Skip to menu Skip to content Skip to footer

2024

Journal Article

DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systems

Bhattacharjee, Arnab, Bai, Guangdong, Tushar, Wayes, Verma, Ashu, Mishra, Sukumar and Saha, Tapan K. (2024). DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systems. IEEE Internet of Things Journal, 11 (24), 40670-40688. doi: 10.1109/jiot.2024.3454257

DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systems

2024

Journal Article

Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defense evaluation

Nguyen, Nhung H., Ge, Mengmeng, Cho, Jin-Hee, Moore, Terrence J., Yoon, Seunghyun, Lim, Hyuk, Nelson, Frederica, Bai, Guangdong and Kim, Dan Dongseong (2024). Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defense evaluation. Computers & Security, 150 104229, 1-19. doi: 10.1016/j.cose.2024.104229

Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defense evaluation

2024

Conference Publication

Beyond the horizon: exploring cross-market security discrepancies in parallel Android apps

Yang, Shishuai, Bai, Guangdong, Lin, Ruoyan, Guo, Jialong and Diao, Wenrui (2024). Beyond the horizon: exploring cross-market security discrepancies in parallel Android apps. 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE), Tsukuba, Japan, 28-31 October 2024. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/issre62328.2024.00059

Beyond the horizon: exploring cross-market security discrepancies in parallel Android apps

2024

Conference Publication

Exploring ChatGPT app ecosystem: distribution, deployment and security

Yan, Chuan, Ren, Ruomai, Meng, Mark Huasong, Wan, Liuhuo, Ooi, Tian Yang and Bai, Guangdong (2024). Exploring ChatGPT app ecosystem: distribution, deployment and security. 39th ACM/IEEE International Conference on Automated Software Engineering (ASE), Sacramento, CA, United States, 28 October-1 November 2024. New York, United States: Association for Computing Machinery. doi: 10.1145/3691620.3695510

Exploring ChatGPT app ecosystem: distribution, deployment and security

2024

Conference Publication

Unveiling intellectual property vulnerabilities of GAN-based distributed machine learning through model extraction attacks

Ma, Mengyao, Liu, Shuofeng, Chamikara, M. A. P., Baruwal Chhetri, Mohan and Bai, Guangdong (2024). Unveiling intellectual property vulnerabilities of GAN-based distributed machine learning through model extraction attacks. 33rd ACM International Conference on Information and Knowledge Management (CIKM), Boise, ID USA, 21-25 October 2024. New York, NY USA: Association for Computing Machinery. doi: 10.1145/3627673.3679850

Unveiling intellectual property vulnerabilities of GAN-based distributed machine learning through model extraction attacks

2024

Conference Publication

Large language models can connect the dots: exploring model optimization bugs with domain knowledge-aware prompts

Guan, Hao, Bai, Guangdong and Liu, Yepang (2024). Large language models can connect the dots: exploring model optimization bugs with domain knowledge-aware prompts. 33rd ACM SIGSOFT International Conference on Software Testing and Analysis (ISSTA), Vienna, Austria, 16-20 September 2024. New York, United States: Association for Computing Machinery. doi: 10.1145/3650212.3680383

Large language models can connect the dots: exploring model optimization bugs with domain knowledge-aware prompts

2024

Journal Article

Investigating Documented Privacy Changes in Android OS

Yan, Chuan, Meng, Mark Huasong, Xie, Fuman and Bai, Guangdong (2024). Investigating Documented Privacy Changes in Android OS. Proceedings of the ACM on Software Engineering, 1 (FSE), 2701-2724. doi: 10.1145/3660826

Investigating Documented Privacy Changes in Android OS

2024

Conference Publication

Universal adversarial perturbations for vision-language pre-trained models

Zhang, Peng-Fei, Huang, Zi and Bai, Guangdong (2024). Universal adversarial perturbations for vision-language pre-trained models. 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, Washington, DC, United States, 14-18 July 2024. New York, NY, United States: ACM. doi: 10.1145/3626772.3657781

Universal adversarial perturbations for vision-language pre-trained models

2024

Conference Publication

AuSSE: a novel framework for security and safety evaluation for autonomous vehicles

Nguyen, Nhung H., Cho, Jin-Hee, Moore, Terrence J., Yoon, Seunghyun, Lim, Hyuk, Nelson, Frederica, Bai, Guangdong and Kim, Dan Dongseong (2024). AuSSE: a novel framework for security and safety evaluation for autonomous vehicles. 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Brisbane, QLD, Australia, 24-27 June 2024. Piscataway, NJ, United States: IEEE. doi: 10.1109/dsn-s60304.2024.00012

AuSSE: a novel framework for security and safety evaluation for autonomous vehicles

2024

Conference Publication

PANDA: Practical Adversarial Attack Against Network Intrusion Detection

Swain, Subrat Kumar, Kumar, Vireshwar, Bai, Guangdong and Kim, Dan Dongseong (2024). PANDA: Practical Adversarial Attack Against Network Intrusion Detection. 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Brisbane, QLD, Australia, 24-27 June 2024. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn-s60304.2024.00017

PANDA: Practical Adversarial Attack Against Network Intrusion Detection

2024

Journal Article

Beyond fidelity: explaining vulnerability localization of learning-based detectors

Cheng, Baijun, Zhao, Shengming, Wang, Kailong, Wang, Meizhen, Bai, Guangdong, Feng, Ruitao, Guo, Yao, Ma, Lei and Wang, Haoyu (2024). Beyond fidelity: explaining vulnerability localization of learning-based detectors. ACM Transactions on Software Engineering and Methodology, 33 (5) 127, 1-33. doi: 10.1145/3641543

Beyond fidelity: explaining vulnerability localization of learning-based detectors

2024

Conference Publication

CORELOCKER: neuron-level usage control

Wang, Zihan, Ma, Zhongkui, Feng, Xinguo, Sun, Ruoxi, Wang, Hu, Xue, Minhui and Bai, Guangdong (2024). CORELOCKER: neuron-level usage control. 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, United States, 19-23 May 2024. Piscataway, NJ, United States: IEEE. doi: 10.1109/sp54263.2024.00233

CORELOCKER: neuron-level usage control

2024

Conference Publication

Is it safe to share your files? An empirical security analysis of Google workspace

Wan, Liuhuo, Wang, Kailong, Wang, Haoyu and Bai, Guangdong (2024). Is it safe to share your files? An empirical security analysis of Google workspace. ACM Web Conference 2024, Singapore, Singapore, 13-17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645697

Is it safe to share your files? An empirical security analysis of Google workspace

2024

Conference Publication

Don't bite off more than you can chew: investigating excessive permission requests in trigger-action integrations

Wan, Liuhuo, Wang, Kailong, Mahadewa, Kulani, Wang, Haoyu and Bai, Guangdong (2024). Don't bite off more than you can chew: investigating excessive permission requests in trigger-action integrations. WWW '24: ACM Web Conference 2024, Singapore, Singapore, 13–17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645721

Don't bite off more than you can chew: investigating excessive permission requests in trigger-action integrations

2024

Conference Publication

Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience

Zhang, Yanjun, Sun, Ruoxi, Shen, Liyue, Bai, Guangdong, Xue, Minhui, Meng, Mark Huasong, Li, Xue, Ko, Ryan and Nepal, Surya (2024). Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience. WWW '24: ACM Web Conference 2024, Singapore, Singapore, 13-17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645545

Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience

2024

Journal Article

Effective and robust adversarial training against data and label corruptions

Zhang, Peng-Fei, Huang, Zi, Xu, Xin-Shun and Bai, Guangdong (2024). Effective and robust adversarial training against data and label corruptions. IEEE Transactions on Multimedia, 26, 9477-9488. doi: 10.1109/tmm.2024.3394677

Effective and robust adversarial training against data and label corruptions

2024

Conference Publication

Are your requests your true needs? Checking excessive data collection in VPA App

Xie, Fuman, Yan, Chuan, Meng, Mark Huasong, Teng, Shaoming, Zhang, Yanjun and Bai, Guangdong (2024). Are your requests your true needs? Checking excessive data collection in VPA App. ICSE '24: IEEE/ACM 46th International Conference on Software Engineering, Lisbon, Portugal, 14-20 April 2024. New York, NY, United States: ACM. doi: 10.1145/3597503.3639107

Are your requests your true needs? Checking excessive data collection in VPA App

2024

Conference Publication

Symbolic verification of mesh commissioning protocol of thread

Upadhyay, Pankaj, Sharma, Subodh and Bai, Guangdong (2024). Symbolic verification of mesh commissioning protocol of thread. 17th Innovations in Software Engineering Conference (ISEC), Bangalore, India, 22-24 February 2024. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3641399.3641446

Symbolic verification of mesh commissioning protocol of thread

2024

Conference Publication

The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright

Dong, Jie, Dong, Naipeng and Bai, Guangdong (2024). The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright. 7th International Symposium on Distributed Ledger Technology SDLT 2023, Brisbane, QLD Australia, 30 November – 1 December 2023. Singapore: Springer. doi: 10.1007/978-981-97-0006-6_7

The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright

2024

Journal Article

ReLU hull approximation

Ma, Zhongkui, Li, Jiaying and Bai, Guangdong (2024). ReLU hull approximation. Proceedings of the ACM on Programming Languages, 8 (POPL) 75, 2260-2287. doi: 10.1145/3632917

ReLU hull approximation