Naipeng Dong
Title
Cited by
Cited by
Year
Challenges in ehealth: From enabling to enforcing privacy
N Dong, H Jonker, J Pang
International Symposium on Foundations of Health Informatics Engineering and …, 2011
462011
Analysis of a receipt-free auction protocol in the applied pi calculus
N Dong, H Jonker, J Pang
International Workshop on Formal Aspects in Security and Trust, 223-238, 2010
282010
Formal analysis of privacy in an eHealth protocol
N Dong, H Jonker, J Pang
European Symposium on Research in Computer Security, 325-342, 2012
262012
Formal analysis of a proof-of-stake blockchain
WYMM Thin, N Dong, G Bai, JS Dong
2018 23rd International Conference on Engineering of Complex Computer …, 2018
92018
Enforcing privacy in the presence of others: Notions, formalisations and relations
N Dong, H Jonker, J Pang
European Symposium on Research in Computer Security, 499-516, 2013
72013
Security analysis of unmanned aircraft systems
MD Nguyen, N Dong, A Roychoudhury
52017
A framework for formal analysis of privacy on SSO protocols
K Wang, G Bai, N Dong, JS Dong
International Conference on Security and Privacy in Communication Systems …, 2017
42017
Deep review sharing
C Guo, D Huang, N Dong, Q Ye, J Xu, Y Fan, H Yang, Y Xu
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
32019
A projection-based approach for memory leak detection
X Sun, S Xu, C Guo, J Xu, N Dong, X Ji, S Zhang
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
32018
Formal modelling and analysis of receipt-free auction protocols in applied pi
N Dong, H Jonker, J Pang
Computers & Security 65, 405-432, 2017
32017
AutoPer: Automatic recommender for runtime-permission in Android applications
H Gao, C Guo, Y Wu, N Dong, X Hou, S Xu, J Xu
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019
22019
Systematic comprehension for developer reply in mobile system forum
C Guo, W Wang, Y Wu, N Dong, Q Ye, J Xu, S Zhang
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
22019
Verification of strong Nash-equilibrium for probabilistic bar systems
D Fernando, N Dong, C Jegourel, JS Dong
International Conference on Formal Engineering Methods, 106-123, 2018
22018
App genome: callback sequencing in Android
C Guo, N Dong, G Bai, Q Ye, J Dong, J Xu, G Si
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
22017
Verification of Nash-equilibrium for probabilistic BAR systems
D Fernando, N Dong, C Jegourel, JS Dong
2016 21st International Conference on Engineering of Complex Computer …, 2016
22016
Automatic construction of callback model for Android Application
C Guo, Q Ye, N Dong, G Bai, JS Dong, J Xu
2016 21st International Conference on Engineering of Complex Computer …, 2016
22016
The foul adversary: formal models
N Dong, T Muller
International Conference on Formal Engineering Methods, 37-53, 2018
12018
Formal Analysis of an E-Health Protocol
N Dong, H Jonker, J Pang
arXiv preprint arXiv:1808.08403, 2018
12018
Formal Analysis of a PoS Blockchain
W Thin, N Dong, G Bai, JS Dong
12018
A verification framework for stateful security protocols
L Li, N Dong, J Pang, J Sun, G Bai, Y Liu, JS Dong
International Conference on Formal Engineering Methods, 262-280, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–20