Skip to menu Skip to content Skip to footer

2018

Conference Publication

The foul adversary: Formal models

Dong, Naipeng and Muller, Tim (2018). The foul adversary: Formal models. International Conference on Formal Engineering Methods ICFEM 2018: Formal Methods and Software Engineering, Gold Coast, QLD Australia, 12-16 November 2018. Heidelberg, Germany: Springer. doi: 10.1007/978-3-030-02450-5_3

The foul adversary: Formal models

2018

Conference Publication

Formal Analysis of a Proof-of-Stake Blockchain

Thin, Wai Yan Maung Maung, Dong, Naipeng, Bai, Guangdong and Dong, Jin Song (2018). Formal Analysis of a Proof-of-Stake Blockchain. 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), Melbourne, VIC Australia, 12-14 December 2018. Piscataway, NJ United States: IEEE. doi: 10.1109/iceccs2018.2018.00031

Formal Analysis of a Proof-of-Stake Blockchain

2018

Conference Publication

Verification of strong nash-equilibrium for probabilistic BAR systems

Fernando, Dileepa, Dong, Naipeng, Jegourel, Cyrille and Dong, Jin Song (2018). Verification of strong nash-equilibrium for probabilistic BAR systems. International Conference on Formal Engineering Methods ICFEM 2018: Formal Methods and Software Engineering, Gold Coast, QLD Australia, 12-16 November 2018. Heidelberg, Germany: Springer. doi: 10.1007/978-3-030-02450-5_7

Verification of strong nash-equilibrium for probabilistic BAR systems

2017

Conference Publication

A verification framework for stateful security protocols

Li, Li, Dong, Naipeng, Pang, Jun, Sun, Jun, Bai, Guangdong, Liu, Yang and Dong, Jin Song (2017). A verification framework for stateful security protocols. 19th International Conference on Formal Engineering Methods (ICFEM), Xian, Peoples Republic of China, 13-17 November 2017. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-68690-5_16

A verification framework for stateful security protocols

2016

Conference Publication

Verification of Nash-equilibrium for probabilistic BAR systems

Dileepa, Fernando, Dong, Naipeng, Jegourel, Cyrille and Dong, Jin Song (2016). Verification of Nash-equilibrium for probabilistic BAR systems. 21st International Conference on Engineering of Complex Computer Systems (ICECCS), Dubai, United Arab Emirates, 6-8 November 2016. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ICECCS.2016.016

Verification of Nash-equilibrium for probabilistic BAR systems

2013

Conference Publication

Enforcing privacy in the presence of others: Notions, formalisations and relations

Dong, Naipeng, Jonker, Hugo and Pang, Jun (2013). Enforcing privacy in the presence of others: Notions, formalisations and relations. European Symposium on Research in Computer Security ESORICS 2013: Computer Security, Egham, United Kingdom, 9-13 September 2013. Heidelberg, Germany: Springer . doi: 10.1007/978-3-642-40203-6_28

Enforcing privacy in the presence of others: Notions, formalisations and relations

2012

Conference Publication

Formal analysis of privacy in an eHealth protocol

Dong, Naipeng, Jonker, Hugo and Pang, Jun (2012). Formal analysis of privacy in an eHealth protocol. 17th European Symposium on Research in Computer Security, Pisa, Italy, 10-12 September 2012. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-33167-1_19

Formal analysis of privacy in an eHealth protocol

2012

Conference Publication

Challenges in eHealth: From enabling to enforcing privacy

Dong, Naipeng, Jonker, Hugo and Pang, Jun (2012). Challenges in eHealth: From enabling to enforcing privacy. FHIES 2011: International Symposium on Foundations of Health Informatics Engineering and Systems, Johannesburg, South Africa, 29-30 August 2011. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-32355-3_12

Challenges in eHealth: From enabling to enforcing privacy

2011

Conference Publication

Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus

Dong, Naipeng, Jonker, Hugo and Pang, Jun (2011). Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus. 7th International Workshop on Formal Aspects of Security and Trust, Pisa, Italy, 16-17 September 2010. Berlin, Germany: Springer.

Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus

2011

Conference Publication

Analysis of a receipt-free auction protocol in the applied Pi calculus

Dong, Naipeng, Jonker, Hugo and Pang, Jun (2011). Analysis of a receipt-free auction protocol in the applied Pi calculus. Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, 16-17 September 2010. Berlin, Heidelberg: Springer Berlin Heidelberg. doi: 10.1007/978-3-642-19751-2_15

Analysis of a receipt-free auction protocol in the applied Pi calculus

2024

Conference Publication

Formal verification techniques for post-quantum cryptography: a systematic review

Xu, Yuexi, Li, Zhenyuan, Dong, Naipeng, Kuchta, Veronika, Hou, Zhe and Liu, Dongxi (2024). Formal verification techniques for post-quantum cryptography: a systematic review. 28th International Conference, ICECCS 2024, Limassol, Cyprus, 19-21 June 2024. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-031-66456-4_19

Formal verification techniques for post-quantum cryptography: a systematic review

2024

Conference Publication

The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright

Dong, Jie, Dong, Naipeng and Bai, Guangdong (2024). The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright. 7th International Symposium on Distributed Ledger Technology SDLT 2023, Brisbane, QLD Australia, 30 November – 1 December 2023. Singapore: Springer. doi: 10.1007/978-981-97-0006-6_7

The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright

2024

Conference Publication

EVM-Vale: formal verification of EVM bytecode using vale

Cumming, Daniel, Utting, Mark, Cassez, Franck, Dong, Naipeng, Bayat Tork, Sadra and Risius, Marten (2024). EVM-Vale: formal verification of EVM bytecode using vale. 7th International Symposium, SDLT 2023, Brisbane, QLD, Australia, 30 November - 1 December 2023. Heidelberg, Germany: Springer. doi: 10.1007/978-981-97-0006-6_3

EVM-Vale: formal verification of EVM bytecode using vale

2023

Conference Publication

Quantitative explainable AI for face recognition

Peng, Shu, Dong, Naipeng and Bai, Guangdong (2023). Quantitative explainable AI for face recognition. 2023 27th International Conference on Engineering of Complex Computer Systems (ICECCS), Toulouse, France, 14-16 June 2023. Piscataway, NJ, United States: IEEE. doi: 10.1109/iceccs59891.2023.00014

Quantitative explainable AI for face recognition

2022

Conference Publication

Verification of EVM Bytecode with Vale

Cumming, Daniel Keith, Utting, Mark, Dong, Naipeng, Cassez, Frank, Tork, S. B. and Risius, Marten (2022). Verification of EVM Bytecode with Vale. 6th Symposium on Distributed Ledger Technology 2022 (SDLT 2022), Gold Coast, QLD Australia, 22 November 2022.

Verification of EVM Bytecode with Vale

2022

Conference Publication

DALT: Deep Activity Launching Test via intent-constraint extraction

Liu, Ao, Guo, Chenkai, Dong, Naipeng, Wang, Yinjie and Xu, Jing (2022). DALT: Deep Activity Launching Test via intent-constraint extraction. 33rd IEEE International Symposium on Software Reliability Engineering (ISSRE), Charlotte, NC, United States, 31 October-3 November 2022. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/issre55969.2022.00053

DALT: Deep Activity Launching Test via intent-constraint extraction

2022

Conference Publication

SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets

Koay, Abigail M. Y., Xie, Miao, Ko, Ryan K. L., Sterner, Charles, Choi, Taejun and Dong, Naipeng (2022). SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets. 1st International Conference on Ubiquitous Security (UbiSec), Guangzhou, Peoples Republic of China, 28-31 December 2021. Singapore, Singapore: Springer Singapore. doi: 10.1007/978-981-19-0468-4_8

SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets

2021

Conference Publication

An analytics framework for heuristic inference attacks against industrial control systems

Choi, Taejun, Bai, Guangdong, Ko, Ryan K. L., Dong, Naipeng, Zhang, Wenlu and Wang, Shunyao (2021). An analytics framework for heuristic inference attacks against industrial control systems. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 202, Guangzhou, China, 29 December 2020-1 January 2021. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom50675.2020.00112

An analytics framework for heuristic inference attacks against industrial control systems

2019

Conference Publication

LightSense: a novel side channel for zero-permission mobile user tracking

Ye, Quanqi, Zhang, Yan, Bai, Guangdong, Dong, Naipeng, Liang, Zhenkai, Dong, Jin Song and Wang, Haoyu (2019). LightSense: a novel side channel for zero-permission mobile user tracking. 22nd International Conference, ISC, New York, NY, United States, 16-18 September 2019. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-30215-3_15

LightSense: a novel side channel for zero-permission mobile user tracking

2019

Conference Publication

Deep Review Sharing

Guo, Chenkai, Huang, Dengrong, Dong, Naipeng, Ye, Quanqi, Xu, Jing, Fan, Yaqing, Yang, Hui and Xu, Yifan (2019). Deep Review Sharing. 26th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Hangzhou, China, 24-27 February 2019. Piscataway, NJ United States: IEEE. doi: 10.1109/saner.2019.8668037

Deep Review Sharing