Dr Guangdong Bai is a Senior Lecturer at School of Information Technology and Electrical Engineering, The University of Queensland, Australia. His research interests include Cyber Security, Software Engineering and Formal Methods.
He obtained his PhD degree from National University of Singapore, Singapore, and M.S. and B.S. degrees from Peking University, China.
Please visit his webpage for more details: https://baigd.github.io/
Conference Publication: Towards better generalization for neural network-based SAT solvers
Zhang, Chenhao, Zhang, Yanjun, Mao, Jeff, Chen, Weitong, Yue, Lin, Bai, Guangdong and Xu, Miao (2022). Towards better generalization for neural network-based SAT solvers. 26th Pacific-Asia Conference, PAKDD 2022, Chengdu, China, 16-19 May 2022. Springer Science and Business Media Deutschland GmbH. doi: 10.1007/978-3-031-05936-0_16
Journal Article: Adversarial robustness of deep neural networks: A survey from a formal verification perspective
Meng, Mark Huasong, Bai, Guangdong, Teo, Sin Gee, Hou, Zhe, Xiao, Yan, Lin, Yun and Dong, Jin Song (2022). Adversarial robustness of deep neural networks: A survey from a formal verification perspective. IEEE Transactions on Dependable and Secure Computing, 1-1. doi: 10.1109/tdsc.2022.3179131
Journal Article: Sharing runtime permission issues for developers based on similar-app review mining
Gao, Hongcan, Guo, Chenkai, Bai, Guangdong, Huang, Dengrong, He, Zhen, Wu, Yanfeng and Xu, Jing (2022). Sharing runtime permission issues for developers based on similar-app review mining. Journal of Systems and Software, 184 111118, 111118. doi: 10.1016/j.jss.2021.111118
Quantitative analysis of Consensus Protocols
(2022) SupraOracles
User Privacy Protection for Credit Data on Mobile Devices
(2022) Zhejiang E-Commerce Bank Co Ltd
Development of quality assurance technologies for meat processing plants
(2021) Innovation Connections
Progressing Neural Network Interpretability for Safety-critical System Applications
Doctor Philosophy
IoT security analytics
Doctor Philosophy
Nudge4Cyber: Framework for Designing Accessible and Effective Cyber Security Nudges
Doctor Philosophy
Adversarial robustness of deep neural networks: A survey from a formal verification perspective
Meng, Mark Huasong, Bai, Guangdong, Teo, Sin Gee, Hou, Zhe, Xiao, Yan, Lin, Yun and Dong, Jin Song (2022). Adversarial robustness of deep neural networks: A survey from a formal verification perspective. IEEE Transactions on Dependable and Secure Computing, 1-1. doi: 10.1109/tdsc.2022.3179131
Sharing runtime permission issues for developers based on similar-app review mining
Gao, Hongcan, Guo, Chenkai, Bai, Guangdong, Huang, Dengrong, He, Zhen, Wu, Yanfeng and Xu, Jing (2022). Sharing runtime permission issues for developers based on similar-app review mining. Journal of Systems and Software, 184 111118, 111118. doi: 10.1016/j.jss.2021.111118
Scrutinizing implementations of smart home integrations
Mahadewa, Kulani, Wang, Kailong, Bai, Guangdong, Shi, Ling, Liu, Yan, Dong, Jin Song and Liang, Zhenkai (2020). Scrutinizing implementations of smart home integrations. IEEE Transactions on Software Engineering, 47 (12), 1-1. doi: 10.1109/tse.2019.2960690
Dilated residual networks with multi-level attention for speaker verification
Wu, Yanfeng, Guo, Chenkai, Gao, Hongcan, Xu, Jing and Bai, Guangdong (2020). Dilated residual networks with multi-level attention for speaker verification. Neurocomputing, 412, 177-186. doi: 10.1016/j.neucom.2020.06.079
Early prediction for mode anomaly in generative adversarial network training: an empirical study
Guo, Chenkai, Huang, Dengrong, Zhang, Jianwen, Xu, Jing, Bai, Guangdong and Dong, Naipeng (2020). Early prediction for mode anomaly in generative adversarial network training: an empirical study. Information Sciences, 534, 117-138. doi: 10.1016/j.ins.2020.05.046
Differentially private collaborative coupling learning for recommender systems
Zhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue and Ko, Ryan K. L. (2020). Differentially private collaborative coupling learning for recommender systems. IEEE Intelligent Systems, 36 (1) 9130104, 1-1. doi: 10.1109/MIS.2020.3005930
A blockchain-based decentralized booking system
Dong, Naipeng, Bai, Guangdong, Huang, Lung-Chen, Lim, Edmund Kok Heng and Dong, Jin Song (2020). A blockchain-based decentralized booking system. Knowledge Engineering Review, 35 e17, e17. doi: 10.1017/s0269888920000260
Autonomous Permission Recommendation
Gao, Hongcan, Guo, Chenkai, Huang, Dengrong, Hou, Xiaolei, Wu, Yanfeng, Xu, Jing, He, Zhen and Bai, Guangdong (2020). Autonomous Permission Recommendation. IEEE Access, 8 8962006, 76580-76594. doi: 10.1109/ACCESS.2020.2967139
Smart grid metering networks: a survey on security, privacy and open research issues
Kumar, Pardeep, Lin, Yun, Bai, Guangdong, Paverd, Andrew, Dong, Jin Song and Martin, Andrew (2019). Smart grid metering networks: a survey on security, privacy and open research issues. IEEE Communications Surveys and Tutorials, 21 (3), 2886-2927. doi: 10.1109/comst.2019.2899354
Towards model checking Android applications
Bai, Guangdong, Ye, Quanqi, Wu, Yongzheng, Botha, Heila, Sun, Jun, Liu, Yang, Dong, Jin Song and Visser, Willem (2018). Towards model checking Android applications. IEEE Transactions on Software Engineering, 44 (6), 595-612. doi: 10.1109/tse.2017.2697848
Context-aware usage control for Web of Things
Bai, Guangdong, Yan, Lin, Gu, Liang, Guo, Yao and Chen, Xiangqun (2014). Context-aware usage control for Web of Things. Security and Communication Networks, 7 (12), 2696-2712. doi: 10.1002/sec.424
Towards better generalization for neural network-based SAT solvers
Zhang, Chenhao, Zhang, Yanjun, Mao, Jeff, Chen, Weitong, Yue, Lin, Bai, Guangdong and Xu, Miao (2022). Towards better generalization for neural network-based SAT solvers. 26th Pacific-Asia Conference, PAKDD 2022, Chengdu, China, 16-19 May 2022. Springer Science and Business Media Deutschland GmbH. doi: 10.1007/978-3-031-05936-0_16
UQ-AAS21: A comprehensive dataset of Amazon Alexa skills
Xie, Fuman, Zhang, Yanjun, Wei, Hanlin and Bai, Guangdong (2022). UQ-AAS21: A comprehensive dataset of Amazon Alexa skills. 17th International Conference on Advanced Data Mining Applications (ADMA), Online, 2-4 February, 2022. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-95405-5_12
Privacy-preserving gradient descent for distributed genome-wide analysis
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan K. L. (2021). Privacy-preserving gradient descent for distributed genome-wide analysis. ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, 4–8 October, 2021. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-88428-4_20
Identifying privacy weaknesses from multi-party trigger-action integration platforms
Mahadewa, Kulani, Zhang, Yanjun, Bai, Guangdong, Bu, Lei, Zuo, Zhiqiang, Fernando, Dileepa, Liang, Zhenkai and Dong, Jin Song (2021). Identifying privacy weaknesses from multi-party trigger-action integration platforms. ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual, Denmark, 11 - 17 July 2021. New York, NY, USA: Association for Computing Machinery. doi: 10.1145/3460319.3464838
MoScan: A model-based vulnerability scanner for web single sign-on services
Wei, Hanlin, Hassanshahi, Behnaz, Bai, Guangdong, Krishnan, Padmanabhan and Vorobyov, Kostyantyn (2021). MoScan: A model-based vulnerability scanner for web single sign-on services. 30th ACM SIGSOFT International Symposium on Software Testing and Analysis ISSTA 2021, Online, 11 - 17 July 2021. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3460319.3469081
Wang, Kailong, Zhang, Junzhe, Bai, Guangdong, Ko, Ryan and Dong, Jin Song (2021). It’s Not Just the Site, It’s the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts. WWW '21: The Web Conference 2021, Ljubljana, Slovenia, 19-23 April 2021. New York, NY United States: ACM. doi: 10.1145/3442381.3450008
An analytics framework for heuristic inference attacks against industrial control systems
Choi, Taejun, Bai, Guangdong, Ko, Ryan K. L., Dong, Naipeng, Zhang, Wenlu and Wang, Shunyao (2021). An analytics framework for heuristic inference attacks against industrial control systems. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 202, Guangzhou, China, 29 December 2020-1 January 2021. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom50675.2020.00112
A large-scale empirical study of COVID-19 themed GitHub repositories
Wang, Liu, Li, Ruiqing, Zhu, Jiaxin, Bai, Guangdong and Wang, Haoyu (2021). A large-scale empirical study of COVID-19 themed GitHub repositories. 45th Annual International IEEE-Computer-Society Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain, 12-16 July 2021. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/compsac51774.2021.00124
DeepAuto: a first step towards formal verification of deep learning systems
Lu, Yuteng, Sun, Weidi, Bai, Guangdong and Sun, Meng (2021). DeepAuto: a first step towards formal verification of deep learning systems. 33rd International Conference on Software Engineering and Knowledge Engineering (SEKE 2021), Pittsburg, PA, United States, 1 - 10 July 2021. Skokie, IL, United States: Knowledge Systems Institute Graduate School. doi: 10.18293/SEKE2021-090
Understanding the impact of COVID-19 on github developers: a preliminary study
Wang, Liu, Li, Ruiqing, Zhu, Jiaxin, Bai, Guangdong, Su, Weihang and Wang, Haoyu (2021). Understanding the impact of COVID-19 on github developers: a preliminary study. 33rd International Conference on Software Engineering and Knowledge Engineering (SEKE 2021), Pittsburg, PA, United States, 1 - 10 July 2021. Skokie, IL, United States: Knowledge Systems Institute Graduate School. doi: 10.18293/SEKE2021-132
Don't Fish in Troubled Waters! Characterizing Coronavirus-Themed Cryptocurrency Scams
Xia, Pengcheng, Wang, Haoyu, Luo, Xiapu, Wu, Lei, Zhou, Yajin, Bai, Guangdong, Xu, Guoai, Huang, Gang and Liu, Xuanzhe (2020). Don't Fish in Troubled Waters! Characterizing Coronavirus-Themed Cryptocurrency Scams. APWG Symposium on Electronic Crime Research (eCrime), Online, 16-19 November 2020. Piscataway, NJ United States: IEEE. doi: 10.1109/eCrime51433.2020.9493255
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts
Ji, Ru, He, Ningyu, Wu, Lei, Wang, Haoyu, Bai, Guangdong and Guo, Yao (2020). DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. 2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS), Singapore, 28-31 October 2020. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICECCS51672.2020.00022
Foggy: a new anonymous communication architecture based on microservices
Wei, Hanlin, Bai, Guangdong and Luo, Zongwei (2020). Foggy: a new anonymous communication architecture based on microservices. 25th International Conference on Engineering of Complex Computer Systems (ICECCS), Singapore, Singapore, 28 - 31 October 2020. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/iceccs51672.2020.00023
PrivColl: practical privacy-preserving collaborative machine learning
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan K. L. (2020). PrivColl: practical privacy-preserving collaborative machine learning. European Symposium on Research in Computer Security, Guildford, United Kingdom, 14-18 September 2020. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-58951-6_20
Meng, Mark H., Bai, Guangdong, Liu, Joseph K., Luo, Xiapu and Wang, Yu (2019). Analyzing use of high privileges on android: an empirical case study of screenshot and screen recording applications. 14th International Conference, Inscrypt 2018, Fuzhou, China, 14-17 December 2018. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-030-14234-6_19
DaPanda: detecting aggressive push notifications in android apps
Liu, Tianming, Wang, Haoyu, Li, Li, Bai, Guangdong, Guo, Yao and Xu, Guoai (2019). DaPanda: detecting aggressive push notifications in android apps. 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), San Diego, CA, United States, 10-11 November 2019. New York, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/ASE.2019.00017
LightSense: a novel side channel for zero-permission mobile user tracking
Ye, Quanqi, Zhang, Yan, Bai, Guangdong, Dong, Naipeng, Liang, Zhenkai, Dong, Jin Song and Wang, Haoyu (2019). LightSense: a novel side channel for zero-permission mobile user tracking. 22nd International Conference, ISC, New York, NY, United States, 16-18 September 2019. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-30215-3_15
A Framework for Formal Analysis of Privacy on SSO Protocols
Wang, Kailong, Bai, Guangdong, Dong, Naipeng and Dong, Jin Song (2018). A Framework for Formal Analysis of Privacy on SSO Protocols. 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Niagara Falls Canada, 22-25 October 2017. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-78813-5_41
Break the dead end of dynamic slicing: localizing data and control omission bug
Lin, Yun, Sun, Jun, Tran, Lyly, Bai, Guangdong, Wang, Haijun and Dong, Jinsong (2018). Break the dead end of dynamic slicing: localizing data and control omission bug. 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), Montpellier, France, 3-7 September 2018. New York, NY USA: Institute of Electrical and Electronics Engineers. doi: 10.1145/3238147.3238163
Formal Analysis of a Proof-of-Stake Blockchain
Thin, Wai Yan Maung Maung, Dong, Naipeng, Bai, Guangdong and Dong, Jin Song (2018). Formal Analysis of a Proof-of-Stake Blockchain. 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), Melbourne, VIC Australia, 12-14 December 2018. Piscataway, NJ United States: IEEE. doi: 10.1109/iceccs2018.2018.00031
Inferring implicit assumptions and correct usage of mobile payment protocols
Ye, Quanqi, Bai, Guangdong, Dong, Naipeng and Dong, Jin Song (2018). Inferring implicit assumptions and correct usage of mobile payment protocols. 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Niagara Falls, Canada, 22-25 October 2017. Heidelberg, Germany: Springer. doi: 10.1007/978-3-319-78813-5_24
Secure and efficient software-based attestation for industrial control devices with ARM processors
Chen, Binbin, Dong, Xinshu, Bai, Guangdong, Jauhar, Sumeet and Cheng, Yueqiang (2017). Secure and efficient software-based attestation for industrial control devices with ARM processors. 33rd Annual Computer Security Applications Conference (ACSAC), Orlando, FL, United States, 4-8 December, 2017. Washington, DC United States: I E E E Computer Society. doi: 10.1145/3134600.3134621
A verification framework for stateful security protocols
Li, Li, Dong, Naipeng, Pang, Jun, Sun, Jun, Bai, Guangdong, Liu, Yang and Dong, Jin Song (2017). A verification framework for stateful security protocols. 19th International Conference on Formal Engineering Methods (ICFEM), Xian, Peoples Republic of China, 13-17 November 2017. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-68690-5_16
App genome: callback sequencing in Android
Guo, Chenkai, Dong, Naipeng, Bai, Guangdong, Ye, Quanqi, Dong, Jinsong, Xu, Jing and Si, Guannan (2017). App genome: callback sequencing in Android. IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), Buenos Aires, Argentina, 20-28 May 2017. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/icse-c.2017.82
Automatic construction of callback model for android application
Guo, Chenkai, Ye, Quanqi, Dong, Naipeng, Bai, Guangdong, Dong, Jin Song and Xu, Jing (2016). Automatic construction of callback model for android application. 21st International Conference on Engineering of Complex Computer Systems (ICECCS), Dubai, United Arab Emirates, 6-8 November 2016. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ICECCS.2016.041
DroidVault: A Trusted Data Vault for Android Devices
Li, Xiaolei, Hu, Hong, Bai, Guangdong, Jia, Yaoqi, Liang, Zhenkai and Saxena, Prateek (2014). DroidVault: A Trusted Data Vault for Android Devices. 19th International Conference on Engineering of Complex Computer Systems (ICECCS), Tianjin, China, 4-7 August 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/iceccs.2014.13
TrustFound: Towards a formal foundation for model checking trusted computing platforms
Bai, Guangdong, Hao, Jianan, Wu, Jianliang, Liu, Yang, Liang, Zhenkai and Martin, Andrew (2014). TrustFound: Towards a formal foundation for model checking trusted computing platforms. FM: International Symposium on Formal Methods, Singapore, Singapore, 12-16 May 2014. Heidelberg, Germany: Springer. doi: 10.1007/978-3-319-06410-9_8
A Software Environment for Confining Malicious Android Applications via Resource Virtualization
Li, Xiaolei, Bai, Guangdong, Liang, Zhenkai and Yin, Heng (2013). A Software Environment for Confining Malicious Android Applications via Resource Virtualization. 18th International Conference on Engineering of Complex Computer Systems (ICECCS), Singapore, 17-19 July 2013. Piscataway, NJ United States: IEEE. doi: 10.1109/iceccs.2013.38
vTRUST: a formal modeling and verification framework for virtualization systems
Hao, Jianan, Liu, Yang, Cai, Wentong, Bai, Guangdong and Sun, Jun (2013). vTRUST: a formal modeling and verification framework for virtualization systems. 15th International Conference on Formal Engineering Methods (ICFEM), Queenstown, New Zealand, 29 October-1 November 2013. Heidelberg, Germany: Springer.
Context-aware usage control for Android
Bai, Guangdong, Gu, Liang, Feng, Tao, Guo, Yao and Chen, Xiangqun (2010). Context-aware usage control for Android. 6th International Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, Singapore, 7-9 September 2010. Heidelberg, Germany: Springer.
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan KL (2020). PrivColl: Practical Privacy-Preserving Collaborative Machine Learning.
Quantitative analysis of Consensus Protocols
(2022) SupraOracles
User Privacy Protection for Credit Data on Mobile Devices
(2022) Zhejiang E-Commerce Bank Co Ltd
Development of quality assurance technologies for meat processing plants
(2021) Innovation Connections
Dynamic Analysis of Java-based Authentication Systems
(2020–2023) Oracle Labs
Massive static and real-time datasets for cyber security research and digital competitiveness
(2020–2022) Data 61 - University Collaboration Agreement (DUCA)
Progressing Neural Network Interpretability for Safety-critical System Applications
Doctor Philosophy — Principal Advisor
Other advisors:
IoT security analytics
Doctor Philosophy — Principal Advisor
Other advisors:
Nudge4Cyber: Framework for Designing Accessible and Effective Cyber Security Nudges
Doctor Philosophy — Principal Advisor
Unified Cyber Security Framework for Distributed Learning
Doctor Philosophy — Principal Advisor
Other advisors:
Security of Internet of Things (IoT) Integration
Doctor Philosophy — Principal Advisor
Other advisors:
Analysing Internet of Thing Applications with Big Data Technique
Doctor Philosophy — Principal Advisor
UQIDAR00265: Security Analytics of Internet of Things (IoT)
Doctor Philosophy — Principal Advisor
Automation of cyber software security targeting on software and mobile analysis
Doctor Philosophy — Principal Advisor
Design and evaluation of highly efficient traffic analysis attack model
Doctor Philosophy — Principal Advisor
Other advisors:
A comprehensive framework for automated cybersecurity assessment, mitigation, and education using graphical security models
Doctor Philosophy — Associate Advisor
Other advisors:
Adversarial AI Attacks and Defenses in Intrusion Detection System for IoT
Doctor Philosophy — Associate Advisor
Other advisors:
Adaptive, secure and resilient programmable logic controllers (PLCs) and data transfer protocols
Doctor Philosophy — Associate Advisor
Other advisors:
A Distributed Data Collection Infrastructure For Automating Industrial Control Systems Security
Doctor Philosophy — Associate Advisor
Other advisors:
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Doctor Philosophy — Associate Advisor
Other advisors:
Novel data access methods for Internet of Things devices
Doctor Philosophy — Associate Advisor
Other advisors:
Secure, Accountable and Provenance-Centric File System
Doctor Philosophy — Associate Advisor
Other advisors:
Privacy-preserving Sharing for Genome-wide Analysis
(2021) Doctor Philosophy — Associate Advisor
Other advisors: