Follow
Naipeng Dong
Title
Cited by
Cited by
Year
Challenges in ehealth: From enabling to enforcing privacy
N Dong, H Jonker, J Pang
Foundations of Health Informatics Engineering and Systems: First …, 2012
742012
Formal analysis of a proof-of-stake blockchain
WYMM Thin, N Dong, G Bai, JS Dong
2018 23rd International Conference on Engineering of Complex Computer …, 2018
532018
Analysis of a receipt-free auction protocol in the applied pi calculus
N Dong, H Jonker, J Pang
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011
302011
Formal analysis of privacy in an eHealth protocol
N Dong, H Jonker, J Pang
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
282012
Deep review sharing
C Guo, D Huang, N Dong, Q Ye, J Xu, Y Fan, H Yang, Y Xu
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
132019
Enforcing privacy in the presence of others: Notions, formalisations and relations
N Dong, H Jonker, J Pang
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
122013
AutoPer: automatic recommender for runtime-permission in android applications
H Gao, C Guo, Y Wu, N Dong, X Hou, S Xu, J Xu
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019
102019
Verification of strong Nash-equilibrium for probabilistic BAR systems
D Fernando, N Dong, C Jegourel, JS Dong
Formal Methods and Software Engineering: 20th International Conference on …, 2018
9*2018
Deep attentive factorization machine for app recommendation service
C Guo, Y Xu, X Hou, N Dong, J Xu, Q Ye
2019 IEEE International Conference on Web Services (ICWS), 134-138, 2019
72019
Systematic comprehension for developer reply in mobile system forum
C Guo, W Wang, Y Wu, N Dong, Q Ye, J Xu, S Zhang
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
72019
A projection-based approach for memory leak detection
X Sun, S Xu, C Guo, J Xu, N Dong, X Ji, S Zhang
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
72018
A framework for formal analysis of privacy on SSO protocols
K Wang, G Bai, N Dong, JS Dong
Security and Privacy in Communication Networks: 13th International …, 2018
72018
Security analysis of unmanned aircraft systems
MD Nguyen, N Dong, A Roychoudhury
72017
Automatic construction of callback model for android application
C Guo, Q Ye, N Dong, G Bai, JS Dong, J Xu
2016 21st International Conference on Engineering of Complex Computer …, 2016
72016
Early prediction for mode anomaly in generative adversarial network training: An empirical study
C Guo, D Huang, J Zhang, J Xu, G Bai, N Dong
Information Sciences 534, 117-138, 2020
52020
Review sharing via deep semi-supervised code clone detection
C Guo, H Yang, D Huang, J Zhang, N Dong, J Xu, J Zhu
IEEE Access 8, 24948-24965, 2020
52020
Inferring implicit assumptions and correct usage of mobile payment protocols
Q Ye, G Bai, N Dong, JS Dong
Security and Privacy in Communication Networks: 13th International …, 2018
52018
A blockchain-based decentralized booking system
N Dong, G Bai, LC Huang, EKH Lim, JS Dong
The Knowledge Engineering Review 35, e17, 2020
42020
Callback2Vec: Callback-aware hierarchical embedding for mobile application
C Guo, D Huang, N Dong, J Zhang, J Xu
Information Sciences 542, 131-155, 2021
32021
Formal analysis of an e-health protocol
N Dong, H Jonker, J Pang
arXiv preprint arXiv:1808.08403, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20