Follow
Yizheng Chen
Title
Cited by
Cited by
Year
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1652017
Mixtrain: Scalable training of verifiably robust neural networks
S Wang, Y Chen, A Abdou, S Jana
arXiv preprint arXiv:1811.02625, 2018
992018
Practical attacks against graph-based clustering
Y Chen, Y Nadji, A Kountouras, F Monrose, R Perdisci, M Antonakakis, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
992017
Enabling network security through active DNS datasets
A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ...
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
932016
On Training Robust PDF Malware Classifiers
Y Chen, S Wang, D She, S Jana
USENIX Security Symposium 2020, 2020
882020
DNS noise: Measuring the pervasiveness of disposable domains in modern DNS traffic
Y Chen, M Antonakakis, R Perdisci, Y Nadji, D Dagon, W Lee
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
662014
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection
Y Chen, Z Ding, X Chen, D Wagner
International Symposium on Research in Attacks, Intrusions and Defenses …, 2023
642023
Neutaint: Efficient Dynamic Taint Analysis with Neural Networks
D She, Y Chen, B Ray, S Jana
IEEE Symposium on Security and Privacy 2020, 2020
642020
SEAT: Similarity encoder by adversarial training for detecting model extraction attack queries
Z Zhang, Y Chen, D Wagner
Proceedings of the 14th ACM Workshop on artificial intelligence and security …, 2021
322021
Learning Security Classifiers with Verified Global Robustness Properties
Y Chen, S Wang, Y Qin, X Liao, S Jana, D Wagner
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
322021
Cost-Aware Robust Tree Ensembles for Security Applications
Y Chen, S Wang, W Jiang, A Cidon, S Jana
USENIX Security Symposium 2021, 2020
252020
On the feasibility of large-scale infections of ios devices
T Wang, Y Jang, Y Chen, S Chung, B Lau, W Lee
23rd USENIX Security Symposium (USENIX Security 14), 79-93, 2014
242014
Continuous Learning for Android Malware Detection
Y Chen, Z Ding, D Wagner
USENIX Security Symposium 2023, 2023
222023
Financial Lower Bounds of Online Advertising Abuse: A Four Year Case Study of the TDSS/TDL4 Botnet
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, W Lee, M Farrell
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
202016
Enhancing gradient-based attacks with symbolic intervals
S Wang, Y Chen, A Abdou, S Jana
ICML Workshop on Security and Privacy of Machine Learning, 2019
112019
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 botnet
Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, M Farrell
Computers & Security 67, 164-180, 2017
112017
Part-Based Models Improve Adversarial Robustness
C Sitawarin, K Pongmala, Y Chen, N Carlini, D Wagner
International Conference on Learning Representations 2023, 2022
102022
Measuring network reputation in the ad-bidding process
Y Chen, Y Nadji, R Romero-Gómez, M Antonakakis, D Dagon
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
102017
FeatNet: large-scale fraud device detection by network representation learning with rich features
C Xu, Z Feng, Y Chen, M Wang, T Wei
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security …, 2018
92018
Vulnerability Detection with Code Language Models: How Far Are We?
Y Ding, Y Fu, O Ibrahim, C Sitawarin, X Chen, B Alomair, D Wagner, ...
IEEE/ACM International Conference on Software Engineering (ICSE 2025), 2024
52024
The system can't perform the operation now. Try again later.
Articles 1–20