2022 Journal Article A uniform framework for anomaly detection in deep neural networksZhao, Fangzhen, Zhang, Chenyi, Dong, Naipeng, You, Zefeng and Wu, Zhenxin (2022). A uniform framework for anomaly detection in deep neural networks. Neural Processing Letters, 54 (4), 3467-3488. doi: 10.1007/s11063-022-10776-y |
2020 Journal Article A blockchain-based decentralized booking systemDong, Naipeng, Bai, Guangdong, Huang, Lung-Chen, Lim, Edmund Kok Heng and Dong, Jin Song (2020). A blockchain-based decentralized booking system. Knowledge Engineering Review, 35 e17, e17. doi: 10.1017/s0269888920000260 |
2018 Conference Publication Formal Analysis of a Proof-of-Stake BlockchainThin, Wai Yan Maung Maung, Dong, Naipeng, Bai, Guangdong and Dong, Jin Song (2018). Formal Analysis of a Proof-of-Stake Blockchain. 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), Melbourne, VIC Australia, 12-14 December 2018. Piscataway, NJ United States: IEEE. doi: 10.1109/iceccs2018.2018.00031 |
2018 Conference Publication Verification of strong nash-equilibrium for probabilistic BAR systemsFernando, Dileepa, Dong, Naipeng, Jegourel, Cyrille and Dong, Jin Song (2018). Verification of strong nash-equilibrium for probabilistic BAR systems. International Conference on Formal Engineering Methods ICFEM 2018: Formal Methods and Software Engineering, Gold Coast, QLD Australia, 12-16 November 2018. Heidelberg, Germany: Springer. doi: 10.1007/978-3-030-02450-5_7 |
2018 Conference Publication The foul adversary: Formal modelsDong, Naipeng and Muller, Tim (2018). The foul adversary: Formal models. International Conference on Formal Engineering Methods ICFEM 2018: Formal Methods and Software Engineering, Gold Coast, QLD Australia, 12-16 November 2018. Heidelberg, Germany: Springer. doi: 10.1007/978-3-030-02450-5_3 |
2017 Journal Article Formal modelling and analysis of receipt-free auction protocols in applied piDong, Naipeng, Jonker, Hugo and Pang, Jun (2017). Formal modelling and analysis of receipt-free auction protocols in applied pi. Computers and Security, 65, 405-432. doi: 10.1016/j.cose.2016.09.002 |
2017 Conference Publication A verification framework for stateful security protocolsLi, Li, Dong, Naipeng, Pang, Jun, Sun, Jun, Bai, Guangdong, Liu, Yang and Dong, Jin Song (2017). A verification framework for stateful security protocols. 19th International Conference on Formal Engineering Methods (ICFEM), Xian, Peoples Republic of China, 13-17 November 2017. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-68690-5_16 |
2016 Conference Publication Verification of Nash-equilibrium for probabilistic BAR systemsDileepa, Fernando, Dong, Naipeng, Jegourel, Cyrille and Dong, Jin Song (2016). Verification of Nash-equilibrium for probabilistic BAR systems. 21st International Conference on Engineering of Complex Computer Systems (ICECCS), Dubai, United Arab Emirates, 6-8 November 2016. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ICECCS.2016.016 |
2013 Conference Publication Enforcing privacy in the presence of others: Notions, formalisations and relationsDong, Naipeng, Jonker, Hugo and Pang, Jun (2013). Enforcing privacy in the presence of others: Notions, formalisations and relations. European Symposium on Research in Computer Security ESORICS 2013: Computer Security, Egham, United Kingdom, 9-13 September 2013. Heidelberg, Germany: Springer . doi: 10.1007/978-3-642-40203-6_28 |
2012 Conference Publication Formal analysis of privacy in an eHealth protocolDong, Naipeng, Jonker, Hugo and Pang, Jun (2012). Formal analysis of privacy in an eHealth protocol. 17th European Symposium on Research in Computer Security, Pisa, Italy, 10-12 September 2012. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-33167-1_19 |
2012 Conference Publication Challenges in eHealth: From enabling to enforcing privacyDong, Naipeng, Jonker, Hugo and Pang, Jun (2012). Challenges in eHealth: From enabling to enforcing privacy. FHIES 2011: International Symposium on Foundations of Health Informatics Engineering and Systems, Johannesburg, South Africa, 29-30 August 2011. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-32355-3_12 |
2011 Conference Publication Analysis of a receipt-free auction protocol in the applied Pi calculusDong, Naipeng, Jonker, Hugo and Pang, Jun (2011). Analysis of a receipt-free auction protocol in the applied Pi calculus. Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, 16-17 September 2010. Berlin, Heidelberg: Springer Berlin Heidelberg. doi: 10.1007/978-3-642-19751-2_15 |
2011 Conference Publication Analysis of a Receipt-Free Auction Protocol in the Applied Pi CalculusDong, Naipeng, Jonker, Hugo and Pang, Jun (2011). Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus. 7th International Workshop on Formal Aspects of Security and Trust, Pisa, Italy, 16-17 September 2010. Berlin, Germany: Springer. |
2025 Journal Article A Container Security Survey: Exploits, Attacks, and DefensesJarkas, Omar, Ko, Ryan, Dong, Naipeng and Mahmud, Redowan (2025). A Container Security Survey: Exploits, Attacks, and Defenses. ACM Computing Surveys. doi: 10.1145/3715001 |
2024 Conference Publication Formal verification techniques for post-quantum cryptography: a systematic reviewXu, Yuexi, Li, Zhenyuan, Dong, Naipeng, Kuchta, Veronika, Hou, Zhe and Liu, Dongxi (2024). Formal verification techniques for post-quantum cryptography: a systematic review. 28th International Conference, ICECCS 2024, Limassol, Cyprus, 19-21 June 2024. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-031-66456-4_19 |
2024 Conference Publication The Benefits of Non-Fungible Token (NFT) Technology in Music CopyrightDong, Jie, Dong, Naipeng and Bai, Guangdong (2024). The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright. 7th International Symposium on Distributed Ledger Technology SDLT 2023, Brisbane, QLD Australia, 30 November – 1 December 2023. Singapore: Springer. doi: 10.1007/978-981-97-0006-6_7 |
2024 Book Chapter Model Checking Concurrency in Smart Contracts with a Case Study of Safe Remote PurchaseYu, Yisong, Dong, Naipeng, Hou, Zhe and Song Dong, Jin (2024). Model Checking Concurrency in Smart Contracts with a Case Study of Safe Remote Purchase. Lecture Notes in Computer Science. (pp. 391-407) Singapore: Springer Nature Singapore. doi: 10.1007/978-981-96-0617-7_22 |
2024 Conference Publication EVM-Vale: formal verification of EVM bytecode using valeCumming, Daniel, Utting, Mark, Cassez, Franck, Dong, Naipeng, Bayat Tork, Sadra and Risius, Marten (2024). EVM-Vale: formal verification of EVM bytecode using vale. 7th International Symposium, SDLT 2023, Brisbane, QLD, Australia, 30 November - 1 December 2023. Heidelberg, Germany: Springer. doi: 10.1007/978-981-97-0006-6_3 |
2024 Book Distributed Ledger Technology: 7th International Symposium, SDLT 2023, Brisbane, QLD, Australia, November 30 – December 1, 2023, Revised Selected PapersNaipeng Dong, Babu Pillai, Guangdong Bai and Mark Utting eds. (2024). Distributed Ledger Technology: 7th International Symposium, SDLT 2023, Brisbane, QLD, Australia, November 30 – December 1, 2023, Revised Selected Papers. Communications in Computer and Information Science, Heidelberg, Germany: Springer. doi: 10.1007/978-981-97-0006-6 |
2024 Book Chapter VeraciTIX: an NFT-based event ticketing systemWard, Ryan, Jo, Komei, Dong, Naipeng, Owens, Bill and Portmann, Marius (2024). VeraciTIX: an NFT-based event ticketing system. Blockchain and smart-contract technologies for innovative applications. (pp. 189-213) edited by Nour El Madhoun, Ioanna Dionysiou and Emmanuel Bertin. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-031-50028-2_7 |