Naipeng Dong

Orcid: 0000-0002-8248-3362

According to our database1, Naipeng Dong authored at least 32 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Adversarial Detection from Derived Models.
Int. J. Pattern Recognit. Artif. Intell., December, 2023

QoS-Aware Diversified Service Selection.
IEEE Trans. Serv. Comput., 2023

Quantitative Explainable AI For Face Recognition.
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023

2022
A Uniform Framework for Anomaly Detection in Deep Neural Networks.
Neural Process. Lett., 2022

DALT: Deep Activity Launching Test via Intent-Constraint Extraction.
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

2021
Callback2Vec: Callback-aware hierarchical embedding for mobile application.
Inf. Sci., 2021

SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets.
Proceedings of the Ubiquitous Security - First International Conference, 2021

2020
A blockchain-based decentralized booking system.
Knowl. Eng. Rev., 2020

Early prediction for mode anomaly in generative adversarial network training: An empirical study.
Inf. Sci., 2020

Review Sharing via Deep Semi-Supervised Code Clone Detection.
IEEE Access, 2020

An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Systematic Comprehension for Developer Reply in Mobile System Forum.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Deep Review Sharing.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking.
Proceedings of the Information Security - 22nd International Conference, 2019

Deep Attentive Factorization Machine for App Recommendation Service.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

AutoPer: Automatic Recommender for Runtime-Permission in Android Applications.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Formal Analysis of an E-Health Protocol.
CoRR, 2018

Verification of Strong Nash-equilibrium for Probabilistic BAR Systems.
Proceedings of the Formal Methods and Software Engineering, 2018

The Foul Adversary: Formal Models.
Proceedings of the Formal Methods and Software Engineering, 2018

Formal Analysis of a Proof-of-Stake Blockchain.
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018

A Projection-Based Approach for Memory Leak Detection.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Formal modelling and analysis of receipt-free auction protocols in applied pi.
Comput. Secur., 2017

Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Framework for Formal Analysis of Privacy on SSO Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2017

App genome: callback sequencing in Android.
Proceedings of the 39th International Conference on Software Engineering, 2017

A Verification Framework for Stateful Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2017

2016
Automatic Construction of Callback Model for Android Application.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

Verification of Nash-Equilibrium for Probabilistic BAR Systems.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

2013
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Formal Analysis of Privacy in an eHealth Protocol.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Challenges in eHealth: From Enabling to Enforcing Privacy.
Proceedings of the Foundations of Health Informatics Engineering and Systems, 2011

2010
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010


  Loading...