My Publications
For the full list please refer to my Google Scholar profile and DBLP profile.
Kailong Wang, Yuwei Zheng, Qing Zhang, Guangdong Bai, Mingchuang Qin, Donghui Zhang, Jin Song Dong
Assessing Certificate Validation User Interfaces of WPA Supplicants
The 28th Annual International Conference On Mobile Computing And Networking (MobiCom), 2022.
[BibTeX] [PDF]Fuman Xie, Yanjun Zhang, Hanlin Wei, Guangdong Bai
UQ-AAS21: A Comprehensive Dataset of Amazon Alexa Skills
International Conference on Advanced Data Mining and Applications (ADMA), 2022.
[BibTeX] [PDF]@InProceedings{ADMA2022, author="Xie, Fuman and Zhang, Yanjun and Wei, Hanlin and Bai, Guangdong", title="UQ-AAS21: A Comprehensive Dataset of Amazon Alexa Skills", booktitle="Advanced Data Mining and Applications (ADMA)", year="2022", pages="159--173", }
Hongcan Gao, Chenkai Guo, Guangdong Bai, Dengrong Huang, Zhen He, Yanfeng Wu, Jing Xu
Sharing runtime permission issues for developers based on similar-app review mining
Journal of Systems and Software , 2022.
[BibTeX] [PDF]@article{JSS2022, title = {Sharing runtime permission issues for developers based on similar-app review mining}, journal = {Journal of Systems and Software}, volume = {184}, pages = {111118}, year = {2022}, author = {Hongcan Gao and Chenkai Guo and Guangdong Bai and Dengrong Huang and Zhen He and Yanfeng Wu and Jing Xu}, }
Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen, Ryan Ko
Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis
The 26th European Symposium on Research in Computer Security (ESORICS), 2021.
[BibTeX] [PDF]@InProceedings{ESORICS2021, author = {Yanjun Zhang and Guangdong Bai and Xue Li and Caitlin Curtis and Chen Chen and Ryan Ko}, title = {Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis}, year = {2021}, booktitle = {Proceedings of the 26th European Symposium on Research in Computer Security (ESORICS)}, pages = {}, }
Kulani Mahadewa, Yanjun Zhang, Guangdong Bai, Lei Bu, Zhiqiang Zuo, Dileepa Fernando, Zhenkai Liang, Jin Song Dong
Identifying privacy weaknesses from multi-party trigger-action integration platforms
The 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2021.
[BibTeX] [PDF]Hanlin Wei, Behnaz Hassanshahi, Guangdong Bai, Padmanabhan Krishnan, Kostyantyn Vorobyov
MoScan: a model-based vulnerability scanner for web single sign-on services (Tool paper)
The 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2021.
[BibTeX] [PDF]Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Weihang Su, Haoyu Wang
Understanding the Impact of COVID-19 on Github Developers: A Preliminary Study
The 33rd International Conference on Software Engineering & Knowledge Engineering (SEKE) , 2021.
[BibTeX] [PDF]Yuteng Lu, Weidi Sun, Guangdong Bai, Meng Sun
DeepAuto: A First Step Towards Formal Verification of Deep Learning Systems
The 33rd International Conference on Software Engineering & Knowledge Engineering (SEKE) , 2021.
[BibTeX] [PDF]Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Haoyu Wang
A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories
IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 2021.
[BibTeX] [PDF]Kailong Wang, Junzhe Zhang, Guangdong Bai, Ryan Ko, Jin Song Dong
It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts
The Web Conference (WWW), 2021.
[BibTeX] [PDF]Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen, Ryan K. L. Ko
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning
The 25th European Symposium on Research in Computer Security (ESORICS), 2020.
[BibTeX] [PDF]@InProceedings{ESORICS2020, author = {Yanjun Zhang and Guangdong Bai and Xue Li and Caitlin Curtis and Chen Chen and Ryan K. L. Ko}, title = {PrivColl: Practical Privacy-Preserving Collaborative Machine Learning}, year = {2020}, booktitle = {Proceedings of the 25th European Symposium on Research in Computer Security (ESORICS)}, pages = {}, }
Yanjun Zhang, Guangdong Bai, Mingyang Zhang, Xue Li, Ryan Ko
Differentially private collaborative coupling learning for recommender systems
IEEE Intelligent Systems, 2020.
[BibTeX] [PDF]@Article{IS2020, author = {Yanjun Zhang and Guangdong Bai and Mingyang Zhang and Xue Li and Ryan Ko}, title = {Differentially private collaborative coupling learning for recommender systems}, year = {2020}, journal = {IEEE Intelligent Systems}, pages = {}, }
Chenkai Guo, Dengrong Huang, Jianwen Zhang, Jing Xu, Guangdong Bai, Naipeng Dong
Early prediction for mode anomaly in generative adversarial network training: An empirical study
Information Sciences, 2020.
[BibTeX] [PDF]@Article{INFOSCI2020, title = {Early prediction for mode anomaly in generative adversarial network training: An empirical study}, journal = {Information Sciences}, volume = {534}, pages = {117 - 138}, year = {2020}, author = {Chenkai Guo and Dengrong Huang and Jianwen Zhang and Jing Xu and Guangdong Bai and Naipeng Dong}, }
Yanfeng Wu, Chenkai Guo, Hongcan Gao, Jing Xu, Guangdong Bai
Dilated residual networks with multi-level attention for speaker verification
Neurocomputing, 2020.
[BibTeX] [PDF]@Article{NEURO2020, author = {Yanfeng Wu and Chenkai Guo and Hongcan Gao and Jing Xu and Guangdong Bai}, title = {Dilated residual networks with multi-level attention for speaker verification}, year = {2020}, journal = {Neurocomputing}, volume = {412}, pages = {177 - 186}, }
Naipeng Dong, Guangdong Bai, Lung-Chen Huang, Edmund Kok Heng Lim, Jin Song Dong
A blockchain-based decentralized booking system
The Knowledge Engineering Review, 2020.
[BibTeX] [PDF]@Article{KER2020, title={A blockchain-based decentralized booking system}, volume={35}, DOI={10.1017/S0269888920000260}, journal={The Knowledge Engineering Review}, publisher={Cambridge University Press}, author={Dong, Naipeng and Bai, Guangdong and Huang, Lung-Chen and Lim, Edmund Kok Heng and Dong, Jin Song}, year={2020}, pages={e17} }
Taejun Choi, Guangdong Bai, Ryan KL Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems
IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020.
[BibTeX] [PDF]Hanlin Wei, Guangdong Bai, Zongwei Luo
Foggy: A New Anonymous Communication Architecture Based on Microservices
The 25th International Conference on Engineering of Complex Computer Systems (ICECCS), 2020.
[BibTeX] [PDF]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo
Deposafe: Demystifying the fake deposit vulnerability in ethereum smart contracts
The 25th International Conference on Engineering of Complex Computer Systems (ICECCS), 2020.
[BibTeX] [PDF]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu
Don't fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams
2020 APWG Symposium on Electronic Crime Research (eCrime), 2020.
[BibTeX] [PDF]Kulani Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Yan Liu, Jin Song Dong and Zhenkai Liang
Scrutinizing Implementations of Smart Home Integrations
IEEE Transactions on Software Engineering (TSE), 2019.
[BibTeX] [PDF]@Article{TSE2019, author={Mahadewa, Kulani and Wang, Kailong and Bai, Guangdong and Shi, Ling and Dong, Jin Song and Liang, Zhenkai}, journal={IEEE Transactions on Software Engineering}, title={Scrutinizing Implementations of Smart Home Integrations}, year={2019}, volume={}, number={}, pages={}, }
Pardeep Kumar, Yun Lin, Guangdong Bai, Andrew Paverd, Jin Song Dong, Andrew Martin
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues
IEEE Communications Surveys & Tutorials, 2019.
[BibTeX] [PDF]@ARTICLE{IEEEST2019, author={Kumar, Pardeep and Lin, Yun and Bai, Guangdong and Paverd, Andrew and Dong, Jin Song and Martin, Andrew}, journal={IEEE Communications Surveys \& Tutorials}, title={Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues}, year={2019}, volume={}, number={}, pages={1-1}, doi={10.1109/COMST.2019.2899354}, ISSN={1553-877X}, month={}, }
Tianming Liu, Haoyu Wang, Li Li, Guangdong Bai, Yao Guo and Guoai Xu
DaPanda: Detecting Aggressive Push Notification in Android Apps
The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2019.
[BibTeX]@InProceedings{ASE2019, author = {Liu, Tianming and Wang, Haoyu and Li, Li and Bai, Guangdong and Guo, Yao and Xu, Guoai}, title = {DaPanda: Detecting Aggressive Push Notifications in Android Apps}, year = {2019}, publisher = {IEEE Press}, booktitle = {Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)}, pages = {66–78}, numpages = {13}, location = {San Diego, California}, }
Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong and Haoyu Wang
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking
the 22nd International Conference Information Security (ISC) , 2019.
[BibTeX] [PDF]@inproceedings{ISC2019, author = {Quanqi Ye and Yan Zhang and Guangdong Bai and Naipeng Dong and Zhenkai Liang and Jin Song Dong and Haoyu Wang}, title = {LightSense: {A} Novel Side Channel for Zero-permission Mobile User Tracking}, booktitle = {Proceedings of the 22nd International Conference Information Security (ISC)}, pages = {299--318}, year = {2019}, }
Guangdong Bai, Quanqi Ye, Yongzheng Wu, Heila Botha, Jun Sun, Yang Liu, Jin Song Dong and Willem Visser
Towards Model Checking Android Applications
IEEE Transactions on Software Engineering (TSE), 44(6): 595-612, 2018.
[BibTeX] [PDF]@Article{TSE2018, author={Bai, Guangdong and Ye, Quanqi and Wu, Yongzheng and Botha, Heila and Sun, Jun and Liu, Yang and Dong, Jin Song and Visser, Willem}, journal={IEEE Transactions on Software Engineering}, title={Towards Model Checking Android Applications}, year={2018}, volume={44}, number={6}, pages={595-612}, }
Kulani Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Jin Song Dong and Zhenkai Liang
HomeScan: Scrutinizing Implementations of Smart Home Integrations
23rd International Conference on Engineering of Complex Computer Systems (ICECCS), 2018.
[BibTeX] [PDF] [Slides]@InProceedings{ICECCS2018a, author = {Mahadewa, Kulani and Wang, Kailong and Bai, Guangdong and Shi, Ling and Dong, Jin Song and Liang, Zhenkai}, title = {HomeScan: Scrutinizing Implementations of Smart Home Integrations}, booktitle = {Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems (ICECCS)}, year = {2018}, pages = {21--30}, }
Wai Yan Maung Maung Thin, Naipeng Dong, Guangdong Bai and Jin Song Dong
Formal Analysis of a Proof-of-Stake Blockchain
23rd International Conference on Engineering of Complex Computer Systems (ICECCS), 2018.
[BibTeX] [PDF] [Slides] [Models]@InProceedings{ICECCS2018b, author = {Thin, Wai Yan Maung Maung and Dong, Naipeng and Bai, Guangdong and Dong, Jin Song}, title = {Formal Analysis of a Proof-of-Stake Blockchain}, booktitle = {Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems (ICECCS)}, year = {2018}, pages = {197--200}, }
Yun Lin, Jun Sun, Lyly Tran, Guangdong Bai, Haijun Wang and Jin Song Dong
Break the dead end of dynamic slicing: localizing data and control omission bug
ACM/IEEE International Conference on Automated Software Engineering (ASE), 2018.
[BibTeX] [PDF]@InProceedings{ASE2018, author = {Lin, Yun and Sun, Jun and Tran, Lyly and Bai, Guangdong and Wang, Haijun and Dong, Jinsong}, title = {Break the Dead End of Dynamic Slicing: Localizing Data and Control Omission Bug}, booktitle = {Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE)}, year = {2018}, pages = {509--519}, publisher = {ACM}, address = {New York, NY, USA}, }
Binbin Chen, Xinshu Dong, Guangdong Bai, Sumeet Jauhar and Yueqiang Cheng
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors
Annual Computer Security Applications Conference (ACSAC), 2017.
[BibTeX] [PDF]@InProceedings{ACSAC2017, author = {Chen, Binbin and Dong, Xinshu and Bai, Guangdong and Jauhar, Sumeet and Cheng, Yueqiang}, title = {Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC) }, year = {2017}, location = {Orlando, FL, USA}, pages = {425--436}, publisher = {ACM}, address = {New York, NY, USA}, }
Quanqi Ye, Guangdong Bai, Naipeng Dong and Jin Song Dong
Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols
International Conference on Security and Privacy in Communication Networks (SecureComm), 2017.
[BibTeX] [PDF]@InProceedings{SecureComm2017a, author="Ye, Quanqi and Bai, Guangdong and Dong, Naipeng and Dong, Jin Song", title="Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols", booktitle="Security and Privacy in Communication Networks (SecureComm)", year="2017", publisher="Springer International Publishing", address="Cham", pages="469--488", }
Kailong Wang, Guangdong Bai, Naipeng Dong and Jin Song Dong
A Framework for Formal Analysis of Privacy on SSO Protocols
International Conference on Security and Privacy in Communication Networks (SecureComm), 2017.
[BibTeX] [PDF]@InProceedings{SecureComm2017b, author="Wang, Kailong and Bai, Guangdong and Dong, Naipeng and Dong, Jin Song", title="A Framework for Formal Analysis of Privacy on SSO Protocols", booktitle="Security and Privacy in Communication Networks (SecureComm)", year="2017", publisher="Springer International Publishing", address="Cham", pages="763--777", }
Li Li, Naipeng Dong, Jun Pang, Jun Sun, Guangdong Bai, Yang Liu and Jin Song Dong
A Verification Framework for Stateful Security Protocols
International Conference on Formal Engineering Methods (ICFEM), 2017.
[BibTeX] [PDF]@InProceedings{ICFEM2017, author="Li, Li and Dong, Naipeng and Pang, Jun and Sun, Jun and Bai, Guangdong and Liu, Yang and Dong, Jin Song", title="A Verification Framework for Stateful Security Protocols", booktitle="Formal Methods and Software Engineering (ICFEM)", year="2017", publisher="Springer International Publishing", pages="262--280", }
Yinhao Xiao, Guangdong Bai, Jian Mao, Zhenkai Liang and Wei Cheng
Privilege Leakage and Information Stealing through the Android Task Mechanism
IEEE Symposium on Privacy-Aware Computing (PAC), 2017.
[BibTeX] [PDF]@InProceedings{PAC2017, author={Y. Xiao and G. Bai and J. Mao and Z. Liang and W. Cheng}, booktitle={2017 IEEE Symposium on Privacy-Aware Computing (PAC)}, title={Privilege Leakage and Information Stealing through the Android Task Mechanism}, year={2017}, pages={152-163}, }
Yaoqi Jia, Guangdong Bai, Prateek Saxena and Zhenkai Liang
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation
Privacy Enhancing Technologies (PETS), 2016.
[BibTeX] [PDF]@article { PETS2016, author = "Yaoqi Jia and Guangdong Bai and Prateek Saxena and Zhenkai Liang", title = "Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation", journal = "Proceedings on Privacy Enhancing Technologies (PETS)", year = "2016", volume = "2016", number = "4", pages: 294 - 314", }
Shuang Liu, Guangdong Bai, Jun Sun and Jin Song Dong
Towards Using Concurrent Java API Correctly
International Conference on Engineering of Complex Computer Systems (ICECCS), 2016.
[BibTeX] [PDF]@inproceedings{ICECCS2016a, author={S. Liu and G. Bai and J. Sun and J. S. Dong}, booktitle={2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS)}, title={Towards Using Concurrent Java API Correctly}, year={2016}, pages={219-222}, }
Chenkai Guo, Quanqi Ye, Naipeng Dong, Guangdong Bai, Jin Song Dong and Jing Xu
Automatic Construction of Callback Model for Android Application
International Conference on Engineering of Complex Computer Systems (ICECCS), 2016.
[BibTeX] [PDF]@inproceedings{ICECCS2016b, author={C. Guo and Q. Ye and N. Dong and G. Bai and J. S. Dong and J. Xu}, booktitle={2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS)}, title={Automatic Construction of Callback Model for Android Application}, year={2016}, pages={231-234}, }
Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong and Shanqing Guo
All Your Sessions are Belong to us: Investigating Authenticator Leakage through Backup Channels on Android
International Conference on Engineering of Complex Computer Systems (ICECCS), 2015.
Best Paper Award [BibTeX] [PDF]@inproceedings{ICECCS2015a, author = {Bai, Guangdong and Sun, Jun and Wu, Jianliang and Ye, Quanqi and Li, Li and Dong, Jin Song and Guo, Shanqing}, title = {All Your Sessions Are Belong to Us: Investigating Authenticator Leakage Through Backup Channels on Android}, booktitle = {Proceedings of the 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS)}, year = {2015}, pages = {60--69},, publisher = {IEEE Computer Society}, address = {Washington, DC, USA}, }
Quanqi Ye, Guangdong Bai and Jin Song Dong
Formal Analysis of a Single Sign-on Protocol Implementation for Android
International Conference on Engineering of Complex Computer Systems (ICECCS), 2015.
[BibTeX] [PDF]@inproceedings{ICECCS2015b, author = {Ye, Quanqi and Bai, Guangdong and Wang, Kailong and Dong, Jin Song}, title = {Formal Analysis of a Single Sign-On Protocol Implementation for Android}, booktitle = {Proceedings of the 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS)}, year = {2015}, pages = {90--99}, numpages = {10}, publisher = {IEEE Computer Society}, address = {Washington, DC, USA}, }
Haoyu Wang, Yao Guo, Zihao Tang, Guangdong Bai and Xiangqun Chen
Reevaluating Android Permission Gaps with Static and Dynamic Analysis
IEEE Global Communications Conference (GLOBECOM), 2015.
[BibTeX] [PDF]@inproceedings{GLOBECOM2015, author={H. Wang and Y. Guo and Z. Tang and G. Bai and X. Chen}, booktitle={2015 IEEE Global Communications Conference (GLOBECOM)}, title={Reevaluating Android Permission Gaps with Static and Dynamic Analysis}, year={2015}, }
Guangdong Bai, Jianan Hao, Jianliang Wu, Yang Liu, Zhenkai Liang and Andrew Martin
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms
International Symposium on Formal Methods (FM), 2014.
[BibTeX] [PDF]@inproceedings{FM2014, author = {Bai, Guangdong and Hao, Jianan and Wu, Jianliang and Liu, Yang and Liang, Zhenkai and Martin, Andrew}, title = {TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms}, booktitle = {Proceedings of the 19th International Symposium on Formal Methods (FM)}, year = {2014}, pages = {110--126}, numpages = {17}, publisher = {Springer-Verlag New York, Inc.}, address = {New York, NY, USA}, }
Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, Prateek Saxena
DroidVault: A Trusted Data Vault for Android Devices
International Conference on Engineering of Complex Computer Systems (ICECCS), 2014.
Best Paper Award [BibTeX] [PDF]@inproceedings{ICECCS2014, author = {Li, Xiaolei and Hu, Hong and Bai, Guangdong and Jia, Yaoqi and Liang, Zhenkai and Saxena, Prateek}, title = {DroidVault: A Trusted Data Vault for Android Devices}, booktitle = {Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems (ICECCS)}, year = {2014}, pages = {29--38}, publisher = {IEEE Computer Society}, address = {Washington, DC, USA}, }
Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun, Yang Liu and Jin Song Dong
AuthScan: Automatic Extraction of Web Authentication Protocols from Implementations
Annual Network & Distributed System Security Symposium (NDSS), 2013.
[BibTeX] [PDF]@inproceedings{NDSS2013, author = {Guangdong Bai and Jike Lei and Guozhu Meng and Sai Sathyanarayan Venkatraman and Prateek Saxena and Jun Sun and Yang Liu and Jin Song Dong}, title = {AuthScan: Automatic Extraction of Web Authentication Protocols from Implementations}, booktitle = {Annual Network & Distributed System Security Symposium (NDSS)}, publisher = {The Internet Society}, year = {2013} } }
Xiaolei Li, Guangdong Bai, Zhenkai Liang and Heng Yin
A Software Environment for Confining Malicious Android Applications via Resource Virtualization
International Conference on Engineering of Complex Computer Systems (ICECCS), 2013.
[BibTeX] [PDF]@inproceedings{ICECCS2013, author = {Li, Xiaolei and Bai, Guangdong and Liang, Zhenkai and Yin, Heng}, title = {A Software Environment for Confining Malicious Android Applications via Resource Virtualization}, booktitle = {Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems (ICECCS)}, year = {2013}, pages = {208--211}, publisher = {IEEE Computer Society}, address = {Washington, DC, USA}, }
Jianan Hao, Yang Liu, Wentong Cai, Guangdong Bai and Jun Sun
vTRUST: A Formal Modeling and Verification Framework for Virtualization Systems
International Conference on Formal Engineering Methods (ICFEM), 2013.
[BibTeX] [PDF]@inproceedings{ICFEM2013, author="Hao, Jianan and Liu, Yang and Cai, Wentong and Bai, Guangdong and Sun, Jun", title="vTRUST: A Formal Modeling and Verification Framework for Virtualization Systems", booktitle="Formal Methods and Software Engineering (ICFEM)", year="2013", publisher="Springer Berlin Heidelberg", pages="329--346", }
Liang Gu, Guangdong Bai, Yao Guo, Xiangqun Chen and Hong Mei
Security Model Oriented Attestation on Dynamically Reconfigurable Component-Based Systems
Journal of Network and Computer Applications, 35(3):974-981, 2012.
[BibTeX] [PDF]@article{JNCA2012, title = "Security model oriented attestation on dynamically reconfigurable component-based systems", journal = "Journal of Network and Computer Applications", volume = "35", number = "3", pages = "974 - 981", year = "2012", author = "Liang Gu and Guangdong Bai and Yao Guo and Xiangqun Chen and Hong Mei", }
Guangdong Bai, Tao Feng, Liang Gu, Yao Guo and Xiangqun Chen
Context-Aware Usage Control for Android
International ICST Conference on Security and Privacy in Communication Networks (SecureComm), 2010.
[BibTeX] [PDF]@InProceedings{SecureComm2010, author="Bai, Guangdong and Gu, Liang and Feng, Tao and Guo, Yao and Chen, Xiangqun", title="Context-Aware Usage Control for Android", booktitle="Security and Privacy in Communication Networks (SecureComm)", year="2010", publisher="Springer Berlin Heidelberg", pages="326--343", }