Smart grid metering networks: A survey on security, privacy and open research issues P Kumar, Y Lin, G Bai, A Paverd, JS Dong, A Martin IEEE Communications Surveys & Tutorials 21 (3), 2886-2927, 2019 | 304 | 2019 |
Authscan: Automatic extraction of web authentication protocols from implementations G Bai, J Lei, G Meng, SS Venkatraman, P Saxena, J Sun, Y Liu, JS Dong The Network and Distributed System Security Symposium (NDSS), 2013 | 149 | 2013 |
Context-aware usage control for android G Bai, L Gu, T Feng, Y Guo, X Chen Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010 | 121 | 2010 |
Formal analysis of a proof-of-stake blockchain WYMM Thin, N Dong, G Bai, JS Dong 2018 23rd International Conference on Engineering of Complex Computer …, 2018 | 73 | 2018 |
Droidvault: A trusted data vault for android devices X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena 2014 19th International Conference on Engineering of Complex Computer …, 2014 | 62 | 2014 |
Don’t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams P Xia, H Wang, X Luo, L Wu, Y Zhou, G Bai, G Xu, G Huang, X Liu 2020 APWG Symposium on Electronic Crime Research (eCrime), 1-14, 2020 | 52 | 2020 |
Reevaluating android permission gaps with static and dynamic analysis H Wang, Y Guo, Z Tang, G Bai, X Chen 2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015 | 46 | 2015 |
Towards model checking android applications G Bai, Q Ye, Y Wu, H Botha, J Sun, Y Liu, JS Dong, W Visser IEEE Transactions on Software Engineering 44 (6), 595-612, 2017 | 41 | 2017 |
Privcoll: Practical privacy-preserving collaborative machine learning Y Zhang, G Bai, X Li, C Curtis, C Chen, RKL Ko European Symposium on Research in Computer Security, 399-418, 2020 | 35 | 2020 |
Break the dead end of dynamic slicing: Localizing data and control omission bug Y Lin, J Sun, L Tran, G Bai, H Wang, J Dong Proceedings of the 33rd ACM/IEEE international conference on automated …, 2018 | 35 | 2018 |
Context‐aware usage control for web of things G Bai, L Yan, L Gu, Y Guo, X Chen Security and Communication Networks 7 (12), 2696-2712, 2014 | 34 | 2014 |
Adversarial robustness of deep neural networks: A survey from a formal verification perspective MH Meng, G Bai, SG Teo, Z Hou, Y Xiao, Y Lin, JS Dong IEEE Transactions on Dependable and Secure Computing, 2022 | 31 | 2022 |
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms G Bai, J Hao, J Wu, Y Liu, Z Liang, A Martin FM 2014: Formal Methods: 19th International Symposium, Singapore, May 12-16 …, 2014 | 31 | 2014 |
Detecting malicious behaviors in javascript applications J Mao, J Bian, G Bai, R Wang, Y Chen, Y Xiao, Z Liang Ieee Access 6, 12284-12294, 2018 | 29 | 2018 |
Secure and efficient software-based attestation for industrial control devices with arm processors B Chen, X Dong, G Bai, S Jauhar, Y Cheng Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 29 | 2017 |
It’s not just the site, it’s the contents: Intra-domain fingerprinting social media websites through cdn bursts K Wang, J Zhang, G Bai, R Ko, JS Dong Proceedings of the Web Conference 2021, 2142-2153, 2021 | 28 | 2021 |
Dapanda: Detecting aggressive push notifications in android apps T Liu, H Wang, L Li, G Bai, Y Guo, G Xu 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 28 | 2019 |
Formal analysis of a single sign-on protocol implementation for android Q Ye, G Bai, K Wang, JS Dong 2015 20th International Conference on Engineering of Complex Computer …, 2015 | 28 | 2015 |
Scrutinizing privacy policy compliance of virtual personal assistant apps F Xie, Y Zhang, C Yan, S Li, L Bu, K Chen, Z Huang, G Bai Proceedings of the 37th IEEE/ACM international conference on automated …, 2022 | 26 | 2022 |
Identifying privacy weaknesses from multi-party trigger-action integration platforms K Mahadewa, Y Zhang, G Bai, L Bu, Z Zuo, D Fernando, Z Liang, JS Dong Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021 | 22 | 2021 |