
Overview
Background
A/Prof Guangdong Bai (on leave) is an Associate Professor at the Discipline of Cyber Security and Software Engineering (CSS), School of Electrical Engineering and Computer Science (EECS), The University of Queensland, Australia. His research interests include Trustworthy AI, Cyber Security, Software Engineering and Formal Methods.
Availability
- Associate Professor Guangdong Bai is:
- Not available for supervision
Qualifications
- Doctor of Philosophy, National University of Singapore
Research interests
-
Trustworthy AI
Advancing Trustworthy AI by developing cutting-edge methods to enhance AI security, privacy, reliability, and ethical alignment.
-
AI for Security/Software Engineering
Leveraging and adapting artificial intelligence to enhance system security and resilience.
-
Privacy Compliance and Governance
Enhancing privacy compliance in software systems, focusing on ensuring that applications adhere to data protection regulations and safeguard user privacy.
Works
Search Professor Guangdong Bai’s works on UQ eSpace
2023
Conference Publication
Wemint: tainting sensitive data leaks in WeChat mini-programs
Meng, Shi, Wang, Liu, Wang, Shenao, Wang, Kailong, Xiao, Xusheng, Bai, Guangdong and Wang, Haoyu (2023). Wemint: tainting sensitive data leaks in WeChat mini-programs. 38th IEEE/ACM International Conference on Automated Software Engineering (ASE), Echternach, Luxembourg, 11-15 September 2023. New York, NY, New York: Institute of Electrical and Electronics Engineers. doi: 10.1109/ASE56229.2023.00151
2023
Book Chapter
Preserving the privacy and cybersecurity of home energy data
Bean, Richard, Zhang, Yanjun, Ko, Ryan K. L., Mao, Xinyu and Bai, Guangdong (2023). Preserving the privacy and cybersecurity of home energy data. Emerging trends in cybersecurity applications. (pp. 323-343) edited by Kevin Daimi, Abeer Alsadoon, Cathryn Peoples and Nour El Madhoun. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-031-09640-2_14
2023
Journal Article
Proactive privacy-preserving learning for cross-modal retrieval
Zhang, Peng-Fei, Bai, Guangdong, Yin, Hongzhi and Huang, Zi (2023). Proactive privacy-preserving learning for cross-modal retrieval. ACM Transactions on Information Systems, 41 (2) 35, 1-23. doi: 10.1145/3545799
2023
Conference Publication
Supervised robustness-preserving data-free neural network pruning
Meng, Mark Huasong, Bai, Guangdong, Teo, Sin G. and Dong, Jin Song (2023). Supervised robustness-preserving data-free neural network pruning. 2023 27th International Conference on Engineering of Complex Computer Systems (ICECCS), Toulouse, France, 12 - 16 June 2023. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICECCS59891.2023.00013
2023
Conference Publication
Towards an effective and interpretable refinement approach for DNN verification
Li, Jiaying, Bai, Guangdong, Pham, Long H. and Sun, Jun (2023). Towards an effective and interpretable refinement approach for DNN verification. 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security (QRS), Chiang Mai, Thailand, 22-26 October 2023. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/QRS60937.2023.00062
2023
Conference Publication
Post-GDPR threat hunting on Android phones: dissecting OS-level safeguards of user-unresettable identifiers
Meng, Mark Huasong, Zhang, Qing, Xia, Guangshuai, Zheng, Yuwei, Zhang, Yanjun, Bai, Guangdong, Liu, Zhi, Teo, Sin G. and Dong, Jin Song (2023). Post-GDPR threat hunting on Android phones: dissecting OS-level safeguards of user-unresettable identifiers. Network and Distributed System Security (NDSS) Symposium 2023, San Diego, CA, United States, 27 February-3 March 2023. Reston, VA, United States: Internet Society. doi: 10.14722/ndss.2023.23176
2022
Journal Article
Characterizing cryptocurrency-themed malicious browser extensions
Wang, Kailong, Ling, Yuxi, Zhang, Yanjun, Yu, Zhou, Wang, Haoyu, Bai, Guangdong, Ooi, Beng Chin and Dong, Jin Song (2022). Characterizing cryptocurrency-themed malicious browser extensions. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 6 (3) 43, 1-31. doi: 10.1145/3570603
2022
Book
Network and system security: 16th international conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, proceedings
Xingliang Yuan, Guangdong Bai, Cristina Alcaraz and Suryadipta Majumdar eds. (2022). Network and system security: 16th international conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, proceedings. Lecture Notes in Computer Science, Heidelberg, Germany: Springer. doi: 10.1007/978-3-031-23020-2
2022
Conference Publication
Better together: attaining the triad of Byzantine-robust federated learning via local update amplification
Shen, Liyue, Zhang, Yanjun, Wang, Jingwei and Bai, Guangdong (2022). Better together: attaining the triad of Byzantine-robust federated learning via local update amplification. 38th Annual Computer Security Applications Conference, Austin, TX, United States, 5-9 December 2022. New York, United States: Association for Computing Machinery. doi: 10.1145/3564625.3564658
2022
Conference Publication
SATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset Generation
Wan, Liuhuo, Zhang, Yanjun, Li, Ruiqing, Ko, Ryan, Hoffman, Louw and Bai, Guangdong (2022). SATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset Generation. 18th International Conference on Advanced Data Mining and Applications (ADMA 2022), Brisbane, QLD Australia, 28–30 November 2022. Heidelberg, Germany: Springer. doi: 10.1007/978-3-031-22064-7_11
2022
Conference Publication
Assessing certificate validation user interfaces of WPA supplicants
Wang, Kailong, Zheng, Yuwei, Zhang, Qing, Bai, Guangdong, Qin, Mingchuang, Zhang, Donghui and Dong, Jin Song (2022). Assessing certificate validation user interfaces of WPA supplicants. ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, MOBICOM, Sydney, NSW Australia, 17 - 21 October 2022. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3495243.3517026
2022
Conference Publication
VITAS: guided model-based VUI testing of VPA apps
Li, Suwan, Bu, Lei, Bai, Guangdong, Guo, Zhixiu, Chen, Kai and Wei, Hanlin (2022). VITAS: guided model-based VUI testing of VPA apps. ASE '22: 37th IEEE/ACM International Conference on Automated Software Engineering, Rochester, MI USA, 10-14 October 2022. New York, NY USA: Association for Computing Machinery. doi: 10.1145/3551349.3556957
2022
Conference Publication
IDEAL: high-order-ensemble adaptation network forlearning with noisy labels
Zhang, Peng-Fei, Huang, Zi, Bai, Guangdong and Xu, Xin-Shun (2022). IDEAL: high-order-ensemble adaptation network forlearning with noisy labels. MM '22: The 30th ACM International Conference on Multimedia, Lisbon, Portugal, 10-14 October 2022. New York, United States: Association for Computing Machinery. doi: 10.1145/3503161.3548053
2022
Conference Publication
Machine unlearning for image retrieval : a generative scrubbing approach
Zhang, Peng-Fei, Bai, Guangdong, Huang, Zi and Xu, Xin-Shun (2022). Machine unlearning for image retrieval : a generative scrubbing approach. MM '22: The 30th ACM International Conference on Multimedia, Lisbon, Portugal, 10-14 October 2022. New York, United States: Association for Computing Machinery. doi: 10.1145/3503161.3548378
2022
Conference Publication
Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps
Xie, Fuman, Zhang, Yanjun, Yan, Chuan, Li, Suwan, Bu, Lei, Chen, Kai, Huang, Zi and Bai, Guangdong (2022). Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps. ASE '22: 37th IEEE/ACM International Conference on Automated Software Engineering, Rochester, MI United States, 10 - 14 October 2022. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3551349.3560416
2022
Journal Article
Preserving privacy for distributed genome-wide analysis against identity tracing attacks
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Nepal, Surya, Grobler, Marthie, Chen, Chen and Ko, Ryan K. L. (2022). Preserving privacy for distributed genome-wide analysis against identity tracing attacks. IEEE Transactions on Dependable and Secure Computing, 20 (4), 1-17. doi: 10.1109/tdsc.2022.3186672
2022
Conference Publication
Towards better generalization for neural network-based SAT solvers
Zhang, Chenhao, Zhang, Yanjun, Mao, Jeff, Chen, Weitong, Yue, Lin, Bai, Guangdong and Xu, Miao (2022). Towards better generalization for neural network-based SAT solvers. 26th Pacific-Asia Conference, PAKDD 2022, Chengdu, China, 16-19 May 2022. CHAM: Springer Science and Business Media Deutschland GmbH. doi: 10.1007/978-3-031-05936-0_16
2022
Journal Article
Adversarial robustness of deep neural networks: A survey from a formal verification perspective
Meng, Mark Huasong, Bai, Guangdong, Teo, Sin Gee, Hou, Zhe, Xiao, Yan, Lin, Yun and Dong, Jin Song (2022). Adversarial robustness of deep neural networks: A survey from a formal verification perspective. IEEE Transactions on Dependable and Secure Computing, 1-1. doi: 10.1109/tdsc.2022.3179131
2022
Journal Article
Sharing runtime permission issues for developers based on similar-app review mining
Gao, Hongcan, Guo, Chenkai, Bai, Guangdong, Huang, Dengrong, He, Zhen, Wu, Yanfeng and Xu, Jing (2022). Sharing runtime permission issues for developers based on similar-app review mining. Journal of Systems and Software, 184 111118, 111118. doi: 10.1016/j.jss.2021.111118
2022
Conference Publication
UQ-AAS21: A comprehensive dataset of Amazon Alexa skills
Xie, Fuman, Zhang, Yanjun, Wei, Hanlin and Bai, Guangdong (2022). UQ-AAS21: A comprehensive dataset of Amazon Alexa skills. 17th International Conference on Advanced Data Mining Applications (ADMA), Online, 2-4 February, 2022. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-95405-5_12
Funding
Current funding
Past funding
Supervision
Availability
- Associate Professor Guangdong Bai is:
- Not available for supervision
Supervision history
Current supervision
-
Doctor Philosophy
Robustness Verification of Neural Network
Principal Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
Automation of cyber software security targeting on software and mobile analysis
Principal Advisor
-
Doctor Philosophy
Multimodal Membership Inference: A Causal Perspective
Principal Advisor
-
Doctor Philosophy
IoT security analytics
Principal Advisor
Other advisors: Professor Ryan Ko, Dr Naipeng Dong
-
Doctor Philosophy
UQIDAR00265: Security Analytics of Internet of Things (IoT)
Principal Advisor
-
Doctor Philosophy
Analysing Internet of Thing Applications with Big Data Technique
Principal Advisor
-
Doctor Philosophy
Nudge4Cyber: Framework for Designing Accessible and Effective Cyber Security Nudges
Principal Advisor
-
Doctor Philosophy
Security of Internet of Things (IoT) Integration
Principal Advisor
Other advisors: Professor Ryan Ko
-
Doctor Philosophy
Privacy Compliance in Software Ecosystems
Principal Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
UQIDAR00265: Security Analytics of Internet of Things (IoT)
Principal Advisor
-
Doctor Philosophy
Privacy attacks and defences in cross-cyber physical domains
Principal Advisor
-
Doctor Philosophy
Auditing Privacy Policy Compliance of IoT Applications
Principal Advisor
-
Doctor Philosophy
Unified Cyber Security Framework for Distributed Learning
Principal Advisor
Other advisors: Professor Ryan Ko
-
Doctor Philosophy
A comprehensive framework for automated cybersecurity assessment, mitigation, and education using graphical security models
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
Doctor Philosophy
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Associate Advisor
Other advisors: Dr Naipeng Dong, Professor Ryan Ko
-
Doctor Philosophy
Evaluating and Enhancing the Resilience of Regression-Based Anomaly Detectors Against Gradient-Free Evasion Attacks in Industrial Control Systems
Associate Advisor
Other advisors: Dr Naipeng Dong, Professor Ryan Ko
-
Doctor Philosophy
Adversarial AI Attacks and Defenses in Intrusion Detection System for IoT
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
Doctor Philosophy
Exploring the Trustworthiness of Information Retrieval in the Era of Large Language Models
Associate Advisor
Other advisors: Dr Ruihong Qiu, Professor Helen Huang
-
Doctor Philosophy
Analysis of Machine Learning Systems
Associate Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
Automated Penetration Testing using Advanced AI Techniques
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
Doctor Philosophy
Towards Privacy-Preserving and Fairness-Aware Federated Recommendation Systems
Associate Advisor
Other advisors: Dr Ruihong Qiu, Professor Helen Huang
-
Doctor Philosophy
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Associate Advisor
Other advisors: Dr Naipeng Dong, Professor Ryan Ko
-
Doctor Philosophy
Continuous Code Analysis for Rapidly Evolving Software
Associate Advisor
Other advisors: Associate Professor Mark Utting, Dr Guowei Yang
-
Master Philosophy
Privacy Compliance in Software Ecosystems
Associate Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
A Distributed Data Collection Infrastructure For Automating Industrial Control Systems Security
Associate Advisor
Other advisors: Dr Naipeng Dong, Professor Ryan Ko
-
Doctor Philosophy
Fairness in Graph Representation Learning Models
Associate Advisor
Other advisors: Professor Helen Huang
-
Doctor Philosophy
AI based intrusion detection and response system
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
Doctor Philosophy
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Associate Advisor
Other advisors: Dr Naipeng Dong, Professor Ryan Ko
-
Doctor Philosophy
Secure, Accountable and Provenance-Centric File System
Associate Advisor
Other advisors: Professor Ryan Ko
-
Doctor Philosophy
Developing inclusive and culturally sensitive design guidelines for AI-enabled smart homes for people with disabilities in developing countries, based on local needs, preferences, and values
Associate Advisor
Other advisors: Professor Tim Miller, Dr Dhaval Vyas
-
Doctor Philosophy
Adversarial AI Attacks and Defenses in Intrusion Detection System for IoT
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
Doctor Philosophy
A comprehensive framework for automated cybersecurity assessment, mitigation, and education using graphical security models
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
Doctor Philosophy
Adaptive, secure and resilient programmable logic controllers (PLCs) and data transfer protocols
Associate Advisor
Other advisors: Professor Tapan Saha, Professor Ryan Ko
Completed supervision
-
2024
Doctor Philosophy
Security Modelling and Analysis of Internet of Things against Evolving Attacks
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
2021
Doctor Philosophy
Privacy-preserving Sharing for Genome-wide Analysis
Associate Advisor
Other advisors: Professor Ryan Ko, Dr Caitlin Curtis, Professor Xue Li
Media
Enquiries
For media enquiries about Associate Professor Guangdong Bai's areas of expertise, story ideas and help finding experts, contact our Media team: