default search action
Chuan Yue
Person information
- affiliation: Colorado School of Mines, Golden, CO, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Chuan Yue:
A software trustworthiness evaluation methodology for cloud services with picture fuzzy information. Appl. Soft Comput. 152: 111205 (2024) - [j34]Chuan Yue, Rubing Huang, Dave Towey, Zixiang Xian, Guohua Wu:
An entropy-based group decision-making approach for software quality evaluation. Expert Syst. Appl. 238(Part C): 121979 (2024) - [j33]Yifeng Liu, Zhenxin Wu, Sio-Long Lo, Zhenqiang Chen, Gang Ke, Chuan Yue:
Data reweighting net for web fine-grained image classification. Multim. Tools Appl. 83(33): 79985-80005 (2024) - 2023
- [j32]Weiping Pei, Yanina Likhtenshteyn, Chuan Yue:
A Tale of Two Communities: Privacy of Third Party App Users in Crowdsourcing - The Case of Receipt Transcription. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-43 (2023) - [c47]Anhao Xiang, Weiping Pei, Chuan Yue:
PolicyChecker: Analyzing the GDPR Completeness of Mobile Apps' Privacy Policies. CCS 2023: 3373-3387 - [c46]Ahmed Alshehri, Eugin Pahk, Joseph Spielman, Jacob T. Parker, Benjamin Gilbert, Chuan Yue:
Exploring the Negotiation Behaviors of Owners and Bystanders over Data Practices of Smart Home Devices. CHI 2023: 67:1-67:27 - [c45]Mengxia Ren, Chuan Yue:
Coverage and Secure Use Analysis of Content Security Policies via Clustering. EuroS&P 2023: 411-428 - [c44]Mengxia Ren, Joshua Josey, Chuan Yue:
WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies. SciSec 2023: 305-318 - 2022
- [j31]Yi Qin, Chuan Yue:
Fuzzing-based hard-label black-box attacks against machine learning models. Comput. Secur. 117: 102694 (2022) - [j30]Ahmed Alshehri, Joseph Spielman, Amiya Prasad, Chuan Yue:
Exploring the Privacy Concerns of Bystanders in Smart Homes from the Perspectives of Both Owners and Bystanders. Proc. Priv. Enhancing Technol. 2022(3): 99-119 (2022) - [j29]Chuan Yue:
A VIKOR-based group decision-making approach to software reliability evaluation. Soft Comput. 26(18): 9445-9464 (2022) - [c43]Weiping Pei, Chuan Yue:
Generating Content-Preserving and Semantics-Flipping Adversarial Text. AsiaCCS 2022: 975-989 - [c42]Sunwoo Jang, Somin Song, Byungchul Tak, Sahil Suneja, Michael V. Le, Chuan Yue, Dan Williams:
SecQuant: Quantifying Container System Call Exposure. ESORICS (2) 2022: 145-166 - [c41]Khalid Alkhattabi, Davita Bird, Kai Miller, Chuan Yue:
Question Answering Models for Privacy Policies of Mobile Apps: Are We There Yet? SciSec 2022: 333-352 - [c40]Zhiju Yang, Weiping Pei, Monchu Chen, Chuan Yue:
WTAGRAPH: Web Tracking and Advertising Detection using Graph Neural Networks. SP 2022: 1540-1557 - 2021
- [j28]Ruifeng Duo, Xiaobo Nie, Ning Yang, Chuan Yue, Yongxiang Wang:
Anomaly Detection and Attack Classification for Train Real-Time Ethernet. IEEE Access 9: 22528-22541 (2021) - [j27]Chuan Yue, Lide Wang, Dengrui Wang, Ruifeng Duo, Xiaobo Nie:
An Ensemble Intrusion Detection Method for Train Ethernet Consist Network Based on CNN and RNN. IEEE Access 9: 59527-59539 (2021) - [j26]Chuan Yue:
Attribute Normalization Approaches to Group Decision-making and Application to Software Reliability Assessment. Cogn. Comput. 13(1): 139-163 (2021) - [j25]Weiping Pei, Zhiju Yang, Monchu Chen, Chuan Yue:
Quality Control in Crowdsourcing based on Fine-Grained Behavioral Features. Proc. ACM Hum. Comput. Interact. 5(CSCW2): 442:1-442:28 (2021) - [c39]Yi Qin, Chuan Yue:
Key-Based Input Transformation Defense Against Adversarial Examples. IPCCC 2021: 1-10 - 2020
- [j24]Chuan Yue:
Picture fuzzy normalized projection and extended VIKOR approach to software reliability assessment. Appl. Soft Comput. 88: 106056 (2020) - [j23]Zhiju Yang, Chuan Yue:
A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments. Proc. Priv. Enhancing Technol. 2020(2): 24-44 (2020) - [j22]Chuan Yue:
An intuitionistic fuzzy projection-based approach and application to software quality evaluation. Soft Comput. 24(1): 429-443 (2020) - [c38]Yi Qin, Ryan Hunt, Chuan Yue:
Distinguishability of adversarial examples. ARES 2020: 12:1-12:10 - [c37]Ahmed Alshehri, Jacob Granley, Chuan Yue:
Attacking and Protecting Tunneled Traffic of Smart Home Devices. CODASPY 2020: 259-270 - [c36]Tao Feng, Chuan Yue:
Visualizing and Interpreting RNN Models in URL-based Phishing Detection. SACMAT 2020: 13-24 - [c35]Khalid Alkhattabi, Ahmed Alshehri, Chuan Yue:
Security and Privacy Analysis of Android Family Locator Apps. SACMAT 2020: 47-58 - [c34]Weiping Pei, Arthur Mayer, Kaylynn Tu, Chuan Yue:
Attention Please: Your Attention Check Questions in Survey Studies Can Be Automatically Answered. WWW 2020: 1182-1193
2010 – 2019
- 2019
- [j21]Chuan Yue:
A normalized projection-based group decision-making method with heterogeneous decision information and application to software development effort assessment. Appl. Intell. 49(10): 3587-3605 (2019) - [j20]Chuan Yue:
Projection-based approach to group decision-making with hybrid information representations and application to software quality evaluation. Comput. Ind. Eng. 132: 98-113 (2019) - [j19]Chuan Yue:
Normalization of attribute values with interval information in group decision-making setting: with an application to software quality evaluation. J. Exp. Theor. Artif. Intell. 31(3): 475-492 (2019) - [j18]Chuan Yue, Xiaohong Peng:
带有区间信息的软件质量评价模型 (Evaluation Model of Software Quality with Interval Data). 计算机科学 46(10): 209-214 (2019) - [j17]Chuan Yue:
A projection-based approach to software quality evaluation from the users' perspectives. Int. J. Mach. Learn. Cybern. 10(9): 2341-2353 (2019) - [j16]Chuan Yue:
An interval-valued intuitionistic fuzzy projection-based approach and application to evaluating knowledge transfer effectiveness. Neural Comput. Appl. 31(11): 7685-7706 (2019) - [j15]Rui Zhao, Chuan Yue, Qi Han:
Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses. IEEE Trans. Inf. Forensics Secur. 14(1): 75-89 (2019) - [c33]Matthew W. Sanders, Chuan Yue:
Mining least privilege attribute based access control policies. ACSAC 2019: 404-416 - 2018
- [j14]Chuan Yue:
A novel approach to interval comparison and application to software quality evaluation. J. Exp. Theor. Artif. Intell. 30(5): 583-602 (2018) - [j13]Chuan Yue:
Normalized projection approach to group decision-making with hybrid decision information. Int. J. Mach. Learn. Cybern. 9(8): 1365-1375 (2018) - [c32]Matthew W. Sanders, Chuan Yue:
Minimizing Privilege Assignment Errors in Cloud Services. CODASPY 2018: 2-12 - [c31]Beaulah A. Navamani, Chuan Yue, Xiaobo Zhou:
Discover and Secure (DaS): An Automated Virtual Machine Security Management Framework. IPCCC 2018: 1-6 - [c30]Yi Qin, Chuan Yue:
Website Fingerprinting by Power Estimation Based Side-Channel Attacks on Android 7. TrustCom/BigDataSE 2018: 1030-1039 - [c29]Zhiju Yang, Rui Zhao, Chuan Yue:
Effective Mobile Web User Fingerprinting via Motion Sensors. TrustCom/BigDataSE 2018: 1398-1405 - 2017
- [j12]Chuan Yue:
Entropy-based weights on decision makers in group decision-making setting with hybrid preference representations. Appl. Soft Comput. 60: 737-749 (2017) - [j11]Rui Zhao, Samantha John, Stacy Karas, Cara Bussell, Jennifer Roberts, Daniel Six, Brandon Gavett, Chuan Yue:
Design and evaluation of the highly insidious extreme phishing attacks. Comput. Secur. 70: 634-647 (2017) - [j10]Chuan Yue:
Two normalized projection models and application to group decision-making. J. Intell. Fuzzy Syst. 32(6): 4389-4402 (2017) - [c28]Beaulah A. Navamani, Chuan Yue, Xiaobo Zhou:
An Analysis of Open Ports and Port Pairs in EC2 Instances. CLOUD 2017: 790-793 - [c27]Matthew W. Sanders, Chuan Yue:
Automated least privileges in cloud-based web services. HotWeb 2017: 3:1-3:6 - [c26]Rui Zhao, Chuan Yue, Qi Han:
Cross-site Input Inference Attacks on Mobile Web Users. SecureComm 2017: 629-643 - 2016
- [j9]Chuan Yue:
A geometric approach for ranking interval-valued intuitionistic fuzzy numbers with an application to group decision-making. Comput. Ind. Eng. 102: 233-245 (2016) - [c25]Rui Zhao, Samantha John, Stacy Karas, Cara Bussell, Jennifer Roberts, Daniel Six, Brandon Gavett, Chuan Yue:
The Highly Insidious Extreme Phishing Attacks. ICCCN 2016: 1-10 - [c24]Chuan Yue:
Sensor-Based Mobile Web Fingerprinting and Cross-Site Input Inference Attacks. IEEE Symposium on Security and Privacy Workshops 2016: 241-244 - [c23]Chuan Yue:
Teaching Computer Science With Cybersecurity Education Built-in. ASE @ USENIX Security Symposium 2016 - 2015
- [c22]Rui Zhao, Chuan Yue, Byung-Chul Tak, Chunqiang Tang:
SafeSky: A Secure Cloud Storage Middleware for End-User Applications. SRDS 2015: 21-30 - [c21]Rui Zhao, Chuan Yue, Qing Yi:
Automatic Detection of Information Leakage Vulnerabilities in Browser Extensions. WWW 2015: 1384-1394 - 2014
- [j8]Rui Zhao, Chuan Yue:
Toward a secure and usable cloud-based password manager for web browsers. Comput. Secur. 46: 32-47 (2014) - 2013
- [j7]Chuan Yue, Haining Wang:
A measurement study of insecure javascript practices on the web. ACM Trans. Web 7(2): 7:1-7:39 (2013) - [c20]Rui Zhao, Chuan Yue:
All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design. CODASPY 2013: 333-340 - [c19]Chuan Yue:
Toward Secure and Convenient Browsing Data Management in the Cloud. HotCloud 2013 - [c18]Chuan Yue:
The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security. LEET 2013 - [c17]Xin Ruan, Chuan Yue, Haining Wang:
Unveiling Privacy Setting Breaches in Online Social Networks. SecureComm 2013: 323-341 - [c16]Rui Zhao, Chuan Yue, Kun Sun:
A Security Analysis of Two Commercial Browser and Cloud Based Password Managers. SocialCom 2013: 448-453 - 2012
- [c15]Chuan Yue:
Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector. LISA 2012: 67-81 - [c14]Chuan Yue, Shingo Mabu, Kotaro Hirasawa:
A bidding strategy using genetic network programming with adjusting parameters for large-scale continuous double auction. SMC 2012: 1896-1902 - 2011
- [j6]Shingo Mabu, Donggeng Yu, Chuan Yue, Kotaro Hirasawa:
No Time Limit and Time Limit Model of Multiple Round Dutch Auction Based on Genetic Network Programming. J. Adv. Comput. Intell. Intell. Informatics 15(1): 3-12 (2011) - [j5]Chuan Yue, Shingo Mabu, Kotaro Hirasawa:
Enhancing Bidding Strategy Using Genetic Network Programming in Agent-Based Multiple Round English Auction. J. Adv. Comput. Intell. Intell. Informatics 15(7): 747-758 (2011) - [c13]Chuan Yue:
Mitigating Cross-Site Form History Spamming Attacks with Domain-Based Ranking. DIMVA 2011: 104-123 - [c12]Chuan Yue, Shingo Mabu, Kotaro Hirasawa:
A bidding strategy for Continuous Double Auctions based on Genetic Network Programming with generalized judgments. SMC 2011: 144-151 - 2010
- [j4]Chuan Yue, Mengjun Xie, Haining Wang:
An automatic HTTP cookie management system. Comput. Networks 54(13): 2182-2198 (2010) - [j3]Chuan Yue, Haining Wang:
BogusBiter: A transparent protection against phishing attacks. ACM Trans. Internet Techn. 10(2): 6:1-6:31 (2010) - [c11]Chuan Yue, Shingo Mabu, Donggeng Yu, Yu Wang, Kotaro Hirasawa:
A bidding strategy of multiple round auctions based on Genetic Network Programming. IEEE Congress on Evolutionary Computation 2010: 1-8
2000 – 2009
- 2009
- [j2]Chuan Yue, Haining Wang:
Profit-aware overload protection in E-commerce Web sites. J. Netw. Comput. Appl. 32(2): 347-356 (2009) - [c10]Eli Courtwright, Chuan Yue, Haining Wang:
Efficient resource management on template-based web servers. DSN 2009: 249-258 - [c9]Chuan Yue, Haining Wang:
SessionMagnifier: a simple approach to secure and convenient kiosk browsing. UbiComp 2009: 125-134 - [c8]Benjamin Strahs, Chuan Yue, Haining Wang:
Secure Passwords Through Enhanced Hashing. LISA 2009: 93-106 - [c7]Ci Chen, Shingo Mabu, Chuan Yue, Kaoru Shimada, Kotaro Hirasawa:
Network Intrusion Detection using Fuzzy Class Association Rule Mining Based on Genetic Network Programming. SMC 2009: 60-67 - [c6]Chuan Yue, Zi Chu, Haining Wang:
RCB: A Simple and Practical Framework for Real-time Collaborative Browsing. USENIX ATC 2009 - [c5]Chuan Yue, Haining Wang:
Characterizing insecure javascript practices on the web. WWW 2009: 961-970 - 2008
- [c4]Chuan Yue, Haining Wang:
Anti-Phishing in Offense and Defense. ACSAC 2008: 345-354 - 2007
- [j1]Richard Tran Mills, Chuan Yue, Andreas Stathopoulos, Dimitrios S. Nikolopoulos:
Runtime and Programming Support for Memory Adaptation in Scientific Applications via Local Disk and Remote Memory. J. Grid Comput. 5(2): 213-234 (2007) - [c3]Chuan Yue, Mengjun Xie, Haining Wang:
Automatic Cookie Usage Setting with CookiePicker. DSN 2007: 460-470 - [c2]Chuan Yue, Haining Wang:
Profit-aware Admission Control for Overload Protection in E-commerce Web Sites. IWQoS 2007: 188-193 - 2006
- [c1]Chuan Yue, Richard Tran Mills, Andreas Stathopoulos, Dimitrios S. Nikolopoulos:
Runtime Support for Memory Adaptation in Scientific Applications via Local Disk and Remote Memory. HPDC 2006: 183-194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint