Guangdong Bai

Orcid: 0000-0002-6390-9890

According to our database1, Guangdong Bai authored at least 93 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications.
Proc. Priv. Enhancing Technol., January, 2024

ReLU Hull Approximation.
Proc. ACM Program. Lang., January, 2024

IoTSecSim: A framework for modelling and simulation of security in Internet of things.
Comput. Secur., January, 2024

AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification.
IEEE Trans. Inf. Forensics Secur., 2024

The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024

Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors.
CoRR, 2024

MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack.
CoRR, 2024

Symbolic Verification of Mesh Commissioning Protocol of Thread.
Proceedings of the 17th Innovations in Software Engineering Conference, 2024

2023
GenDroid: A query-efficient black-box android adversarial attack framework.
Comput. Secur., September, 2023

Proactive Privacy-preserving Learning for Cross-modal Retrieval.
ACM Trans. Inf. Syst., April, 2023

Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Symbolic Security Verification of Mesh Commissioning Protocol in Thread (extended version).
CoRR, 2023

AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning.
Proceedings of the ACM Web Conference 2023, 2023

Towards an Effective and Interpretable Refinement Approach for DNN Verification.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Enhancing Federated Learning Robustness Using Data-Agnostic Model Pruning.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Security Checking of Trigger-Action-Programming Smart Home Integrations.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

A Comprehensive Study of Real-World Bugs in Machine Learning Model Optimization.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Quantitative Explainable AI For Face Recognition.
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023

Supervised Robustness-preserving Data-free Neural Network Pruning.
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023

SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Investigating Users' Understanding of Privacy Policies of Virtual Personal Assistant Applications.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Preserving the Privacy and Cybersecurity of Home Energy Data.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

Preserving the Privacy and Cybersecurity of Home Energy Data.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

2022
Sharing runtime permission issues for developers based on similar-app review mining.
J. Syst. Softw., 2022

Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective.
CoRR, 2022

Paoding: Supervised Robustness-preserving Data-free Neural Network Pruning.
CoRR, 2022

Towards Better Generalization for Neural Network-Based SAT Solvers.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022

Assessing certificate validation user interfaces of WPA supplicants.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

IDEAL: High-Order-Ensemble Adaptation Network for Learning with Noisy Labels.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Machine Unlearning for Image Retrieval: A Generative Scrubbing Approach.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

VITAS : Guided Model-based VUI Testing of VPA Apps.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

SATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset Generation.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022

Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Scrutinizing Implementations of Smart Home Integrations.
IEEE Trans. Software Eng., 2021

Characterizing Cryptocurrency-themed Malicious Browser Extensions.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Differentially Private Collaborative Coupling Learning for Recommender Systems.
IEEE Intell. Syst., 2021

Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning.
CoRR, 2021

ColdPress: An Extensible Malware Analysis Platform for Threat Intelligence.
CoRR, 2021

It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Understanding the Impact of COVID-19 on Github Developers: A Preliminary Study.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

DeepAuto: A First Step Towards Formal Verification of Deep Learning Systems (S).
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

MoScan: a model-based vulnerability scanner for web single sign-on services.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Identifying privacy weaknesses from multi-party trigger-action integration platforms.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis.
Proceedings of the Computer Security - ESORICS 2021, 2021

A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

UQ-AAS21: A Comprehensive Dataset of Amazon Alexa Skills.
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021

2020
A blockchain-based decentralized booking system.
Knowl. Eng. Rev., 2020

Early prediction for mode anomaly in generative adversarial network training: An empirical study.
Inf. Sci., 2020

Dilated residual networks with multi-level attention for speaker verification.
Neurocomputing, 2020

When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories.
CoRR, 2020

Autonomous Permission Recommendation.
IEEE Access, 2020

An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Foggy: A New Anonymous Communication Architecture Based on Microservices.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

PrivColl: Practical Privacy-Preserving Collaborative Machine Learning.
Proceedings of the Computer Security - ESORICS 2020, 2020

Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

2019
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues.
IEEE Commun. Surv. Tutorials, 2019

DaPanda: Detecting Aggressive Push Notifications in Android Apps.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking.
Proceedings of the Information Security - 22nd International Conference, 2019

2018
Towards Model Checking Android Applications.
IEEE Trans. Software Eng., 2018

DroidEcho: an in-depth dissection of malicious behaviors in Android applications.
Cybersecur., 2018

Detecting Malicious Behaviors in JavaScript Applications.
IEEE Access, 2018

Break the dead end of dynamic slicing: localizing data and control omission bug.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Formal Analysis of a Proof-of-Stake Blockchain.
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018

HOMESCAN: Scrutinizing Implementations of Smart Home Integrations.
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018

Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
TwiInsight: Discovering Topics and Sentiments from Social Media Datasets.
CoRR, 2017

Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Framework for Formal Analysis of Privacy on SSO Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2017

Privilege Leakage and Information Stealing through the Android Task Mechanism.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

App genome: callback sequencing in Android.
Proceedings of the 39th International Conference on Software Engineering, 2017

A Verification Framework for Stateful Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2017

Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation.
Proc. Priv. Enhancing Technol., 2016

Towards Using Concurrent Java API Correctly.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

Automatic Construction of Callback Model for Android Application.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

2015
Formal Analysis of a Single Sign-On Protocol Implementation for Android.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

Reevaluating Android Permission Gaps with Static and Dynamic Analysis.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Context-aware usage control for web of things.
Secur. Commun. Networks, 2014

A Light-Weight Software Environment for Confining Android Malware.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

DroidVault: A Trusted Data Vault for Android Devices.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms.
Proceedings of the FM 2014: Formal Methods, 2014

2013
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

vTRUST: A Formal Modeling and Verification Framework for Virtualization Systems.
Proceedings of the Formal Methods and Software Engineering, 2013

A Software Environment for Confining Malicious Android Applications via Resource Virtualization.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

2012
Security model oriented attestation on dynamically reconfigurable component-based systems.
J. Netw. Comput. Appl., 2012

2010
Context-Aware Usage Control for Android.
Proceedings of the Security and Privacy in Communication Networks, 2010


  Loading...