default search action
Yizheng Chen 0001
Person information
- affiliation: University of California, Berkeley, Berkeley, CA, USA
- affiliation (former): Columbia University, NY, USA
- affiliation (Ph.D.): Georgia Institute of Technology, GA, USA
Other persons with the same name
- Yizheng Chen — disambiguation page
- Yizheng Chen 0002 — Missouri University of Science and Technology, Rolla, MO, USA
- Yizheng Chen 0003 — Zhejiang Lab, Hangzhou, China
- Yizheng Chen 0004 — Hunan Institute of Engineering, Xiangtan, China
- Yizheng Chen 0005 — University of Wisconsin-Madison, WI, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i13]Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David A. Wagner, Baishakhi Ray, Yizheng Chen:
Vulnerability Detection with Code Language Models: How Far Are We? CoRR abs/2403.18624 (2024) - [i12]Yigitcan Kaya, Yizheng Chen, Shoumik Saha, Fabio Pierazzi, Lorenzo Cavallaro, David A. Wagner, Tudor Dumitras:
Demystifying Behavior-Based Malware Detection at Endpoints. CoRR abs/2405.06124 (2024) - 2023
- [c17]Chawin Sitawarin, Kornrapat Pongmala, Yizheng Chen, Nicholas Carlini, David A. Wagner:
Part-Based Models Improve Adversarial Robustness. ICLR 2023 - [c16]Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David A. Wagner:
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. RAID 2023: 654-668 - [c15]Yizheng Chen, Zhoujie Ding, David A. Wagner:
Continuous Learning for Android Malware Detection. USENIX Security Symposium 2023: 1127-1144 - [i11]Yizheng Chen, Zhoujie Ding, David A. Wagner:
Continuous Learning for Android Malware Detection. CoRR abs/2302.04332 (2023) - [i10]Yizheng Chen, Zhoujie Ding, Xinyun Chen, David A. Wagner:
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. CoRR abs/2304.00409 (2023) - 2022
- [i9]Chawin Sitawarin, Kornrapat Pongmala, Yizheng Chen, Nicholas Carlini, David A. Wagner:
Part-Based Models Improve Adversarial Robustness. CoRR abs/2209.09117 (2022) - 2021
- [c14]Yizheng Chen:
Session details: Session 3: Privacy-Preserving Machine Learning. AISec@CCS 2021 - [c13]Zhanyuan Zhang, Yizheng Chen, David A. Wagner:
SEAT: Similarity Encoder by Adversarial Training for Detecting Model Extraction Attack Queries. AISec@CCS 2021: 37-48 - [c12]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CCS 2021: 477-494 - [c11]Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana:
Cost-Aware Robust Tree Ensembles for Security Applications. USENIX Security Symposium 2021: 2291-2308 - [e1]Nicholas Carlini, Ambra Demontis, Yizheng Chen:
AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021. ACM 2021, ISBN 978-1-4503-8657-9 [contents] - [i8]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CoRR abs/2105.11363 (2021) - 2020
- [c10]Dongdong She, Yizheng Chen, Abhishek Shah, Baishakhi Ray, Suman Jana:
Neutaint: Efficient Dynamic Taint Analysis with Neural Networks. SP 2020: 1527-1543 - [c9]Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana:
On Training Robust PDF Malware Classifiers. USENIX Security Symposium 2020: 2343-2360
2010 – 2019
- 2019
- [i7]Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana:
On Training Robust PDF Malware Classifiers. CoRR abs/1904.03542 (2019) - [i6]Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana:
Enhancing Gradient-based Attacks with Symbolic Intervals. CoRR abs/1906.02282 (2019) - [i5]Dongdong She, Yizheng Chen, Baishakhi Ray, Suman Jana:
Neutaint: Efficient Dynamic Taint Analysis with Neural Networks. CoRR abs/1907.03756 (2019) - [i4]Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana:
Training Robust Tree Ensembles for Security. CoRR abs/1912.01149 (2019) - 2018
- [b1]Yizheng Chen:
Improving robustness of DNS graph clustering against noise. Georgia Institute of Technology, Atlanta, GA, USA, 2018 - [c8]Chao Xu, Zhentan Feng, Yizheng Chen, Minghua Wang, Tao Wei:
FeatNet: Large-scale Fraud Device Detection by Network Representation Learning with Rich Features. AISec@CCS 2018: 57-63 - [i3]Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana:
MixTrain: Scalable Training of Formally Robust Neural Networks. CoRR abs/1811.02625 (2018) - 2017
- [j1]Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Michael Farrell:
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet. Comput. Secur. 67: 164-180 (2017) - [c7]Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis:
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. CCS 2017: 569-586 - [c6]Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou:
Practical Attacks Against Graph-based Clustering. CCS 2017: 1125-1142 - [c5]Yizheng Chen, Yacin Nadji, Rosa Romero Gómez, Manos Antonakakis, David Dagon:
Measuring Network Reputation in the Ad-Bidding Process. DIMVA 2017: 388-409 - [i2]Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis:
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. CoRR abs/1708.08519 (2017) - [i1]Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou:
Practical Attacks Against Graph-based Clustering. CoRR abs/1708.09056 (2017) - 2016
- [c4]Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee, Michael Farrell:
Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet. DIMVA 2016: 231-254 - [c3]Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, David Dagon, Manos Antonakakis, Rodney Joffe:
Enabling Network Security Through Active DNS Datasets. RAID 2016: 188-208 - 2014
- [c2]Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, Wenke Lee:
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic. DSN 2014: 598-609 - [c1]Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon P. Chung, Billy Lau, Wenke Lee:
On the Feasibility of Large-Scale Infections of iOS Devices. USENIX Security Symposium 2014: 79-93
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint