2024 Journal Article DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systemsBhattacharjee, Arnab, Bai, Guangdong, Tushar, Wayes, Verma, Ashu, Mishra, Sukumar and Saha, Tapan K. (2024). DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systems. IEEE Internet of Things Journal, 11 (24), 40670-40688. doi: 10.1109/jiot.2024.3454257 |
2024 Journal Article Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defense evaluationNguyen, Nhung H., Ge, Mengmeng, Cho, Jin-Hee, Moore, Terrence J., Yoon, Seunghyun, Lim, Hyuk, Nelson, Frederica, Bai, Guangdong and Kim, Dan Dongseong (2024). Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defense evaluation. Computers & Security, 150 104229, 1-19. doi: 10.1016/j.cose.2024.104229 |
2024 Conference Publication Beyond the horizon: exploring cross-market security discrepancies in parallel Android appsYang, Shishuai, Bai, Guangdong, Lin, Ruoyan, Guo, Jialong and Diao, Wenrui (2024). Beyond the horizon: exploring cross-market security discrepancies in parallel Android apps. 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE), Tsukuba, Japan, 28-31 October 2024. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/issre62328.2024.00059 |
2024 Conference Publication Exploring ChatGPT app ecosystem: distribution, deployment and securityYan, Chuan, Ren, Ruomai, Meng, Mark Huasong, Wan, Liuhuo, Ooi, Tian Yang and Bai, Guangdong (2024). Exploring ChatGPT app ecosystem: distribution, deployment and security. 39th ACM/IEEE International Conference on Automated Software Engineering (ASE), Sacramento, CA, United States, 28 October-1 November 2024. New York, United States: Association for Computing Machinery. doi: 10.1145/3691620.3695510 |
2024 Conference Publication Unveiling intellectual property vulnerabilities of GAN-based distributed machine learning through model extraction attacksMa, Mengyao, Liu, Shuofeng, Chamikara, M. A. P., Baruwal Chhetri, Mohan and Bai, Guangdong (2024). Unveiling intellectual property vulnerabilities of GAN-based distributed machine learning through model extraction attacks. 33rd ACM International Conference on Information and Knowledge Management (CIKM), Boise, ID USA, 21-25 October 2024. New York, NY USA: Association for Computing Machinery. doi: 10.1145/3627673.3679850 |
2024 Conference Publication Large language models can connect the dots: exploring model optimization bugs with domain knowledge-aware promptsGuan, Hao, Bai, Guangdong and Liu, Yepang (2024). Large language models can connect the dots: exploring model optimization bugs with domain knowledge-aware prompts. 33rd ACM SIGSOFT International Conference on Software Testing and Analysis (ISSTA), Vienna, Austria, 16-20 September 2024. New York, United States: Association for Computing Machinery. doi: 10.1145/3650212.3680383 |
2024 Journal Article Investigating Documented Privacy Changes in Android OSYan, Chuan, Meng, Mark Huasong, Xie, Fuman and Bai, Guangdong (2024). Investigating Documented Privacy Changes in Android OS. Proceedings of the ACM on Software Engineering, 1 (FSE), 2701-2724. doi: 10.1145/3660826 |
2024 Conference Publication Universal adversarial perturbations for vision-language pre-trained modelsZhang, Peng-Fei, Huang, Zi and Bai, Guangdong (2024). Universal adversarial perturbations for vision-language pre-trained models. 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, Washington, DC, United States, 14-18 July 2024. New York, NY, United States: ACM. doi: 10.1145/3626772.3657781 |
2024 Conference Publication AuSSE: a novel framework for security and safety evaluation for autonomous vehiclesNguyen, Nhung H., Cho, Jin-Hee, Moore, Terrence J., Yoon, Seunghyun, Lim, Hyuk, Nelson, Frederica, Bai, Guangdong and Kim, Dan Dongseong (2024). AuSSE: a novel framework for security and safety evaluation for autonomous vehicles. 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Brisbane, QLD, Australia, 24-27 June 2024. Piscataway, NJ, United States: IEEE. doi: 10.1109/dsn-s60304.2024.00012 |
2024 Conference Publication PANDA: Practical Adversarial Attack Against Network Intrusion DetectionSwain, Subrat Kumar, Kumar, Vireshwar, Bai, Guangdong and Kim, Dan Dongseong (2024). PANDA: Practical Adversarial Attack Against Network Intrusion Detection. 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Brisbane, QLD, Australia, 24-27 June 2024. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn-s60304.2024.00017 |
2024 Journal Article Beyond fidelity: explaining vulnerability localization of learning-based detectorsCheng, Baijun, Zhao, Shengming, Wang, Kailong, Wang, Meizhen, Bai, Guangdong, Feng, Ruitao, Guo, Yao, Ma, Lei and Wang, Haoyu (2024). Beyond fidelity: explaining vulnerability localization of learning-based detectors. ACM Transactions on Software Engineering and Methodology, 33 (5) 127, 1-33. doi: 10.1145/3641543 |
2024 Conference Publication CORELOCKER: neuron-level usage controlWang, Zihan, Ma, Zhongkui, Feng, Xinguo, Sun, Ruoxi, Wang, Hu, Xue, Minhui and Bai, Guangdong (2024). CORELOCKER: neuron-level usage control. 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, United States, 19-23 May 2024. Piscataway, NJ, United States: IEEE. doi: 10.1109/sp54263.2024.00233 |
2024 Conference Publication Is it safe to share your files? An empirical security analysis of Google workspaceWan, Liuhuo, Wang, Kailong, Wang, Haoyu and Bai, Guangdong (2024). Is it safe to share your files? An empirical security analysis of Google workspace. ACM Web Conference 2024, Singapore, Singapore, 13-17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645697 |
2024 Conference Publication Don't bite off more than you can chew: investigating excessive permission requests in trigger-action integrationsWan, Liuhuo, Wang, Kailong, Mahadewa, Kulani, Wang, Haoyu and Bai, Guangdong (2024). Don't bite off more than you can chew: investigating excessive permission requests in trigger-action integrations. WWW '24: ACM Web Conference 2024, Singapore, Singapore, 13–17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645721 |
2024 Conference Publication Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilienceZhang, Yanjun, Sun, Ruoxi, Shen, Liyue, Bai, Guangdong, Xue, Minhui, Meng, Mark Huasong, Li, Xue, Ko, Ryan and Nepal, Surya (2024). Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience. WWW '24: ACM Web Conference 2024, Singapore, Singapore, 13-17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645545 |
2024 Journal Article Effective and robust adversarial training against data and label corruptionsZhang, Peng-Fei, Huang, Zi, Xu, Xin-Shun and Bai, Guangdong (2024). Effective and robust adversarial training against data and label corruptions. IEEE Transactions on Multimedia, 26, 9477-9488. doi: 10.1109/tmm.2024.3394677 |
2024 Conference Publication Are your requests your true needs? Checking excessive data collection in VPA AppXie, Fuman, Yan, Chuan, Meng, Mark Huasong, Teng, Shaoming, Zhang, Yanjun and Bai, Guangdong (2024). Are your requests your true needs? Checking excessive data collection in VPA App. ICSE '24: IEEE/ACM 46th International Conference on Software Engineering, Lisbon, Portugal, 14-20 April 2024. New York, NY, United States: ACM. doi: 10.1145/3597503.3639107 |
2024 Conference Publication Symbolic verification of mesh commissioning protocol of threadUpadhyay, Pankaj, Sharma, Subodh and Bai, Guangdong (2024). Symbolic verification of mesh commissioning protocol of thread. 17th Innovations in Software Engineering Conference (ISEC), Bangalore, India, 22-24 February 2024. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3641399.3641446 |
2024 Conference Publication The Benefits of Non-Fungible Token (NFT) Technology in Music CopyrightDong, Jie, Dong, Naipeng and Bai, Guangdong (2024). The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright. 7th International Symposium on Distributed Ledger Technology SDLT 2023, Brisbane, QLD Australia, 30 November – 1 December 2023. Singapore: Springer. doi: 10.1007/978-981-97-0006-6_7 |
2024 Journal Article ReLU hull approximationMa, Zhongkui, Li, Jiaying and Bai, Guangdong (2024). ReLU hull approximation. Proceedings of the ACM on Programming Languages, 8 (POPL) 75, 2260-2287. doi: 10.1145/3632917 |