Guangdong Bai bio photo

Guangdong Bai

Associate Professor
School of Information Technology and Electrical Engineering
The University of Queensland
Australia

Twitter   G. Scholar LinkedIn e-Mail

Professional Services

Editorial Board

  • Associate Editor: IEEE Transactions on Dependable and Secure Computing (TDSC)
  • Associate Editor: IEEE Transactions on Services Computing (TSC)
  • Program Committee Member

  • NDSS, IEEE S&P, CCS, Usenix Security, ESORICS, AsiaCCS
  • ICSE, ISSTA, ASE, FSE, The Web Conference (WWW)
  • Conference General Chair/Co-Chair

  • The 18th International Conference on Provable and Practical Security (ProvSec 2024)
  • The 86th IFIP Working Group 10.4 Meetings
  • The 24th International Conference on Formal Engineering Methods (ICFEM 2023)
  • Program Commitee Chair

  • The 16th International Conference on Network and System Security (NSS 2022)
  • The 3rd Symposium on Distributed Ledger Technology (SDLT3)
  • The 22nd International Conference on Engineering of Complex Computer Systems (ICECCS 2017)
  • Talks/Keynotes Given by me

  • Machine Learning for Privacy Compliance in Software Ecosystems
    Dependable and Secure Machine Learning (DSML) @ DSN, June 2024.

  • Privacy Compliance in Emerging Applications
    The 3rd International Symposium on Advanced Security on Software and Systems (ASSS) @ AsiaCCS, July 2023.

  • Hey, You, Get off My Private Data: Do Apps Respect Your Privacy as They Claim?
    Black Hat Asia, online, May 2021.

  • Security Analysis of Internet-or-Things Systems: An Integration Perspective
    Working Formal Methods Symposium (FROM) , Sep 2020.

  • The Secret Codes Tell the Secrets
    HITB Lock Down, online, July 2020.

  • Trusted Computing based Protocols: Modeling and Analysis
    Peking University, Beijing, China, Jul 2019.

  • Towards Model Checking Event-driven Applications for Security Properties
    Oracle, Brisbane, Australia, Jan 2019.

  • A New Fuzzing Method on Android
    SyScan360, Singapore, Mar 2018.

  • The Nightmare of Fragmentation: A Case Study of 200+ Vulnerabilities in Android Phones
    HITB GSEC, Singapore, Aug 2017.

  • 3G/4G Intranet Scanning and its Application on the WormHole Vulnerability
    Black Hat Asia, Singapore, Mar 2017.

  • Authenticator Leakage through Backup Channels on Android
    Black Hat Europe, Amsterdam, The Netherlands, Nov 2015.

  • Extracting Model from Implementations of Web Authentication Protocols
    Peking University, Beijing, China, Oct 2015.