updates via Differential Data-flow Analysis Using Trust Domains | Raphael J Sofaer Yaniv David Mingqing Kang Jianjia Yu Yinzhi Cao | 2024/4/12 | |
Undefined-oriented Programming: Detecting and Chaining Prototype Pollution Gadgets in Node. js Template Engines for Malicious Consequences | Zhengyu Liu Kecheng An Yinzhi Cao | 2024/2/1 | |
Sneakyprompt: Jailbreaking text-to-image generative models | Yuchen Yang Bo Hui Haolin Yuan Neil Gong Yinzhi Cao | 2024/2/1 | |
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction | Bofei Chen Lei Zhang Xinyou Huang Yinzhi Cao Keke Lian | 2024/2/1 | |
Assessing Cybersecurity Vulnerabilities in Code Large Language Models | arXiv preprint arXiv:2404.18567 | Md Imran Hossen Jianyi Zhang Yinzhi Cao Xiali Hei | 2024/4/29 |
Trustllm: Trustworthiness in large language models | arXiv preprint arXiv:2401.05561 | Lichao Sun Yue Huang Haoran Wang Siyuan Wu Qihui Zhang | 2024/1/10 |
Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability | Mingqing Kang Yichao Xu Song Li Rigel Gjomemo Jianwei Hou | 2023/5/21 | |
Squint hard enough: attacking perceptual hashing with adversarial machine learning | Jonathan Prokos Neil Fendley Matthew Green Roei Schuster Eran Tromer | 2023 | |
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation | Jianjia Yu Song Li Junmin Zhu Yinzhi Cao | 2023/11/15 | |
{McFIL}: Model Counting {Functionality-Inherent} Leakage | Maximilian Zinkus Yinzhi Cao Matthew D Green | 2023 | |
Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps | Xiaolin Du Zhemin Yang Jiapeng Lin Yinzhi Cao Min Yang | 2023/10/17 | |
{PrivateFL}: Accurate, differentially private federated learning via personalized data transformation | Yuchen Yang Bo Hui Haolin Yuan Neil Gong Yinzhi Cao | 2023 | |
EdgeMixup: Embarrassingly Simple Data Alteration to Improve Lyme Disease Lesion Segmentation and Diagnosis Fairness | Haolin Yuan John Aucott Armin Hadzic William Paul Marcia Villegas de Flores | 2023/10/1 | |
Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites. | Shujiang Wu Pengfei Sun Yao Zhao Yinzhi Cao | 2023 | |
Understanding the (in) security of cross-side face verification systems in mobile apps: a system perspective | Xiaohan Zhang Haoqi Ye Ziqi Huang Xiao Ye Yinzhi Cao | 2023/5/21 | |
CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph | Faysal Hossain Shezan Zihao Su Mingqing Kang Nicholas Phair Patrick William Thomas | 2023 | |
MiniTaintDev: Unveiling Mini-App Vulnerabilities through Dynamic Taint Analysis | Jianjia Yu Zifeng Kang Yinzhi Cao | 2023/11/26 | |
Slowing down the aging of learning-based malware detectors with api knowledge | IEEE Transactions on Dependable and Secure Computing | Xiaohan Zhang Mi Zhang Yuan Zhang Ming Zhong Xin Zhang | 2022/1/25 |
Rendering contention channel made practical in web browsers | Shujiang Wu Jianjia Yu Min Yang Yinzhi Cao | 2022 | |
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities | IEEE Transactions on Dependable and Secure Computing | Ling Jin Yinzhi Cao Yan Chen Di Zhang Simone Campanoni | 2022/1/7 |