Jun Pang
Title
Cited by
Cited by
Year
PAT: Towards flexible verification under fairness
J Sun, Y Liu, J Dong, J Pang
21st International Conference on Computer Aided Verification, 709-714, 2009
3652009
Metrics for action-labelled quantitative transition systems
Y Deng, T Chothia, C Palamidessi, J Pang
Electronic Notes in Theoretical Computer Science 153 (2), 79-96, 2006
842006
Recent development and biomedical applications of probabilistic Boolean networks
P Trairatphisan, A Mizera, J Pang, AA Tantar, J Schneider, T Sauter
Cell communication and signaling 11 (1), 46, 2013
782013
Measuring anonymity with relative entropy
Y Deng, J Pang, P Wu
Proceedings of 4th Workshop on Formal Aspects in Security and Trust (FAST'06 …, 2007
752007
A new access control scheme for Facebook-style social networks
J Pang, Y Zhang
Computers & Security 54, 44-59, 2015
632015
Analysis of a Distributed System for Lifting Trucks
JF Groote, J Pang, AG Wouters
Journal of Logic and Algebraic Programming 55 (1-2), 21-56, 2003
632003
walk2friends: Inferring social links from mobility profiles
M Backes, M Humbert, J Pang, Y Zhang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
572017
Privacy and verifiability in voting systems: Methods, developments and trends
H Jonker, S Mauw, J Pang
Computer Science Review 10, 1-30, 2013
502013
Constructing and Comparing User Mobility Profiles for Location-based Services
X Chen, J Pang, R Xue
28th ACM Symposium on Applied Computing, 2013
492013
Verification of a sliding window protocol in μCRL and PVS
B Badban, W Fokkink, JF Groote, J Pang, J van de Pol
Formal Aspects of Computing 17 (3), 342-388, 2005
492005
Exact state set representations in the verification of linear hybrid systems with large discrete state space
W Damm, S Disch, H Hungar, S Jacobs, J Pang, F Pigorsch, C Scholl, ...
International Symposium on Automated Technology for Verification and …, 2007
482007
Cones and foci: A mechanical framework for protocol verification
W Fokkink, J Pang, J Van De Pol
Formal Methods in System Design 29 (1), 1-31, 2006
47*2006
Challenges in ehealth: From enabling to enforcing privacy
N Dong, H Jonker, J Pang
International Symposium on Foundations of Health Informatics Engineering and …, 2011
462011
Model checking a cache coherence protocol of a Java DSM implementation
J Pang, W Fokkink, R Hofman, R Veldema
The Journal of Logic and Algebraic Programming 71 (1), 1-43, 2007
46*2007
Verifying a sliding window protocol in μCRL
W Fokkink, JF Groote, J Pang, B Badban, J van de Pol
Proc. 10th Conference on Algebraic Methodology and Software Technology …, 2004
462004
A framework for automatically checking anonymity with μCRL
T Chothia, S Orzan, J Pang, MT Dashti
Proc. 2nd Symposium on Trustworthy Global Computing (TGC'06), 301-318, 2007
452007
Compositional reasoning for probabilistic finite-state behaviors
Y Deng, C Palamidessi, J Pang
Processes, Terms and Cycles: Steps on the Road to Infinity: Essays Dedicated …, 2005
452005
Constructing and comparing user mobility profiles
X Chen, J Pang, R Xue
ACM Transactions on the Web (TWEB) 8 (4), 1-25, 2014
422014
Measuring query privacy in location-based services
X Chen, J Pang
Proceedings of the second ACM conference on Data and Application Security …, 2012
422012
Weak probabilistic anonymity
Y Deng, C Palamidessi, J Pang
Electronic Notes in Theoretical Computer Science 180 (1), 55-76, 2007
422007
The system can't perform the operation now. Try again later.
Articles 1–20