Guangdong Bai
Orcid: 0000-0002-6390-9890
According to our database1,
Guangdong Bai
authored at least 115 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Trans. Softw. Eng. Methodol., June, 2024
On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications.
Proc. Priv. Enhancing Technol., January, 2024
IoTSecSim: A framework for modelling and simulation of security in Internet of things.
Comput. Secur., January, 2024
IEEE Trans. Multim., 2024
AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification.
IEEE Trans. Inf. Forensics Secur., 2024
PAODING: A High-fidelity Data-free Pruning Toolkit for Debloating Pre-trained Neural Networks.
CoRR, 2024
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack.
CoRR, 2024
Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey.
IEEE Commun. Surv. Tutorials, 2024
Privacy-Preserving and Fairness-Aware Federated Learning for Critical Infrastructure Protection and Resilience.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations.
Proceedings of the ACM on Web Conference 2024, 2024
Essential or Excessive? MINDAEXT: Measuring Data Minimization Practices among Browser Extensions.
Proceedings of the IEEE International Conference on Software Analysis, 2024
Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial Approximation.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2024
Large Language Models Can Connect the Dots: Exploring Model Optimization Bugs with Domain Knowledge-Aware Prompts.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Beyond the Horizon: Exploring Cross-Market Security Discrepancies in Parallel Android Apps.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024
Proceedings of the 17th Innovations in Software Engineering Conference, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Unveiling Intellectual Property Vulnerabilities of GAN-Based Distributed Machine Learning through Model Extraction Attacks.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Comput. Secur., September, 2023
ACM Trans. Inf. Syst., April, 2023
Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks.
IEEE Trans. Dependable Secur. Comput., 2023
Symbolic Security Verification of Mesh Commissioning Protocol in Thread (extended version).
CoRR, 2023
AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023
Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023
SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Investigating Users' Understanding of Privacy Policies of Virtual Personal Assistant Applications.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023
2022
J. Syst. Softw., 2022
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective.
CoRR, 2022
CoRR, 2022
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022
Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Software Eng., 2021
Proc. ACM Meas. Anal. Comput. Syst., 2021
IEEE Intell. Syst., 2021
CoRR, 2021
CoRR, 2021
It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts.
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Identifying privacy weaknesses from multi-party trigger-action integration platforms.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021
2020
Early prediction for mode anomaly in generative adversarial network training: An empirical study.
Inf. Sci., 2020
Neurocomputing, 2020
When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories.
CoRR, 2020
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
2019
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues.
IEEE Commun. Surv. Tutorials, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
2018
Cybersecur., 2018
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the Formal Methods and Software Engineering, 2017
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016
2015
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms.
Proceedings of the FM 2014: Formal Methods, 2014
2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Formal Methods and Software Engineering, 2013
A Software Environment for Confining Malicious Android Applications via Resource Virtualization.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013
2012
Security model oriented attestation on dynamically reconfigurable component-based systems.
J. Netw. Comput. Appl., 2012
2010
Proceedings of the Security and Privacy in Communication Networks, 2010