default search action
Naipeng Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, Naipeng Dong, Taejun Choi, Yanjun Zhang:
Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey. IEEE Commun. Surv. Tutorials 26(2): 930-966 (2024) - [c24]Yuexi Xu, Zhenyuan Li, Naipeng Dong, Veronika Kuchta, Zhe Hou, Dongxi Liu:
Formal Verification Techniques for Post-quantum Cryptography: A Systematic Review. ICECCS 2024: 346-366 - 2023
- [j8]Fangzhen Zhao, Chenyi Zhang, Naipeng Dong, Ming Li:
Adversarial Detection from Derived Models. Int. J. Pattern Recognit. Artif. Intell. 37(15): 2350031:1-2350031:30 (2023) - [j7]Chenkai Guo, Weijie Zhang, Naipeng Dong, Zheli Liu, Yang Xiang:
QoS-Aware Diversified Service Selection. IEEE Trans. Serv. Comput. 16(3): 2085-2099 (2023) - [c23]Shu Peng, Naipeng Dong, Guangdong Bai:
Quantitative Explainable AI For Face Recognition. ICECCS 2023: 32-41 - 2022
- [j6]Fangzhen Zhao, Chenyi Zhang, Naipeng Dong, Zefeng You, Zhenxin Wu:
A Uniform Framework for Anomaly Detection in Deep Neural Networks. Neural Process. Lett. 54(4): 3467-3488 (2022) - [c22]Ao Liu, Chenkai Guo, Naipeng Dong, Yinjie Wang, Jing Xu:
DALT: Deep Activity Launching Test via Intent-Constraint Extraction. ISSRE 2022: 482-493 - 2021
- [j5]Chenkai Guo, Dengrong Huang, Naipeng Dong, Jianwen Zhang, Jing Xu:
Callback2Vec: Callback-aware hierarchical embedding for mobile application. Inf. Sci. 542: 131-155 (2021) - [c21]Abigail M. Y. Koay, Miao Xie, Ryan K. L. Ko, Charles Sterner, Taejun Choi, Naipeng Dong:
SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets. UbiSec 2021: 102-115 - [i3]Taejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang:
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. CoRR abs/2101.11866 (2021) - [i2]Fangzhen Zhao, Chenyi Zhang, Naipeng Dong, Zefeng You, Zhenxin Wu:
A Uniform Framework for Anomaly Detection in Deep Neural Networks. CoRR abs/2110.03092 (2021) - 2020
- [j4]Chenkai Guo, Hui Yang, Dengrong Huang, Jianwen Zhang, Naipeng Dong, Jing Xu, Jingwen Zhu:
Review Sharing via Deep Semi-Supervised Code Clone Detection. IEEE Access 8: 24948-24965 (2020) - [j3]Chenkai Guo, Dengrong Huang, Jianwen Zhang, Jing Xu, Guangdong Bai, Naipeng Dong:
Early prediction for mode anomaly in generative adversarial network training: An empirical study. Inf. Sci. 534: 117-138 (2020) - [j2]Naipeng Dong, Guangdong Bai, Lung-Chen Huang, Edmund Kok Heng Lim, Jin Song Dong:
A blockchain-based decentralized booking system. Knowl. Eng. Rev. 35: e17 (2020) - [c20]Taejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang:
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. TrustCom 2020: 827-835
2010 – 2019
- 2019
- [c19]Hongcan Gao, Chenkai Guo, Yanfeng Wu, Naipeng Dong, Xiaolei Hou, Sihan Xu, Jing Xu:
AutoPer: Automatic Recommender for Runtime-Permission in Android Applications. COMPSAC (1) 2019: 107-116 - [c18]Chenkai Guo, Yifan Xu, Xiaolei Hou, Naipeng Dong, Jing Xu, Quanqi Ye:
Deep Attentive Factorization Machine for App Recommendation Service. ICWS 2019: 134-138 - [c17]Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong, Haoyu Wang:
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking. ISC 2019: 299-318 - [c16]Chenkai Guo, Dengrong Huang, Naipeng Dong, Quanqi Ye, Jing Xu, Yaqing Fan, Hui Yang, Yifan Xu:
Deep Review Sharing. SANER 2019: 61-72 - [c15]Chenkai Guo, Weijing Wang, Yanfeng Wu, Naipeng Dong, Quanqi Ye, Jing Xu, Sen Zhang:
Systematic Comprehension for Developer Reply in Mobile System Forum. SANER 2019: 242-252 - 2018
- [c14]Xiaohui Sun, Sihan Xu, Chenkai Guo, Jing Xu, Naipeng Dong, Xiujuan Ji, Sen Zhang:
A Projection-Based Approach for Memory Leak Detection. COMPSAC (2) 2018: 430-435 - [c13]Wai Yan Maung Maung Thin, Naipeng Dong, Guangdong Bai, Jin Song Dong:
Formal Analysis of a Proof-of-Stake Blockchain. ICECCS 2018: 197-200 - [c12]Naipeng Dong, Tim Muller:
The Foul Adversary: Formal Models. ICFEM 2018: 37-53 - [c11]Dileepa Fernando, Naipeng Dong, Cyrille Jégourel, Jin Song Dong:
Verification of Strong Nash-equilibrium for Probabilistic BAR Systems. ICFEM 2018: 106-123 - [i1]Naipeng Dong, Hugo Jonker, Jun Pang:
Formal Analysis of an E-Health Protocol. CoRR abs/1808.08403 (2018) - 2017
- [j1]Naipeng Dong, Hugo L. Jonker, Jun Pang:
Formal modelling and analysis of receipt-free auction protocols in applied pi. Comput. Secur. 65: 405-432 (2017) - [c10]Li Li, Naipeng Dong, Jun Pang, Jun Sun, Guangdong Bai, Yang Liu, Jin Song Dong:
A Verification Framework for Stateful Security Protocols. ICFEM 2017: 262-280 - [c9]Chenkai Guo, Naipeng Dong, Guangdong Bai, Quanqi Ye, Jin Song Dong, Jing Xu, Guannan Si:
App genome: callback sequencing in Android. ICSE (Companion Volume) 2017: 149-151 - [c8]Quanqi Ye, Guangdong Bai, Naipeng Dong, Jin Song Dong:
Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols. SecureComm 2017: 469-488 - [c7]Kailong Wang, Guangdong Bai, Naipeng Dong, Jin Song Dong:
A Framework for Formal Analysis of Privacy on SSO Protocols. SecureComm 2017: 763-777 - 2016
- [c6]Dileepa Fernando, Naipeng Dong, Cyrille Jégourel, Jin Song Dong:
Verification of Nash-Equilibrium for Probabilistic BAR Systems. ICECCS 2016: 53-62 - [c5]Chenkai Guo, Quanqi Ye, Naipeng Dong, Guangdong Bai, Jin Song Dong, Jing Xu:
Automatic Construction of Callback Model for Android Application. ICECCS 2016: 231-234 - 2013
- [c4]Naipeng Dong, Hugo Jonker, Jun Pang:
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. ESORICS 2013: 499-516 - 2012
- [c3]Naipeng Dong, Hugo Jonker, Jun Pang:
Formal Analysis of Privacy in an eHealth Protocol. ESORICS 2012: 325-342 - 2011
- [c2]Naipeng Dong, Hugo Jonker, Jun Pang:
Challenges in eHealth: From Enabling to Enforcing Privacy. FHIES 2011: 195-206 - 2010
- [c1]Naipeng Dong, Hugo L. Jonker, Jun Pang:
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus. Formal Aspects in Security and Trust 2010: 223-238
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint