2024 Journal Article DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systemsBhattacharjee, Arnab, Bai, Guangdong, Tushar, Wayes, Verma, Ashu, Mishra, Sukumar and Saha, Tapan K. (2024). DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systems. IEEE Internet of Things Journal, 1-1. doi: 10.1109/jiot.2024.3454257 |
2024 Journal Article Investigating Documented Privacy Changes in Android OSYan, Chuan, Meng, Mark Huasong, Xie, Fuman and Bai, Guangdong (2024). Investigating Documented Privacy Changes in Android OS. Proceedings of the ACM on Software Engineering, 1 (FSE), 2701-2724. doi: 10.1145/3660826 |
2024 Journal Article Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based DetectorsCheng, Baijun, Zhao, Shengming, Wang, Kailong, Wang, Meizhen, Bai, Guangdong, Feng, Ruitao, Guo, Yao, Ma, Lei and Wang, Haoyu (2024). Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors. ACM Transactions on Software Engineering and Methodology, 33 (5) 127, 1-33. doi: 10.1145/3641543 |
2024 Journal Article Tryptophan metabolism and piglet diarrhea: Where we stand and the challenges aheadZhao, Xuan, Pang, Jiaman, Zhang, Wanghong, Peng, Xie, Yang, Zhenguo, Bai, Guangdong and Xia, Yaoyao (2024). Tryptophan metabolism and piglet diarrhea: Where we stand and the challenges ahead. Animal Nutrition, 17, 123-133. doi: 10.1016/j.aninu.2024.03.005 |
2024 Journal Article ReLU hull approximationMa, Zhongkui, Li, Jiaying and Bai, Guangdong (2024). ReLU hull approximation. Proceedings of the ACM on Programming Languages, 8 (POPL) ARTN 75, 2260-2287. doi: 10.1145/3632917 |
2024 Journal Article Effective and Robust Adversarial Training Against Data and Label CorruptionsZhang, Peng-Fei, Huang, Zi, Xu, Xin-Shun and Bai, Guangdong (2024). Effective and Robust Adversarial Training Against Data and Label Corruptions. IEEE Transactions on Multimedia, 26, 1-12. doi: 10.1109/tmm.2024.3394677 |
2024 Journal Article IoTSecSim: a framework for modelling and simulation of security in Internet of ThingsChee, Kok Onn, Ge, Mengmeng, Bai, Guangdong and Kim, Dan Dongseong (2024). IoTSecSim: a framework for modelling and simulation of security in Internet of Things. Computers and Security, 136 103534, 103534. doi: 10.1016/j.cose.2023.103534 |
2023 Journal Article Evasion attack and defense on machine learning models in cyber-physical systems: a surveyWang, Shunyao, Ko, Ryan K. L., Bai, Guangdong, Dong, Naipeng, Choi, Taejun and Zhang, Yanjun (2023). Evasion attack and defense on machine learning models in cyber-physical systems: a survey. IEEE Communications Surveys and Tutorials, 26 (2), 930-966. doi: 10.1109/comst.2023.3344808 |
2023 Journal Article Detecting contradictions from IoT protocol specification documents based on neural generated knowledge graphFeng, Xinguo, Zhang, Yanjun, Meng, Mark Huasong, Li, Yansong, Eu Joe, Chegne, Wang, Zhe and Bai, Guangdong (2023). Detecting contradictions from IoT protocol specification documents based on neural generated knowledge graph. ISA Transactions, 141, 10-19. doi: 10.1016/j.isatra.2023.04.025 |
2023 Journal Article GenDroid: a query-efficient black-box android adversarial attack frameworkXu, Guangquan, Shao, Hongfei, Cui, Jingyi, Bai, Hongpeng, Li, Jiliang, Bai, Guangdong, Liu, Shaoying, Meng, Weizhi and Zheng, Xi (2023). GenDroid: a query-efficient black-box android adversarial attack framework. Computers and Security, 132 103359, 103359. doi: 10.1016/j.cose.2023.103359 |
2023 Journal Article Characterizing cryptocurrency-themed malicious browser extensionsWang, Kailong, Ling, Yuxi, Zhang, Yanjun, Yu, Zhou, Wang, Haoyu, Bai, Guangdong, Ooi, Beng Chin and Dong, Jin Song (2023). Characterizing cryptocurrency-themed malicious browser extensions. ACM SIGMETRICS Performance Evaluation Review, 51 (1), 91-92. doi: 10.1145/3606376.3593529 |
2023 Journal Article Glucose supplementation improves intestinal amino acid transport and muscle amino acid pool in pigs during chronic cold exposureTeng, Teng, Song, Xin, Sun, Guodong, Ding, Hongwei, Sun, Haoyang, Bai, Guangdong and Shi, Baoming (2023). Glucose supplementation improves intestinal amino acid transport and muscle amino acid pool in pigs during chronic cold exposure. Animal Nutrition, 12, 360-374. doi: 10.1016/j.aninu.2022.10.009 |
2023 Journal Article A reliable vaccine tracking and monitoring system for health clinics using blockchainBiswas, Kamanashis, Muthukkumarasamy, Vallipuram, Bai, Guangdong and Chowdhury, Mohammad Jabed Morshed (2023). A reliable vaccine tracking and monitoring system for health clinics using blockchain. Scientific Reports, 13 (1) 570, 570. doi: 10.1038/s41598-022-26029-w |
2023 Journal Article Proactive privacy-preserving learning for cross-modal retrievalZhang, Peng-Fei, Bai, Guangdong, Yin, Hongzhi and Huang, Zi (2023). Proactive privacy-preserving learning for cross-modal retrieval. ACM Transactions on Information Systems, 41 (2) ARTN 35, 1-23. doi: 10.1145/3545799 |
2022 Journal Article Characterizing cryptocurrency-themed malicious browser extensionsWang, Kailong, Ling, Yuxi, Zhang, Yanjun, Yu, Zhou, Wang, Haoyu, Bai, Guangdong, Ooi, Beng Chin and Dong, Jin Song (2022). Characterizing cryptocurrency-themed malicious browser extensions. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 6 (3) 43, 1-31. doi: 10.1145/3570603 |
Featured 2022 Journal Article Preserving privacy for distributed genome-wide analysis against identity tracing attacksZhang, Yanjun, Bai, Guangdong, Li, Xue, Nepal, Surya, Grobler, Marthie, Chen, Chen and Ko, Ryan K. L. (2022). Preserving privacy for distributed genome-wide analysis against identity tracing attacks. IEEE Transactions on Dependable and Secure Computing, 20 (4), 1-17. doi: 10.1109/tdsc.2022.3186672 |
2022 Journal Article Adversarial robustness of deep neural networks: A survey from a formal verification perspectiveMeng, Mark Huasong, Bai, Guangdong, Teo, Sin Gee, Hou, Zhe, Xiao, Yan, Lin, Yun and Dong, Jin Song (2022). Adversarial robustness of deep neural networks: A survey from a formal verification perspective. IEEE Transactions on Dependable and Secure Computing, 1-1. doi: 10.1109/tdsc.2022.3179131 |
2022 Journal Article Sharing runtime permission issues for developers based on similar-app review miningGao, Hongcan, Guo, Chenkai, Bai, Guangdong, Huang, Dengrong, He, Zhen, Wu, Yanfeng and Xu, Jing (2022). Sharing runtime permission issues for developers based on similar-app review mining. Journal of Systems and Software, 184 111118, 111118. doi: 10.1016/j.jss.2021.111118 |
2020 Journal Article Scrutinizing implementations of smart home integrationsMahadewa, Kulani, Wang, Kailong, Bai, Guangdong, Shi, Ling, Liu, Yan, Dong, Jin Song and Liang, Zhenkai (2020). Scrutinizing implementations of smart home integrations. IEEE Transactions on Software Engineering, 47 (12), 1-1. doi: 10.1109/tse.2019.2960690 |
2020 Journal Article Protein-restricted diet balanced for lysine, methionine, threonine, and tryptophan for nursery pigs elicits subsequent compensatory growth and has long term effects on protein metabolism and organ developmentSun, Yuchen, Teng, Teng, Bai, Guangdong, Qiu, Shengnan, Shi, Baoming, Ju, Daxin and Zhao, Xuan (2020). Protein-restricted diet balanced for lysine, methionine, threonine, and tryptophan for nursery pigs elicits subsequent compensatory growth and has long term effects on protein metabolism and organ development. Animal Feed Science and Technology, 270 114712, 1-13. doi: 10.1016/j.anifeedsci.2020.114712 |