Guangdong Bai bio photo

Guangdong Bai

Associate Professor
School of Information Technology and Electrical Engineering
The University of Queensland
Australia

Twitter   G. Scholar LinkedIn e-Mail

My Publications

For the full list please refer to my Google Scholar profile and DBLP profile.


[ɩ] indicates work of which I am the lead author, including the (co-)first author, the corresponding author, or the first author being my student.

    2024

  1. Xinguo Feng, Zhongkui Ma, Zihan Wang, Chegne Eu Joe, Mengyao Ma, Alsharif Abuadbba, Guangdong Bai[ɩ]
    Uncovering Gradient Inversion Risks in Practical Language Model Training
    ACM Computer and Communications Security Conference (CCS) , 2024.
    [BibTeX] [PDF]

    
    
  2. Chuan Yan, Ruomai Ren, Mark Huasong Meng, Liuhuo Wan, Tian Yang Ooi, Guangdong Bai[ɩ]
    Exploring ChatGPT App Ecosystem: Distribution, Deployment and Security
    IEEE/ACM International Conference on Automated Software Engineering (ASE) , 2024.
    [BibTeX] [PDF]

    
    
  3. Shuofeng Liu, Zihan Wang, Minhui Xue, Long Wang, Yuanchao Zhang, Guangdong Bai[ɩ]
    Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial Approximation
    USENIX Security Symposium (USENIX Security) , 2024.
    [BibTeX] [PDF]

    @inproceedings{Usenix2024,
    author = {Liu, Shuofeng and Wang, Zihan and Wang, Long and Zhang, Yuanchao and Bai, Guangdong},
    title = {Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial Approximation},
    year = {2024},
    booktitle = {33rd USENIX Security Symposium (USENIX Security)},
    
  4. Chuan Yan, Mark Huasong Meng, Fuman Xie, Guangdong Bai[ɩ]
    Investigating Documented Privacy Changes in Android OS
    ACM International Conference on the Foundations of Software Engineering (FSE) , 2024.
    [BibTeX] [PDF]

    @article{FSE2024,
    author = {Yan, Chuan and Meng, Mark Huasong and Xie, Fuman and Bai, Guangdong},
    title = {Investigating Documented Privacy Changes in Android OS},
    year = {2024},
    issue_date = {July 2024},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    volume = {1},
    number = {FSE},
    url = {https://doi.org/10.1145/3660826},
    doi = {10.1145/3660826},
    journal = {Proc. ACM Softw. Eng.},
    month = {jul},
    articleno = {119},
    numpages = {24},
    }
    
  5. Zihan Wang, Zhongkui Ma, Xinguo Feng, Ruoxi Sun, Hu Wang, Minhui Xue, Guangdong Bai[ɩ]
    CoreLocker: Neuron-level Usage Control
    IEEE Symposium on Security and Privacy (S&P) , 2024.
    [BibTeX] [PDF]

    @INPROCEEDINGS{SP2024,
    author = {Zihan Wang and Zhongkui Ma and Xinguo Feng and Ruoxi Sun and Hu Wang and Minhui Xue and Guangdong Bai},
    booktitle = {2024 IEEE Symposium on Security and Privacy (SP)},
    title = {CoreLocker: Neuron-level Usage Control},
    year = {2024},
    volume = {},
    issn = {2375-1207},
    doi = {10.1109/SP54263.2024.00233},
    url = {https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00233},
    publisher = {IEEE Computer Society},
    address = {Los Alamitos, CA, USA},
    month = {may}
    }
    
  6. Liuhuo Wan, Kailong Wang, Kulani Tharaka Mahadewa, Haoyu Wang, Guangdong Bai[ɩ]
    Don't bite off more than you can chew: Investigating Excessive Permission Requests in Trigger-Action Integrations
    The Web Conference (WWW) , 2024.
    [BibTeX] [PDF]

    @inproceedings{WWW2024-2,
    author = {Wan, Liuhuo and Wang, Kailong and Mahadewa, Kulani and Wang, Haoyu and Bai, Guangdong},
    title = {Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations},
    year = {2024},
    isbn = {9798400701719},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3589334.3645721},
    doi = {10.1145/3589334.3645721},
    booktitle = {Proceedings of the ACM on Web Conference 2024},
    pages = {3106–3116},
    numpages = {11},
    location = {Singapore, Singapore},
    series = {WWW '24}
    }
    
  7. Liuhuo Wan, Kailong Wang, Haoyu Wang, Guangdong Bai[ɩ]
    Is it safe to share your files? An Empirical Security Analysis of Google Workspace
    The Web Conference (WWW) , 2024.
    [BibTeX] [PDF]

    @inproceedings{WWW2024-1,
    author = {Wan, Liuhuo and Wang, Kailong and Wang, Haoyu and Bai, Guangdong},
    title = {Is It Safe to Share Your Files? An Empirical Security Analysis of Google Workspace},
    year = {2024},
    isbn = {9798400701719},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3589334.3645697},
    doi = {10.1145/3589334.3645697},
    booktitle = {Proceedings of the ACM on Web Conference 2024},
    pages = {1892–1901},
    numpages = {10},
    keywords = {Google workspace, add-ons, security vulnerabilities, sharing},
    location = {Singapore, Singapore},
    series = {WWW '24}
    }
    
  8. Baijun Cheng, Shengming Zhao, Kailong Wang, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo, Lei Ma, Haoyu Wang
    Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors
    ACM Transactions on Software Engineering and Methodology (TOSEM) , 2024.
    [BibTeX] [PDF]

    @article{10.1145/3641543,
    author = {Cheng, Baijun and Zhao, Shengming and Wang, Kailong and Wang, Meizhen and Bai, Guangdong and Feng, Ruitao and Guo, Yao and Ma, Lei and Wang, Haoyu},
    title = {Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors},
    year = {2024},
    issue_date = {June 2024},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    volume = {33},
    number = {5},
    issn = {1049-331X},
    url = {https://doi.org/10.1145/3641543},
    doi = {10.1145/3641543},
    journal = {ACM Trans. Softw. Eng. Methodol.},
    month = {jun},
    articleno = {127},
    numpages = {33},
    }
    
  9. Zhongkui Ma, Jiaying Li, Guangdong Bai[ɩ]
    ReLU Hull Approximation
    The 51st ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), 2024.
    [BibTeX] [PDF]

    @article{10.1145/3632917,
    author = {Ma, Zhongkui and Li, Jiaying and Bai, Guangdong},
    title = {ReLU Hull Approximation},
    year = {2024},
    issue_date = {January 2024},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    volume = {8},
    number = {POPL},
    url = {https://doi.org/10.1145/3632917},
    doi = {10.1145/3632917},
    journal = {Proc. ACM Program. Lang.},
    month = {jan},
    articleno = {75},
    numpages = {28},
    }
    
  10. Fuman Xie, Chuan Yan, Mark Huasong Meng, Shaoming Teng, Yanjun Zhang, Guangdong Bai[ɩ]
    Are Your Requests Your True Needs? Checking Excessive Data Collection in VPA Apps
    The 46th International Conference on Software Engineering (ICSE), 2024.
    [BibTeX] [PDF]

    @inproceedings{10.1145/3597503.3639107,
    author = {Xie, Fuman and Yan, Chuan and Meng, Mark Huasong and Teng, Shaoming and Zhang, Yanjun and Bai, Guangdong},
    title = {Are Your Requests Your True Needs? Checking Excessive Data Collection in VPA App},
    year = {2024},
    isbn = {9798400702174},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3597503.3639107},
    doi = {10.1145/3597503.3639107},
    booktitle = {Proceedings of the IEEE/ACM 46th International Conference on Software Engineering},
    articleno = {205},
    numpages = {12},
    location = {Lisbon, Portugal},
    series = {ICSE '24}
    }
    
  11. Chuan Yan, Fuman Xie, Mark Huasong Meng, Yanjun Zhang, Guangdong Bai[ɩ]
    On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications
    The 24th Privacy Enhancing Technologies Symposium (PETS), 2024.
    [BibTeX] [PDF]

    
    
  12. 2023

  13. Shi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, Haoyu Wang
    WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs
    The 38th IEEE/ACM International Conference on Automated Software Engineering (ASE) , 2023.
    [BibTeX] [PDF]

    
    
  14. Lei Bu, Qiuping Zhang, Suwan Li, Jinglin Dai, Guangdong Bai, Kai Chen, Xuandong Li
    Security Checking of Trigger-Action-Programming Smart Home Integrations
    The 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) , 2023.
    [BibTeX] [PDF]

    
    
  15. Baiqi Chen, Tingmin Wu, Yanjun Zhang, Mohan Baruwal Chhetri, Guangdong Bai[ɩ]
    Investigating Users' Understanding of Privacy Policies of Virtual Personal Assistant Applications
    The 18th ACM ASIA Conference on Computer and Communications Security (ASIACCS) , 2023.
    [BibTeX] [PDF]

    
    
  16. Mengyao Ma, Yanjun Zhang, Leo Yu Zhang, Pathum Chamikara Mahawaga Arachchige, Mohan Baruwal Chhetri, Guangdong Bai[ɩ]
    LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks
    The 18th ACM ASIA Conference on Computer and Communications Security (ASIACCS) , 2023.
    [BibTeX] [PDF]

    
    
  17. Yanjun Zhang, Guangdong Bai, Mahawaga Arachchige Pathum Chamikara, Mengyao Ma, Liyue Shen, Jingwei Wang, Surya Nepal, Minhui Xue, Long Wang, Joseph Liu
    AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning
    The ACM Web Conference (WWW) , 2023.
    [BibTeX] [PDF]

    
    
  18. Mark Huasong Meng, Sin Gee Teo, Guangdong Bai[ɩ], Kailong Wang, and Jin Song Dong
    Enhancing Federated Learning Robustness using Data-Agnostic Model Pruning
    Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) , 2023.
    [BibTeX] [PDF]

    
    
  19. Hao Guan, Ying Xiao, Jiaying Li, Yepang Liu, Guangdong Bai[ɩ]
    A Comprehensive Study of Real-World Bugs in Machine Learning Model Optimization
    The International Conference on Software Engineering (ICSE) , 2023.
    [BibTeX] [PDF]

    
    
  20. Mark Huasong Meng, Qing Zhang, Guangshuai Xia, Yuwei Zheng, Yanjun Zhang, Guangdong Bai[ɩ], Zhi Liu, Sin Gee Teo, Jin Song Dong
    Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers
    The Network and Distributed System Security Symposium (NDSS) , 2023.
    [BibTeX] [PDF]

    
    
  21. Kailong Wang, Yuxi Ling, Yanjun Zhang, Zhou Yu, Haoyu Wang, Guangdong Bai[ɩ], Beng Chin Ooi, Jin Song Dong
    Characterizing Cryptocurrency-themed Malicious Browser Extensions
    ACM SIGMETRICS, 2023.
    [BibTeX] [PDF]

    
    
  22. 2022

  23. Liyue Shen, Yanjun Zhang, Jingwei Wang, Guangdong Bai[ɩ]
    Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification
    The Annual Computer Security Applications Conference (ACSAC), 2022.
    [BibTeX] [PDF]

    
    
  24. Fuman Xie, Yanjun Zhang, Chuan Yan, Suwan Li, Lei Bu, Kai Chen, Zi Huang, Guangdong Bai[ɩ]
    Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps
    The 37th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2022.
    [BibTeX] [PDF]

    
    
  25. Suwan Li, Lei Bu, Guangdong Bai, Zhixiu Guo, Kai Chen, Hanlin Wei
    VITAS: Guided Model-based VUI Testing of VPA Apps
    The 37th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2022.
    [BibTeX] [PDF]

    
    
  26. Yuxin Ling, Kailong Wang, Guangdong Bai[ɩ], Haoyu Wang, Jin Song Dong
    Are They Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions
    The 37th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2022.
    [BibTeX] [PDF]

    
    
  27. Peng-Fei Zhang, Zi Huang, Guangdong Bai, Xin-Shun Xu
    IDEAL: High-Order-Ensemble Adaptation Network for Learning with Noisy Labels
    The 30th ACM International Conference on Multimedia (MM), 2022.
    [BibTeX] [PDF]

    @inproceedings{MM2022-1,
    author = {Zhang, Peng-Fei and Huang, Zi and Bai, Guangdong and Xu, Xin-Shun},
    title = {IDEAL: High-Order-Ensemble Adaptation Network for Learning with Noisy Labels},
    year = {2022},
    booktitle = {Proceedings of the 30th ACM International Conference on Multimedia (MM)},
    pages = {325–333},
    numpages = {9},
    }
    
  28. Peng-Fei Zhang, Guangdong Bai, Zi Huang, Xin-Shun Xu
    Machine Unlearning for Image Retrieval: A Generative Scrubbing Approach
    The 30th ACM International Conference on Multimedia (MM), 2022.
    [BibTeX] [PDF]

    @inproceedings{MM2022-2,
    author = {Zhang, Peng-Fei and Bai, Guangdong and Huang, Zi and Xu, Xin-Shun},
    title = {Machine Unlearning for Image Retrieval: A Generative Scrubbing Approach},
    year = {2022},
    booktitle = {Proceedings of the 30th ACM International Conference on Multimedia (MM)},
    pages = {237–245},
    numpages = {9},
    }
    
    }
    
  29. Peng-Fei Zhang, Guangdong Bai, Hongzhi Yin, Zi Huang
    Proactive Privacy-preserving Learning for Cross-modal Retrieval
    ACM Transactions on Information Systems, 2022.
    [BibTeX] [PDF]

    @article{TIS2022,
    author = {Zhang, Peng-Fei and Bai, Guangdong and Yin, Hongzhi and Huang, Zi},
    title = {Proactive Privacy-Preserving Learning for Cross-Modal Retrieval},
    year = {2022},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    journal = {ACM Transactions on Information Systems},
    month = {jun},
    }
    
  30. Mark Huasong Meng, Guangdong Bai[ɩ], Sin Gee Teo, Zhe Hou, Yan Xiao, Yun Lin, Jin Song Dong
    Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective
    IEEE Transactions on Dependable and Secure Computing (TDSC) , 2022.
    [BibTeX] [PDF]

    @ARTICLE{TDSC2022-1,
      author={Meng, Mark Huasong and Bai, Guangdong and Teo, Sin Gee and Hou, Zhe and Xiao, Yan and Lin, Yun and Dong, Jin Song},
      journal={IEEE Transactions on Dependable and Secure Computing}, 
      title={Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective}, 
      year={2022},
      volume={},
      number={},
      pages={1-1},
      doi={10.1109/TDSC.2022.3179131},
    }
    
  31. Yanjun Zhang, Guangdong Bai[ɩ], Xue Li, Surya Nepal, Marthie Grobler, Chen Chen, Ryan K L Ko
    Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks
    IEEE Transactions on Dependable and Secure Computing (TDSC) , 2022.
    [BibTeX] [PDF]

        @ARTICLE{TDSC2022-2,
          author={Zhang, Yanjun and Bai, Guangdong and Li, Xue and Nepal, Surya and Grobler, Marthie and Chen, Chen and Ko, Ryan K L},
          journal={IEEE Transactions on Dependable and Secure Computing}, 
          title={Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks}, 
          year={2022},
          volume={},
          number={},
          pages={1-17},
          doi={10.1109/TDSC.2022.3186672}, 
        }
      
  32. Kailong Wang, Yuwei Zheng, Qing Zhang, Guangdong Bai[ɩ], Mingchuang Qin, Donghui Zhang, Jin Song Dong
    Assessing Certificate Validation User Interfaces of WPA Supplicants
    The 28th Annual International Conference On Mobile Computing And Networking (MobiCom), 2022.
    [BibTeX] [PDF]

    
    
  33. Liuhuo Wan, Yanjun Zhang, Ruiqing Li, Ryan Ko, Louw Hoffman, and Guangdong Bai[ɩ]
    SATB: A Testbed of IoT-based Smart Agriculture Network for Dataset Generation
    International Conference on Advanced Data Mining and Applications (ADMA), 2022.
    Best Paper Runner Up Award [BibTeX] [PDF]

    @InProceedings{ADMA2022,
    author="Wan, Liuhuo and Zhang, Yanjun and Li, Ruiqing and Ko, Ryan and Hoffman, Louw and Bai, Guangdong",
    title="SATB: A Testbed of IoT-based Smart Agriculture Network for Dataset Generation",
    booktitle="Advanced Data Mining and Applications (ADMA)",
    year="2022",
    }
    
  34. Chenhao Zhang, Yanjun Zhang, Jeff Mao, Weitong Chen, Lin Yue, Guangdong Bai[ɩ], Miao Xu
    Towards Better Generalization for Neural Network-Based SAT Solvers
    Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2022.
    [BibTeX] [PDF]

    @inproceedings{PAKDD,
    author = {Zhang, Chenhao and Zhang, Yanjun and Mao, Jeff and Chen, Weitong and Yue, Lin and Bai, Guangdong and Xu, Miao},
    title = {Towards Better Generalization for Neural Network-Based SAT Solvers},
    year = {2022},
    isbn = {978-3-031-05935-3},
    publisher = {Springer-Verlag},
    address = {Berlin, Heidelberg},
    url = {https://doi.org/10.1007/978-3-031-05936-0_16},
    doi = {10.1007/978-3-031-05936-0_16},
    booktitle = {Advances in Knowledge Discovery and Data Mining: 26th Pacific-Asia Conference, PAKDD 2022, Chengdu, China, May 16–19, 2022, Proceedings, Part II},
    pages = {199–210},
    numpages = {12},
    }
    
  35. Hongcan Gao, Chenkai Guo, Guangdong Bai, Dengrong Huang, Zhen He, Yanfeng Wu, Jing Xu
    Sharing runtime permission issues for developers based on similar-app review mining
    Journal of Systems and Software , 2022.
    [BibTeX] [PDF]

    @article{JSS2022,
    title = {Sharing runtime permission issues for developers based on similar-app review mining},
    journal = {Journal of Systems and Software},
    volume = {184},
    pages = {111118},
    year = {2022},
    author = {Hongcan Gao and Chenkai Guo and Guangdong Bai and Dengrong Huang and Zhen He and Yanfeng Wu and Jing Xu},
    }
    
  36. 2021

  37. Yanjun Zhang, Guangdong Bai[ɩ], Xue Li, Caitlin Curtis, Chen Chen, Ryan Ko
    Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis
    The 26th European Symposium on Research in Computer Security (ESORICS), 2021.
    [BibTeX] [PDF]

    @InProceedings{ESORICS2021,
      author = {Yanjun Zhang and Guangdong Bai and Xue Li and Caitlin Curtis and Chen Chen and Ryan Ko}, 
      title = {Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis}, 
      year = {2021},
      booktitle = {Proceedings of the 26th European Symposium on Research in Computer Security (ESORICS)}, 
      pages = {},
    }
    
  38. Kulani Mahadewa, Yanjun Zhang, Guangdong Bai[ɩ], Lei Bu, Zhiqiang Zuo, Dileepa Fernando, Zhenkai Liang, Jin Song Dong
    Identifying privacy weaknesses from multi-party trigger-action integration platforms
    The 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2021.
    [BibTeX] [PDF]

    
    
  39. Hanlin Wei, Behnaz Hassanshahi, Guangdong Bai[ɩ], Padmanabhan Krishnan, Kostyantyn Vorobyov
    MoScan: a model-based vulnerability scanner for web single sign-on services (Tool paper)
    The 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2021.
    [BibTeX] [PDF]

    
    
  40. Fuman Xie, Yanjun Zhang, Hanlin Wei, Guangdong Bai[ɩ]
    UQ-AAS21: A Comprehensive Dataset of Amazon Alexa Skills
    International Conference on Advanced Data Mining and Applications (ADMA), 2021.
    Best Application Paper Runner Up Award [BibTeX] [PDF]

    @InProceedings{ADMA2021,
    author="Xie, Fuman and Zhang, Yanjun and Wei, Hanlin and Bai, Guangdong",
    title="UQ-AAS21: A Comprehensive Dataset of Amazon Alexa Skills",
    booktitle="Advanced Data Mining and Applications (ADMA)",
    year="2021",
    pages="159--173",
    }
    
  41. Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Weihang Su, Haoyu Wang
    Understanding the Impact of COVID-19 on Github Developers: A Preliminary Study
    The 33rd International Conference on Software Engineering & Knowledge Engineering (SEKE) , 2021.
    [BibTeX] [PDF]

    
    
  42. Yuteng Lu, Weidi Sun, Guangdong Bai, Meng Sun
    DeepAuto: A First Step Towards Formal Verification of Deep Learning Systems
    The 33rd International Conference on Software Engineering & Knowledge Engineering (SEKE) , 2021.
    [BibTeX] [PDF]

    
    
  43. Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Haoyu Wang
    A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories
    IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 2021.
    [BibTeX] [PDF]

    
    
  44. Kailong Wang, Junzhe Zhang, Guangdong Bai[ɩ], Ryan Ko, Jin Song Dong
    It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts
    The Web Conference (WWW), 2021.
    [BibTeX] [PDF]

    
    
  45. 2020

  46. Yanjun Zhang, Guangdong Bai[ɩ], Xue Li, Caitlin Curtis, Chen Chen, Ryan K. L. Ko
    PrivColl: Practical Privacy-Preserving Collaborative Machine Learning
    The 25th European Symposium on Research in Computer Security (ESORICS), 2020.
    [BibTeX] [PDF]

    @InProceedings{ESORICS2020,
      author = {Yanjun Zhang and Guangdong Bai and Xue Li and Caitlin Curtis and Chen Chen and Ryan K. L. Ko}, 
      title = {PrivColl: Practical Privacy-Preserving Collaborative Machine Learning}, 
      year = {2020},
      booktitle = {Proceedings of the 25th European Symposium on Research in Computer Security (ESORICS)}, 
      pages = {},
    }
    
  47. Yanjun Zhang, Guangdong Bai[ɩ], Mingyang Zhang, Xue Li, Ryan Ko
    Differentially private collaborative coupling learning for recommender systems
    IEEE Intelligent Systems, 2020.
    [BibTeX] [PDF]

    @Article{IS2020,
      author = {Yanjun Zhang and Guangdong Bai and Mingyang Zhang and Xue Li and Ryan Ko}, 
      title = {Differentially private collaborative coupling learning for recommender systems}, 
      year = {2020},
      journal = {IEEE Intelligent Systems},
      pages = {},
    }
    
  48. Chenkai Guo, Dengrong Huang, Jianwen Zhang, Jing Xu, Guangdong Bai, Naipeng Dong
    Early prediction for mode anomaly in generative adversarial network training: An empirical study
    Information Sciences, 2020.
    [BibTeX] [PDF]

    @Article{INFOSCI2020,
      title = {Early prediction for mode anomaly in generative adversarial network training: An empirical study},
      journal = {Information Sciences},
      volume = {534},
      pages = {117 - 138},
      year = {2020},
      author = {Chenkai Guo and Dengrong Huang and Jianwen Zhang and Jing Xu and Guangdong Bai and Naipeng Dong},
    }
    
  49. Yanfeng Wu, Chenkai Guo, Hongcan Gao, Jing Xu, Guangdong Bai
    Dilated residual networks with multi-level attention for speaker verification
    Neurocomputing, 2020.
    [BibTeX] [PDF]

    @Article{NEURO2020,
      author = {Yanfeng Wu and Chenkai Guo and Hongcan Gao and Jing Xu and Guangdong Bai},
      title = {Dilated residual networks with multi-level attention for speaker verification}, 
      year = {2020},
      journal = {Neurocomputing},
      volume = {412},
      pages = {177 - 186},
    }
    
  50. Naipeng Dong, Guangdong Bai, Lung-Chen Huang, Edmund Kok Heng Lim, Jin Song Dong
    A blockchain-based decentralized booking system
    The Knowledge Engineering Review, 2020.
    [BibTeX] [PDF]

    @Article{KER2020,
      title={A blockchain-based decentralized booking system}, 
      volume={35}, 
      DOI={10.1017/S0269888920000260}, 
      journal={The Knowledge Engineering Review}, 
      publisher={Cambridge University Press}, 
      author={Dong, Naipeng and Bai, Guangdong and Huang, Lung-Chen and Lim, Edmund Kok Heng and Dong, Jin Song}, 
      year={2020}, 
      pages={e17}
    }
    
    
  51. Taejun Choi, Guangdong Bai, Ryan KL Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang
    An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems
    IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020.
    [BibTeX] [PDF]

    
    
  52. Hanlin Wei, Guangdong Bai[ɩ], Zongwei Luo
    Foggy: A New Anonymous Communication Architecture Based on Microservices
    The 25th International Conference on Engineering of Complex Computer Systems (ICECCS), 2020.
    [BibTeX] [PDF]

    
    
  53. Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo
    Deposafe: Demystifying the fake deposit vulnerability in ethereum smart contracts
    The 25th International Conference on Engineering of Complex Computer Systems (ICECCS), 2020.
    [BibTeX] [PDF]

    
    
  54. Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu
    Don't fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams
    2020 APWG Symposium on Electronic Crime Research (eCrime), 2020.
    [BibTeX] [PDF]

    
    
  55. 2019

  56. Kulani Mahadewa, Kailong Wang, Guangdong Bai[ɩ], Ling Shi, Yan Liu, Jin Song Dong and Zhenkai Liang
    Scrutinizing Implementations of Smart Home Integrations
    IEEE Transactions on Software Engineering (TSE), 2019.
    [BibTeX] [PDF]

    @Article{TSE2019,
     author={Mahadewa, Kulani and Wang, Kailong and Bai, Guangdong and Shi, Ling and Dong, Jin Song and Liang, Zhenkai},
     journal={IEEE Transactions on Software Engineering},
     title={Scrutinizing Implementations of Smart Home Integrations},
     year={2019},
     volume={},
     number={},
     pages={},
    }
    
  57. Pardeep Kumar, Yun Lin, Guangdong Bai, Andrew Paverd, Jin Song Dong, Andrew Martin
    Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues
    IEEE Communications Surveys & Tutorials, 2019.
    [BibTeX] [PDF]

    @ARTICLE{IEEEST2019, 
    author={Kumar, Pardeep and Lin, Yun and Bai, Guangdong and Paverd, Andrew and Dong, Jin Song and Martin, Andrew}, 
    journal={IEEE Communications Surveys \& Tutorials}, 
    title={Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues}, 
    year={2019}, 
    volume={}, 
    number={}, 
    pages={1-1}, 
    doi={10.1109/COMST.2019.2899354}, 
    ISSN={1553-877X}, 
    month={},
    }
    
  58. Tianming Liu, Haoyu Wang, Li Li, Guangdong Bai, Yao Guo and Guoai Xu
    DaPanda: Detecting Aggressive Push Notification in Android Apps
    The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2019.
    [BibTeX]

    @InProceedings{ASE2019,
      author = {Liu, Tianming and Wang, Haoyu and Li, Li and Bai, Guangdong and Guo, Yao and Xu, Guoai},
      title = {DaPanda: Detecting Aggressive Push Notifications in Android Apps},
      year = {2019},
      publisher = {IEEE Press},
      booktitle = {Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)},
      pages = {66–78},
      numpages = {13},
      location = {San Diego, California},
    }
    
  59. Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong and Haoyu Wang
    LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking
    the 22nd International Conference Information Security (ISC) , 2019.
    [BibTeX] [PDF]

    @inproceedings{ISC2019,
      author    = {Quanqi Ye and Yan Zhang and Guangdong Bai and Naipeng Dong and Zhenkai Liang and Jin Song Dong and Haoyu Wang},
      title     = {LightSense: {A} Novel Side Channel for Zero-permission Mobile User Tracking},
      booktitle = {Proceedings of the 22nd International Conference Information Security (ISC)},
      pages     = {299--318},
      year      = {2019},
    }
    
  60. 2018

  61. Guangdong Bai[ɩ], Quanqi Ye, Yongzheng Wu, Heila Botha, Jun Sun, Yang Liu, Jin Song Dong and Willem Visser
    Towards Model Checking Android Applications
    IEEE Transactions on Software Engineering (TSE), 44(6): 595-612, 2018.
    [BibTeX] [PDF]

    @Article{TSE2018,
     author={Bai, Guangdong and Ye, Quanqi and Wu, Yongzheng and Botha, Heila and Sun, Jun and Liu, Yang and Dong, Jin Song and Visser, Willem},
     journal={IEEE Transactions on Software Engineering},
     title={Towards Model Checking Android Applications},
     year={2018},
     volume={44},
     number={6},
     pages={595-612},
    }
    
  62. Kulani Mahadewa, Kailong Wang, Guangdong Bai[ɩ], Ling Shi, Jin Song Dong and Zhenkai Liang
    HomeScan: Scrutinizing Implementations of Smart Home Integrations
    23rd International Conference on Engineering of Complex Computer Systems (ICECCS), 2018.
    [BibTeX] [PDF] [Slides]

    @InProceedings{ICECCS2018a,
      author = {Mahadewa, Kulani and Wang, Kailong and Bai, Guangdong and Shi, Ling and Dong, Jin Song and Liang, Zhenkai},
      title = {HomeScan: Scrutinizing Implementations of Smart Home Integrations},
      booktitle = {Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems (ICECCS)},
      year = {2018},
      pages = {21--30},
    }
    
  63. Wai Yan Maung Maung Thin, Naipeng Dong, Guangdong Bai and Jin Song Dong
    Formal Analysis of a Proof-of-Stake Blockchain
    23rd International Conference on Engineering of Complex Computer Systems (ICECCS), 2018.
    [BibTeX] [PDF] [Slides] [Models]

    @InProceedings{ICECCS2018b,
      author = {Thin, Wai Yan Maung Maung and Dong, Naipeng and Bai, Guangdong and Dong, Jin Song},
      title = {Formal Analysis of a Proof-of-Stake Blockchain},
      booktitle = {Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems (ICECCS)},
      year = {2018},
      pages = {197--200},
    }
    
  64. Yun Lin, Jun Sun, Lyly Tran, Guangdong Bai, Haijun Wang and Jin Song Dong
    Break the dead end of dynamic slicing: localizing data and control omission bug
    ACM/IEEE International Conference on Automated Software Engineering (ASE), 2018.
    [BibTeX] [PDF]

    @InProceedings{ASE2018,
      author = {Lin, Yun and Sun, Jun and Tran, Lyly and Bai, Guangdong and Wang, Haijun and Dong, Jinsong},
      title = {Break the Dead End of Dynamic Slicing: Localizing Data and Control Omission Bug},
      booktitle = {Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE)},
      year = {2018},
      pages = {509--519},
      publisher = {ACM},
      address = {New York, NY, USA},
    }
    
  65. 2017

  66. Binbin Chen, Xinshu Dong, Guangdong Bai, Sumeet Jauhar and Yueqiang Cheng
    Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors
    Annual Computer Security Applications Conference (ACSAC), 2017.
    [BibTeX] [PDF]

    @InProceedings{ACSAC2017,
     author = {Chen, Binbin and Dong, Xinshu and Bai, Guangdong and Jauhar, Sumeet and Cheng, Yueqiang},
     title = {Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors},
     booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC) },
     year = {2017},
     location = {Orlando, FL, USA},
     pages = {425--436},
     publisher = {ACM},
     address = {New York, NY, USA},
    }
    
  67. Quanqi Ye, Guangdong Bai[ɩ], Naipeng Dong and Jin Song Dong
    Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols
    International Conference on Security and Privacy in Communication Networks (SecureComm), 2017.
    [BibTeX] [PDF]

    @InProceedings{SecureComm2017a,
    author="Ye, Quanqi and Bai, Guangdong and Dong, Naipeng and Dong, Jin Song",
    title="Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols",
    booktitle="Security and Privacy in Communication Networks (SecureComm)",
    year="2017",
    publisher="Springer International Publishing",
    address="Cham",
    pages="469--488",
    }
    
  68. Kailong Wang, Guangdong Bai[ɩ], Naipeng Dong and Jin Song Dong
    A Framework for Formal Analysis of Privacy on SSO Protocols
    International Conference on Security and Privacy in Communication Networks (SecureComm), 2017.
    [BibTeX] [PDF]

    @InProceedings{SecureComm2017b,
    author="Wang, Kailong and Bai, Guangdong and Dong, Naipeng and Dong, Jin Song",
    title="A Framework for Formal Analysis of Privacy on SSO Protocols",
    booktitle="Security and Privacy in Communication Networks (SecureComm)",
    year="2017",
    publisher="Springer International Publishing",
    address="Cham",
    pages="763--777",
    }
    
  69. Li Li, Naipeng Dong, Jun Pang, Jun Sun, Guangdong Bai, Yang Liu and Jin Song Dong
    A Verification Framework for Stateful Security Protocols
    International Conference on Formal Engineering Methods (ICFEM), 2017.
    [BibTeX] [PDF]

    @InProceedings{ICFEM2017,
     author="Li, Li and Dong, Naipeng and Pang, Jun and Sun, Jun and Bai, Guangdong and Liu, Yang and Dong, Jin Song",
     title="A Verification Framework for Stateful Security Protocols",
     booktitle="Formal Methods and Software Engineering (ICFEM)",
     year="2017",
     publisher="Springer International Publishing",
     pages="262--280",
    }
    
  70. Yinhao Xiao, Guangdong Bai, Jian Mao, Zhenkai Liang and Wei Cheng
    Privilege Leakage and Information Stealing through the Android Task Mechanism
    IEEE Symposium on Privacy-Aware Computing (PAC), 2017.
    [BibTeX] [PDF]

    @InProceedings{PAC2017,
     author={Y. Xiao and G. Bai and J. Mao and Z. Liang and W. Cheng},
    booktitle={2017 IEEE Symposium on Privacy-Aware Computing (PAC)},
    title={Privilege Leakage and Information Stealing through the Android Task Mechanism},
    year={2017},
    pages={152-163},
    }
    
  71. 2016

  72. Yaoqi Jia, Guangdong Bai, Prateek Saxena and Zhenkai Liang
    Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation
    Privacy Enhancing Technologies (PETS), 2016.
    [BibTeX] [PDF]

    @article { PETS2016,
          author = "Yaoqi Jia and Guangdong Bai and Prateek Saxena and Zhenkai Liang",
          title = "Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation",
          journal = "Proceedings on Privacy Enhancing Technologies (PETS)",
          year = "2016",
          volume = "2016",
          number = "4",
          pages:      294 - 314",
    }
    
  73. Shuang Liu, Guangdong Bai, Jun Sun and Jin Song Dong
    Towards Using Concurrent Java API Correctly
    International Conference on Engineering of Complex Computer Systems (ICECCS), 2016.
    [BibTeX] [PDF]

    @inproceedings{ICECCS2016a,
    author={S. Liu and G. Bai and J. Sun and J. S. Dong},
    booktitle={2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS)},
    title={Towards Using Concurrent Java API Correctly},
    year={2016},
    pages={219-222},
    }
    
  74. Chenkai Guo, Quanqi Ye, Naipeng Dong, Guangdong Bai, Jin Song Dong and Jing Xu
    Automatic Construction of Callback Model for Android Application
    International Conference on Engineering of Complex Computer Systems (ICECCS), 2016.
    [BibTeX] [PDF]

    @inproceedings{ICECCS2016b,
    author={C. Guo and Q. Ye and N. Dong and G. Bai and J. S. Dong and J. Xu},
    booktitle={2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS)},
    title={Automatic Construction of Callback Model for Android Application},
    year={2016},
    pages={231-234},
    }
    
  75. 2015

  76. Guangdong Bai[ɩ], Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong and Shanqing Guo
    All Your Sessions are Belong to us: Investigating Authenticator Leakage through Backup Channels on Android
    International Conference on Engineering of Complex Computer Systems (ICECCS), 2015.
    Best Paper Award [BibTeX] [PDF]

    @inproceedings{ICECCS2015a,
     author = {Bai, Guangdong and Sun, Jun and Wu, Jianliang and Ye, Quanqi and Li, Li and Dong, Jin Song and Guo, Shanqing},
     title = {All Your Sessions Are Belong to Us: Investigating Authenticator Leakage Through Backup Channels on Android},
     booktitle = {Proceedings of the 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS)},
     year = {2015},
     pages = {60--69},,
     publisher = {IEEE Computer Society},
     address = {Washington, DC, USA},
    }
    
  77. Quanqi Ye, Guangdong Bai[ɩ] and Jin Song Dong
    Formal Analysis of a Single Sign-on Protocol Implementation for Android
    International Conference on Engineering of Complex Computer Systems (ICECCS), 2015.
    [BibTeX] [PDF]

    @inproceedings{ICECCS2015b,
     author = {Ye, Quanqi and Bai, Guangdong and Wang, Kailong and Dong, Jin Song},
     title = {Formal Analysis of a Single Sign-On Protocol Implementation for Android},
     booktitle = {Proceedings of the 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS)},
     year = {2015},
     pages = {90--99},
     numpages = {10},
     publisher = {IEEE Computer Society},
     address = {Washington, DC, USA},
    }
    
  78. Haoyu Wang, Yao Guo, Zihao Tang, Guangdong Bai and Xiangqun Chen
    Reevaluating Android Permission Gaps with Static and Dynamic Analysis
    IEEE Global Communications Conference (GLOBECOM), 2015.
    [BibTeX] [PDF]

    @inproceedings{GLOBECOM2015,
    author={H. Wang and Y. Guo and Z. Tang and G. Bai and X. Chen},
    booktitle={2015 IEEE Global Communications Conference (GLOBECOM)},
    title={Reevaluating Android Permission Gaps with Static and Dynamic Analysis},
    year={2015},
    }
    
  79. 2014

  80. Guangdong Bai[ɩ], Jianan Hao, Jianliang Wu, Yang Liu, Zhenkai Liang and Andrew Martin
    TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms
    International Symposium on Formal Methods (FM), 2014.
    [BibTeX] [PDF]

    @inproceedings{FM2014,
     author = {Bai, Guangdong and Hao, Jianan and Wu, Jianliang and Liu, Yang and Liang, Zhenkai and Martin, Andrew},
     title = {TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms},
     booktitle = {Proceedings of the 19th International Symposium on Formal Methods (FM)},
     year = {2014},
     pages = {110--126},
     numpages = {17},
     publisher = {Springer-Verlag New York, Inc.},
     address = {New York, NY, USA},
    }
    
    
  81. Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, Prateek Saxena
    DroidVault: A Trusted Data Vault for Android Devices
    International Conference on Engineering of Complex Computer Systems (ICECCS), 2014.
    Best Paper Award [BibTeX] [PDF]

    @inproceedings{ICECCS2014,
      author = {Li, Xiaolei and Hu, Hong and Bai, Guangdong and Jia, Yaoqi and Liang, Zhenkai and Saxena, Prateek},
     title = {DroidVault: A Trusted Data Vault for Android Devices},
     booktitle = {Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems (ICECCS)},
     year = {2014},
     pages = {29--38},
     publisher = {IEEE Computer Society},
     address = {Washington, DC, USA},
    }
    
  82. 2013

  83. Guangdong Bai[ɩ], Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun, Yang Liu and Jin Song Dong
    AuthScan: Automatic Extraction of Web Authentication Protocols from Implementations
    Annual Network & Distributed System Security Symposium (NDSS), 2013.
    [BibTeX] [PDF]

    @inproceedings{NDSS2013,
      author    = {Guangdong Bai and Jike Lei and Guozhu Meng and Sai Sathyanarayan Venkatraman and Prateek Saxena and Jun Sun and Yang Liu and Jin Song Dong},
      title     = {AuthScan: Automatic Extraction of Web Authentication Protocols from Implementations},
      booktitle = {Annual Network & Distributed System Security Symposium (NDSS)},
      publisher = {The Internet Society},
      year      = {2013}
    }
    }
    
  84. Xiaolei Li, Guangdong Bai, Zhenkai Liang and Heng Yin
    A Software Environment for Confining Malicious Android Applications via Resource Virtualization
    International Conference on Engineering of Complex Computer Systems (ICECCS), 2013.
    [BibTeX] [PDF]

    @inproceedings{ICECCS2013,
    author = {Li, Xiaolei and Bai, Guangdong and Liang, Zhenkai and Yin, Heng},
     title = {A Software Environment for Confining Malicious Android Applications via Resource Virtualization},
     booktitle = {Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems (ICECCS)},
     year = {2013},
     pages = {208--211},
     publisher = {IEEE Computer Society},
     address = {Washington, DC, USA},
    }
    
  85. Jianan Hao, Yang Liu, Wentong Cai, Guangdong Bai and Jun Sun
    vTRUST: A Formal Modeling and Verification Framework for Virtualization Systems
    International Conference on Formal Engineering Methods (ICFEM), 2013.
    [BibTeX] [PDF]

    @inproceedings{ICFEM2013,
    author="Hao, Jianan and Liu, Yang and Cai, Wentong and Bai, Guangdong and Sun, Jun",
    title="vTRUST: A Formal Modeling and Verification Framework for Virtualization Systems",
    booktitle="Formal Methods and Software Engineering (ICFEM)",
    year="2013",
    publisher="Springer Berlin Heidelberg",
    pages="329--346",
    }
    
  86. 2012 & before

  87. Liang Gu, Guangdong Bai, Yao Guo, Xiangqun Chen and Hong Mei
    Security Model Oriented Attestation on Dynamically Reconfigurable Component-Based Systems
    Journal of Network and Computer Applications, 35(3):974-981, 2012.
    [BibTeX] [PDF]

    @article{JNCA2012,
    title = "Security model oriented attestation on dynamically reconfigurable component-based systems",
    journal = "Journal of Network and Computer Applications",
    volume = "35",
    number = "3",
    pages = "974 - 981",
    year = "2012",
    author = "Liang Gu and Guangdong Bai and Yao Guo and Xiangqun Chen and Hong Mei",
    }
    
  88. Guangdong Bai[ɩ], Tao Feng, Liang Gu, Yao Guo and Xiangqun Chen
    Context-Aware Usage Control for Android
    International ICST Conference on Security and Privacy in Communication Networks (SecureComm), 2010.
    [BibTeX] [PDF]

    @InProceedings{SecureComm2010,
    author="Bai, Guangdong and Gu, Liang and Feng, Tao and Guo, Yao and Chen, Xiangqun",
    title="Context-Aware Usage Control for Android",
    booktitle="Security and Privacy in Communication Networks (SecureComm)",
    year="2010",
    publisher="Springer Berlin Heidelberg",
    pages="326--343",
    }