Skip to menu Skip to content Skip to footer

2024

Conference Publication

Beyond the horizon: exploring cross-market security discrepancies in parallel Android apps

Yang, Shishuai, Bai, Guangdong, Lin, Ruoyan, Guo, Jialong and Diao, Wenrui (2024). Beyond the horizon: exploring cross-market security discrepancies in parallel Android apps. 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE), Tsukuba, Japan, 28-31 October 2024. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/issre62328.2024.00059

Beyond the horizon: exploring cross-market security discrepancies in parallel Android apps

2024

Conference Publication

Exploring ChatGPT app ecosystem: distribution, deployment and security

Yan, Chuan, Ren, Ruomai, Meng, Mark Huasong, Wan, Liuhuo, Ooi, Tian Yang and Bai, Guangdong (2024). Exploring ChatGPT app ecosystem: distribution, deployment and security. 39th ACM/IEEE International Conference on Automated Software Engineering (ASE), Sacramento, CA, United States, 28 October-1 November 2024. New York, United States: Association for Computing Machinery. doi: 10.1145/3691620.3695510

Exploring ChatGPT app ecosystem: distribution, deployment and security

2024

Conference Publication

Unveiling intellectual property vulnerabilities of GAN-based distributed machine learning through model extraction attacks

Ma, Mengyao, Liu, Shuofeng, Chamikara, M. A. P., Baruwal Chhetri, Mohan and Bai, Guangdong (2024). Unveiling intellectual property vulnerabilities of GAN-based distributed machine learning through model extraction attacks. 33rd ACM International Conference on Information and Knowledge Management (CIKM), Boise, ID USA, 21-25 October 2024. New York, NY USA: Association for Computing Machinery. doi: 10.1145/3627673.3679850

Unveiling intellectual property vulnerabilities of GAN-based distributed machine learning through model extraction attacks

2024

Conference Publication

Large language models can connect the dots: exploring model optimization bugs with domain knowledge-aware prompts

Guan, Hao, Bai, Guangdong and Liu, Yepang (2024). Large language models can connect the dots: exploring model optimization bugs with domain knowledge-aware prompts. 33rd ACM SIGSOFT International Conference on Software Testing and Analysis (ISSTA), Vienna, Austria, 16-20 September 2024. New York, United States: Association for Computing Machinery. doi: 10.1145/3650212.3680383

Large language models can connect the dots: exploring model optimization bugs with domain knowledge-aware prompts

2024

Conference Publication

Universal adversarial perturbations for vision-language pre-trained models

Zhang, Peng-Fei, Huang, Zi and Bai, Guangdong (2024). Universal adversarial perturbations for vision-language pre-trained models. 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, Washington, DC, United States, 14-18 July 2024. New York, NY, United States: ACM. doi: 10.1145/3626772.3657781

Universal adversarial perturbations for vision-language pre-trained models

2024

Conference Publication

AuSSE: a novel framework for security and safety evaluation for autonomous vehicles

Nguyen, Nhung H., Cho, Jin-Hee, Moore, Terrence J., Yoon, Seunghyun, Lim, Hyuk, Nelson, Frederica, Bai, Guangdong and Kim, Dan Dongseong (2024). AuSSE: a novel framework for security and safety evaluation for autonomous vehicles. 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Brisbane, QLD, Australia, 24-27 June 2024. Piscataway, NJ, United States: IEEE. doi: 10.1109/dsn-s60304.2024.00012

AuSSE: a novel framework for security and safety evaluation for autonomous vehicles

2024

Conference Publication

PANDA: Practical Adversarial Attack Against Network Intrusion Detection

Swain, Subrat Kumar, Kumar, Vireshwar, Bai, Guangdong and Kim, Dan Dongseong (2024). PANDA: Practical Adversarial Attack Against Network Intrusion Detection. 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Brisbane, QLD, Australia, 24-27 June 2024. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn-s60304.2024.00017

PANDA: Practical Adversarial Attack Against Network Intrusion Detection

2024

Conference Publication

CORELOCKER: neuron-level usage control

Wang, Zihan, Ma, Zhongkui, Feng, Xinguo, Sun, Ruoxi, Wang, Hu, Xue, Minhui and Bai, Guangdong (2024). CORELOCKER: neuron-level usage control. 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, United States, 19-23 May 2024. Piscataway, NJ, United States: IEEE. doi: 10.1109/sp54263.2024.00233

CORELOCKER: neuron-level usage control

2024

Conference Publication

Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience

Zhang, Yanjun, Sun, Ruoxi, Shen, Liyue, Bai, Guangdong, Xue, Minhui, Meng, Mark Huasong, Li, Xue, Ko, Ryan and Nepal, Surya (2024). Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience. WWW '24: ACM Web Conference 2024, Singapore, Singapore, 13-17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645545

Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience

2024

Conference Publication

Is it safe to share your files? An empirical security analysis of Google workspace

Wan, Liuhuo, Wang, Kailong, Wang, Haoyu and Bai, Guangdong (2024). Is it safe to share your files? An empirical security analysis of Google workspace. ACM Web Conference 2024, Singapore, Singapore, 13-17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645697

Is it safe to share your files? An empirical security analysis of Google workspace

2024

Conference Publication

Don't bite off more than you can chew: investigating excessive permission requests in trigger-action integrations

Wan, Liuhuo, Wang, Kailong, Mahadewa, Kulani, Wang, Haoyu and Bai, Guangdong (2024). Don't bite off more than you can chew: investigating excessive permission requests in trigger-action integrations. WWW '24: ACM Web Conference 2024, Singapore, Singapore, 13–17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645721

Don't bite off more than you can chew: investigating excessive permission requests in trigger-action integrations

2024

Conference Publication

Are your requests your true needs? Checking excessive data collection in VPA App

Xie, Fuman, Yan, Chuan, Meng, Mark Huasong, Teng, Shaoming, Zhang, Yanjun and Bai, Guangdong (2024). Are your requests your true needs? Checking excessive data collection in VPA App. ICSE '24: IEEE/ACM 46th International Conference on Software Engineering, Lisbon, Portugal, 14-20 April 2024. New York, NY, United States: ACM. doi: 10.1145/3597503.3639107

Are your requests your true needs? Checking excessive data collection in VPA App

2024

Conference Publication

Symbolic verification of mesh commissioning protocol of thread

Upadhyay, Pankaj, Sharma, Subodh and Bai, Guangdong (2024). Symbolic verification of mesh commissioning protocol of thread. 17th Innovations in Software Engineering Conference (ISEC), Bangalore, India, 22-24 February 2024. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3641399.3641446

Symbolic verification of mesh commissioning protocol of thread

2024

Conference Publication

The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright

Dong, Jie, Dong, Naipeng and Bai, Guangdong (2024). The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright. 7th International Symposium on Distributed Ledger Technology SDLT 2023, Brisbane, QLD Australia, 30 November – 1 December 2023. Singapore: Springer. doi: 10.1007/978-981-97-0006-6_7

The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright

2024

Conference Publication

Essential or excessive? MINDAEXT: measuring data minimization practices among browser extensions

Ling, Yuxi, Hao, Yun, Wang, Yuyan, Wang, Kailong, Bai, Guangdong and Dong, Jin Song (2024). Essential or excessive? MINDAEXT: measuring data minimization practices among browser extensions. 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Rovaniemi, Finland, 12-15 March 2024. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/SANER60148.2024.00104

Essential or excessive? MINDAEXT: measuring data minimization practices among browser extensions

2023

Conference Publication

SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples

Swain, Subrat Kumar, Kumar, Vireshwar, Kim, Dan Dongseong and Bai, Guangdong (2023). SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples. 26th European Conference on Artificial Intelligence ECAI 2023, Kraków, Poland, 30 September – 4 October 2023. Amsterdam, Netherlands: IOS Press. doi: 10.3233/FAIA230525

SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples

2023

Conference Publication

Security checking of trigger-action-programming smart home integrations

Bu, Lei, Zhang, Qiuping, Li, Suwan, Dai, Jinglin, Bai, Guangdong, Chen, Kai and Li, Xuandong (2023). Security checking of trigger-action-programming smart home integrations. ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, Seattle, WA, United States, 17-21 July 2023. New York, United States: Association for Computing Machinery. doi: 10.1145/3597926.3598084

Security checking of trigger-action-programming smart home integrations

2023

Conference Publication

Investigating users’ understanding of privacy policies of virtual personal assistant applications

Chen, Baiqi, Wu, Tingmin, Zhang, Yanjun, Chhetri, Mohan Baruwal and Bai, Guangdong (2023). Investigating users’ understanding of privacy policies of virtual personal assistant applications. 18th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), Melbourne, VIC, Australia, 10-14 July 2023. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3579856.3590335

Investigating users’ understanding of privacy policies of virtual personal assistant applications

2023

Conference Publication

LoDen: making every client in federated learning a defender against the poisoning membership inference attacks

Ma, Mengyao, Zhang, Yanjun, Arachchige, Pathum Chamikara Mahawaga, Zhang, Leo Yu, Chhetri, Mohan Baruwal and Bai, Guangdong (2023). LoDen: making every client in federated learning a defender against the poisoning membership inference attacks. 18th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), Melbourne, VIC, Australia, 10-14 July 2023. New York, NY, United States: ACM. doi: 10.1145/3579856.3590334

LoDen: making every client in federated learning a defender against the poisoning membership inference attacks

2023

Conference Publication

Characterizing cryptocurrency-themed malicious browser extensions

Wang, Kailong, Ling, Yuxi, Zhang, Yanjun, Yu, Zhou, Wang, Haoyu, Bai, Guangdong, Ooi, Beng Chin and Dong, Jin Song (2023). Characterizing cryptocurrency-themed malicious browser extensions. SIGMETRICS '23: ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, Orlando, FL, United States, 19 - 23 June 2023. New York, NY, United States: ACM. doi: 10.1145/3578338.3593529

Characterizing cryptocurrency-themed malicious browser extensions