Skip to menu Skip to content Skip to footer

2024

Journal Article

DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systems

Bhattacharjee, Arnab, Bai, Guangdong, Tushar, Wayes, Verma, Ashu, Mishra, Sukumar and Saha, Tapan K. (2024). DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systems. IEEE Internet of Things Journal, 1-1. doi: 10.1109/jiot.2024.3454257

DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systems

2024

Journal Article

Investigating Documented Privacy Changes in Android OS

Yan, Chuan, Meng, Mark Huasong, Xie, Fuman and Bai, Guangdong (2024). Investigating Documented Privacy Changes in Android OS. Proceedings of the ACM on Software Engineering, 1 (FSE), 2701-2724. doi: 10.1145/3660826

Investigating Documented Privacy Changes in Android OS

2024

Journal Article

Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors

Cheng, Baijun, Zhao, Shengming, Wang, Kailong, Wang, Meizhen, Bai, Guangdong, Feng, Ruitao, Guo, Yao, Ma, Lei and Wang, Haoyu (2024). Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors. ACM Transactions on Software Engineering and Methodology, 33 (5) 127, 1-33. doi: 10.1145/3641543

Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors

2024

Journal Article

Tryptophan metabolism and piglet diarrhea: Where we stand and the challenges ahead

Zhao, Xuan, Pang, Jiaman, Zhang, Wanghong, Peng, Xie, Yang, Zhenguo, Bai, Guangdong and Xia, Yaoyao (2024). Tryptophan metabolism and piglet diarrhea: Where we stand and the challenges ahead. Animal Nutrition, 17, 123-133. doi: 10.1016/j.aninu.2024.03.005

Tryptophan metabolism and piglet diarrhea: Where we stand and the challenges ahead

2024

Journal Article

ReLU hull approximation

Ma, Zhongkui, Li, Jiaying and Bai, Guangdong (2024). ReLU hull approximation. Proceedings of the ACM on Programming Languages, 8 (POPL) ARTN 75, 2260-2287. doi: 10.1145/3632917

ReLU hull approximation

2024

Journal Article

Effective and Robust Adversarial Training Against Data and Label Corruptions

Zhang, Peng-Fei, Huang, Zi, Xu, Xin-Shun and Bai, Guangdong (2024). Effective and Robust Adversarial Training Against Data and Label Corruptions. IEEE Transactions on Multimedia, 26, 1-12. doi: 10.1109/tmm.2024.3394677

Effective and Robust Adversarial Training Against Data and Label Corruptions

2024

Journal Article

IoTSecSim: a framework for modelling and simulation of security in Internet of Things

Chee, Kok Onn, Ge, Mengmeng, Bai, Guangdong and Kim, Dan Dongseong (2024). IoTSecSim: a framework for modelling and simulation of security in Internet of Things. Computers and Security, 136 103534, 103534. doi: 10.1016/j.cose.2023.103534

IoTSecSim: a framework for modelling and simulation of security in Internet of Things

2023

Journal Article

Evasion attack and defense on machine learning models in cyber-physical systems: a survey

Wang, Shunyao, Ko, Ryan K. L., Bai, Guangdong, Dong, Naipeng, Choi, Taejun and Zhang, Yanjun (2023). Evasion attack and defense on machine learning models in cyber-physical systems: a survey. IEEE Communications Surveys and Tutorials, 26 (2), 930-966. doi: 10.1109/comst.2023.3344808

Evasion attack and defense on machine learning models in cyber-physical systems: a survey

2023

Journal Article

Detecting contradictions from IoT protocol specification documents based on neural generated knowledge graph

Feng, Xinguo, Zhang, Yanjun, Meng, Mark Huasong, Li, Yansong, Eu Joe, Chegne, Wang, Zhe and Bai, Guangdong (2023). Detecting contradictions from IoT protocol specification documents based on neural generated knowledge graph. ISA Transactions, 141, 10-19. doi: 10.1016/j.isatra.2023.04.025

Detecting contradictions from IoT protocol specification documents based on neural generated knowledge graph

2023

Journal Article

GenDroid: a query-efficient black-box android adversarial attack framework

Xu, Guangquan, Shao, Hongfei, Cui, Jingyi, Bai, Hongpeng, Li, Jiliang, Bai, Guangdong, Liu, Shaoying, Meng, Weizhi and Zheng, Xi (2023). GenDroid: a query-efficient black-box android adversarial attack framework. Computers and Security, 132 103359, 103359. doi: 10.1016/j.cose.2023.103359

GenDroid: a query-efficient black-box android adversarial attack framework

2023

Journal Article

Characterizing cryptocurrency-themed malicious browser extensions

Wang, Kailong, Ling, Yuxi, Zhang, Yanjun, Yu, Zhou, Wang, Haoyu, Bai, Guangdong, Ooi, Beng Chin and Dong, Jin Song (2023). Characterizing cryptocurrency-themed malicious browser extensions. ACM SIGMETRICS Performance Evaluation Review, 51 (1), 91-92. doi: 10.1145/3606376.3593529

Characterizing cryptocurrency-themed malicious browser extensions

2023

Journal Article

Glucose supplementation improves intestinal amino acid transport and muscle amino acid pool in pigs during chronic cold exposure

Teng, Teng, Song, Xin, Sun, Guodong, Ding, Hongwei, Sun, Haoyang, Bai, Guangdong and Shi, Baoming (2023). Glucose supplementation improves intestinal amino acid transport and muscle amino acid pool in pigs during chronic cold exposure. Animal Nutrition, 12, 360-374. doi: 10.1016/j.aninu.2022.10.009

Glucose supplementation improves intestinal amino acid transport and muscle amino acid pool in pigs during chronic cold exposure

2023

Journal Article

A reliable vaccine tracking and monitoring system for health clinics using blockchain

Biswas, Kamanashis, Muthukkumarasamy, Vallipuram, Bai, Guangdong and Chowdhury, Mohammad Jabed Morshed (2023). A reliable vaccine tracking and monitoring system for health clinics using blockchain. Scientific Reports, 13 (1) 570, 570. doi: 10.1038/s41598-022-26029-w

A reliable vaccine tracking and monitoring system for health clinics using blockchain

2023

Journal Article

Proactive privacy-preserving learning for cross-modal retrieval

Zhang, Peng-Fei, Bai, Guangdong, Yin, Hongzhi and Huang, Zi (2023). Proactive privacy-preserving learning for cross-modal retrieval. ACM Transactions on Information Systems, 41 (2) ARTN 35, 1-23. doi: 10.1145/3545799

Proactive privacy-preserving learning for cross-modal retrieval

2022

Journal Article

Characterizing cryptocurrency-themed malicious browser extensions

Wang, Kailong, Ling, Yuxi, Zhang, Yanjun, Yu, Zhou, Wang, Haoyu, Bai, Guangdong, Ooi, Beng Chin and Dong, Jin Song (2022). Characterizing cryptocurrency-themed malicious browser extensions. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 6 (3) 43, 1-31. doi: 10.1145/3570603

Characterizing cryptocurrency-themed malicious browser extensions

Featured

2022

Journal Article

Preserving privacy for distributed genome-wide analysis against identity tracing attacks

Zhang, Yanjun, Bai, Guangdong, Li, Xue, Nepal, Surya, Grobler, Marthie, Chen, Chen and Ko, Ryan K. L. (2022). Preserving privacy for distributed genome-wide analysis against identity tracing attacks. IEEE Transactions on Dependable and Secure Computing, 20 (4), 1-17. doi: 10.1109/tdsc.2022.3186672

Preserving privacy for distributed genome-wide analysis against identity tracing attacks

2022

Journal Article

Adversarial robustness of deep neural networks: A survey from a formal verification perspective

Meng, Mark Huasong, Bai, Guangdong, Teo, Sin Gee, Hou, Zhe, Xiao, Yan, Lin, Yun and Dong, Jin Song (2022). Adversarial robustness of deep neural networks: A survey from a formal verification perspective. IEEE Transactions on Dependable and Secure Computing, 1-1. doi: 10.1109/tdsc.2022.3179131

Adversarial robustness of deep neural networks: A survey from a formal verification perspective

2022

Journal Article

Sharing runtime permission issues for developers based on similar-app review mining

Gao, Hongcan, Guo, Chenkai, Bai, Guangdong, Huang, Dengrong, He, Zhen, Wu, Yanfeng and Xu, Jing (2022). Sharing runtime permission issues for developers based on similar-app review mining. Journal of Systems and Software, 184 111118, 111118. doi: 10.1016/j.jss.2021.111118

Sharing runtime permission issues for developers based on similar-app review mining

2020

Journal Article

Scrutinizing implementations of smart home integrations

Mahadewa, Kulani, Wang, Kailong, Bai, Guangdong, Shi, Ling, Liu, Yan, Dong, Jin Song and Liang, Zhenkai (2020). Scrutinizing implementations of smart home integrations. IEEE Transactions on Software Engineering, 47 (12), 1-1. doi: 10.1109/tse.2019.2960690

Scrutinizing implementations of smart home integrations

2020

Journal Article

Protein-restricted diet balanced for lysine, methionine, threonine, and tryptophan for nursery pigs elicits subsequent compensatory growth and has long term effects on protein metabolism and organ development

Sun, Yuchen, Teng, Teng, Bai, Guangdong, Qiu, Shengnan, Shi, Baoming, Ju, Daxin and Zhao, Xuan (2020). Protein-restricted diet balanced for lysine, methionine, threonine, and tryptophan for nursery pigs elicits subsequent compensatory growth and has long term effects on protein metabolism and organ development. Animal Feed Science and Technology, 270 114712, 1-13. doi: 10.1016/j.anifeedsci.2020.114712

Protein-restricted diet balanced for lysine, methionine, threonine, and tryptophan for nursery pigs elicits subsequent compensatory growth and has long term effects on protein metabolism and organ development