
Overview
Background
A/Prof Guangdong Bai (on leave) is an Associate Professor at the Discipline of Cyber Security and Software Engineering (CSS), School of Electrical Engineering and Computer Science (EECS), The University of Queensland, Australia. His research interests include Trustworthy AI, Cyber Security, Software Engineering and Formal Methods.
Availability
- Associate Professor Guangdong Bai is:
- Not available for supervision
Qualifications
- Doctor of Philosophy, National University of Singapore
Research interests
-
Trustworthy AI
Advancing Trustworthy AI by developing cutting-edge methods to enhance AI security, privacy, reliability, and ethical alignment.
-
AI for Security/Software Engineering
Leveraging and adapting artificial intelligence to enhance system security and resilience.
-
Privacy Compliance and Governance
Enhancing privacy compliance in software systems, focusing on ensuring that applications adhere to data protection regulations and safeguard user privacy.
Works
Search Professor Guangdong Bai’s works on UQ eSpace
2024
Journal Article
DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systems
Bhattacharjee, Arnab, Bai, Guangdong, Tushar, Wayes, Verma, Ashu, Mishra, Sukumar and Saha, Tapan K. (2024). DeeBBAA: a benchmark deep black box adversarial attack against cyber-physical power systems. IEEE Internet of Things Journal, 11 (24), 40670-40688. doi: 10.1109/jiot.2024.3454257
2024
Journal Article
Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defense evaluation
Nguyen, Nhung H., Ge, Mengmeng, Cho, Jin-Hee, Moore, Terrence J., Yoon, Seunghyun, Lim, Hyuk, Nelson, Frederica, Bai, Guangdong and Kim, Dan Dongseong (2024). Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defense evaluation. Computers & Security, 150 104229, 1-19. doi: 10.1016/j.cose.2024.104229
2024
Conference Publication
Beyond the horizon: exploring cross-market security discrepancies in parallel Android apps
Yang, Shishuai, Bai, Guangdong, Lin, Ruoyan, Guo, Jialong and Diao, Wenrui (2024). Beyond the horizon: exploring cross-market security discrepancies in parallel Android apps. 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE), Tsukuba, Japan, 28-31 October 2024. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/issre62328.2024.00059
2024
Conference Publication
Exploring ChatGPT app ecosystem: distribution, deployment and security
Yan, Chuan, Ren, Ruomai, Meng, Mark Huasong, Wan, Liuhuo, Ooi, Tian Yang and Bai, Guangdong (2024). Exploring ChatGPT app ecosystem: distribution, deployment and security. 39th ACM/IEEE International Conference on Automated Software Engineering (ASE), Sacramento, CA, United States, 28 October-1 November 2024. New York, United States: Association for Computing Machinery. doi: 10.1145/3691620.3695510
2024
Conference Publication
Unveiling intellectual property vulnerabilities of GAN-based distributed machine learning through model extraction attacks
Ma, Mengyao, Liu, Shuofeng, Chamikara, M. A. P., Baruwal Chhetri, Mohan and Bai, Guangdong (2024). Unveiling intellectual property vulnerabilities of GAN-based distributed machine learning through model extraction attacks. 33rd ACM International Conference on Information and Knowledge Management (CIKM), Boise, ID USA, 21-25 October 2024. New York, NY USA: Association for Computing Machinery. doi: 10.1145/3627673.3679850
2024
Conference Publication
Large language models can connect the dots: exploring model optimization bugs with domain knowledge-aware prompts
Guan, Hao, Bai, Guangdong and Liu, Yepang (2024). Large language models can connect the dots: exploring model optimization bugs with domain knowledge-aware prompts. 33rd ACM SIGSOFT International Conference on Software Testing and Analysis (ISSTA), Vienna, Austria, 16-20 September 2024. New York, United States: Association for Computing Machinery. doi: 10.1145/3650212.3680383
2024
Journal Article
Investigating Documented Privacy Changes in Android OS
Yan, Chuan, Meng, Mark Huasong, Xie, Fuman and Bai, Guangdong (2024). Investigating Documented Privacy Changes in Android OS. Proceedings of the ACM on Software Engineering, 1 (FSE), 2701-2724. doi: 10.1145/3660826
2024
Conference Publication
Universal adversarial perturbations for vision-language pre-trained models
Zhang, Peng-Fei, Huang, Zi and Bai, Guangdong (2024). Universal adversarial perturbations for vision-language pre-trained models. 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, Washington, DC, United States, 14-18 July 2024. New York, NY, United States: ACM. doi: 10.1145/3626772.3657781
2024
Conference Publication
PANDA: Practical Adversarial Attack Against Network Intrusion Detection
Swain, Subrat Kumar, Kumar, Vireshwar, Bai, Guangdong and Kim, Dan Dongseong (2024). PANDA: Practical Adversarial Attack Against Network Intrusion Detection. 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Brisbane, QLD, Australia, 24-27 June 2024. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn-s60304.2024.00017
2024
Conference Publication
AuSSE: a novel framework for security and safety evaluation for autonomous vehicles
Nguyen, Nhung H., Cho, Jin-Hee, Moore, Terrence J., Yoon, Seunghyun, Lim, Hyuk, Nelson, Frederica, Bai, Guangdong and Kim, Dan Dongseong (2024). AuSSE: a novel framework for security and safety evaluation for autonomous vehicles. 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Brisbane, QLD, Australia, 24-27 June 2024. Piscataway, NJ, United States: IEEE. doi: 10.1109/dsn-s60304.2024.00012
2024
Journal Article
Beyond fidelity: explaining vulnerability localization of learning-based detectors
Cheng, Baijun, Zhao, Shengming, Wang, Kailong, Wang, Meizhen, Bai, Guangdong, Feng, Ruitao, Guo, Yao, Ma, Lei and Wang, Haoyu (2024). Beyond fidelity: explaining vulnerability localization of learning-based detectors. ACM Transactions on Software Engineering and Methodology, 33 (5) 127, 1-33. doi: 10.1145/3641543
2024
Conference Publication
CORELOCKER: neuron-level usage control
Wang, Zihan, Ma, Zhongkui, Feng, Xinguo, Sun, Ruoxi, Wang, Hu, Xue, Minhui and Bai, Guangdong (2024). CORELOCKER: neuron-level usage control. 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, United States, 19-23 May 2024. Piscataway, NJ, United States: IEEE. doi: 10.1109/sp54263.2024.00233
2024
Conference Publication
Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience
Zhang, Yanjun, Sun, Ruoxi, Shen, Liyue, Bai, Guangdong, Xue, Minhui, Meng, Mark Huasong, Li, Xue, Ko, Ryan and Nepal, Surya (2024). Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience. WWW '24: ACM Web Conference 2024, Singapore, Singapore, 13-17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645545
2024
Conference Publication
Is it safe to share your files? An empirical security analysis of Google workspace
Wan, Liuhuo, Wang, Kailong, Wang, Haoyu and Bai, Guangdong (2024). Is it safe to share your files? An empirical security analysis of Google workspace. ACM Web Conference 2024, Singapore, Singapore, 13-17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645697
2024
Conference Publication
Don't bite off more than you can chew: investigating excessive permission requests in trigger-action integrations
Wan, Liuhuo, Wang, Kailong, Mahadewa, Kulani, Wang, Haoyu and Bai, Guangdong (2024). Don't bite off more than you can chew: investigating excessive permission requests in trigger-action integrations. WWW '24: ACM Web Conference 2024, Singapore, Singapore, 13–17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645721
2024
Journal Article
Effective and robust adversarial training against data and label corruptions
Zhang, Peng-Fei, Huang, Zi, Xu, Xin-Shun and Bai, Guangdong (2024). Effective and robust adversarial training against data and label corruptions. IEEE Transactions on Multimedia, 26, 9477-9488. doi: 10.1109/tmm.2024.3394677
2024
Conference Publication
Are your requests your true needs? Checking excessive data collection in VPA App
Xie, Fuman, Yan, Chuan, Meng, Mark Huasong, Teng, Shaoming, Zhang, Yanjun and Bai, Guangdong (2024). Are your requests your true needs? Checking excessive data collection in VPA App. ICSE '24: IEEE/ACM 46th International Conference on Software Engineering, Lisbon, Portugal, 14-20 April 2024. New York, NY, United States: ACM. doi: 10.1145/3597503.3639107
2024
Conference Publication
Symbolic verification of mesh commissioning protocol of thread
Upadhyay, Pankaj, Sharma, Subodh and Bai, Guangdong (2024). Symbolic verification of mesh commissioning protocol of thread. 17th Innovations in Software Engineering Conference (ISEC), Bangalore, India, 22-24 February 2024. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3641399.3641446
2024
Conference Publication
The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright
Dong, Jie, Dong, Naipeng and Bai, Guangdong (2024). The Benefits of Non-Fungible Token (NFT) Technology in Music Copyright. 7th International Symposium on Distributed Ledger Technology SDLT 2023, Brisbane, QLD Australia, 30 November – 1 December 2023. Singapore: Springer. doi: 10.1007/978-981-97-0006-6_7
2024
Journal Article
ReLU hull approximation
Ma, Zhongkui, Li, Jiaying and Bai, Guangdong (2024). ReLU hull approximation. Proceedings of the ACM on Programming Languages, 8 (POPL) 75, 2260-2287. doi: 10.1145/3632917
Funding
Current funding
Past funding
Supervision
Availability
- Associate Professor Guangdong Bai is:
- Not available for supervision
Supervision history
Current supervision
-
Doctor Philosophy
Robustness Verification of Neural Network
Principal Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
Automation of cyber software security targeting on software and mobile analysis
Principal Advisor
-
Doctor Philosophy
Multimodal Membership Inference: A Causal Perspective
Principal Advisor
-
Doctor Philosophy
IoT security analytics
Principal Advisor
Other advisors: Professor Ryan Ko, Dr Naipeng Dong
-
Doctor Philosophy
UQIDAR00265: Security Analytics of Internet of Things (IoT)
Principal Advisor
-
Doctor Philosophy
Analysing Internet of Thing Applications with Big Data Technique
Principal Advisor
-
Doctor Philosophy
Nudge4Cyber: Framework for Designing Accessible and Effective Cyber Security Nudges
Principal Advisor
-
Doctor Philosophy
Security of Internet of Things (IoT) Integration
Principal Advisor
Other advisors: Professor Ryan Ko
-
Doctor Philosophy
Privacy Compliance in Software Ecosystems
Principal Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
UQIDAR00265: Security Analytics of Internet of Things (IoT)
Principal Advisor
-
Doctor Philosophy
Privacy attacks and defences in cross-cyber physical domains
Principal Advisor
-
Doctor Philosophy
Auditing Privacy Policy Compliance of IoT Applications
Principal Advisor
-
Doctor Philosophy
Unified Cyber Security Framework for Distributed Learning
Principal Advisor
Other advisors: Professor Ryan Ko
-
Doctor Philosophy
A comprehensive framework for automated cybersecurity assessment, mitigation, and education using graphical security models
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
Doctor Philosophy
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Associate Advisor
Other advisors: Dr Naipeng Dong, Professor Ryan Ko
-
Doctor Philosophy
Evaluating and Enhancing the Resilience of Regression-Based Anomaly Detectors Against Gradient-Free Evasion Attacks in Industrial Control Systems
Associate Advisor
Other advisors: Dr Naipeng Dong, Professor Ryan Ko
-
Doctor Philosophy
Adversarial AI Attacks and Defenses in Intrusion Detection System for IoT
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
Doctor Philosophy
Exploring the Trustworthiness of Information Retrieval in the Era of Large Language Models
Associate Advisor
Other advisors: Dr Ruihong Qiu, Professor Helen Huang
-
Doctor Philosophy
Analysis of Machine Learning Systems
Associate Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
Automated Penetration Testing using Advanced AI Techniques
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
Doctor Philosophy
Towards Privacy-Preserving and Fairness-Aware Federated Recommendation Systems
Associate Advisor
Other advisors: Dr Ruihong Qiu, Professor Helen Huang
-
Doctor Philosophy
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Associate Advisor
Other advisors: Dr Naipeng Dong, Professor Ryan Ko
-
Doctor Philosophy
Continuous Code Analysis for Rapidly Evolving Software
Associate Advisor
Other advisors: Associate Professor Mark Utting, Dr Guowei Yang
-
Master Philosophy
Privacy Compliance in Software Ecosystems
Associate Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
A Distributed Data Collection Infrastructure For Automating Industrial Control Systems Security
Associate Advisor
Other advisors: Dr Naipeng Dong, Professor Ryan Ko
-
Doctor Philosophy
Fairness in Graph Representation Learning Models
Associate Advisor
Other advisors: Professor Helen Huang
-
Doctor Philosophy
AI based intrusion detection and response system
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
Doctor Philosophy
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Associate Advisor
Other advisors: Dr Naipeng Dong, Professor Ryan Ko
-
Doctor Philosophy
Secure, Accountable and Provenance-Centric File System
Associate Advisor
Other advisors: Professor Ryan Ko
-
Doctor Philosophy
Developing inclusive and culturally sensitive design guidelines for AI-enabled smart homes for people with disabilities in developing countries, based on local needs, preferences, and values
Associate Advisor
Other advisors: Professor Tim Miller, Dr Dhaval Vyas
-
Doctor Philosophy
Adversarial AI Attacks and Defenses in Intrusion Detection System for IoT
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
Doctor Philosophy
A comprehensive framework for automated cybersecurity assessment, mitigation, and education using graphical security models
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
Doctor Philosophy
Adaptive, secure and resilient programmable logic controllers (PLCs) and data transfer protocols
Associate Advisor
Other advisors: Professor Tapan Saha, Professor Ryan Ko
Completed supervision
-
2024
Doctor Philosophy
Security Modelling and Analysis of Internet of Things against Evolving Attacks
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
2021
Doctor Philosophy
Privacy-preserving Sharing for Genome-wide Analysis
Associate Advisor
Other advisors: Professor Ryan Ko, Dr Caitlin Curtis, Professor Xue Li
Media
Enquiries
For media enquiries about Associate Professor Guangdong Bai's areas of expertise, story ideas and help finding experts, contact our Media team: