Dr Guangdong Bai is an Associate Professor at School of Electrical Engineering and Computer Science, The University of Queensland, Australia. His research interests include Cyber Security, Software Engineering and Formal Methods.
He obtained his PhD degree from National University of Singapore, Singapore, and M.S. and B.S. degrees from Peking University, China.
Please visit his webpage for latest update: https://baigd.github.io/
Journal Article: GenDroid: a query-efficient black-box android adversarial attack framework
Xu, Guangquan, Shao, Hongfei, Cui, Jingyi, Bai, Hongpeng, Li, Jiliang, Bai, Guangdong, Liu, Shaoying, Meng, Weizhi and Zheng, Xi (2023). GenDroid: a query-efficient black-box android adversarial attack framework. Computers and Security, 132 103359, 103359. doi: 10.1016/j.cose.2023.103359
Conference Publication: Security checking of trigger-action-programming smart home integrations
Bu, Lei, Zhang, Qiuping, Li, Suwan, Dai, Jinglin, Bai, Guangdong, Chen, Kai and Li, Xuandong (2023). Security checking of trigger-action-programming smart home integrations. ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, Seattle, WA, United States, 17-21 July 2023. New York, United States: Association for Computing Machinery. doi: 10.1145/3597926.3598084
Conference Publication: Investigating Users’ Understanding of Privacy Policies of Virtual Personal Assistant Applications
Chen, Baiqi, Wu, Tingmin, Zhang, Yanjun, Chhetri, Mohan Baruwal and Bai, Guangdong (2023). Investigating Users’ Understanding of Privacy Policies of Virtual Personal Assistant Applications. 18th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), Melbourne Australia, Jul 10-14, 2023. New York, NY, USA: ACM. doi: 10.1145/3579856.3590335
Responsible modelling respecting privacy, data quality, and green computing
(2023–2026) ARC Discovery Projects
Quantitative analysis of Consensus Protocols
(2022) SupraOracles
User Privacy Protection for Credit Data on Mobile Devices
(2022) Zhejiang E-Commerce Bank Co Ltd
Privacy attacks and defences in cross-cyber physical domains
Doctor Philosophy
Multimodal Membership Inference: A Causal Perspective
Doctor Philosophy
Robustness Verification of Neural Network
Doctor Philosophy
Xingliang Yuan, Guangdong Bai, Cristina Alcaraz and Suryadipta Majumdar eds. (2022). Network and system security: 16th international conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, proceedings. Lecture Notes in Computer Science, Heidelberg, Germany: Springer. doi: 10.1007/978-3-031-23020-2
Preserving the privacy and cybersecurity of home energy data
Bean, Richard, Zhang, Yanjun, Ko, Ryan K. L., Mao, Xinyu and Bai, Guangdong (2023). Preserving the privacy and cybersecurity of home energy data. Emerging trends in cybersecurity applications. (pp. 323-343) edited by Kevin Daimi, Abeer Alsadoon, Cathryn Peoples and Nour El Madhoun. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-031-09640-2_14
GenDroid: a query-efficient black-box android adversarial attack framework
Xu, Guangquan, Shao, Hongfei, Cui, Jingyi, Bai, Hongpeng, Li, Jiliang, Bai, Guangdong, Liu, Shaoying, Meng, Weizhi and Zheng, Xi (2023). GenDroid: a query-efficient black-box android adversarial attack framework. Computers and Security, 132 103359, 103359. doi: 10.1016/j.cose.2023.103359
Characterizing Cryptocurrency-themed Malicious Browser Extensions
Wang, Kailong, Ling, Yuxi, Zhang, Yanjun, Yu, Zhou, Wang, Haoyu, Bai, Guangdong, Ooi, Beng Chin and Dong, Jin Song (2023). Characterizing Cryptocurrency-themed Malicious Browser Extensions. ACM SIGMETRICS Performance Evaluation Review, 51 (1), 91-92. doi: 10.1145/3606376.3593529
Feng, Xinguo, Zhang, Yanjun, Meng, Mark Huasong, Li, Yansong, Eu Joe, Chegne, Wang, Zhe and Bai, Guangdong (2023). Detecting contradictions from IoT protocol specification documents based on neural generated knowledge graph. ISA Transactions. doi: 10.1016/j.isatra.2023.04.025
A reliable vaccine tracking and monitoring system for health clinics using blockchain
Biswas, Kamanashis, Muthukkumarasamy, Vallipuram, Bai, Guangdong and Chowdhury, Mohammad Jabed Morshed (2023). A reliable vaccine tracking and monitoring system for health clinics using blockchain. Scientific Reports, 13 (1) 570. doi: 10.1038/s41598-022-26029-w
Proactive privacy-preserving learning for cross-modal retrieval
Zhang, Peng-Fei, Bai, Guangdong, Yin, Hongzhi and Huang, Zi (2023). Proactive privacy-preserving learning for cross-modal retrieval. ACM Transactions on Information Systems, 41 (2), 1-23. doi: 10.1145/3545799
Characterizing cryptocurrency-themed malicious browser extensions
Wang, Kailong, Ling, Yuxi, Zhang, Yanjun, Yu, Zhou, Wang, Haoyu, Bai, Guangdong, Ooi, Beng Chin and Dong, Jin Song (2022). Characterizing cryptocurrency-themed malicious browser extensions. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 6 (3) 43, 1-31. doi: 10.1145/3570603
Preserving privacy for distributed genome-wide analysis against identity tracing attacks
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Nepal, Surya, Grobler, Marthie, Chen, Chen and Ko, Ryan K. L. (2022). Preserving privacy for distributed genome-wide analysis against identity tracing attacks. IEEE Transactions on Dependable and Secure Computing, 20 (4), 1-17. doi: 10.1109/tdsc.2022.3186672
Adversarial robustness of deep neural networks: A survey from a formal verification perspective
Meng, Mark Huasong, Bai, Guangdong, Teo, Sin Gee, Hou, Zhe, Xiao, Yan, Lin, Yun and Dong, Jin Song (2022). Adversarial robustness of deep neural networks: A survey from a formal verification perspective. IEEE Transactions on Dependable and Secure Computing, 1-1. doi: 10.1109/tdsc.2022.3179131
Sharing runtime permission issues for developers based on similar-app review mining
Gao, Hongcan, Guo, Chenkai, Bai, Guangdong, Huang, Dengrong, He, Zhen, Wu, Yanfeng and Xu, Jing (2022). Sharing runtime permission issues for developers based on similar-app review mining. Journal of Systems and Software, 184 111118, 111118. doi: 10.1016/j.jss.2021.111118
Scrutinizing implementations of smart home integrations
Mahadewa, Kulani, Wang, Kailong, Bai, Guangdong, Shi, Ling, Liu, Yan, Dong, Jin Song and Liang, Zhenkai (2020). Scrutinizing implementations of smart home integrations. IEEE Transactions on Software Engineering, 47 (12), 1-1. doi: 10.1109/tse.2019.2960690
Dilated residual networks with multi-level attention for speaker verification
Wu, Yanfeng, Guo, Chenkai, Gao, Hongcan, Xu, Jing and Bai, Guangdong (2020). Dilated residual networks with multi-level attention for speaker verification. Neurocomputing, 412, 177-186. doi: 10.1016/j.neucom.2020.06.079
Early prediction for mode anomaly in generative adversarial network training: an empirical study
Guo, Chenkai, Huang, Dengrong, Zhang, Jianwen, Xu, Jing, Bai, Guangdong and Dong, Naipeng (2020). Early prediction for mode anomaly in generative adversarial network training: an empirical study. Information Sciences, 534, 117-138. doi: 10.1016/j.ins.2020.05.046
Differentially private collaborative coupling learning for recommender systems
Zhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue and Ko, Ryan K. L. (2020). Differentially private collaborative coupling learning for recommender systems. IEEE Intelligent Systems, 36 (1) 9130104, 1-1. doi: 10.1109/MIS.2020.3005930
A blockchain-based decentralized booking system
Dong, Naipeng, Bai, Guangdong, Huang, Lung-Chen, Lim, Edmund Kok Heng and Dong, Jin Song (2020). A blockchain-based decentralized booking system. Knowledge Engineering Review, 35 e17, e17. doi: 10.1017/s0269888920000260
Autonomous Permission Recommendation
Gao, Hongcan, Guo, Chenkai, Huang, Dengrong, Hou, Xiaolei, Wu, Yanfeng, Xu, Jing, He, Zhen and Bai, Guangdong (2020). Autonomous Permission Recommendation. IEEE Access, 8 8962006, 76580-76594. doi: 10.1109/ACCESS.2020.2967139
Smart grid metering networks: a survey on security, privacy and open research issues
Kumar, Pardeep, Lin, Yun, Bai, Guangdong, Paverd, Andrew, Dong, Jin Song and Martin, Andrew (2019). Smart grid metering networks: a survey on security, privacy and open research issues. IEEE Communications Surveys and Tutorials, 21 (3), 2886-2927. doi: 10.1109/comst.2019.2899354
Towards model checking Android applications
Bai, Guangdong, Ye, Quanqi, Wu, Yongzheng, Botha, Heila, Sun, Jun, Liu, Yang, Dong, Jin Song and Visser, Willem (2018). Towards model checking Android applications. IEEE Transactions on Software Engineering, 44 (6), 595-612. doi: 10.1109/tse.2017.2697848
Context-aware usage control for Web of Things
Bai, Guangdong, Yan, Lin, Gu, Liang, Guo, Yao and Chen, Xiangqun (2014). Context-aware usage control for Web of Things. Security and Communication Networks, 7 (12), 2696-2712. doi: 10.1002/sec.424
Security checking of trigger-action-programming smart home integrations
Bu, Lei, Zhang, Qiuping, Li, Suwan, Dai, Jinglin, Bai, Guangdong, Chen, Kai and Li, Xuandong (2023). Security checking of trigger-action-programming smart home integrations. ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, Seattle, WA, United States, 17-21 July 2023. New York, United States: Association for Computing Machinery. doi: 10.1145/3597926.3598084
Investigating Users’ Understanding of Privacy Policies of Virtual Personal Assistant Applications
Chen, Baiqi, Wu, Tingmin, Zhang, Yanjun, Chhetri, Mohan Baruwal and Bai, Guangdong (2023). Investigating Users’ Understanding of Privacy Policies of Virtual Personal Assistant Applications. 18th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), Melbourne Australia, Jul 10-14, 2023. New York, NY, USA: ACM. doi: 10.1145/3579856.3590335
Ma, Mengyao, Zhang, Yanjun, Arachchige, Pathum Chamikara Mahawaga, Zhang, Leo Yu, Chhetri, Mohan Baruwal and Bai, Guangdong (2023). LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks. 18th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), Melbourne Australia, Jul 10-14, 2023. New York, NY, USA: ACM. doi: 10.1145/3579856.3590334
Characterizing Cryptocurrency-themed Malicious Browser Extensions
Wang, Kailong, Ling, Yuxi, Zhang, Yanjun, Yu, Zhou, Wang, Haoyu, Bai, Guangdong, Ooi, Beng Chin and Dong, Jin Song (2023). Characterizing Cryptocurrency-themed Malicious Browser Extensions. New York, NY, USA: ACM. doi: 10.1145/3578338.3593529
Enhancing federated learning robustness using data-agnostic model pruning
Meng, Mark Huasong, Teo, Sin G., Bai, Guangdong, Wang, Kailong and Dong, Jin Song (2023). Enhancing federated learning robustness using data-agnostic model pruning. 27th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2023, Osaka, Japan, 25-28 May 2023. Cham, Switzerland: Springer. doi: 10.1007/978-3-031-33377-4_34
AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning
Zhang, Yanjun, Bai, Guangdong, Chamikara, Mahawaga Arachchige Pathum, Ma, Mengyao, Shen, Liyue, Wang, Jingwei, Nepal, Surya, Xue, Minhui, Wang, Long and Liu, Joseph (2023). AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning. New York, NY, USA: ACM. doi: 10.1145/3543507.3583542
Are they toeing the line? Diagnosing privacy compliance violations among browser extensions
Ling, Yuxi, Wang, Kailong, Bai, Guangdong, Wang, Haoyu and Dong, Jin Song (2023). Are they toeing the line? Diagnosing privacy compliance violations among browser extensions. ASE '22: 37th IEEE/ACM International Conference on Automated Software Engineering, Rochester MI, United States, 10-14 October 2022. New York, United States: Association for Computing Machinery. doi: 10.1145/3551349.3560436
Meng, Mark Huasong, Zhang, Qing, Xia, Guangshuai, Zheng, Yuwei, Zhang, Yanjun, Bai, Guangdong, Liu, Zhi, Teo, Sin G. and Dong, Jin Song (2023). Post-GDPR threat hunting on Android phones: dissecting OS-level safeguards of user-unresettable identifiers. Network and Distributed System Security (NDSS) Symposium 2023, San Diego, CA, United States, 27 February-3 March 2023. Reston, VA, United States: Internet Society. doi: 10.14722/ndss.2023.23176
Shen, Liyue, Zhang, Yanjun, Wang, Jingwei and Bai, Guangdong (2022). Better together: attaining the triad of Byzantine-robust federated learning via local update amplification. 38th Annual Computer Security Applications Conference, Austin, TX, United States, 5-9 December 2022. New York, United States: Association for Computing Machinery. doi: 10.1145/3564625.3564658
SATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset Generation
Wan, Liuhuo, Zhang, Yanjun, Li, Ruiqing, Ko, Ryan, Hoffman, Louw and Bai, Guangdong (2022). SATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset Generation. 18th International Conference on Advanced Data Mining and Applications (ADMA 2022), Brisbane, QLD Australia, 28–30 November 2022. Heidelberg, Germany: Springer. doi: 10.1007/978-3-031-22064-7_11
Assessing certificate validation user interfaces of WPA supplicants
Wang, Kailong, Zheng, Yuwei, Zhang, Qing, Bai, Guangdong, Qin, Mingchuang, Zhang, Donghui and Dong, Jin Song (2022). Assessing certificate validation user interfaces of WPA supplicants. ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, MOBICOM, Sydney, NSW Australia, 17 - 21 October 2022. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3495243.3517026
IDEAL: high-order-ensemble adaptation network forlearning with noisy labels
Zhang, Peng-Fei, Huang, Zi, Bai, Guangdong and Xu, Xin-Shun (2022). IDEAL: high-order-ensemble adaptation network forlearning with noisy labels. MM '22: The 30th ACM International Conference on Multimedia, Lisbon, Portugal, 10-14 October 2022. New York, United States: Association for Computing Machinery. doi: 10.1145/3503161.3548053
Machine unlearning for image retrieval : a generative scrubbing approach
Zhang, Peng-Fei, Bai, Guangdong, Huang, Zi and Xu, Xin-Shun (2022). Machine unlearning for image retrieval : a generative scrubbing approach. MM '22: The 30th ACM International Conference on Multimedia, Lisbon, Portugal, 10-14 October 2022. New York, United States: Association for Computing Machinery. doi: 10.1145/3503161.3548378
Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps
Xie, Fuman, Zhang, Yanjun, Yan, Chuan, Li, Suwan, Bu, Lei, Chen, Kai, Huang, Zi and Bai, Guangdong (2022). Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps. ASE '22: 37th IEEE/ACM International Conference on Automated Software Engineering, Rochester, MI United States, 10 - 14 October 2022. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3551349.3560416
VITAS: guided model-based VUI testing of VPA apps
Li, Suwan, Bu, Lei, Bai, Guangdong, Guo, Zhixiu, Chen, Kai and Wei, Hanlin (2022). VITAS: guided model-based VUI testing of VPA apps. ASE '22: 37th IEEE/ACM International Conference on Automated Software Engineering, Rochester, MI USA, 10-14 October 2022. New York, NY USA: Association for Computing Machinery. doi: 10.1145/3551349.3556957
Towards better generalization for neural network-based SAT solvers
Zhang, Chenhao, Zhang, Yanjun, Mao, Jeff, Chen, Weitong, Yue, Lin, Bai, Guangdong and Xu, Miao (2022). Towards better generalization for neural network-based SAT solvers. 26th Pacific-Asia Conference, PAKDD 2022, Chengdu, China, 16-19 May 2022. CHAM: Springer Science and Business Media Deutschland GmbH. doi: 10.1007/978-3-031-05936-0_16
UQ-AAS21: A comprehensive dataset of Amazon Alexa skills
Xie, Fuman, Zhang, Yanjun, Wei, Hanlin and Bai, Guangdong (2022). UQ-AAS21: A comprehensive dataset of Amazon Alexa skills. 17th International Conference on Advanced Data Mining Applications (ADMA), Online, 2-4 February, 2022. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-95405-5_12
Privacy-preserving gradient descent for distributed genome-wide analysis
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan K. L. (2021). Privacy-preserving gradient descent for distributed genome-wide analysis. ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, 4–8 October, 2021. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-88428-4_20
Identifying privacy weaknesses from multi-party trigger-action integration platforms
Mahadewa, Kulani, Zhang, Yanjun, Bai, Guangdong, Bu, Lei, Zuo, Zhiqiang, Fernando, Dileepa, Liang, Zhenkai and Dong, Jin Song (2021). Identifying privacy weaknesses from multi-party trigger-action integration platforms. ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual, Denmark, 11 - 17 July 2021. New York, NY, USA: Association for Computing Machinery. doi: 10.1145/3460319.3464838
MoScan: A model-based vulnerability scanner for web single sign-on services
Wei, Hanlin, Hassanshahi, Behnaz, Bai, Guangdong, Krishnan, Padmanabhan and Vorobyov, Kostyantyn (2021). MoScan: A model-based vulnerability scanner for web single sign-on services. 30th ACM SIGSOFT International Symposium on Software Testing and Analysis ISSTA 2021, Online, 11 - 17 July 2021. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3460319.3469081
Wang, Kailong, Zhang, Junzhe, Bai, Guangdong, Ko, Ryan and Dong, Jin Song (2021). It’s Not Just the Site, It’s the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts. WWW '21: The Web Conference 2021, Ljubljana, Slovenia, 19-23 April 2021. New York, NY United States: ACM. doi: 10.1145/3442381.3450008
An analytics framework for heuristic inference attacks against industrial control systems
Choi, Taejun, Bai, Guangdong, Ko, Ryan K. L., Dong, Naipeng, Zhang, Wenlu and Wang, Shunyao (2021). An analytics framework for heuristic inference attacks against industrial control systems. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 202, Guangzhou, China, 29 December 2020-1 January 2021. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom50675.2020.00112
A large-scale empirical study of COVID-19 themed GitHub repositories
Wang, Liu, Li, Ruiqing, Zhu, Jiaxin, Bai, Guangdong and Wang, Haoyu (2021). A large-scale empirical study of COVID-19 themed GitHub repositories. 45th Annual International IEEE-Computer-Society Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain, 12-16 July 2021. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/compsac51774.2021.00124
DeepAuto: a first step towards formal verification of deep learning systems
Lu, Yuteng, Sun, Weidi, Bai, Guangdong and Sun, Meng (2021). DeepAuto: a first step towards formal verification of deep learning systems. 33rd International Conference on Software Engineering and Knowledge Engineering (SEKE 2021), Pittsburg, PA, United States, 1 - 10 July 2021. Skokie, IL, United States: Knowledge Systems Institute Graduate School. doi: 10.18293/SEKE2021-090
Understanding the impact of COVID-19 on github developers: a preliminary study
Wang, Liu, Li, Ruiqing, Zhu, Jiaxin, Bai, Guangdong, Su, Weihang and Wang, Haoyu (2021). Understanding the impact of COVID-19 on github developers: a preliminary study. 33rd International Conference on Software Engineering and Knowledge Engineering (SEKE 2021), Pittsburg, PA, United States, 1 - 10 July 2021. Skokie, IL, United States: Knowledge Systems Institute Graduate School. doi: 10.18293/SEKE2021-132
Don't Fish in Troubled Waters! Characterizing Coronavirus-Themed Cryptocurrency Scams
Xia, Pengcheng, Wang, Haoyu, Luo, Xiapu, Wu, Lei, Zhou, Yajin, Bai, Guangdong, Xu, Guoai, Huang, Gang and Liu, Xuanzhe (2020). Don't Fish in Troubled Waters! Characterizing Coronavirus-Themed Cryptocurrency Scams. APWG Symposium on Electronic Crime Research (eCrime), Online, 16-19 November 2020. Piscataway, NJ United States: IEEE. doi: 10.1109/eCrime51433.2020.9493255
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts
Ji, Ru, He, Ningyu, Wu, Lei, Wang, Haoyu, Bai, Guangdong and Guo, Yao (2020). DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. 2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS), Singapore, 28-31 October 2020. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICECCS51672.2020.00022
Foggy: a new anonymous communication architecture based on microservices
Wei, Hanlin, Bai, Guangdong and Luo, Zongwei (2020). Foggy: a new anonymous communication architecture based on microservices. 25th International Conference on Engineering of Complex Computer Systems (ICECCS), Singapore, Singapore, 28 - 31 October 2020. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/iceccs51672.2020.00023
PrivColl: practical privacy-preserving collaborative machine learning
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan K. L. (2020). PrivColl: practical privacy-preserving collaborative machine learning. European Symposium on Research in Computer Security, Guildford, United Kingdom, 14-18 September 2020. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-58951-6_20
Meng, Mark H., Bai, Guangdong, Liu, Joseph K., Luo, Xiapu and Wang, Yu (2019). Analyzing use of high privileges on android: an empirical case study of screenshot and screen recording applications. 14th International Conference, Inscrypt 2018, Fuzhou, China, 14-17 December 2018. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-030-14234-6_19
DaPanda: detecting aggressive push notifications in android apps
Liu, Tianming, Wang, Haoyu, Li, Li, Bai, Guangdong, Guo, Yao and Xu, Guoai (2019). DaPanda: detecting aggressive push notifications in android apps. 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), San Diego, CA, United States, 10-11 November 2019. New York, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/ASE.2019.00017
LightSense: a novel side channel for zero-permission mobile user tracking
Ye, Quanqi, Zhang, Yan, Bai, Guangdong, Dong, Naipeng, Liang, Zhenkai, Dong, Jin Song and Wang, Haoyu (2019). LightSense: a novel side channel for zero-permission mobile user tracking. 22nd International Conference, ISC, New York, NY, United States, 16-18 September 2019. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-30215-3_15
A Framework for Formal Analysis of Privacy on SSO Protocols
Wang, Kailong, Bai, Guangdong, Dong, Naipeng and Dong, Jin Song (2018). A Framework for Formal Analysis of Privacy on SSO Protocols. 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Niagara Falls Canada, 22-25 October 2017. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-78813-5_41
Break the dead end of dynamic slicing: localizing data and control omission bug
Lin, Yun, Sun, Jun, Tran, Lyly, Bai, Guangdong, Wang, Haijun and Dong, Jinsong (2018). Break the dead end of dynamic slicing: localizing data and control omission bug. 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), Montpellier, France, 3-7 September 2018. New York, NY USA: Institute of Electrical and Electronics Engineers. doi: 10.1145/3238147.3238163
Formal Analysis of a Proof-of-Stake Blockchain
Thin, Wai Yan Maung Maung, Dong, Naipeng, Bai, Guangdong and Dong, Jin Song (2018). Formal Analysis of a Proof-of-Stake Blockchain. 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), Melbourne, VIC Australia, 12-14 December 2018. Piscataway, NJ United States: IEEE. doi: 10.1109/iceccs2018.2018.00031
Inferring implicit assumptions and correct usage of mobile payment protocols
Ye, Quanqi, Bai, Guangdong, Dong, Naipeng and Dong, Jin Song (2018). Inferring implicit assumptions and correct usage of mobile payment protocols. 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Niagara Falls, Canada, 22-25 October 2017. Heidelberg, Germany: Springer. doi: 10.1007/978-3-319-78813-5_24
Secure and efficient software-based attestation for industrial control devices with ARM processors
Chen, Binbin, Dong, Xinshu, Bai, Guangdong, Jauhar, Sumeet and Cheng, Yueqiang (2017). Secure and efficient software-based attestation for industrial control devices with ARM processors. 33rd Annual Computer Security Applications Conference (ACSAC), Orlando, FL, United States, 4-8 December, 2017. Washington, DC United States: I E E E Computer Society. doi: 10.1145/3134600.3134621
A verification framework for stateful security protocols
Li, Li, Dong, Naipeng, Pang, Jun, Sun, Jun, Bai, Guangdong, Liu, Yang and Dong, Jin Song (2017). A verification framework for stateful security protocols. 19th International Conference on Formal Engineering Methods (ICFEM), Xian, Peoples Republic of China, 13-17 November 2017. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-68690-5_16
App genome: callback sequencing in Android
Guo, Chenkai, Dong, Naipeng, Bai, Guangdong, Ye, Quanqi, Dong, Jinsong, Xu, Jing and Si, Guannan (2017). App genome: callback sequencing in Android. IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), Buenos Aires, Argentina, 20-28 May 2017. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/icse-c.2017.82
Automatic construction of callback model for android application
Guo, Chenkai, Ye, Quanqi, Dong, Naipeng, Bai, Guangdong, Dong, Jin Song and Xu, Jing (2016). Automatic construction of callback model for android application. 21st International Conference on Engineering of Complex Computer Systems (ICECCS), Dubai, United Arab Emirates, 6-8 November 2016. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ICECCS.2016.041
DroidVault: A Trusted Data Vault for Android Devices
Li, Xiaolei, Hu, Hong, Bai, Guangdong, Jia, Yaoqi, Liang, Zhenkai and Saxena, Prateek (2014). DroidVault: A Trusted Data Vault for Android Devices. 19th International Conference on Engineering of Complex Computer Systems (ICECCS), Tianjin, China, 4-7 August 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/iceccs.2014.13
TrustFound: Towards a formal foundation for model checking trusted computing platforms
Bai, Guangdong, Hao, Jianan, Wu, Jianliang, Liu, Yang, Liang, Zhenkai and Martin, Andrew (2014). TrustFound: Towards a formal foundation for model checking trusted computing platforms. FM: International Symposium on Formal Methods, Singapore, Singapore, 12-16 May 2014. Heidelberg, Germany: Springer. doi: 10.1007/978-3-319-06410-9_8
A Software Environment for Confining Malicious Android Applications via Resource Virtualization
Li, Xiaolei, Bai, Guangdong, Liang, Zhenkai and Yin, Heng (2013). A Software Environment for Confining Malicious Android Applications via Resource Virtualization. 18th International Conference on Engineering of Complex Computer Systems (ICECCS), Singapore, 17-19 July 2013. Piscataway, NJ United States: IEEE. doi: 10.1109/iceccs.2013.38
vTRUST: a formal modeling and verification framework for virtualization systems
Hao, Jianan, Liu, Yang, Cai, Wentong, Bai, Guangdong and Sun, Jun (2013). vTRUST: a formal modeling and verification framework for virtualization systems. 15th International Conference on Formal Engineering Methods (ICFEM), Queenstown, New Zealand, 29 October-1 November 2013. Heidelberg, Germany: Springer.
Context-aware usage control for Android
Bai, Guangdong, Gu, Liang, Feng, Tao, Guo, Yao and Chen, Xiangqun (2010). Context-aware usage control for Android. 6th International Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, Singapore, 7-9 September 2010. Heidelberg, Germany: Springer.
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan KL (2020). PrivColl: Practical Privacy-Preserving Collaborative Machine Learning.
Responsible modelling respecting privacy, data quality, and green computing
(2023–2026) ARC Discovery Projects
Quantitative analysis of Consensus Protocols
(2022) SupraOracles
User Privacy Protection for Credit Data on Mobile Devices
(2022) Zhejiang E-Commerce Bank Co Ltd
Development of quality assurance technologies for meat processing plants
(2021) Innovation Connections
Dynamic Analysis of Java-based Authentication Systems
(2020–2023) Oracle Labs
Massive static and real-time datasets for cyber security research and digital competitiveness
(2020–2023) Data 61 - University Collaboration Agreement (DUCA)
Privacy attacks and defences in cross-cyber physical domains
Doctor Philosophy — Principal Advisor
Multimodal Membership Inference: A Causal Perspective
Doctor Philosophy — Principal Advisor
Robustness Verification of Neural Network
Doctor Philosophy — Principal Advisor
Other advisors:
Auditing Privacy Policy Compliance of IoT Applications
Doctor Philosophy — Principal Advisor
IoT security analytics
Doctor Philosophy — Principal Advisor
Other advisors:
Nudge4Cyber: Framework for Designing Accessible and Effective Cyber Security Nudges
Doctor Philosophy — Principal Advisor
Unified Cyber Security Framework for Distributed Learning
Doctor Philosophy — Principal Advisor
Other advisors:
Security of Internet of Things (IoT) Integration
Doctor Philosophy — Principal Advisor
Other advisors:
Analysing Internet of Thing Applications with Big Data Technique
Doctor Philosophy — Principal Advisor
UQIDAR00265: Security Analytics of Internet of Things (IoT)
Doctor Philosophy — Principal Advisor
Automation of cyber software security targeting on software and mobile analysis
Doctor Philosophy — Principal Advisor
Security Modelling and Analysis of Internet of Things against Evolving Attacks
Doctor Philosophy — Associate Advisor
Other advisors:
Adversarial AI Attacks and Defenses in Intrusion Detection System for IoT
Doctor Philosophy — Associate Advisor
Other advisors:
AI based intrusion detection and response system
Doctor Philosophy — Associate Advisor
Other advisors:
Automated Penetration Testing using Advanced AI Techniques
Doctor Philosophy — Associate Advisor
Other advisors:
Security Analysis of Web Applications
Doctor Philosophy — Associate Advisor
Other advisors:
A comprehensive framework for automated cybersecurity assessment, mitigation, and education using graphical security models
Doctor Philosophy — Associate Advisor
Other advisors:
Adaptive, secure and resilient programmable logic controllers (PLCs) and data transfer protocols
Doctor Philosophy — Associate Advisor
Other advisors:
A Distributed Data Collection Infrastructure For Automating Industrial Control Systems Security
Doctor Philosophy — Associate Advisor
Other advisors:
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Doctor Philosophy — Associate Advisor
Other advisors:
Secure, Accountable and Provenance-Centric File System
Doctor Philosophy — Associate Advisor
Other advisors:
Privacy-preserving Sharing for Genome-wide Analysis
(2021) Doctor Philosophy — Associate Advisor
Other advisors: