Jun Pang
Orcid: 0000-0002-4521-4112Affiliations:
- University of Luxembourg, Esch-sur-Alzette, Luxembourg
According to our database1,
Jun Pang
authored at least 251 papers
between 1999 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
2025
0
5
10
15
20
1
11
9
12
9
8
7
7
3
5
5
6
6
4
1
3
1
2
1
2
2
1
1
1
6
7
6
6
7
5
6
8
10
12
6
9
6
7
6
9
2
7
4
4
5
2
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2025
Neural Networks, 2025
2024
Soc. Netw. Anal. Min., December, 2024
XRAD: Ransomware Address Detection Method based on Bitcoin Transaction Relationships.
ACM Trans. Web, November, 2024
IEEE Comput. Intell. Mag., May, 2024
Bridging Performance of X (formerly known as Twitter) Users: A Predictor of Subjective Well-Being During the Pandemic.
ACM Trans. Web, February, 2024
A tale of two roles: exploring topic-specific susceptibility and influence in cascade prediction.
Data Min. Knowl. Discov., January, 2024
Proc. ACM Program. Lang., 2024
Deep autoencoder architecture with outliers for temporal attributed network embedding.
Expert Syst. Appl., 2024
Integrating Optimal Transport and Structural Inference Models for GRN Inference from Single-cell Data.
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Observability of Boolean Control Networks: New Definition and Verification Algorithm.
Proceedings of the Formal Methods and Software Engineering, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Knowl. Data Eng., July, 2023
Inf. Technol. Control., March, 2023
IEEE ACM Trans. Comput. Biol. Bioinform., 2023
CoRR, 2023
Proceedings of the Information Security - 26th International Conference, 2023
Structural-semantics Guided Program Simplification for Understanding Neural Code Intelligence Models.
Proceedings of the 14th Asia-Pacific Symposium on Internetware, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the 20th International Conference on Informatics in Control, 2023
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
2022
ACM Trans. Web, 2022
Simplifying Node Classification on Heterophilous Graphs with Compatible Label Propagation.
Trans. Mach. Learn. Res., 2022
Sci. Comput. Program., 2022
PeerJ Comput. Sci., 2022
Frontiers Comput. Sci., 2022
Data Min. Knowl. Discov., 2022
"Double vaccinated, 5G boosted!": Learning Attitudes towards COVID-19 Vaccination from Social Media.
CoRR, 2022
Simplifying Node Classification on Heterophilous Graphs with Compatible Label Propagation.
CoRR, 2022
CoRR, 2022
Proceedings of the Social Informatics - 13th International Conference, 2022
The Burden of Being a Bridge: Analysing Subjective Well-Being of Twitter Users During the COVID-19 Pandemic.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
Proceedings of the 61st IEEE Conference on Decision and Control, 2022
Proceedings of the 29th Asia-Pacific Software Engineering Conference, 2022
2021
IEEE ACM Trans. Comput. Biol. Bioinform., 2021
Semantic and relational spaces in science of science: deep learning models for article vectorisation.
Scientometrics, 2021
J. Log. Comput., 2021
IACR Cryptol. ePrint Arch., 2021
The Burden of Being a Bridge: Understanding the Role of Multilingual Users during the COVID-19 Pandemic.
CoRR, 2021
Effective Link Prediction with Topological and Temporal Information using Wavelet Neural Network Embedding.
Comput. J., 2021
Bioinform., 2021
Big Data Cogn. Comput., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Formal Methods - 24th International Symposium, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
From #jobsearch to #mask: improving COVID-19 cascade prediction with spillover effects.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021
Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE ACM Trans. Comput. Biol. Bioinform., 2020
Preface for the special issue of the 12th International Symposium on Theoretical Aspects of Software Engineering (TASE 2018).
Sci. Comput. Program., 2020
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios.
IACR Cryptol. ePrint Arch., 2020
From #Jobsearch to #Mask: Improving COVID-19 Cascade Prediction with Spillover Effects.
CoRR, 2020
CoRR, 2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020
Proceedings of the 38th IEEE International Conference on Computer Design, 2020
Effects of Avatar Cuteness on Users' Perceptions of System Errors in Anthropomorphic Interfaces.
Proceedings of the HCI in Business, Government and Organizations, 2020
Proceedings of the Computational Methods in Systems Biology, 2020
Proceedings of the BCB '20: 11th ACM International Conference on Bioinformatics, 2020
2019
IEEE ACM Trans. Comput. Biol. Bioinform., 2019
IEEE ACM Trans. Comput. Biol. Bioinform., 2019
A new decomposition-based method for detecting attractors in synchronous Boolean networks.
Sci. Comput. Program., 2019
Knowl. Inf. Syst., 2019
Formal Aspects Comput., 2019
Proceedings of the Web Information Systems Engineering - WISE 2019, 2019
Proceedings of the 37th IEEE International Conference on Computer Design, 2019
Proceedings of the Formal Methods - The Next 30 Years - Third World Congress, 2019
Proceedings of the Computational Methods in Systems Biology, 2019
Proceedings of the Computational Methods in Systems Biology, 2019
2018
ACM Trans. Comput. Log., 2018
IEEE ACM Trans. Comput. Biol. Bioinform., 2018
IEEE ACM Trans. Comput. Biol. Bioinform., 2018
Learning probabilistic models for model checking: an evolutionary approach and an empirical study.
Int. J. Softw. Tools Technol. Transf., 2018
Towards the Existential Control of Boolean Networks: A Preliminary Report (Extended Abstract).
CoRR, 2018
A Decomposition-based Approach towards the Control of Boolean Networks (Technical Report).
CoRR, 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2018
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018
Proceedings of the Computational Methods in Systems Biology, 2018
Proceedings of the Computational Methods in Systems Biology, 2018
Proceedings of the 2018 ACM International Conference on Bioinformatics, 2018
2017
Finding susceptible and protective interaction patterns in large-scale genetic association study.
Frontiers Comput. Sci., 2017
Taming Asynchrony for Attractor Detection in Large Boolean Networks (Technical Report).
CoRR, 2017
Comput. Secur., 2017
Proceedings of the International Conference on Web Intelligence, 2017
A New Decomposition Method for Attractor Detection in Large Synchronous Boolean Networks.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2017
Proceedings of the Eleventh International Conference on Web and Social Media, 2017
Proceedings of the Formal Methods and Software Engineering, 2017
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 2017
Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study.
Proceedings of the Fundamental Approaches to Software Engineering, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Effect of Online Review Chunking on Product Attitude: The Moderating Role of Motivation to Think.
Int. J. Electron. Commer., 2016
Sci. China Inf. Sci., 2016
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016
An Efficient Two-Table Join Query Processing Based on Extended Bloom Filter in MapReduce.
Proceedings of the Web-Age Information Management, 2016
Proceedings of the Web-Age Information Management, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016
Proceedings of the 34th IEEE International Conference on Computer Design, 2016
Proceedings of the Complex Networks & Their Applications V - Proceedings of the 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016), Milan, Italy, November 30, 2016
Proceedings of the Computational Methods in Systems Biology, 2016
Proceedings of the Computational Methods in Systems Biology, 2016
2015
ACM J. Emerg. Technol. Comput. Syst., 2015
Parallel Approximate Steady-state Analysis of Large Probabilistic Boolean Networks (Technical Report).
CoRR, 2015
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the Engineering the Web in the Big Data Era - 15th International Conference, 2015
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the Automated Technology for Verification and Analysis, 2015
ParaVerifier: An Automatic Framework for Proving Parameterized Cache Coherence Protocols.
Proceedings of the Automated Technology for Verification and Analysis, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
Distance and Friendship: A Distance-Based Model for Link Prediction in Social Networks.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
J. Parallel Distributed Comput., 2014
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014
2013
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Frontiers Comput. Sci., 2013
Comput. Sci. Rev., 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the Network on Chip Architectures, 2013
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013
Verification of Functional and Non-functional Requirements of Web Service Composition.
Proceedings of the Formal Methods and Software Engineering, 2013
Proceedings of the Formal Techniques for Safety-Critical Systems, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Trans. Comp. Sys. Biology, 2012
J. Comput. Secur., 2012
Innov. Syst. Softw. Eng., 2012
Effects of conflicting aggregated rating on eWOM review credibility and diagnosticity: The moderating role of review valence.
Decis. Support Syst., 2012
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Inf. Process. Lett., 2011
Proceedings of the Proceedings Third International Workshop on Computational Models for Cell Processes, 2011
Proceedings of the Security Protocols XIX, 2011
Analysis of Remote Quality Inspection System for Construction Projects.
Proceedings of the ICEIS 2011, 2011
Proceedings of the FM 2011: Formal Methods, 2011
Proceedings of the Foundations of Health Informatics Engineering and Systems, 2011
Proceedings of the Sixth International Conference on Availability, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V.
J. Information Security, 2010
J. Information Security, 2010
Proceedings of the 4th International Workshop on Harnessing Theories for Tool Support in Software, 2010
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Proceedings of the Theoretical Computer Science, 2010
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010
Proceedings of the 15th IEEE International Conference on Engineering of Complex Computer Systems, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
Proceedings of the Proceedings 7th International Workshop on Security Issues in Concurrency, 2009
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009
Proceedings of the Formal Methods and Software Engineering, 2009
Fair-Priority-Expression-Based burst scheduling to enhance performance and fairness of shared dram systems.
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009
Proceedings of the Computer Aided Verification, 21st International Conference, 2009
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Frontiers Comput. Sci. China, 2008
Proceedings of the 2008 International Conference on Embedded Computer Systems: Architectures, 2008
Proceedings of the Fifth IFIP International Conference On Theoretical Computer Science, 2008
2007
J. Log. Algebraic Methods Program., 2007
Proceedings of the Fifth Workshop on Quantitative Aspects of Programming Languages, 2007
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2007
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007
Proceedings of the Formal Methods and Hybrid Real-Time Systems, 2007
Exact State Set Representations in the Verification of Linear Hybrid Systems with Large Discrete State Space.
Proceedings of the Automated Technology for Verification and Analysis, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM.
J. Univers. Comput. Sci., 2006
Formal Methods Syst. Des., 2006
Proceedings of the Trustworthy Global Computing, Second Symposium, 2006
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006
Proceedings of the Automated Technology for Verification and Analysis, 2006
2005
A Note on K-State Self-stabilization in a Ring with K=N.
Nord. J. Comput., 2005
Formal Aspects Comput., 2005
Proceedings of the International Workshop on Security and Concurrency, SecCo@CONCUR 2005, 2005
Proceedings of the Third Workshop on Quantitative Aspects of Programming Languages, 2005
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2005
Proceedings of the Processes, 2005
2004
Proceedings of the 6th AMAST Workshop on Real-Time Systems, 2004
Proceedings of the Fouth International Workshop on Automated Verification of Critical Systems, 2004
Proceedings of the 2nd International Conference on Software Engineering and Formal Methods (SEFM 2004), 2004
Towards an Integrated Architecture for Peer-to-Peer and Ad Hoc Overlay Network Applications.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004
Proceedings of the Algebraic Methodology and Software Technology, 2004
2003
J. Log. Algebraic Methods Program., 2003
Proceedings of the Formal Methods and Software Engineering, 2003
Proceedings of the Foundations of Software Science and Computational Structures, 2003
2002
Proceedings of the Formal Methods and Software Engineering, 2002
2001
J. Comput. Sci. Technol., 2001
1999
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999