Guangdong Bai
Guangdong Bai
Associate Professor of The University of Queensland
Verified email at - Homepage
Cited by
Cited by
Smart grid metering networks: A survey on security, privacy and open research issues
P Kumar, Y Lin, G Bai, A Paverd, JS Dong, A Martin
IEEE Communications Surveys & Tutorials 21 (3), 2886-2927, 2019
Authscan: Automatic extraction of web authentication protocols from implementations
G Bai, J Lei, G Meng, SS Venkatraman, P Saxena, J Sun, Y Liu, JS Dong
The Network and Distributed System Security Symposium (NDSS), 2013
Context-aware usage control for android
G Bai, L Gu, T Feng, Y Guo, X Chen
Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010
Droidvault: A trusted data vault for android devices
X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena
2014 19th International Conference on Engineering of Complex Computer …, 2014
Formal analysis of a proof-of-stake blockchain
WYMM Thin, N Dong, G Bai, JS Dong
2018 23rd International Conference on Engineering of Complex Computer …, 2018
Reevaluating android permission gaps with static and dynamic analysis
H Wang, Y Guo, Z Tang, G Bai, X Chen
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
Towards model checking android applications
G Bai, Q Ye, Y Wu, H Botha, J Sun, Y Liu, JS Dong, W Visser
IEEE Transactions on Software Engineering 44 (6), 595-612, 2017
Context‐aware usage control for web of things
G Bai, L Yan, L Gu, Y Guo, X Chen
Security and Communication Networks 7 (12), 2696-2712, 2014
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms
G Bai, J Hao, J Wu, Y Liu, Z Liang, A Martin
FM 2014: Formal Methods: 19th International Symposium, Singapore, May 12-16 …, 2014
Formal analysis of a single sign-on protocol implementation for android
Q Ye, G Bai, K Wang, JS Dong
2015 20th International Conference on Engineering of Complex Computer …, 2015
Break the dead end of dynamic slicing: Localizing data and control omission bug
Y Lin, J Sun, L Tran, G Bai, H Wang, J Dong
Proceedings of the 33rd ACM/IEEE international conference on automated …, 2018
Detecting malicious behaviors in javascript applications
J Mao, J Bian, G Bai, R Wang, Y Chen, Y Xiao, Z Liang
IEEE Access 6, 12284-12294, 2018
Privcoll: Practical privacy-preserving collaborative machine learning
Y Zhang, G Bai, X Li, C Curtis, C Chen, RKL Ko
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
Secure and efficient software-based attestation for industrial control devices with arm processors
B Chen, X Dong, G Bai, S Jauhar, Y Cheng
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Don’t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams
P Xia, H Wang, X Luo, L Wu, Y Zhou, G Bai, G Xu, G Huang, X Liu
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-14, 2020
Dapanda: Detecting aggressive push notifications in android apps
T Liu, H Wang, L Li, G Bai, Y Guo, G Xu
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
All your sessions are belong to us: Investigating authenticator leakage through backup channels on android
G Bai, J Sun, J Wu, Q Ye, L Li, JS Dong, S Guo
2015 20th International Conference on Engineering of Complex Computer …, 2015
It’s not just the site, it’s the contents: intra-domain fingerprinting social media websites through CDN bursts
K Wang, J Zhang, G Bai, R Ko, JS Dong
Proceedings of the Web Conference 2021, 2142-2153, 2021
When the open source community meets covid-19: Characterizing covid-19 themed github repositories
L Wang, R Li, J Zhu, G Bai, H Wang
arXiv preprint arXiv:2010.12218, 2020
Differentially private collaborative coupling learning for recommender systems
Y Zhang, G Bai, M Zhong, X Li, RKL Ko
IEEE Intelligent Systems 36 (1), 16-24, 2020
The system can't perform the operation now. Try again later.
Articles 1–20