
Guangdong Bai
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j12]Yanjun Zhang
, Guangdong Bai, Mingyang Zhong
, Xue Li, Ryan K. L. Ko:
Differentially Private Collaborative Coupling Learning for Recommender Systems. IEEE Intell. Syst. 36(1): 16-24 (2021) - [i7]Taejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang:
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. CoRR abs/2101.11866 (2021) - [i6]Haoxi Tan, Mahin Chandramohan, Cristina Cifuentes, Guangdong Bai, Ryan K. L. Ko:
ColdPress: An Extensible Malware Analysis Platform for Threat Intelligence. CoRR abs/2103.07012 (2021) - 2020
- [j11]Hongcan Gao
, Chenkai Guo
, Dengrong Huang
, Xiaolei Hou
, Yanfeng Wu
, Jing Xu
, Zhen He
, Guangdong Bai
:
Autonomous Permission Recommendation. IEEE Access 8: 76580-76594 (2020) - [j10]Yanfeng Wu, Chenkai Guo, Hongcan Gao, Jing Xu, Guangdong Bai:
Dilated residual networks with multi-level attention for speaker verification. Neurocomputing 412: 177-186 (2020) - [j9]Chenkai Guo
, Dengrong Huang, Jianwen Zhang, Jing Xu, Guangdong Bai, Naipeng Dong:
Early prediction for mode anomaly in generative adversarial network training: An empirical study. Inf. Sci. 534: 117-138 (2020) - [j8]Naipeng Dong
, Guangdong Bai, Lung-Chen Huang, Edmund Kok Heng Lim, Jin Song Dong:
A blockchain-based decentralized booking system. Knowl. Eng. Rev. 35: e17 (2020) - [c29]Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen
, Ryan K. L. Ko:
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning. ESORICS (1) 2020: 399-418 - [c28]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo:
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. ICECCS 2020: 125-134 - [c27]Hanlin Wei, Guangdong Bai, Zongwei Luo:
Foggy: A New Anonymous Communication Architecture Based on Microservices. ICECCS 2020: 135-144 - [c26]Taejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang:
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. TrustCom 2020: 827-835 - [i5]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo:
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. CoRR abs/2006.06419 (2020) - [i4]Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis
, Chen Chen, Ryan K. L. Ko:
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning. CoRR abs/2007.06953 (2020) - [i3]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. CoRR abs/2007.13639 (2020) - [i2]Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Haoyu Wang:
When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories. CoRR abs/2010.12218 (2020)
2010 – 2019
- 2019
- [j7]Pardeep Kumar
, Yun Lin
, Guangdong Bai, Andrew Paverd
, Jin Song Dong, Andrew P. Martin
:
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues. IEEE Commun. Surv. Tutorials 21(3): 2886-2927 (2019) - [c25]Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong, Haoyu Wang:
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking. ISC 2019: 299-318 - [c24]Tianming Liu, Haoyu Wang, Li Li, Guangdong Bai, Yao Guo, Guoai Xu:
DaPanda: Detecting Aggressive Push Notifications in Android Apps. ASE 2019: 66-78 - 2018
- [j6]Jian Mao
, Jingdong Bian, Guangdong Bai, Ruilong Wang, Yue Chen, Yinhao Xiao, Zhenkai Liang
:
Detecting Malicious Behaviors in JavaScript Applications. IEEE Access 6: 12284-12294 (2018) - [j5]Guozhu Meng, Ruitao Feng, Guangdong Bai, Kai Chen, Yang Liu:
DroidEcho: an in-depth dissection of malicious behaviors in Android applications. Cybersecur. 1(1): 4 (2018) - [j4]Guangdong Bai
, Quanqi Ye, Yongzheng Wu, Heila Botha, Jun Sun, Yang Liu, Jin Song Dong, Willem Visser:
Towards Model Checking Android Applications. IEEE Trans. Software Eng. 44(6): 595-612 (2018) - [c23]Mark H. Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang:
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications. Inscrypt 2018: 349-369 - [c22]Kulani Tharaka Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Jin Song Dong, Zhenkai Liang:
HOMESCAN: Scrutinizing Implementations of Smart Home Integrations. ICECCS 2018: 21-30 - [c21]Wai Yan Maung Maung Thin, Naipeng Dong, Guangdong Bai, Jin Song Dong:
Formal Analysis of a Proof-of-Stake Blockchain. ICECCS 2018: 197-200 - [c20]Yun Lin, Jun Sun, Lyly Tran, Guangdong Bai, Haijun Wang, Jin Song Dong:
Break the dead end of dynamic slicing: localizing data and control omission bug. ASE 2018: 509-519 - 2017
- [c19]Binbin Chen, Xinshu Dong, Guangdong Bai, Sumeet Jauhar, Yueqiang Cheng:
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors. ACSAC 2017: 425-436 - [c18]Li Li, Naipeng Dong, Jun Pang, Jun Sun
, Guangdong Bai, Yang Liu, Jin Song Dong:
A Verification Framework for Stateful Security Protocols. ICFEM 2017: 262-280 - [c17]Chenkai Guo, Naipeng Dong, Guangdong Bai, Quanqi Ye, Jin Song Dong, Jing Xu, Guannan Si:
App genome: callback sequencing in Android. ICSE (Companion Volume) 2017: 149-151 - [c16]Yinhao Xiao, Guangdong Bai, Jian Mao, Zhenkai Liang
, Wei Cheng:
Privilege Leakage and Information Stealing through the Android Task Mechanism. PAC 2017: 152-163 - [c15]Quanqi Ye, Guangdong Bai, Naipeng Dong, Jin Song Dong:
Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols. SecureComm 2017: 469-488 - [c14]Kailong Wang, Guangdong Bai, Naipeng Dong, Jin Song Dong:
A Framework for Formal Analysis of Privacy on SSO Protocols. SecureComm 2017: 763-777 - [i1]Zhengkui Wang, Guangdong Bai, Soumyadeb Chowdhury, Quanqing Xu, Zhi Lin Seow:
TwiInsight: Discovering Topics and Sentiments from Social Media Datasets. CoRR abs/1705.08094 (2017) - 2016
- [j3]Yaoqi Jia, Guangdong Bai, Prateek Saxena, Zhenkai Liang:
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation. Proc. Priv. Enhancing Technol. 2016(4): 294-314 (2016) - [c13]Shuang Liu
, Guangdong Bai, Jun Sun, Jin Song Dong:
Towards Using Concurrent Java API Correctly. ICECCS 2016: 219-222 - [c12]Chenkai Guo, Quanqi Ye, Naipeng Dong, Guangdong Bai, Jin Song Dong, Jing Xu:
Automatic Construction of Callback Model for Android Application. ICECCS 2016: 231-234 - 2015
- [c11]Haoyu Wang, Yao Guo, Zihao Tang, Guangdong Bai, Xiangqun Chen:
Reevaluating Android Permission Gaps with Static and Dynamic Analysis. GLOBECOM 2015: 1-6 - [c10]Guangdong Bai, Jun Sun
, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo:
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android. ICECCS 2015: 60-69 - [c9]Quanqi Ye, Guangdong Bai, Kailong Wang, Jin Song Dong:
Formal Analysis of a Single Sign-On Protocol Implementation for Android. ICECCS 2015: 90-99 - 2014
- [j2]Guangdong Bai, Lin Yan, Liang Gu, Yao Guo, Xiangqun Chen:
Context-aware usage control for web of things. Secur. Commun. Networks 7(12): 2696-2712 (2014) - [c8]Guangdong Bai, Jianan Hao, Jianliang Wu, Yang Liu, Zhenkai Liang
, Andrew P. Martin:
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms. FM 2014: 110-126 - [c7]Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang
, Prateek Saxena:
DroidVault: A Trusted Data Vault for Android Devices. ICECCS 2014: 29-38 - [c6]Xiaolei Li, Guangdong Bai, Benjamin Thian, Zhenkai Liang
, Heng Yin
:
A Light-Weight Software Environment for Confining Android Malware. SERE (Companion) 2014: 158-167 - 2013
- [c5]Xiaolei Li, Guangdong Bai, Zhenkai Liang
, Heng Yin
:
A Software Environment for Confining Malicious Android Applications via Resource Virtualization. ICECCS 2013: 208-211 - [c4]Jianan Hao, Yang Liu, Wentong Cai
, Guangdong Bai, Jun Sun
:
vTRUST: A Formal Modeling and Verification Framework for Virtualization Systems. ICFEM 2013: 329-346 - [c3]Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun, Yang Liu, Jin Song Dong:
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations. NDSS 2013 - 2012
- [j1]Liang Gu, Guangdong Bai, Yao Guo, Xiangqun Chen, Hong Mei:
Security model oriented attestation on dynamically reconfigurable component-based systems. J. Netw. Comput. Appl. 35(3): 974-981 (2012) - 2010
- [c2]Guangdong Bai, Liang Gu, Tao Feng, Yao Guo, Xiangqun Chen:
Context-Aware Usage Control for Android. SecureComm 2010: 326-343 - [c1]Liang Gu, Guangdong Bai, Yao Guo, Xiangqun Chen, Hong Mei:
Security Model Oriented Attestation on Dynamically Reconfigurable Component-Based Systems. UIC/ATC Workshops 2010: 299-304
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-13 22:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint