%%%%%%%%%%%%%%%%%%%%%% Jun Pang's bibliography

%%%%%%%%%%%%%%%%%%%%%% PhD thesis
@PHDThesis{Pan04,
  author    = {J. Pang},
  title     = {Formal Verification of Distributed Systems},
  school    = {Vrije Universiteit Amsterdam},
  year      = {2004},
}

%%%%%%%%%%%%%%%%%%%%%% Book Chapters
@InProceedings{DMOOP+07,
  author    = {W. Damm and A. Mikschl and J. Oehlerking and E.-R. Olderog and J. Pang and A. Platzer and M. Segelken and B. Wirtz},
  title     = {Automating verification of cooperation, control, and design in traffic applications},
  booktitle = {Formal Methods and Hybrid Real-Time Systems,
               Essays Dedicated to Dines Bj{\o}rner and Zhou Chaochen on the Occasion of Their 70th Birthdays},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2007},
  volume    = {4700},
  pages     = {115-169},
}

@InProceedings{DPP05,
  author    = {Y. Deng and C. Palamidessi and J. Pang},
  title     = {Compositional reasoning for probabilistic finite-state behaviors},
  booktitle = {Processes, Terms and Cycles: Steps on the Road to Infinity:
               Essays Dedicated to Jan Willem Klop on the Occasion of His 60th Birthday},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2005},
  volume    = {3838},
  pages     = {309-337},
}

%%%%%%%%%%%%%%%%%%%%%% International Journals
@Article{SP20c,
  author    = {C. Su and J. Pang},
  title     = {{CABEAN}: A software for the control of asynchronous {B}oolean networks},
  journal = {Bioinformatics},
  year      = {2020},
  volume    = {},
  number    = {},
  pages     = {},
}

@Article{MPL20a,
  author    = {X. Mo and J. Pang and Z. Liu},
  title     = {{THS-GWNN}: {A} deep learning framework for temporal network link prediction},
  journal = {Frontiers of Computer Science},
  year      = {2020},
  volume    = {},
  number    = {},
  pages     = {},
}

@Article{MPL20,
  author    = {X. Mo and J. Pang and Z. Liu},
  title     = {Effective link prediction with topological and temporal information using wavelet neural network embedding},
  journal = {The Computer Journal},
  year      = {2020},
  volume    = {},
  number    = {},
  pages     = {},
}

@Article{PSPM19,
  author    = {S. Paul and C. Su and J. Pang and A. Mizera},
  title     = {An efficient approach towards the source-target control of {B}oolean networks},
  journal = {IEEE/ACM Transactions on Computational Biology and Bioinformatics},
  year      = {2020},
  volume    = {},
  number    = {},
  pages     = {},
}

@Article{SPP19,
  author    = {C. Su and J. Pang and S. Paul},
  title     = {Towards the optimal decomposition of {B}oolean networks},
  journal = {IEEE/ACM Transactions on Computational Biology and Bioinformatics},
  year      = {2020},
  volume    = {},
  number    = {},
  pages     = {},
}

@Article{MSPP19,
  author    = {H. Mandon and C. Su and J. Pang and S. Paul and S. Haar and L. Paulev\'e},
  title     = {Algorithms for the sequential reprogramming of {B}oolean networks},
  journal = {IEEE/ACM Transactions on Computational Biology and Bioinformatics},
  year      = {2019},
  volume    = {16},
  number    = {5},
  pages     = {1610-1619},
}

@Article{BPSP19,
  author    = {A. Baudin and S. Paul and C. Su and J. Pang},
  title     = {Controlling Large {B}oolean Networks with Single-Step Perturbations},
  journal = {Bioinformatics},
  year      = {2019},
  volume    = {35},
  number    = {14},
  pages     = {i558-i567},
}

@Article{YMPQ19b,
  author    = {Q. Yuan and A. Mizera and J. Pang and H. Qu},
  title     = {A new decomposition-based method for detecting attractors in synchronous {B}oolean networks},
  journal = {Science of Computer Programming},
  year      = {2019},
  volume    = {180},
  pages     = {18-35},
}

@Article{CLCP19,
  author    = {B.-H. Chen and C.-T. Li and K.-T. Chuang and J. Pang and Y. Zhang},
  title     = {An active learning-based approach for location-aware acquaintance inference},
  journal = {Knowledge and Information Systems},
  year      = {2019},
  volume    = {59},
  number    = {3},
  pages     = {539-569},
}

@Article{MPY18,
  author    = {A. Mizera and J. Pang and Q, Yuan},
  title     = {{GPU}-accelerated steady-state computation of large probabilistic {B}oolean networks},
  journal   = {Formal Aspects of Computing},
  year      = {2019},
  volume    = {31},
  number    = {1},
  pages     = {27-46},
}

@Article{MPQY19,
  author    = {A. Mizera and J. Pang and H. Qu and Q. Yuan},
  title     = {Taming asynchrony for attractor detection in large {B}oolean networks},
  journal = {IEEE/ACM Transactions on Computational Biology and Bioinformatics},
  year      = {2019},
  volume    = {16},
  number    = {1},
  pages     = {31-42},
}

@Article{LDJP18,
  author    = {Y. Li and K. Duan and D. Jansen and J. Pang and L. Zhang and Y. Lv and S. Cai},
  title     = {An automatic proving approach to parameterized verification},
  journal = {ACM Transactions on Computational Logic},
  year      = {2018},
  volume    = {19},
  number    = {4},
  pages     = {1-27},
}

@Article{MPY18,
  author    = {A. Mizera and J. Pang and Q. Yuan},
  title     = {Reviving the two-state {M}arkov chain approach},
  journal = {IEEE/ACM Transactions on Computational Biology and Bioinformatics},
  year      = {2018},
  volume    = {15},
  number    = {5},
  pages     = {1525-1537},
}

@Article{WSYP18,
  author    = {J. Wang and J. Sun and Q. Yuan and J. Pang},
  title     = {Probabilistic model learning for model checking: An empirical study and a new approach},
  journal = {International Journal on Software Tools for Technology Transfer},
  year      = {2018},
  volume    = {20},
  number    = {6},
  pages     = {689-704},
}

@Article{MPSY18,
  author    = {A. Mizera and J. Pang and C. Su and Q. Yuan},
  title     = {{ASSA-PBN: A toolbox for probabilistic Boolean networks}},
  journal = {IEEE/ACM Transactions on Computational Biology and Bioinformatics},
  year      = {2018},
  volume    = {15},
  number    = {4},
  pages     = {1203-1216},
}

@Article{DJP17,
  author    = {N. Dong and H. L. Jonker and J. Pang},
  title     = {Formal modelling and analysis of receipt-free auction protocols in applied pi},
  journal   = {Computers \& Security},
  year      = {2017},
  volume    = {65},
  number    = {},
  pages     = {405-432},
}

@Article{YQPM16,
  author    = {Q. Yuan and H. Qu and J. Pang and A. Mizera},
  title     = {Improving {BDD}-based attractor detection for synchronous {B}oolean networks},
  journal = {SCIENCE CHINA Information Sciences},
  year      = {2016},
  volume    = {59},
  number    = {8},
  pages     = {080101:1-080101:16},
}

@Article{PZ15,
  author    = {J. Pang and Y. Zhang},
  title     = {A new access control scheme for {F}acebook-style social networks},
  journal   = {Computers \& Security},
  year      = {2015},
  volume    = {54},
  number    = {},
  pages     = {44-59},
}

@Article{LP15,
  author    = {Y. Li and J. Pang},
  title     = {Formalizing provable anonymity in {Isabelle/HOL}},
  journal   = {Formal Aspects of Computing},
  year      = {2015},
  volume    = {27},
  number    = {2},
  pages     = {255-282},
}

@Article{CPX14,
  author    = {X. Chen and J. Pang and R. Xue},
  title     = {Constructing and comparing user mobility profiles},
  journal   = {ACM Transactions on the Web},
  year      = {2014},
  volume    = {8},
  number    = {4},
  pages     = {article 21},
}

@Article{TMPTS14,
  author    = {P. Trairatphisan and A. Mizera and J. Pang and A.-A. Tantar and T. Sauter},
  title     = {{optPBN}: an optimisation toolbox for probabilistic {B}oolean networks},
  journal   = {PLOS ONE},
  year      = {2014},
  volume    = {9},
  number    = {7},
  pages     = {e98001},
}

@Article{CP14,
  author    = {X. Chen and J. Pang},
  title     = {Protecting query privacy in location-based services},
  journal   = {GeoInformatica},
  year      = {2014},
  volume    = {18},
  number    = {1},
  pages     = {95-133},
}

@Article{SSL+14,
  author    = {Y. Si and J. Sun and Y. Liu and J. S. Dong and J. Pang and S. Zhang and X. Yang},
  title     = {Model Checking with Fairness Assumptions using {PAT}},
  journal   = {Frontiers of Computer Science},
  year      = {2014},
  volume    = {8},
  number	= {1},
  pages     = {1-16},
}

@Article{JMP13,
  author    = {H. L. Jonker and S. Mauw and J. Pang},
  title     = {Privacy and verifiability in voting systems: {M}ethods, developments and trends},
  journal   = {Computer Science Review},
  year      = {2013},
  volume    = {10},
  pages     = {1-30},
}

@Article{TMPTSS13,
  author    = {P. Trairatphisan and A. Mizera and J. Pang and A.-A. Tantar and J. Schneider and T. Sauter},
  title     = {Recent development and biomedical applications of probabilistic {B}oolean networks},
  journal   = {Cell Communication and Signaling},
  year      = {2013},
  volume    = {11},
  pages     = {46},
}

@Article{LP13,
  author    = {Y. Li and J. Pang},
  title     = {An inductive approach to strand spaces},
  journal   = {Formal Aspects of Computing},
  year      = {2013},
  volume    = {25},
  number    = {4},
  pages     = {465-501},
}

@Article{LPZ13,
  author    = {Z. Liu and J. Pang and C. Zhang},
  title     = {Design and formal verification of a certified email protocol with transparent {TTP}},
  journal   = {Frontiers of Computer Science},
  year      = {2013},
  volume    = {7},
  number	= {2},
  pages     = {279-297},
}

@Article{CLMP13,
  author    = {X. Chen and G. Lenzini and S. Mauw and J. Pang},
  title     = {Design and formal analysis of a group signature based electronic toll pricing system},
  journal   = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications},
  year      = {2013},
  volume    = {4},
  number	= {1},
  pages     = {55-75},
}

@Article{SZPAM12,
  author    = {Y. Sun and C. Zhang and J. Pang and B. Alcalde and S. Mauw},
  title     = {A trust-augmented voting scheme for collaborative privacy management},
  journal   = {Journal of Computer Security},
  year      = {2012},
  volume    = {20},
  number    = {4},
  pages     = {437-459},
}

@Article{YTPMMS12,
  author    = {Q. Yuan and P. Trairatphisan and J. Pang and S. Mauw and M. Wiesinger and T. Sauter},
  title     = {Probabilistic model checking of the {PDGF} signaling pathway},
  journal   = {Transactions on Computational Systems Biology},
  year      = {2012},
  series    = {Lecture Notes in Bioinformatics},
  volume    = {7625},
  pages     = {151-180},
}

@Article{ZZPM12,
  author    = {Y. Zhang and C. Zhang and J. Pang and S. Mauw},
  title     = {Game-based verification of contract signing protocols with minimal messages},
  journal   = {Innovations in Systems and Software Engineering},
  year      = {2012},
  volume    = {8},
  number    = {2},
  pages     = {111-124},
}

@Article{BEFP11,
  author    = {R. Bakhshi and J. Endrullis and W. J. Fokkink and J. Pang},
  title     = {Fast leader election in anonymous rings with bounded expected delay},
  journal   = {Information Processing Letters},
  year      = {2011},
  volume    = {111},
  number    = {17},
  pages     = {864-870},
}

@Article{JMP09,
  author    = {H. L. Jonker and S. Mauw and J. Pang},
  title     = {A formal framework for quantifying voter-controlled privacy},
  journal   = {Journal of Algorithms in Cognition, Informatics and Logic},
  year      = {2009},
  volume    = {64},
  number    = {2-3},
  pages     = {89-105},
}

@Article{PLD08,
  author    = {J. Pang and Z. Luo and Y. Deng},
  title     = {On automatic verification of self-stabilizing population protocols},
  journal   = {Frontiers of Computer Science in China},
  year      = {2008},
  volume    = {2},
  number    = {4},
  pages     = {357-367},
}

@Article{FPW08,
  author    = {W. J. Fokkink and J. Pang and A. J. Wijs},
  title     = {Is timed branching bisimilarity a congruence indeed?},
  journal   = {Fundamenta Informaticae},
  year      = {2008},
  volume    = {87},
  number    = {3-4},
  pages     = {287-311},
}

@Article{PFHV07,
  author    = {J. Pang and W. J. Fokkink and R. F.H. Hofman and R. Veldema},
  title     = {Model checking a cache coherence protocol of a {J}ava {DSM} implementation},
  journal   = {Journal of Logic and Algebraic Programming},
  year      = {2007},
  volume    = {71},
  number    = {1},
  pages     = {1-43},
}

@Article{FokPan06,
  author    = {W. J. Fokkink and J. Pang},
  title     = {Variations on {I}tai-{R}odeh leader election for anonymous rings and their analysis in {PRISM}},
  journal   = {Journal of Universal Computer Science},
  year      = {2006},
  volume    = {12},
  number    = {8},
  pages     = {981-1006},
}

@Article{FPP06,
  author    = {W. J. Fokkink and J. Pang and J. C. {van de Pol}},
  title     = {Cones and foci: {A} mechanical framework for protocol verification},
  journal   = {Formal Methods in System Design},
  year      = {2006},
  volume    = {29},
  number    = {1},
  pages     = {1-31},
}

@Article{BFGPP05,
  author    = {B. Badban and W. J. Fokkink and J. F. Groote and J. Pang and J. C. {van de Pol}},
  title     = {Verification of a sliding window protocol in $\mu${CRL} and {PVS}},
  journal   = {Formal Aspects of Computing},
  year      = {2005},
  volume    = {17},
  number    = {3},
  pages     = {342-388},
}

@Article{FHP05,
  author    = {W. J. Fokkink and J.-H. Hoepman and J. Pang},
  title     = {A note on K-state self-stabilization in a ring with $K$=$N$},
  journal   = {Nordic Journal of Computing},
  year      = {2005},
  volume    = {12},
  number    = {1},
  pages     = {18-26},
}

@Article{LFPZ04,
  author    = {B. Li and X. Fan and J. Pang and J. Zhao},
  title     = {A model to slice Java programs hierarchically},
  journal   = {Journal of Computer Science and Technology},
  year      = {2004},
  volume    = {19},
  number    = {6},
  pages     = {848-858},
}

@Article{GPW03,
  author    = {J. F. Groote and J. Pang and A. G. Wouters},
  title     = {Analysis of a distributed system for lifting trucks},
  journal   = {Journal of Logic and Algebraic Programming},
  year      = {2003},
  volume    = {55},
  number    = {1-2},
  pages     = {21-56},
}

@Article{WPZYZ01,
  author    = {Y. Wang and J. Pang and M. Zha and Z. Yang and G. Zheng},
  title     = {A formal software development approach using refinement calculus},
  journal   = {Journal of Computer Science and Technology},
  year      = {2001},
  volume    = {16},
  number    = {3},
  pages     = {251-262},
}

%%%%%%%%%%%%%%%%%%%%%% Conference and Workshop Proceedings and Editorials
%%%%%%%%%%%%%%%%%%%%%% 2020
@InProceedings{LCJ20,
  author    = {Y. Li and T. Cao and D. Jansen and J. Pang and X. Wei},
  title     = {Accelerated veriﬁcation of parametric protocols with decision trees},
  booktitle = {Proc.\ 38th IEEE International Conference on Computer Design (ICCD'20)},
  publisher = {IEEE Computer Society},
  year      = {2020},
  pages     = {},
}

@InProceedings{ZPZ20,
  author    = {Z. Zhong and Y. Zhang and J. Pang},
  title     = {{NeuLP}: {A}n end-to-end deep-learning model for link prediction},
  booktitle = {Proc.\ 21st International Conference on Web Information System Engineering (WISE'20)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2020},
  volume    = {12342},
  pages     = {96-108},
}

@InProceedings{MPL20a,
  author    = {X. Mo and J. Pang and Z. Liu},
  title     = {Higher-order graph convolutional embedding for temporal networks},
  booktitle = {Proc.\ 21st International Conference on Web Information System Engineering (WISE'20)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2020},
  volume    = {12342},
  pages     = {3-15},
}

@InProceedings{SP20b,
  author    = {C. Su and J. Pang},
  title     = {A dynamics-based approach for the target control of {B}oolean networks},
  booktitle = {Proc.\ 11th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics (BCB'20)},
  publisher = {ACM Press},
  year      = {2020},
  pages     = {50:1-50:8},
}

@InProceedings{SP20a,
  author    = {C. Su and J. Pang},
  title     = {Sequential temporary and permanent control of {B}oolean networks},
  booktitle = {Proc.\ 18th International Conference on Computational Methods in Systems Biology (CMSB'20)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2020},
  volume    = {12314},
  pages     = {234-251},
}

@InProceedings{ZP20,
  author    = {C. Zhang and J. Pang},
  title     = {Characterising probabilistic alternating simulation for concurrent games},
  booktitle = {Proc.\ 14th IEEE Symposium on Theoretical Aspects of Software Engineering (TASE'20)},
  publisher = {IEEE Computer Society},
  year      = {2012},
  pages     = {},
}

@InProceedings{WDZCP20,
  author    = {G. Wu and L. Dai and Z. Liu and T. Chen and J. Pang},
  title     = {Online observability of {B}oolean control networks},
  booktitle = {Proc.\ 21st World Congress of the International Federation of Automatic Control (IFAC'20)},
  publisher = {IFAC},
  series    = {IFAC-Papers On Line},
  year      = {2020},
  volume    = {},
  pages     = {},
}

@Proceedings{GCAI20,
  editor    = {G. Danoy and J. Pang and G. Sutcliffe},
  title     = {Proc.\ 6th Global Conference on Artificial Intelligence (GCAI'20)},
  year      = {2020},
  series    = {EPiC Series in Computing},
  volume    = {72},
  publisher = {Easychair},
}

@Proceedings{SETTA20,
  editor    = {J. Pang and L. Zhang},
  title     = {Proc.\ 6th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications (SETTA'20)},
  year      = {2020},
  series    = {Lecture Notes in Computer Science},
  volume    = {12153},
  publisher = {Springer-Verlag},
}

%%%%%%%%%%%%%%%%%%%%%% 2019
@Proceedings{ICECCS19,
  editor    = {J. Pang and J. Sun},
  title     = {Proc.\ 24th International Conference on Engineering of Complex Computer Systems (ICECCS'19)},
  year      = {2019},
  publisher = {IEEE Computer Society},
}

@InProceedings{LCP19,
  author    = {Y. Li and J. Cao and J. Pang},
  title     = {A learning-based framework for automatic parameterized verification},
  booktitle = {Proc.\ 37th IEEE International Conference on Computer Design (ICCD'19)},
  publisher = {IEEE Computer Society},
  year      = {2019},
  pages     = {450-459},
}

@InProceedings{ZPZ19,
  author    = {Z. Zhong and Y. Zhang and J. Pang},
  title     = {A graph-based approach to explore relationship between hashtags and images},
  booktitle = {Proc.\ 20th International Conference on Web Information System Engineering (WISE'19)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2019},
  volume    = {11881},
  pages     = {473-488},
}

@InProceedings{SPP19,
  author    = {C. Su and S. Paul and J. Pang},
  title     = {Controlling large {B}oolean networks with temporary and permanent perturbations},
  booktitle = {Proc.\ 23rd International Symposium on Formal Methods (FM'19)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2019},
  volume    = {11800},
  pages     = {707-724},
}

@InProceedings{MSHP19,
  author    = {H. Mandon and C. Su and S. Haar and J. Pang and L. Paulev\'e},
  title     = {Sequential reprogramming of {B}oolean networks made practical},
  booktitle = {Proc.\ 17th International Conference on Computational Methods in Systems Biology (CMSB'19)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2019},
  volume    = {11773},
  pages     = {3-19},
}

@InProceedings{SPP19b,
  author    = {C. Su and S. Paul and J. Pang},
  title     = {Scalable control of asynchronous {B}oolean networks},
  booktitle = {Proc.\ 17th International Conference on Computational Methods in Systems Biology (CMSB'19)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2019},
  volume    = {11773},
  pages     = {364-367},
}


%%%%%%%%%%%%%%%%%%%%%% 2018
@Proceedings{TASE18,
  editor    = {J. Pang and C. Zhang and J. He and J. Weng},
  title     = {Proc.\ 12th International Symposium on Theoretical Aspects of Software Engineering (TASE'18)},
  year      = {2018},
  publisher = {IEEE Computer Society},
}

@InProceedings{CLP18,
  author    = {J. Cao and Y. Li and J. Pang},
  title     = {{L-CMP}: An automatic learning-based parameterized verification tool},
  booktitle = {Proc.\ 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE'18)},
  publisher = {ACM Press},
  year      = {2018},
  pages     = {892-895},
}

@InProceedings{PSPM18,
  author    = {S. Paul and C. Su and J. Pang and A. Mizera},
  title     = {A decomposition-based approach towards the control of {B}oolean networks},
  booktitle = {Proc.\ 9th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics (BCB'18)},
  publisher = {ACM Press},
  year      = {2018},
  pages     = {11-20},
}

@InProceedings{PPS18,
  author    = {S. Paul and J. Pang and C. Su},
  title     = {Towards the existential control of {B}oolean networks: a preliminary report},
  booktitle = {Proc.\ 4th International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA'18)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2018},
  volume    = {10998},
  pages     = {142-147},
}

@InProceedings{MPQY18,
  author    = {A. Mizera and J. Pang and H. Qu and Q. Yuan},
  title     = {{ASSA-PBN} 3.0: {A}nalysing context-sensitive probabilistic {B}oolean networks},
  booktitle = {Proc.\ 16th International Conference on Computational Methods in Systems Biology (CMSB'18)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2018},
  volume    = {11095},
  pages     = {313-317},
}

@InProceedings{ZHRL18,
  author    = {Y. Zhang and M. Humbert and T. Rahman and C.-T. Li and J. Pang and M. Backes},
  title     = {Tagvisor: {A} privacy advisor for sharing hashtags},
  booktitle = {Proc.\ The Web Conference 2018 (WWW'18)},
  publisher = {ACM Press},
  year      = {2018},
  pages     = {287-296},
}

%%%%%%%%%%%%%%%%%%%%%% 2017
@InProceedings{WQPZJ17,
  author    = {Y. Wang and Z. Qin and J. Pang and Y. Zhang and X. Jin},
  title     = {Semantic annotation for places in {LBSN} through graph embedding},
  booktitle = {Proc.\ 26th ACM International Conference on Information and Knowledge Management (CIKM'17)},
  publisher = {ACM Press},
  year      = {2017},
  pages     = {2343-2346},
}

@InProceedings{BHPZ17,
  author    = {M. Backes and M. Humbert and J. Pang and Y. Zhang},
  title     = {walk2friends: {I}nferring social links from mobility profiles},
  booktitle = {Proc.\ 24th ACM International Conference on Computer and Communications Security (CCS'17)},
  publisher = {ACM Press},
  year      = {2017},
  pages     = {1943-1957},
}

@InProceedings{MPQY17,
  author    = {A. Mizera and J. Pang and H. Qu and Q. Yuan},
  title     = {A new decomposition method for attractor detection in large synchronous {B}oolean networks},
  booktitle = {Proc.\ 3rd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA'17)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2017},
  volume    = {10606},
  pages     = {232-249},
}

@InProceedings{LDPSBLD17,
  author    = {L. Li and N. Dong and J. Pang and J. Sun and G. Bai and Y. Liu and J.-S. Dong},
  title     = {A verification framework for stateful security protocols},
  booktitle = {Proc.\ 19th Conference on Formal Engineering Methods (ICFEM'17)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2017},
  volume    = {10610},
  pages     = {262-280},
}

@InProceedings{ZNHP17,
  author    = {Y. Zhang and M. Ni and W. Han and J. Pang},
  title     = {Does \#like4like Indeed Provoke More Likes?},
  booktitle = {Proc.\ 16th IEEE/WIC/ACM International Conference on Web Intelligence (WI'17)},
  publisher = {ACM Press},
  year      = {2017},
  pages     = {179-186},
}

@InProceedings{PZ17b,
  author    = {J. Pang and Y. Zhang},
  title     = {Quantifying location sociality},
  booktitle = {Proc.\ 28th ACM Conference on Hypertext and Social Media (HT'17)},
  publisher = {ACM Press},
  year      = {2017},
  pages     = {145-154},
}

@InProceedings{PZ17a,
  author    = {J. Pang and Y. Zhang},
  title     = {{DeepCity}: {A} feature learning framework for mining location check-ins},
  booktitle = {Proc.\ 11th International AAAI Conference on Web and Social Media (ICWSM'17)},
  publisher = {AAAI Press},
  year      = {2017},
  pages     = {652-655},
}

@InProceedings{WSYP17,
  author    = {J. Wang and J. Sun and Q. Yuan and J. Pang},
  title     = {Should we learn probabilistic models for model checking? {A} new approach and an empirical study},
  booktitle = {Proc.\ 20th International Conference on Fundamental Approaches to Software Engineering (FASE'17)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2017},
  volume    = {10202},
  pages     = {3-21},
}


%%%%%%%%%%%%%%%%%%%%%% 2016
@InProceedings{ZZPL16,
  author    = {Z. Zhou and Y. Zhang and J. Pang and C.-T. Li},
  title     = {Modeling city locations as complex networks: An initial study},
  booktitle = {Proc.\ 5th International Workshop on Complex Networks and their Applications (CNA'16)},
  publisher = {Springer-Verlag},
  series    = {Studies in Computational Intelligence Series},
  year      = {2016},
  volume    = {693},
  pages     = {735-747},
}

@InProceedings{LDLPC16,
  author    = {Y. Li and K. Duan and Y. Lv and J. Pang and S. Cai},
  title     = {A novel approach to parameterized verificationof cache coherence protocols},
  booktitle = {Proc.\ 34th IEEE International Conference on Computer Design (ICCD'16)},
  publisher = {IEEE Computer Society},
  year      = {2016},
  pages     = {560-567},
}

@InProceedings{MPY16e,
  author    = {A. Mizera and J. Pang and Q. Yuan},
  title     = {{GPU}-accelerated steady-state computation of large probabilistic {B}oolean networks},
  booktitle = {Proc.\ 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA'16)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2016},
  volume    = {9984},
  pages     = {50-66},
}

@InProceedings{PPY16c,
  author    = {J. Pang and P. Zablotskaia and Y. Zhang},
  title     = {On impact of weather on human mobility in cities},
  booktitle = {Proc.\ 17th International Conference on Web Information System Engineering (WISE'16)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2016},
  volume    = {10042},
  pages     = {247-256},
}

@InProceedings{MPY16d,
  author    = {A. Mizera and J. Pang and Q. Yuan},
  title     = {{GPU}-accelerated steady-state analysis of probabilistic {B}oolean networks},
  booktitle = {Proc.\ 14th International Conference on Computational Methods in Systems Biology (CMSB'16)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2016},
  volume    = {9859},
  pages     = {343-345},
}

@InProceedings{MPY16c,
  author    = {A. Mizera and J. Pang and Q. Yuan},
  title     = {Fast simulation of probabilistic {B}oolean networks},
  booktitle = {Proc.\ 14th International Conference on Computational Methods in Systems Biology (CMSB'16)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2016},
  volume    = {9859},
  pages     = {216-231},
}

@InProceedings{MPY16b,
  author    = {A. Mizera and J. Pang and Q. Yuan},
  title     = {{ASSA-PBN} 2.0: {A} software tool for probabilistic {B}oolean networks},
  booktitle = {Proc.\ 14th International Conference on Computational Methods in Systems Biology (CMSB'16)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2016},
  volume    = {9859},
  pages     = {309-315},
}

@InProceedings{NZHP16,
  author    = {M. Ni, Y. Zhang, W. Han and J. Pang},
  title     = {An empirical study on user access control in online social networks},
  booktitle = {Proc.\ 21st ACM Symposium on Access Control Models and Technologies (SACMAT'16)},
  publisher = {ACM Press},
  year      = {2016},
  pages     = {13-23},
}

@InProceedings{MPY16a,
  author    = {A. Mizera and J. Pang and Q. Yuan},
  title     = {Parallel approximate steady-state analysis of large probabilistic {B}oolean networks},
  booktitle = {Proc.\ 31st ACM Symposium on Applied Computing (SAC'16)},
  publisher = {ACM Press},
  year      = {2016},
  pages     = {1-8},
}


%%%%%%%%%%%%%%%%%%%%%% 2015
@InProceedings{QYPM15,
  author    = {H. Qu and Q. Yuan and J. Pang and A. Mizera},
  title     = {Improving {BDD}-based attractor detection for synchronous Boolean networks},
  booktitle = {Proc.\ 7th Asia-Pacific Symposium on Internetware (Internetware'15)},
  publisher = {ACM Press},
  year      = {2015},
  pages     = {212-220},
}

@InProceedings{PZd15,
  author    = {J. Pang and Y. Zhang},
  title     = {Location prediction: {C}ommunities speak louder than friends},
  booktitle = {Proc.\ 3rd ACM  Conference on Online Social Networks (COSN'15)},
  publisher = {ACM Press},
  year      = {2015},
  pages     = {161-171},
}

@InProceedings{CMP15,
  author    = {X. Chen and A. Mizera and J. Pang},
  title     = {Activity tracking: {A} new attack on location privacy},
  booktitle = {Proc.\ 3rd IEEE Conference on Communications and Network Security (CNS'15)},
  publisher = {IEEE Computer Society},
  year      = {2015},
  pages     = {22-30},
}

@InProceedings{MPY15,
  author    = {A. Mizera and J. Pang and Q. Yuan},
  title     = {{ASSA-PBN}: {A}n approximate steady-state analyser for probabilistic {B}oolean networks},
  booktitle = {Proc.\ 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2015},
  volume    = {9364},
  pages     = {214-220},
}

@InProceedings{LPL15,
  author    = {Y. Li and J. Pang and Y. Lv and D. Fan and S. Cao and and K. Duan},
  title     = {{paraVerifier}: {A}n automatic framework for proving parameterized cache coherence protocols},
  booktitle = {Proc.\ 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2015},
  volume    = {9364},
  pages     = {207-213},
}

@InProceedings{CPZ15,
  author    = {R. Cheng and J. Pang and Y. Zhang},
  title     = {Inferring friendship from check-in data of location-based social networks},
  booktitle = {Proc.\ 5th Workshop on Social Network Analysis in Applications (SNAA'15)
  (as part of 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM'15))},
  publisher = {ACM Press},
  year      = {2015},
  pages     = {1284-1291},
}

@InProceedings{ZP15b,
  author    = {Y. Zhang and J. Pang},
  title     = {Distance and friendship: {A} distance-based model for link prediction in social networks},
  booktitle = {Proc.\ 17th Asia-Pacific Web Conference (APWeb'15)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2015},
  volume    = {9313},
  pages     = {55-66},
}

@InProceedings{PZ15c,
  author    = {J. Pang and Y. Zhang},
  title     = {Event prediction with community leaders},
  booktitle = {Proc.\ 10th Conference on Availability, Reliability and Security (ARES'15)},
  publisher = {IEEE Computer Society},
  year      = {2015},
  pages     = {238-243},
}

@InProceedings{ZP15a,
  author    = {Y. Zhang and J. Pang},
  title     = {Community-driven social influence analysis and applications},
  booktitle = {Proc.\ Porc.\ 15th International Conference on Web Engineering (PhD Symposium) (ICWE'15)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2015},
  volume    = {9114},
  pages     = {644-647},
}

@InProceedings{CPZ15,
  author    = {M. Cramer and J. Pang and Y. Zhang},
  title     = {A logical approach to restricting access in online social networks},
  booktitle = {Proc.\ 20th ACM Symposium on Access Control Models and Technologies (SACMAT'15)},
  publisher = {ACM Press},
  year      = {2015},
  pages     = {75-86},
}

@InProceedings{PZ15b,
  author    = {J. Pang and Y. Zhang},
  title     = {Cryptographic protocols for enforcing relationship-based access control policies},
  booktitle = {Proc.\ 39th Annual IEEE Computers, Software \& Applications Conference (COMPSAC'15)},
  publisher = {IEEE Computer Society},
  year      = {2015},
  pages     = {484-493},
}

@InProceedings{PZ15a,
  author    = {J. Pang and Y. Zhang},
  title     = {Exploring communities for effective location prediction},
  booktitle = {Proc.\ 24th World Wide Web Conference (Companion Volume) (WWW'15)},
  publisher = {ACM Press},
  year      = {2015},
  pages     = {87-88},
}

%%%%%%%%%%%%%%%%%%%%%% 2014
@proceedings{ICFEM14,
  editor    = {S. Merz and J. Pang}, 
  title     = {Proceedings of the 16th International Conference on Formal Engineering Methods},
  booktitle = {ICFEM 2014},
  series    = {LNCS},
  volume    = {8229},
  year      = {2014},
}

@InProceedings{EP14,
  author    = {Y. Elrahaiby and J. Pang},
  title     = {Dynamic analysis of usage control policies},
  booktitle = {Proc.\ 11th Conference on Security and Cryptography (SECRYPT'14)},
  publisher = {SciTePress},
  year      = {2014},
  pages     = {88-100},
}

@InProceedings{CKLP14,
  author    = {X. Chen and P. Kordy and R. Lv and J. Pang},
  title     = {{MinUS}: {M}ining user similarity with trajectory patterns},
  booktitle = {Proc.\ 7th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD'14)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2014},
  volume    = {8726},
  pages     = {436-439},
}

@InProceedings{PZ14,
  author    = {J. Pang and Y. Zhang},
  title     = {A new access control scheme for {F}acebook-style social networks},
  booktitle = {Proc.\ 9th Conference on Availability, Reliability and Security (ARES'14)},
  publisher = {IEEE Computer Society},
  year      = {2014},
  pages     = {1-10},
}

@InProceedings{CLMP14,
  author    = {X. Chen and R. Lv and X. Ma and J. Pang},
  title     = {Measuring user similarity with trajectory patterns: {P}rinciples and new metrics},
  booktitle = {Proc.\ 16th Asia-Pacific Web Conference (APWeb'14)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2014},
  volume    = {8709},
  pages     = {437-448},
}

@Proceedings{PL14,
  editor    = {J. Pang and Y. Liu},
  title = {Proc.\ 3rd Workshop on Engineering Safety and Security Systems (ESSS'14)},
  year      = {2014},
  series    = {Electronic Proceedings in Theoretical Computer Science},
  volume    = {150},
}

@InProceedings{MPY14,
  author    = {A. Mizera and J. Pang and Q. Yuan},
  title     = {Model-checking based approaches to parameter estimation of gene regulatory networks},
  booktitle = {Proc.\ 19th IEEE Conference on Engineering of Complex Computer Systems (ICECCS'14)},
  publisher = {IEEE Computer Society},
  year      = {2014},
  pages     = {206-209},
}

@InProceedings{LPLSD14,
  author    = {L. Li and J. Pang and Y. Liu and J. Sun and J. S. Dong},
  title     = {Symbolic analysis of an electric vehicle charging protocol},
  booktitle = {Proc.\ 19th IEEE Conference on Engineering of Complex Computer Systems (ICECCS'14)},
  publisher = {IEEE Computer Society},
  year      = {2014},
  pages     = {11-18},
}

@InProceedings{LP14,
  author    = {Y. Li and J. Pang},
  title     = {A strand space approach to provable anonymity},
  booktitle = {Proc.\ 2nd Workshop on Formal Techniques for Safety-Critical Systems (FTSCS'13)},
  publisher = {Springer-Verlag},
  series    = {Communications in Computer and Information Science},
  year      = {2014},
  volume    = {419},
  pages     = {71-87},
}

%%%%%%%%%%%%%%%%%%%%%% 2013
@InProceedings{CHLMMP13,
  author    = {X. Chen and C. Harpes and G. Lenzini and M. Martins and S. Mauw and J. Pang},
  title     = {{DEMO}: Demonstrating a trust framework for evaluating {GNSS} signal integrity},
  booktitle = {Proc.\ 20th ACM Conference on Computer and Communications Security (CCS'13)},
  publisher = {ACM Press},
  year      = {2013},
  pages     = {1329-1332},
}

@InProceedings{CTSLPL13,
  author    = {M. Chen and T. H. Tan and J. Sun and Y. Liu and J. Pang and X. Li},
  title     = {Verification of functional and non-functional requirements of web service composition},
  booktitle = {Proc.\ 15th Conference on Formal Engineering Methods (ICFEM'13)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2013},
  volume    = {8144},
  pages     = {313-328},
}

@InProceedings{MPST13b,
  author    = {A. Mizera and J. Pang and T. Sauter, and P. Trairatphisan},
  title     = {A balancing act: {P}arameter estimation for biological models with steady-state measurements},
  booktitle = {Proc.\ 11th Conference on Computational Methods in Systems Biology (CMSB'13)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Bioinformatics},
  year      = {2013},
  volume    = {8130},
  pages     = {253-254},
}

@InProceedings{DJP13,
  author    = {N. Dong and H. L. Jonker and J. Pang},
  title     = {Enforcing privacy in the presence of others: {N}otions, formalisations and relations},
  booktitle = {Proc.\ 18th European Symposium on Research in Computer Security (ESORICS'13)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2013},
  volume    = {8134},
  pages     = {499-516},
}

@InProceedings{MPST13a,
  author    = {A. Mizera and J. Pang and T. Sauter, and P. Trairatphisan},
  title     = {Mathematical modelling of the {P}latelet-{D}erived {G}rowth {F}actor ({PDGF}) signalling pathway},
  booktitle = {Proc.\ 4th Workshop on Computational Models for Cell Processes (CompMod'13)},
  series    = {Electronic Proceedings in Theoretical Computer Science},
  year      = {2013},
  volume    = {116},
  pages     = {35},
}

@InProceedings{CLMMP13,
  author    = {X. Chen and G. Lenzini and M. Martins and S. Mauw and J. Pang},
  title     = {A trust framework for evaluating GNSS signal integrity},
  booktitle = {Proc.\ 26th IEEE Computer Security Foundations Symposium (CSF'13)},
  publisher = {IEEE Computer Society},
  year      = {2013},
  pages     = {179-192},
}

@InProceedings{CPX13,
  author    = {X. Chen and J. Pang and R. Xue},
  title     = {Constructing and comparing user mobility profiles for location-based services},
  booktitle = {Proc.\ 28th ACM Symposium on Applied Computing (SAC'13)},
  publisher = {ACM Press},
  year      = {2013},
  pages     = {261-266},
}

@InProceedings{CP13,
  author    = {X. Chen and J. Pang},
  title     = {Exploring dependency for query privacy protection in location-based services},
  booktitle = {Proc.\ 3rd ACM Conference on Data and Application Security and Privacy (CODASPY'13)},
  publisher = {ACM Press},
  year      = {2013},
  pages     = {37-47},
}

@InProceedings{CFP13,
  author    = {X. Chen and D. Fonkwe and J. Pang},
  title     = {Post-hoc analysis of user traceability in electronic toll collection systems},
  booktitle = {Proc.\ 7th Workshop on Data Privacy Management (DPM'12)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2013},
  volume    = {7731},
  pages     = {29-42},
}

%%%%%%%%%%%%%%%%%%%%%% 2012
@InProceedings{DJP12,
  author    = {N. Dong and H. L. Jonker and J. Pang},
  title     = {Formal analysis of privacy in an e{H}ealth protocol},
  booktitle = {Proc.\ 17th European Symposium on Research in Computer Security (ESORICS'12)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2012},
  volume    = {7459},
  pages     = {325-342},
}

@InProceedings{CLMP12,
  author    = {X. Chen and G. Lenzini and S. Mauw and J. Pang},
  title     = {A group signature based electronic toll pricing system},
  booktitle = {Proc.\ 7th Conference on Availability, Reliability and Security (ARES'12)},
  publisher = {IEEE Computer Society},
  year      = {2012},
  pages     = {85-93},
}

@InProceedings{LSPM12,
  author    = {Q. Li and P. Schaffer and J. Pang and S. Mauw},
  title     = {Comparative analysis of clustering protocols with probabilistic model checking},
  booktitle = {Proc.\ 6th IEEE Symposium on Theoretical Aspects of Software Engineering (TASE'12)},
  publisher = {IEEE Computer Society},
  year      = {2012},
  pages     = {249-252},
}

@InProceedings{DJP12,
  author    = {N. Dong and H. L. Jonker and J. Pang},
  title     = {Challenges in e{H}ealth: from enabling to enforcing privacy},
  booktitle = {Proc.\ 1st Symposium on Foundations of Health Information Engineering and Systems (FHIES'11)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2012},
  volume    = {7151},
  pages     = {195-206},
}

@InProceedings{CP12,
  author    = {X. Chen and J. Pang},
  title     = {Measuring query privacy in location-based services},
  booktitle = {Proc.\ 2nd ACM Conference on Data and Application Security and Privacy (CODASPY'12)},
  publisher = {ACM Press},
  year      = {2012},
  pages     = {49-60},
}

@InProceedings{ZP12,
  author    = {C. Zhang and J. Pang},
  title     = {An algorithm for probabilistic alternating simulation},
  booktitle = {Proc.\ 38th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM'12)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2012},
  volume    = {7147},
  pages     = {431-442},
}

%%%%%%%%%%%%%%%%%%%%%% 2011
@InProceedings{LMP11,
  author    = {G. Lenzini and S. Mauw and J. Pang},
  title     = {Selective location blinding using hash chains},
  booktitle = {Proc.\ 19th Workshop on Security Protocols (SPW'11)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2011},
  volume    = {7114},
  pages     = {132-141},
}

@InProceedings{YPMTWS11,
  author    = {Q. Yuan and J. Pang and S. Mauw and P. Trairatphisan and M. Wiesinger, and T. Sauter},
  title     = {A study of the {PDGF} signaling pathway with {PRISM}},
  booktitle = {Proc.\ 3rd Workshop on Computational Models for Cell Processes (CompMod'11)},
  series    = {Electronic Proceedings in Theoretical Computer Science},
  year      = {2011},
  volume    = {67},
  pages     = {65-81},
}

@InProceedings{LP11,
  author    = {Y. Li and J. Pang},
  title     = {An inductive approach to provable anonymity},
  booktitle = {Proc.\ 6th Conference on Availability, Reliability and Security (ARES'11)},
  publisher = {IEEE Computer Society},
  year      = {2011},
  pages     = {454-459},
}

@InProceedings{JP11,
  author    = {H. L. Jonker and J. Pang},
  title     = {Bulletin boards in voting systems: {M}odelling and measuring privacy},
  booktitle = {Proc.\ 6th Conference on Availability, Reliability and Security (ARES'11)},
  publisher = {IEEE Computer Society},
  year      = {2011},
  pages     = {294-300},
}

@InProceedings{LPZ11,
  author    = {Z. Liu and J. Pang and C. Zhang},
  title     = {Verification of a key-chain based {TTP} transparent {CEM} protocol},
  booktitle = {Proc.\ 3rd Workshop on Harnessing Theories for Tool Support in Software (TTSS'10)},
  series    = {Electronic Notes in Theoretical Computer Science},
  year      = {2011},
  publisher = {Elsevier},
  volume    = {274},
  pages     = {51-65},
}

@InProceedings{SZPAM11,
  author    = {Y. Sun and C. Zhang and J. Pang and B. Alcalde and S. Mauw},
  title     = {A trust-augmented voting scheme for collaborative privacy management},
  booktitle = {Proc.\ 6th Workshop on Security and Trust Management (STM'10)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2011},
  volume    = {6710},
  pages     = {132-146},
}

@InProceedings{ZSPLD11,
  author    = {S. Zhang and J. Sun and J. Pang and Y. Liu and J.-S. Dong},
  title     = {On combining state space reductions with global fairness assumptions},
  booktitle = {Proc.\ 17th Symposium on Formal Methods (FM'11)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2011},
  volume    = {6664},
  pages     = {432-447},
}

@InProceedings{DJP11,
  author    = {N. Dong and H. L. Jonker and J. Pang},
  title     = {Analysis of a receipt-free auction protocol in the applied pi calculus},
  booktitle = {Proc.\ 7th Workshop on Formal Aspects in Security and Trust (FAST'10)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2011},
  volume    = {6561},
  pages     = {223-238},
}

%%%%%%%%%%%%%%%%%%%%%% 2010
@InProceedings{LPZ10,
  author    = {Z. Liu and J. Pang and C. Zhang},
  title     = {Extending a key-chain based certified email protocol with transparent {TTP}},
  booktitle = {Proc.\ 6th IEEE/IFIP Symposium on Trusted Computing and Communications (TrustCom'10)},
  publisher = {IEEE Computer Society},
  year      = {2010},
  pages     = {630-636},
}

@InProceedings{ZP10,
  author    = {C. Zhang and J. Pang},
  title     = {On probabilistic alternating simulations},
  booktitle = {Proc.\ 6th IFIP Conference on Theoretical Computer Science (TCS'10)},
  publisher = {IFIP International Federation for Information Processing},
  series    = {IFIP Advances in Information and Communication Technology},
  year      = {2010},
  volume    = {323},
  pages     = {71-85},
}

@InProceedings{BEFP10,
  author    = {R. Bakhshi and J. Endrullis and W. J. Fokkink and Jun Pang},
  title     = {Brief announcement: {A}synchronous bounded expected delay networks},
  booktitle = {Proc.\ 29th Annual ACM Symposium on Principles of Distributed Computing (PODC'10)},
  publisher = {ACM Press},
  year      = {2010},
  pages     = {392-393},
}

@InProceedings{AP10,
  author    = {X. An and J. Pang},
  title     = {Model checking round-based distributed algorithms},
  booktitle = {Proc.\ 15th IEEE Conference on Engineering of Complex Computer Systems (ICECCS'10)},
  publisher = {IEEE Computer Society},
  year      = {2010},
  pages     = {127-135},
}

@InProceedings{ZZPM10,
  author    = {Y. Zhang and C. Zhang and J. Pang and S. Mauw},
  title     = {Game-based verification of multi-party contract signing protocols},
  booktitle = {Proc.\ 6th Workshop on Formal Aspects in Security and Trust (FAST'09)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2010},
  volume    = {5983},
  pages     = {186-200},
}

%%%%%%%%%%%%%%%%%%%%%% 2009
@InProceedings{CDP09,
  author    = {X. Chen and T. {van Deursen} and J. Pang},
  title     = {Improving automatic verification of security protocols with {XOR}},
  booktitle = {Proc.\ 11th Conference on Formal Engineering Methods (ICFEM'09)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2009},
  volume    = {5885},
  pages     = {106-127},
}

@InProceedings{LZP09,
  author    = {B. Li and Y. Zhou and J. Pang},
  title     = {Model-driven automatic generation of verified BPEL code for web service composition},
  booktitle = {Proc.\ 16th Asia-Pacific Software Engineering Conference (APSEC'09)},
  publisher = {IEEE Computer Society},
  year      = {2009},
  pages     = {355-362},
}

@InProceedings{PZ09,
  author    = {J. Pang and C. Zhang},
  title     = {How to work with honest but curious judges? (preliminary report)},
  booktitle = {Proc.\ 7th Workshop on Security Issues in Concurrency (SecCo'09)},
  series    = {Electronic Proceedings in Theoretical Computer Science},
  year      = {2009},
  volume    = {7},
  pages     = {31-45},
}

@InProceedings{LPSZ09,
  author    = {Y. Liu and J. Pang and J. Sun and J. Zhao},
  title     = {Verification of population ring protocols in {PAT}},
  booktitle = {Proc.\ 3rd IEEE Symposium on Theoretical Aspects of Software Engineering (TASE'09)},
  publisher = {IEEE Computer Society},
  year      = {2009},
  pages     = {81-89},
}

@InProceedings{DLSP09,
  author    = {J. Sun and Y. Liu and J.-S. Dong and J. Pang},
  title     = {PAT: {T}owards flexible verification under fairness},
  booktitle = {Proc.\ 21st Conference on Computer Aided Verification (CAV'09)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2009},
  volume    = {5643},
  pages     = {709-714},
}

@InProceedings{JMP09,
  author    = {H. L. Jonker and S. Mauw and J. Pang},
  title     = {Measuring voter-controlled privacy},
  booktitle = {Proc.\ 4th Conference on Availability, Reliability and Security (ARES'09)},
  publisher = {IEEE Computer Society},
  year      = {2009},
  pages     = {289-298},
}

%%%%%%%%%%%%%%%%%%%%%% 2008
@InProceedings{BFPP08,
  author    = {R. Bakhshi and W. J. Fokkink and J. Pang and J. C. {van de Pol}},
  title     = {Leader election in anonymous rings: {F}ranklin goes probabilistic},
  booktitle = {Proc.\ 5th IFIP Conference on Theoretical Computer Science (TCS'08)},
  publisher = {Springer-Verlag},
  series    = {IFIP International Federation for Information Processing},
  year      = {2008},
  volume    = {273},
  pages     = {57-72},
}

@InProceedings{PLD08,
  author    = {J. Pang and Z. Luo and Y. Deng},
  title     = {On automatic verification of self-stabilizing population protocols},
  booktitle = {Proc.\ 2nd IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering (TASE'08)},
  publisher = {IEEE Computer Society},
  year      = {2008},
  pages     = {185-192},
}

%%%%%%%%%%%%%%%%%%%%%% 2007
@InProceedings{LiPan07,
  author    = {Y. Li and J. Pang},
  title     = {Extending the strand space method to verify {K}erberos {V}},
  booktitle = {Proc.\ 8th Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'07)},
  publisher = {IEEE Computer Society},
  year      = {2007},
  pages     = {437-444},
}

@InProceedings{CPT07,
  author    = {T. Chothia and J. Pang and M. {Torabi Dashti}},
  title     = {Keeping secrets in resource aware components},
  booktitle = {Proc.\ 5th Workshop on Quantitative Aspects of Programming Languages (QAPL'07)},
  publisher = {Elsveier},
  series    = {Electronic Notes in Theoretical Computer Science},
  volume    = {190},
  number    = {3},
  pages     = {79-94},
  year	= {2007},
}

@InProceedings{FKP07,
  author    = {W. J. Fokkink and A. Kakebeen and J. Pang},
  title     = {Adapting the {U}ppaal model of a distributed lift system},
  booktitle = {Proc.\ 2nd IPM Symposium on Fundamentals of Software Engineering (FSEN'07)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2007},
  volume    = {4767},
  pages     = {81-97},
}

@InProceedings{DDHJP+07,
  author    = {W. Damm and S. Disch and H. Hungar and S. Jacobs and J. Pang and F. Pigorsch and C. Scholl and U. Waldmann and B. Wirtz},
  title     = {Exact state set representations in the verification of linear hybrid systems with large discrete state-space},
  booktitle = {Proc.\ 5th Symposium on Automated Technology for Verification and Analysis (ATVA'07)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2007},
  volume    = {4762},
  pages     = {425-440},
}

@InProceedings{DPW07,
  author    = {Y. Deng and J. Pang and P. Wu},
  title     = {Measuring anonymity with relative entropy},
  booktitle = {Proc.\ 4th Workshop on Formal Aspects in Security and Trust (FAST'06)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2007},
  volume    = {4691},
  pages     = {65-79},
}

@InProceedings{COPT07,
  author    = {T. Chothia and S. M. Orzan and J. Pang and M. {Torabi Dashti}},
  title     = {A framework for automatically checking anonymity with $\mu${CRL}},
  booktitle = {Proc.\ 2nd Symposium on Trustworthy Global Computing (TGC'06)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2007},
  volume    = {4661},
  pages     = {301-318},
}

@InProceedings{DPP07,
  author    = {Y. Deng and C. Palamidessi and J. Pang},
  title     = {Weak probabilistic anonymity},
  booktitle = {Proc.\ 3rd Workshop on Security Issues in Concurrency (SecCo'05)},
  publisher = {Elsevier},
  series    = {Electronic Notes in Theoretical Computer Science},
  year      = {2007},
  volume    = {180},
  number    = {1},
  pages     = {55-76},
}

@InProceedings{LCPD07,
  author    = {L. Luo and X. Cai and J. Pang and Y. Deng},
  title     = {Analyzing an electronic cash protocol using applied pi-calculus},
  booktitle = {Proc.\ 5th Conference on Applied Cryptography and Network Security (ACNS'07)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2007},
  volume    = {4521},
  pages     = {87-103},
}

@InProceedings{BCLOP+07,
  author    = {S. C. C. Blom and J. R. Calame and B. Lisser and S. M. Orzan and
               J. Pang and J. C. {van de Pol} and M. {Torabi Dashti} and A. J. Wijs},
  title     = {Distributed analysis with $\mu${CRL}: a compendium of case studies},
  booktitle = {Proc.\ 13th Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'07)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2007},
  volume    = {4424},
  pages     = {683-689},
}

%%%%%%%%%%%%%%%%%%%%%% 2006
@InProceedings{LiPan06,
  author    = {Y. Li and J. Pang},
  title     = {Generalized unsolicited tests for authentication protocol analysis},
  booktitle = {Proc.\ 7th Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06)},
  publisher = {IEEE Computer Society},
  year      = {2006},
  pages     = {509-514},
}

@InProceedings{DDHPP+06,
  author    = {W. Damm and S. Disch and H. Hungar and J. Pang and F. Pigorsch and C. Scholl and U. Waldmann and B. Wirtz},
  title     = {Automatic verification of hybrid systems with large discrete state space},
  booktitle = {Proc.\ 4th Symposium on Automated Technology for Verification and Analysis (ATVA'06)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2006},
  volume    = {4218},
  pages     = {276-291},
}

@InProceedings{DCPP06,
  author    = {Y. Deng and T. Chothia and C. Palamidessi and J. Pang},
  title     = {Metrics for action-labelled quantitative transition systems},
  booktitle = {Proc.\ 3rd Workshop on Quantitative Aspects of Programming Languages (QAPL'05)},
  series    = {Electronic Notes in Theoretical Computer Science},
  publisher = {Elsevier},
  year      = {2006},
  volume    = {153},
  number    = {2},
  pages     = {79-96},
}

%%%%%%%%%%%%%%%%%%%%%% 2005
@InProceedings{FokPan05a,
  author    = {W. J. Fokkink and J. Pang},
  title     = {Formal verification of timed systems using cones and foci},
  booktitle = {Proc.\ 6th AMAST Workshop on Real-Time Systems (ARTS'04)},
  series    = {Electronic Notes in Theoretical Computer Science},
  publisher = {Elsevier},
  year      = {2005},
  volume    = {139},
  number    = {1},
  pages     = {105-122},
}

@InProceedings{FPW05,
  author    = {W. J. Fokkink and J. Pang and A. J. Wijs},
  title     = {Is timed branching bisimularity an equivalence indeed?},
  booktitle = {Proc.\ 3rd Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'05)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2005},
  volume    = {3829},
  pages     = {258-272},
}

@InProceedings{FokPan05b,
  author    = {W. J. Fokkink and J. Pang},
  title     = {Simplifying {I}tai-{R}odeh leader election for anonymous rings},
  booktitle = {Proc.\ 4th Workshop on Automated Verification of Critical Systems (AVoCS'04)},
  publisher = {Elsevier},
  series    = {Electronic Notes in Theoretical Computer Science},
  year      = {2005},
  volume    = {128},
  number    = {6},
  pages     = {53-68},
}

%%%%%%%%%%%%%%%%%%%%%% 2004
@InProceedings{PPV04,
  author    = {J. Pang and J. C. {van de Pol} and M. {Valero Espada}},
  title     = {Abstraction of parallel uniform processes with data},
  booktitle = {Proc.\ 2nd Conference on Software Engineering and Formal Methods (SEFM'04)},
  publisher = {IEEE Computer Society},
  year      = {2004},
  pages     = {14-23},
}

@InProceedings{FGPBP04,
  author    = {W. J. Fokkink and J. F. Groote and J. Pang and B. Badban and J. C. {van de Pol}},
  title     = {Verifying a sliding window protocol in $\mu${CRL}},
  booktitle = {Proc.\ 10th Conference on Algebraic Methodology and Software Technology (AMAST'04)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2004},
  volume    = {3116},
  pages     = {148-163},
}

@InProceedings{YSZP04,
  author    = {L. Yan and K. Sere and X. Zhou and J. Pang},
  title     = {Towards an integrated architecture for peer-to-peer and ad hoc overlay network applications},
  booktitle = {Proc.\ 10th Workshop on Future Trends in Distributed Computing Systems (FTDCS'04)},
  publisher = {IEEE Computer Society},
  year      = {2004},
  pages     = {312-318},
}

%%%%%%%%%%%%%%%%%%%%%% 2003
@InProceedings{PKF03,
  author    = {J. Pang and B. Karstens and W. J. Fokkink},
  title     = {Analyzing the redesign of a distributed lift system in {UPPAAL}},
  booktitle = {Proc.\ 5th Conference on Formal Engineering Methods (ICFEM'03)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2003},
  volume    = {2885},
  pages     = {504-522},
}

@InProceedings{PFHV03,
  author    = {J. Pang and W. J. Fokkink and R. F.H. Hofman and R. Veldema},
  title     = {Model checking a cache coherence protocol for a {J}ava {DSM} implementation},
  booktitle = {Proc.\ 17th Parallel and Distributed Processing Symposium (IPDPS'03)},
  publisher = {IEEE Computer Society},
  year      = {2003},
  pages     = {238},
}

@InProceedings{FokPan03,
  author    = {W. J. Fokkink and J. Pang},
  title     = {Cones and foci for protocol verification revisited},
  booktitle = {Proc.\ 6th Conference on Foundations of Software Science and Computation Structures (FoSSaCS'03)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2003},
  volume    = {2620},
  pages     = {267-281},
}

%%%%%%%%%%%%%%%%%%%%%% 2002
@InProceedings{Pan02,
  author    = {J. Pang},
  title     = {Analysis of a security protocol in $\mu${CRL}},
  booktitle = {Proc.\ 4th Conference on Formal Engineering Methods (ICFEM'02)},
  publisher = {Springer-Verlag},
  series    = {Lecture Notes in Computer Science},
  year      = {2002},
  volume    = {2495},
  pages     = {396-400},
}

%%%%%%%%%%%%%%%%%%%%%% 2001
@InProceedings{GPW01,
  author    = {J. F. Groote and J. Pang and A. G. Wouters},
  title     = {A balancing act: {A}nalyzing a distributed lift system},
  booktitle = {Proc.\ 6th Workshop on Formal Methods for Industrial Critical Systems (FMICS'01)},
  year      = {2001},
  pages     = {1-12},
}

%%%%%%%%%%%%%%%%%%%%%% 2000
@InProceedings{WPZYZ00,
  author    = {Y. Wang and J. Pang and M. Zha and Z. Yang and G. Zheng},
  title     = {On refinement calculus with program window inference},
  booktitle = {Proc.\ 16th IFIP World Computer Congress, Conference on Software: Theory and Practice (WCC-ICS'00)},
  year      = {2000},
  pages     = {403-406},
}

%%%%%%%%%%%%%%%%%%%%%% 1999
@InProceedings{WBPZZ99,
  author    = {Y. Wang and B. Li and J. Pang and M. Zha and G. Zheng},
  title     = {A formal software development approach based on COOZ and refinement calculus},
  booktitle = {Proc.\ 31st Conference on Technology of Object Oriented Language and Systems (TOOLS'99)},
  publisher = {IEEE Computer Society},
  year      = {1999},
  pages     = {261-266},
}

@InProceedings{WPLZ99,
  author    = {Y. Wang and J. Pang and B. Li and and G. Zheng},
  title     = {On refinement of formal object-oriented specification},
  booktitle = {Proc.\ 5th Conference for Young Computer Scientists (ICYCS'99)},
  publisher = {International Academic Publishers},
  year      = {1999},
  pages     = {243-245},
}

%%%%%%%%%%%%%%%%%%%%%% Technical Reports
@TechReport{ZP11,
  author      = {C. Zhang and J. Pang},
  title       = {An algorithm for probabilistic alternating simulation},
  institution = {CoRR},
  number      = {abs/1106.1978},
  year        = {2011},
  note        = {\url{http://arxiv.org/abs/1106.1978}},
}

@TechReport{BEFP10,
  author      = {R. Bakhshi and J. Endrullis and W. J. Fokkink and J. Pang},
  title       = {Asynchronous Bounded Expected Delay Networks},
  institution = {CoRR},
  number      = {abs/1003.2084},
  year        = {2010},
  note        = {\url{http://arxiv.org/abs/1003.2084}},
}

@TechReport{ZP10,
  author      = {C. Zhang and J. Pang},
  title       = {On probabilistic alternating simulations},
  institution = {CoRR},
  number      = {abs/1003.0788},
  year        = {2010},
  note        = {\url{http://arxiv.org/abs/1003.0788}},
}

@Techreport{SLDP09,
  author      = {J. Sun and Y. Liu and J.-S. Dong and J. Pang},
  title       = {Towards a toolkit for efficient and flexible verification under fairness},
  number      = {TRB2/09},
  institution = {National University of Singapore, School of Computing},
  year        = {2009},
}

@TechReport{DDHJPP+07,
  author      = {W. Damm and S. Disch and H. Hungar and S. Jacobs and J. Pang
                 and F. Pigorsch and C. Scholl and U. Waldmann and B. Wirtz},
  title       = {Exact state set representations in the verification of linear hybrid systems with large discrete state-space},
  number      = {No. 21},
  institution = {SFB/TR 14 AVACS},
  year        = {2007},
}

@TechReport{FokPan04,
  author      = {W. J. Fokkink and J. Pang},
  title       = {Simplifying {I}tai-{R}odeh leader election for anonymous rings},
  number      = {SEN-R0405},
  institution = {CWI, Amsterdam},
  year        = {2004},
}

@TechReport{FHP04,
  author      = {W. J. Fokkink and J.-H. Hoepman and J. Pang},
  title       = {A note on $K$-state self-stabilization in a ring with $K$=$N$},
  number      = {SEN-R0402},
  institution = {CWI, Amsterdam},
  year        = {2004},
}

@TechReport{FGPBP03,
  author      = {W. J. Fokkink and J. F. Groote and J. Pang and B. Badban and J. C. {van de Pol}},
  title       = {Verifying a sliding window protocol in $\mu${CRL}},
  number      = {SEN-R0308},
  institution = {CWI, Amsterdam},
  year        = {2003},
}

@TechReport{FokPan02,
  author      = {W. J. Fokkink and J. Pang},
  title       = {Cones and foci for protocol verification revisited},
  number      = {SEN-R0229},
  institution = {CWI, Amsterdam},
  year        = {2002},
}

@TechReport{Pan02,
  author      = {J. Pang},
  title       = {Analysis of a security protocol in $\mu${CRL}},
  number      = {SEN-R0201},
  institution = {CWI, Amsterdam},
  year        = {2002},
}

@TechReport{GPW01,
  author      = {J. F. Groote and J. Pang and A. G. Wouters},
  title       = {Analysis of a distributed system for lifting trucks},
  number      = {SEN-R0111},
  institution = {CWI, Amsterdam},
  year        = {2001},
}
