2022 Journal Article A uniform framework for anomaly detection in deep neural networksZhao, Fangzhen, Zhang, Chenyi, Dong, Naipeng, You, Zefeng and Wu, Zhenxin (2022). A uniform framework for anomaly detection in deep neural networks. Neural Processing Letters, 54 (4), 3467-3488. doi: 10.1007/s11063-022-10776-y |
2020 Journal Article A blockchain-based decentralized booking systemDong, Naipeng, Bai, Guangdong, Huang, Lung-Chen, Lim, Edmund Kok Heng and Dong, Jin Song (2020). A blockchain-based decentralized booking system. Knowledge Engineering Review, 35 e17, e17. doi: 10.1017/s0269888920000260 |
2018 Conference Publication Formal Analysis of a Proof-of-Stake BlockchainThin, Wai Yan Maung Maung, Dong, Naipeng, Bai, Guangdong and Dong, Jin Song (2018). Formal Analysis of a Proof-of-Stake Blockchain. 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), Melbourne, VIC Australia, 12-14 December 2018. Piscataway, NJ United States: IEEE. doi: 10.1109/iceccs2018.2018.00031 |
2018 Conference Publication Verification of strong nash-equilibrium for probabilistic BAR systemsFernando, Dileepa, Dong, Naipeng, Jegourel, Cyrille and Dong, Jin Song (2018). Verification of strong nash-equilibrium for probabilistic BAR systems. International Conference on Formal Engineering Methods ICFEM 2018: Formal Methods and Software Engineering, Gold Coast, QLD Australia, 12-16 November 2018. Heidelberg, Germany: Springer. doi: 10.1007/978-3-030-02450-5_7 |
2018 Conference Publication The foul adversary: Formal modelsDong, Naipeng and Muller, Tim (2018). The foul adversary: Formal models. International Conference on Formal Engineering Methods ICFEM 2018: Formal Methods and Software Engineering, Gold Coast, QLD Australia, 12-16 November 2018. Heidelberg, Germany: Springer. doi: 10.1007/978-3-030-02450-5_3 |
2017 Journal Article Formal modelling and analysis of receipt-free auction protocols in applied piDong, Naipeng, Jonker, Hugo and Pang, Jun (2017). Formal modelling and analysis of receipt-free auction protocols in applied pi. Computers and Security, 65, 405-432. doi: 10.1016/j.cose.2016.09.002 |
2017 Conference Publication A verification framework for stateful security protocolsLi, Li, Dong, Naipeng, Pang, Jun, Sun, Jun, Bai, Guangdong, Liu, Yang and Dong, Jin Song (2017). A verification framework for stateful security protocols. 19th International Conference on Formal Engineering Methods (ICFEM), Xian, Peoples Republic of China, 13-17 November 2017. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-68690-5_16 |
2016 Conference Publication Verification of Nash-equilibrium for probabilistic BAR systemsDileepa, Fernando, Dong, Naipeng, Jegourel, Cyrille and Dong, Jin Song (2016). Verification of Nash-equilibrium for probabilistic BAR systems. 21st International Conference on Engineering of Complex Computer Systems (ICECCS), Dubai, United Arab Emirates, 6-8 November 2016. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ICECCS.2016.016 |
2013 Conference Publication Enforcing privacy in the presence of others: Notions, formalisations and relationsDong, Naipeng, Jonker, Hugo and Pang, Jun (2013). Enforcing privacy in the presence of others: Notions, formalisations and relations. European Symposium on Research in Computer Security ESORICS 2013: Computer Security, Egham, United Kingdom, 9-13 September 2013. Heidelberg, Germany: Springer . doi: 10.1007/978-3-642-40203-6_28 |
2012 Conference Publication Formal analysis of privacy in an eHealth protocolDong, Naipeng, Jonker, Hugo and Pang, Jun (2012). Formal analysis of privacy in an eHealth protocol. 17th European Symposium on Research in Computer Security, Pisa, Italy, 10-12 September 2012. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-33167-1_19 |
2012 Conference Publication Challenges in eHealth: From enabling to enforcing privacyDong, Naipeng, Jonker, Hugo and Pang, Jun (2012). Challenges in eHealth: From enabling to enforcing privacy. FHIES 2011: International Symposium on Foundations of Health Informatics Engineering and Systems, Johannesburg, South Africa, 29-30 August 2011. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-32355-3_12 |
2011 Conference Publication Analysis of a receipt-free auction protocol in the applied Pi calculusDong, Naipeng, Jonker, Hugo and Pang, Jun (2011). Analysis of a receipt-free auction protocol in the applied Pi calculus. Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, 16-17 September 2010. Berlin, Heidelberg: Springer Berlin Heidelberg. doi: 10.1007/978-3-642-19751-2_15 |
2011 Conference Publication Analysis of a Receipt-Free Auction Protocol in the Applied Pi CalculusDong, Naipeng, Jonker, Hugo and Pang, Jun (2011). Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus. 7th International Workshop on Formal Aspects of Security and Trust, Pisa, Italy, 16-17 September 2010. Berlin, Germany: Springer. |
2025 Journal Article A container security survey: exploits, attacks, and defensesJarkas, Omar, Ko, Ryan, Dong, Naipeng and Mahmud, Redowan (2025). A container security survey: exploits, attacks, and defenses. ACM Computing Surveys, 57 (7) 170, 1-36. doi: 10.1145/3715001 |
2025 Journal Article Uncovering API-scope misalignment in the app-in-app ecosystemChe, Jiarui, Guo, Chenkai, Dong, Naipeng, Pei, Jiaqi, Fan, Lingling, Mi, Xun, Xie, Xueshuo, Luo, Xiangyang, Liu, Zheli and Cheng, Renhong (2025). Uncovering API-scope misalignment in the app-in-app ecosystem. Proceedings of the ACM on Software Engineering, 2 (ISSTA), 1933-1954. doi: 10.1145/3728962 |
2025 Conference Publication Intelligent data refinement and analysis of real-world cyber attacks on SCADA systemsZhang, Wenlu, Dong, Naipeng, Choi, Taejun, Bai, Guangdong and Ko, Ryan K. L. (2025). Intelligent data refinement and analysis of real-world cyber attacks on SCADA systems. E-Energy '25: The 16th ACM International Conference on Future and Sustainable Energy Systems, Rotterdam, Netherlands, 17-20 June 2025. New York, NY USA: Association for Computing Machinery. doi: 10.1145/3679240.3734654 |
2025 Journal Article Fratricide! Hijacking in android multi-windowGuo, Chenkai, Wang, Tianhong, Wang, Qianlu, Dong, Naipeng, Luo, Xiangyang and Liu, Zheli (2025). Fratricide! Hijacking in android multi-window. IEEE Transactions on Dependable and Secure Computing, 22 (3), 3075-3092. doi: 10.1109/tdsc.2024.3524755 |
2025 Conference Publication EP-Detector: Automatic Detection of Error-Prone Operation Anomalies in Android ApplicationsGuo, Chenkai, Wang, Qianlu, Dong, Naipeng, Fan, Lingling, Wang, Tianhong, Zhang, Weijie, Chen, Enbao, Liu, Zheli and Yu, Lu (2025). EP-Detector: Automatic Detection of Error-Prone Operation Anomalies in Android Applications. IEEE. doi: 10.1109/icse55347.2025.00029 |
2025 Conference Publication PQS-BC: comparative analysis of NIST post-quantum signatures for blockchainWong, Wan Kai, Dong, Naipeng and Dinh, Cong Minh (2025). PQS-BC: comparative analysis of NIST post-quantum signatures for blockchain. 18th International Conference, NSS 2024, Abu Dhabi, United Arab Emirates, 20-22 November 2024. Singapore: Springer. doi: 10.1007/978-981-96-3531-3_17 |
2025 Book Chapter Blockchain Based Electrical Vehicle Charging PlatformZhu, Chensheng, Dong, Naipeng and Bai, Guangdong (2025). Blockchain Based Electrical Vehicle Charging Platform. Communications in Computer and Information Science. (pp. 103-116) Singapore: Springer Nature Singapore. doi: 10.1007/978-981-96-4442-1_7 |