Guangdong Bai
Associate Professor
School of Information Technology and Electrical Engineering
The University of Queensland
Australia
Twitter
G. Scholar
LinkedIn
e-Mail
Professional Services
Editorial Board
Associate Editor: IEEE Transactions on Dependable and Secure Computing (TDSC)
Associate Editor: IEEE Transactions on Services Computing (TSC)
Program Committee Member
NDSS, IEEE S&P, CCS, Usenix Security, ESORICS, AsiaCCS
ICSE, ISSTA, ASE, FSE, The Web Conference (WWW)
Conference General Chair/Co-Chair
The 18th International Conference on Provable and Practical Security (ProvSec 2024)
The 86th IFIP Working Group 10.4 Meetings
The 24th International Conference on Formal Engineering Methods (ICFEM 2023)
Program Commitee Chair
The 16th International Conference on Network and System Security (NSS 2022)
The 3rd Symposium on Distributed Ledger Technology (SDLT3)
The 22nd International Conference on Engineering of Complex Computer Systems (ICECCS 2017)
Talks/Keynotes Given by me
Machine Learning for Privacy Compliance in Software Ecosystems
Dependable and Secure Machine Learning (DSML) @ DSN, June 2024.
Privacy Compliance in Emerging Applications
The 3rd International Symposium on Advanced Security on Software and Systems (ASSS) @ AsiaCCS, July 2023.
Hey, You, Get off My Private Data: Do Apps Respect Your Privacy as They Claim?
Black Hat Asia, online, May 2021.
Security Analysis of Internet-or-Things Systems: An Integration Perspective
Working Formal Methods Symposium (FROM) , Sep 2020.
The Secret Codes Tell the Secrets
HITB Lock Down, online, July 2020.
Trusted Computing based Protocols: Modeling and Analysis
Peking University, Beijing, China, Jul 2019.
Towards Model Checking Event-driven Applications for Security Properties
Oracle, Brisbane, Australia, Jan 2019.
A New Fuzzing Method on Android
SyScan360, Singapore, Mar 2018.
The Nightmare of Fragmentation: A Case Study of 200+ Vulnerabilities in Android Phones
HITB GSEC, Singapore, Aug 2017.
3G/4G Intranet Scanning and its Application on the WormHole Vulnerability
Black Hat Asia, Singapore, Mar 2017.
Authenticator Leakage through Backup Channels on Android
Black Hat Europe, Amsterdam, The Netherlands, Nov 2015.
Extracting Model from Implementations of Web Authentication Protocols
Peking University, Beijing, China, Oct 2015.