Jun Pang

Affiliations:
  • University of Luxembourg, Esch-sur-Alzette, Luxembourg


According to our database1, Jun Pang authored at least 235 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bridging Performance of X (formerly known as Twitter) Users: A Predictor of Subjective Well-Being During the Pandemic.
ACM Trans. Web, February, 2024

A tale of two roles: exploring topic-specific susceptibility and influence in cascade prediction.
Data Min. Knowl. Discov., January, 2024

2023
Multi-Grained Semantics-Aware Graph Neural Networks.
IEEE Trans. Knowl. Data Eng., July, 2023

Relation-Aware Weighted Embedding for Heterogeneous Graphs.
Inf. Technol. Control., March, 2023

Target Control of Asynchronous Boolean Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

Hierarchical message-passing graph neural networks.
Data Min. Knowl. Discov., 2023

On Quantified Observability Analysis in Multiagent Systems.
CoRR, 2023

Ownership Protection of Generative Adversarial Networks.
CoRR, 2023

PriSampler: Mitigating Property Inference of Diffusion Models.
CoRR, 2023

Exploring Unconfirmed Transactions for Effective Bitcoin Address Clustering.
CoRR, 2023

Membership Inference of Diffusion Models.
CoRR, 2023

Loss and Likelihood Based Membership Inference of Diffusion Models.
Proceedings of the Information Security - 26th International Conference, 2023

Structural-semantics Guided Program Simplification for Understanding Neural Code Intelligence Models.
Proceedings of the 14th Asia-Pacific Symposium on Internetware, 2023

Effective and Efficient Structural Inference with Reservoir Computing.
Proceedings of the International Conference on Machine Learning, 2023

Active Learning based Structural Inference.
Proceedings of the International Conference on Machine Learning, 2023

Single-Experiment Reconstructibility of Boolean Control Networks Revisited.
Proceedings of the 20th International Conference on Informatics in Control, 2023

On Observability Analysis in Multiagent Systems.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

Election Verifiability in Receipt-Free Voting Protocols.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

2022
GR-ego COVID-19 Twitter dataset.
Dataset, October, 2022

A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin.
ACM Trans. Web, 2022

Simplifying Node Classification on Heterophilous Graphs with Compatible Label Propagation.
Trans. Mach. Learn. Res., 2022

Unsupervised Network Embedding Beyond Homophily.
Trans. Mach. Learn. Res., 2022

Modal characterisation of simulation relations in probabilistic concurrent games.
Sci. Comput. Program., 2022

Effective attributed network embedding with information behavior extraction.
PeerJ Comput. Sci., 2022

THS-GWNN: a deep learning framework for temporal network link prediction.
Frontiers Comput. Sci., 2022

Exploring Spillover Effects for COVID-19 Cascade Prediction.
Entropy, 2022

Personalised meta-path generation for heterogeneous graph neural networks.
Data Min. Knowl. Discov., 2022

A Multilingual Dataset of COVID-19 Vaccination Attitudes on Twitter.
CoRR, 2022

"Double vaccinated, 5G boosted!": Learning Attitudes towards COVID-19 Vaccination from Social Media.
CoRR, 2022

Simplifying Node Classification on Heterophilous Graphs with Compatible Label Propagation.
CoRR, 2022

Unsupervised Heterophilous Network Embedding via r-Ego Network Discrimination.
CoRR, 2022

Measuring COVID-19 Vaccine Hesitancy: Consistency of Social Media with Surveys.
Proceedings of the Social Informatics - 13th International Conference, 2022

The Burden of Being a Bridge: Analysing Subjective Well-Being of Twitter Users During the COVID-19 Pandemic.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Iterative Structural Inference of Directed Graphs.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Functional Scenario Classification for Android Applications using GNNs.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

Target Control of Boolean Networks with Permanent Edgetic Perturbations.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

NEGAR: Network Embedding Guided Architecture Recovery for Software Systems.
Proceedings of the 29th Asia-Pacific Software Engineering Conference, 2022

2021
Towards Optimal Decomposition of Boolean Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

Semantic and relational spaces in science of science: deep learning models for article vectorisation.
Scientometrics, 2021

Preface of the special issue'Logic, argumentation and AI' in JLC.
J. Log. Comput., 2021

Provably Improving Election Verifiability in Belenios.
IACR Cryptol. ePrint Arch., 2021

The Burden of Being a Bridge: Understanding the Role of Multilingual Users during the COVID-19 Pandemic.
CoRR, 2021

Model Extraction and Defenses on Generative Adversarial Networks.
CoRR, 2021

Effective Link Prediction with Topological and Temporal Information using Wavelet Neural Network Embedding.
Comput. J., 2021

CABEAN: a software for the control of asynchronous Boolean networks.
Bioinform., 2021

An Exploratory Study of COVID-19 Information on Twitter in the Greater Region.
Big Data Cogn. Comput., 2021

Temporal Networks Based Industry Identification for Bitcoin Users.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Cabean 2.0: Efficient and Efficacious Control of Asynchronous Boolean Networks.
Proceedings of the Formal Methods - 24th International Symposium, 2021

Hilbert Sinkhorn Divergence for Optimal Transport.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Membership Inference Attacks against GANs by Leveraging Over-representation Regions.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

From #jobsearch to #mask: improving COVID-19 cascade prediction with spillover effects.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
An Efficient Approach Towards the Source-Target Control of Boolean Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2020

Preface for the special issue of the 12th International Symposium on Theoretical Aspects of Software Engineering (TASE 2018).
Sci. Comput. Program., 2020

Preface.
J. Comput. Sci. Technol., 2020

Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios.
IACR Cryptol. ePrint Arch., 2020

From #Jobsearch to #Mask: Improving COVID-19 Cascade Prediction with Spillover Effects.
CoRR, 2020

Reinforcement Learning Enhanced Heterogeneous Graph Neural Network.
CoRR, 2020

Adaptive Multi-grained Graph Neural Networks.
CoRR, 2020

Sequential Control of Boolean Networks with Temporary and Permanent Perturbations.
CoRR, 2020

NeuLP: An End-to-End Deep-Learning Model for Link Prediction.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Higher-Order Graph Convolutional Embedding for Temporal Networks.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Characterising Probabilistic Alternating Simulation for Concurrent Games.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

Accelerated Verification of Parametric Protocols with Decision Trees.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

Effects of Avatar Cuteness on Users' Perceptions of System Errors in Anthropomorphic Interfaces.
Proceedings of the HCI in Business, Government and Organizations, 2020

Sequential Temporary and Permanent Control of Boolean Networks.
Proceedings of the Computational Methods in Systems Biology, 2020

A Dynamics-based Approach for the Target Control of Boolean Networks.
Proceedings of the BCB '20: 11th ACM International Conference on Bioinformatics, 2020

2019
Taming Asynchrony for Attractor Detection in Large Boolean Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019

Algorithms for the Sequential Reprogramming of Boolean Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019

A new decomposition-based method for detecting attractors in synchronous Boolean networks.
Sci. Comput. Program., 2019

An active learning-based approach for location-aware acquaintance inference.
Knowl. Inf. Syst., 2019

GPU-accelerated steady-state computation of large probabilistic Boolean networks.
Formal Aspects Comput., 2019

Online Observability of Boolean Control Networks.
CoRR, 2019

Controlling large Boolean networks with single-step perturbations.
Bioinform., 2019

A Graph-Based Approach to Explore Relationship Between Hashtags and Images.
Proceedings of the Web Information Systems Engineering - WISE 2019, 2019

A Learning-Based Framework for Automatic Parameterized Verification.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

Controlling Large Boolean Networks with Temporary and Permanent Perturbations.
Proceedings of the Formal Methods - The Next 30 Years - Third World Congress, 2019

Scalable Control of Asynchronous Boolean Networks.
Proceedings of the Computational Methods in Systems Biology, 2019

Sequential Reprogramming of Boolean Networks Made Practical.
Proceedings of the Computational Methods in Systems Biology, 2019

2018
An Automatic Proving Approach to Parameterized Verification.
ACM Trans. Comput. Log., 2018

Reviving the Two-State Markov Chain Approach.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018

ASSA-PBN: A Toolbox for Probabilistic Boolean Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018

Learning probabilistic models for model checking: an evolutionary approach and an empirical study.
Int. J. Softw. Tools Technol. Transf., 2018

Formal Analysis of an E-Health Protocol.
CoRR, 2018

Towards the Existential Control of Boolean Networks: A Preliminary Report (Extended Abstract).
CoRR, 2018

A Decomposition-based Approach towards the Control of Boolean Networks (Technical Report).
CoRR, 2018

Tagvisor: A Privacy Advisor for Sharing Hashtags.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Towards the Existential Control of Boolean Networks: A Preliminary Report.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2018

L-CMP: an automatic learning-based parameterized verification tool.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

On the Full Control of Boolean Networks.
Proceedings of the Computational Methods in Systems Biology, 2018

ASSA-PBN 3.0: Analysing Context-Sensitive Probabilistic Boolean Networks.
Proceedings of the Computational Methods in Systems Biology, 2018

A Decomposition-based Approach towards the Control of Boolean Networks.
Proceedings of the 2018 ACM International Conference on Bioinformatics, 2018

2017
Finding susceptible and protective interaction patterns in large-scale genetic association study.
Frontiers Comput. Sci., 2017

Taming Asynchrony for Attractor Detection in Large Boolean Networks (Technical Report).
CoRR, 2017

Formal modelling and analysis of receipt-free auction protocols in applied pi.
Comput. Secur., 2017

Does #like4like indeed provoke more likes?
Proceedings of the International Conference on Web Intelligence, 2017

A New Decomposition Method for Attractor Detection in Large Synchronous Boolean Networks.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2017

DeepCity: A Feature Learning Framework for Mining Location Check-Ins.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

A Verification Framework for Stateful Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2017

Quantifying Location Sociality.
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 2017

Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study.
Proceedings of the Fundamental Approaches to Software Engineering, 2017

Semantic Annotation for Places in LBSN through Graph Embedding.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

walk2friends: Inferring Social Links from Mobility Profiles.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Selected and extended papers from ACM SVT 2014.
Sci. Comput. Program., 2016

Effect of Online Review Chunking on Product Attitude: The Moderating Role of Motivation to Think.
Int. J. Electron. Commer., 2016

Editorial.
Formal Aspects Comput., 2016

Fast Simulation of Probabilistic Boolean Networks (Technical Report).
CoRR, 2016

Improving BDD-based attractor detection for synchronous Boolean networks.
Sci. China Inf. Sci., 2016

On Impact of Weather on Human Mobility in Cities.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

An Efficient Two-Table Join Query Processing Based on Extended Bloom Filter in MapReduce.
Proceedings of the Web-Age Information Management, 2016

A Shortest Path Query Method Based on Tree Decomposition and Label Coverage.
Proceedings of the Web-Age Information Management, 2016

An Empirical Study on User Access Control in Online Social Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Parallel approximate steady-state analysis of large probabilistic Boolean networks.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

The Persuasive Impact of Emoticons in Online Word-of-Mouth Communication.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

A novel approach to parameterized verification of cache coherence protocols.
Proceedings of the 34th IEEE International Conference on Computer Design, 2016

Modeling City Locations as Complex Networks: An initial study.
Proceedings of the Complex Networks & Their Applications V - Proceedings of the 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016), Milan, Italy, November 30, 2016

ASSA-PBN 2.0: A Software Tool for Probabilistic Boolean Networks.
Proceedings of the Computational Methods in Systems Biology, 2016

Fast Simulation of Probabilistic Boolean Networks.
Proceedings of the Computational Methods in Systems Biology, 2016

2015
mNoC: Large Nanophotonic Network-on-Chip Crossbars with Molecular Scale Devices.
ACM J. Emerg. Technol. Comput. Syst., 2015

Formalizing provable anonymity in Isabelle/HOL.
Formal Aspects Comput., 2015

Parallel Approximate Steady-state Analysis of Large Probabilistic Boolean Networks (Technical Report).
CoRR, 2015

Reviving the Two-state Markov Chain Approach (Technical Report).
CoRR, 2015

A new access control scheme for Facebook-style social networks.
Comput. Secur., 2015

Exploring Communities for Effective Location Prediction.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

A Logical Approach to Restricting Access in Online Social Networks.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Community-Driven Social Influence Analysis and Applications.
Proceedings of the Engineering the Web in the Big Data Era - 15th International Conference, 2015

Location Prediction: Communities Speak Louder than Friends.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Cryptographic Protocols for Enforcing Relationship-Based Access Control Policies.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Activity tracking: A new attack on location privacy.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

ASSA-PBN: An Approximate Steady-State Analyser of Probabilistic Boolean Networks.
Proceedings of the Automated Technology for Verification and Analysis, 2015

ParaVerifier: An Automatic Framework for Proving Parameterized Cache Coherence Protocols.
Proceedings of the Automated Technology for Verification and Analysis, 2015

Inferring Friendship from Check-in Data of Location-Based Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

More is Less, Less is More: Molecular-Scale Photonic NoC Power Topologies.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

Distance and Friendship: A Distance-Based Model for Link Prediction in Social Networks.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

Event Prediction with Community Leaders.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Constructing and Comparing User Mobility Profiles.
ACM Trans. Web, 2014

Special section on Software Verification and Testing.
Sci. Comput. Program., 2014

Modeling and simulation of a nanoscale optical computing system.
J. Parallel Distributed Comput., 2014

Protecting query privacy in location-based services.
GeoInformatica, 2014

Model checking with fairness assumptions using PAT.
Frontiers Comput. Sci., 2014

Stateful Security Protocol Verification.
CoRR, 2014

Dynamic Analysis of Usage Control Policies.
Proceedings of the SECRYPT 2014, 2014

MinUS: Mining User Similarity with Trajectory Patterns.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2014

Model-Checking Based Approaches to Parameter Estimation of Gene Regulatory Networks.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Symbolic Analysis of an Electric Vehicle Charging Protocol.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Rhythm: harnessing data parallel hardware for server workloads.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014

Measuring User Similarity with Trajectory Patterns: Principles and New Metrics.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

2013
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Special issue: software verification and testing.
Innov. Syst. Softw. Eng., 2013

Design and formal verification of a CEM protocol with transparent TTP.
Frontiers Comput. Sci., 2013

An inductive approach to strand spaces.
Formal Aspects Comput., 2013

Location Assurance and Privacy in GNSS Navigation.
ERCIM News, 2013

Privacy and verifiability in voting systems: Methods, developments and trends.
Comput. Sci. Rev., 2013

Constructing and comparing user mobility profiles for location-based services.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Exploiting emerging technologies for nanoscale photonic networks-on-chip.
Proceedings of the Network on Chip Architectures, 2013

Message from ESSS 2013 Workshop Co-chairs.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Verification of Functional and Non-functional Requirements of Web Service Composition.
Proceedings of the Formal Methods and Software Engineering, 2013

A Strand Space Approach to Provable Anonymity.
Proceedings of the Formal Techniques for Safety-Critical Systems, 2013

Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations.
Proceedings of the Computer Security - ESORICS 2013, 2013

A Trust Framework for Evaluating GNSS Signal Integrity.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

Exploring dependency for query privacy protection in location-based services.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Demonstrating a trust framework for evaluating GNSS signal integrity.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Probabilistic Model Checking of the PDGF Signaling Pathway.
Trans. Comp. Sys. Biology, 2012

A trust-augmented voting scheme for collaborative privacy management.
J. Comput. Secur., 2012

Game-based verification of contract signing protocols with minimal messages.
Innov. Syst. Softw. Eng., 2012

Effects of conflicting aggregated rating on eWOM review credibility and diagnosticity: The moderating role of review valence.
Decis. Support Syst., 2012

Comparative Analysis of Clustering Protocols with Probabilistic Model Checking.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

An Algorithm for Probabilistic Alternating Simulation.
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012

Formal Analysis of Privacy in an eHealth Protocol.
Proceedings of the Computer Security - ESORICS 2012, 2012

Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Measuring query privacy in location-based services.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

A Group Signature Based Electronic Toll Pricing System.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Fast leader election in anonymous rings with bounded expected delay.
Inf. Process. Lett., 2011

A Study of the PDGF Signaling Pathway with PRISM
Proceedings of the Proceedings Third International Workshop on Computational Models for Cell Processes, 2011

Selective Location Blinding Using Hash Chains.
Proceedings of the Security Protocols XIX, 2011

Analysis of Remote Quality Inspection System for Construction Projects.
Proceedings of the ICEIS 2011, 2011

On Combining State Space Reductions with Global Fairness Assumptions.
Proceedings of the FM 2011: Formal Methods, 2011

Challenges in eHealth: From Enabling to Enforcing Privacy.
Proceedings of the Foundations of Health Informatics Engineering and Systems, 2011

An Inductive Approach to Provable Anonymity.
Proceedings of the Sixth International Conference on Availability, 2011

Bulletin Boards in Voting Systems: Modelling and Measuring Privacy.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V.
J. Information Security, 2010

Extending the Strand Space Method with Timestamps: Part I the Theory.
J. Information Security, 2010

Verification of A Key Chain Based TTP Transparent CEM Protocol.
Proceedings of the 4th International Workshop on Harnessing Theories for Tool Support in Software, 2010

Asynchronous Bounded Expected Delay Networks
CoRR, 2010

Brief announcement: asynchronous bounded expected delay networks.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

On Probabilistic Alternating Simulations.
Proceedings of the Theoretical Computer Science, 2010

Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

Model Checking Round-Based Distributed Algorithms.
Proceedings of the 15th IEEE International Conference on Engineering of Complex Computer Systems, 2010

Extending a Key-Chain Based Certified Email Protocol with Transparent TTP.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
A formal framework for quantifying voter-controlled privacy.
J. Algorithms, 2009

How to Work with Honest but Curious Judges? (Preliminary Report)
Proceedings of the Proceedings 7th International Workshop on Security Issues in Concurrency, 2009

Verification of Population Ring Protocols in PAT.
Proceedings of the TASE 2009, 2009

Message from T4CIA Workshop Co-chairs.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Game-Based Verification of Multi-Party Contract Signing Protocols.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

Improving Automatic Verification of Security Protocols with XOR.
Proceedings of the Formal Methods and Software Engineering, 2009

Fair-Priority-Expression-Based burst scheduling to enhance performance and fairness of shared dram systems.
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009

PAT: Towards Flexible Verification under Fairness.
Proceedings of the Computer Aided Verification, 21st International Conference, 2009

Model-Driven Automatic Generation of Verified BPEL Code for Web Service Composition.
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009

Measuring Voter-Controlled Privacy.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Is Timed Branching Bisimilarity a Congruence Indeed?
Fundam. Informaticae, 2008

On automatic verification of self-stabilizing population protocols.
Frontiers Comput. Sci. China, 2008

A priority-expression-based burst scheduling of memory reordering access.
Proceedings of the 2008 International Conference on Embedded Computer Systems: Architectures, 2008

Leader Election in Anonymous Rings: Franklin Goes Probabilistic.
Proceedings of the Fifth IFIP International Conference On Theoretical Computer Science, 2008

2007
Model checking a cache coherence protocol of a Java DSM implementation.
J. Log. Algebraic Methods Program., 2007

Keeping Secrets in Resource Aware Components.
Proceedings of the Fifth Workshop on Quantitative Aspects of Programming Languages, 2007

Distributed Analysis with <i>mu</i> CRL: A Compendium of Case Studies.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2007

Extending the Strand Space Method to Verify Kerberos V.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

Adapting the UPPAAL Model of a Distributed Lift System.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007

Automating Verification of Cooperation, Control, and Design in Traffic Applications.
Proceedings of the Formal Methods and Hybrid Real-Time Systems, 2007

Exact State Set Representations in the Verification of Linear Hybrid Systems with Large Discrete State Space.
Proceedings of the Automated Technology for Verification and Analysis, 2007

Analyzing an Electronic Cash Protocol Using Applied Pi Calculus.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM.
J. Univers. Comput. Sci., 2006

Cones and foci: A mechanical framework for protocol verification.
Formal Methods Syst. Des., 2006

A Framework for Automatically Checking Anonymity with <i>mu</i> CRL.
Proceedings of the Trustworthy Global Computing, Second Symposium, 2006

Generalized Unsolicited Tests for Authentication Protocol Analysis.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Measuring Anonymity with Relative Entropy.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

Automatic Verification of Hybrid Systems with Large Discrete State Space.
Proceedings of the Automated Technology for Verification and Analysis, 2006

2005
A Note on K-State Self-stabilization in a Ring with K=N.
Nord. J. Comput., 2005

Verification of a sliding window protocol in µCRL and PVS.
Formal Aspects Comput., 2005

Weak Probabilistic Anonymity.
Proceedings of the International Workshop on Security and Concurrency, SecCo@CONCUR 2005, 2005

Metrics for Action-labelled Quantitative Transition Systems.
Proceedings of the Third Workshop on Quantitative Aspects of Programming Languages, 2005

Is Timed Branching Bisimilarity an Equivalence Indeed?.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2005

Compositional Reasoning for Probabilistic Finite-State Behaviors.
Proceedings of the Processes, 2005

2004
Model for Slicing JAVA Programs Hierarchically.
J. Comput. Sci. Technol., 2004

Formal Verification of Timed Systems Using Cones and Foci.
Proceedings of the 6th AMAST Workshop on Real-Time Systems, 2004

Simplifying Itai-Rodeh Leader Election for Anonymous Rings.
Proceedings of the Fouth International Workshop on Automated Verification of Critical Systems, 2004

Abstraction of Parallel Uniform Processes with Data.
Proceedings of the 2nd International Conference on Software Engineering and Formal Methods (SEFM 2004), 2004

Towards an Integrated Architecture for Peer-to-Peer and Ad Hoc Overlay Network Applications.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

Verifying a Sliding Window Protocol in µCRL.
Proceedings of the Algebraic Methodology and Software Technology, 2004

2003
Analysis of a distributed system for lifting trucks.
J. Log. Algebraic Methods Program., 2003

Analyzing the Redesign of a Distributed Lift System in UPPAAL.
Proceedings of the Formal Methods and Software Engineering, 2003

Cones and Foci for Protocol Verification Revisited.
Proceedings of the Foundations of Software Science and Computational Structures, 2003

2002
Analysis of a Security Protocol in µCRL.
Proceedings of the Formal Methods and Software Engineering, 2002

2001
A Formal Software Development Approach Using Refinement Calculus.
J. Comput. Sci. Technol., 2001

1999
A Formal Software Development Approach Based on COOZ and Refinement Calculus.
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999


  Loading...