
Summary
International Journals
-
Ownership infringement detection for generative adversarial networks against model stealing.
Hailong Hu and Jun Pang.
IEEE Transactions on Artificial Intelligence xx(x): xxx-xxx, 2025. (To appear)
-
KAGNNs: Kolmogorov-Arnold networks meet graph learning.
Roman Bresson, Giannis Nikolentzos,
George Panagopoulos, Michail Chatzianastasis,
Jun Pang, and Michalis Vazirgiannis.
Transactions on Machine Learning Research, 2025.
-
Multi-relational graph contrastive learning with learnable graph augmentation.
Xian Mo, Jun Pang,
and Zihang Zhao.
Applied Soft Computing 174: article 113008, 2025.
-
“Double vaccinated, 5G boosted!": Learning attitudes towards COVID-19 vaccination from social media.
Ninghan Chen, Xihui Chen,
Zhiqiang Zhong, and Jun Pang.
ACM Transactions on the Web 19(1): 1-24, 2025.
-
Fooling machine learning models: A novel out-of-distribution attack through generative adversarial networks.
Hailong Hu and Jun Pang.
Applied Intelligence 55(5): 327, 2025.
-
Multi-relational graph contrastive learning with learnable graph augmentation.
Xian Mo, Jun Pang,
Binyuan Wan, Rui Tang,
Hao Liu, and Shuyu Jiang.
Neural Networks 181: article 106757, 2025.
-
Learning graph representations for influence maximization.
George Panagopoulos, Nikolaos Tziortziotis,
Michalis Vazirgiannis, Jun Pang,
and Fragkiskos Malliaros.
Social Network Analysis and Mining 14: article 203, 2024.
-
XRAD: Ransomware address detection method based on Bitcoin transaction relationships.
Kai Wang, Michael Tong,
Jun Pang, Jitao Wang,
and Weili Han.
ACM Transactions on the Web 18(4): 1-33, 2024.
-
Revealing chemical trends: Insights from data-driven visualisation and patent analysis in exposomics research.
Dagny Aurich, Emma Schymanski,
Flavio de Jesus Matias, Paul Thiessen,
and Jun Pang.
Environmental Science & Technology Letters 11(10): 1046-1052, 2024.
-
Mechanizing the CMP abstraction for parameterized verification.
Yongjian Li,
Bohua Zhan, and Jun Pang.
Proceedings of the ACM on Programming Languages (OOPSLA)
8: 1324-1350, 2024.
-
Hierarchical bipartite graph convolutional network for recommendation.
Yi-Wei Cheng, Zhiqiang Zhong,
Jun Pang, and Cheng-Te Li.
IEEE Computational Intelligence Magazine 19(2): 49-60, 2024.
-
Deep autoencoder architecture with outliers for temporal attributed network embedding.
Xian Mo,
Jun Pang, and Zhiming Liu.
Expert Systems with Applications
240: 122596, 2024.
-
A tale of two roles: Exploring topic-specific susceptibility and influence in cascade prediction.
Ninghan Chen, Xihui Chen,
Zhiqiang Zhong, and Jun Pang.
Data Mining and Knowledge Discovery
38(1): 79-109, 2024.
-
Bridging performance of Twitter users: A predictor of subjective well-being during the pandemic.
Ninghan Chen, Xihui Chen,
Zhiqiang Zhong, and Jun Pang.
ACM Transactions on the Web 18(1): 15:1-15:23, 2024.
-
Multi-grained semantics-aware graph neural networks.
Zhiqiang Zhong, Cheng-Te Li,
and Jun Pang.
IEEE Transactions on Knowledge and Data Engineering
35(7): 7251-7262, 2023.
-
The applicability of transperceptual and deep learning approaches to the study and mimicry of complex cartilaginous tissues.
Jack Waghorne, Cameron Howard,
Hailong Hu, Jun Pang,
William Peveler, Louise Harris,
and Olga Barrera.
Frontiers in Materials
10, article 4 2023.
-
Relation-aware weighted embedding for heterogeneous graphs.
Ganglin Hu and Jun Pang.
Information Technology and Control
52(1): 199-214, 2023.
-
Hierarchical message-passing graph neural networks.
Zhiqiang Zhong, Cheng-Te Li,
and Jun Pang.
Data Mining and Knowledge Discovery
37(1): 381-408, 2023.
-
Target control of asynchronous Boolean networks.
Cui Su and Jun Pang.
IEEE/ACM Transactions on Computational Biology and Bioinformatics
20(1): 707-719, 2023.
-
Unsupervised network embedding beyond homophily.
Zhiqiang Zhong, Guadalupe Gonzalez,
Daniele Grattarola, and Jun Pang.
Transactions on Machine Learning Research, 2022.
-
Simplifying node classification on heterophilous graphs with compatible label propagation.
Zhiqiang Zhong, Sergey Ivanov,
and Jun Pang.
Transactions on Machine Learning Research, 2022.
-
Personalised meta-path generation for heterogeneous graph neural networks.
Zhiqiang Zhong, Cheng-Te Li,
and Jun Pang.
Data Mining and Knowledge Discovery
36(6): 2299-2333, 2022.
-
A multilingual dataset of COVID-19 vaccination attitudes on Twitter.
Ninghan Chen, Xihui Chen,
and Jun Pang.
Data in Brief
44: article 108503, 2022.
-
Review of current human genome-scale metabolic models for brain cancer and neurodegenerative diseases.
Ali Kishk, Maria Pires Pacheco,
Tony Heurtaux, Lasse Sinkkonen,
Jun Pang, Sabrina Fritah,
Simone Niclou, and Thomas Sauter.
Cells
11(16): article 2486, 2022.
-
Effective attributed network embedding with information behavior extraction.
Ganglin Hu, Jun Pang,
and Xian Mo.
PeerJ Computer Science
8: e1030, 2022.
-
Exploring spillover effects for COVID-19 cascade prediction.
Ninghan Chen, Xihui Chen,
Zhiqiang Zhong, and Jun Pang.
Entropy
4(2): article 222, 2022.
-
Modal characterisation of simulation relations in probabilistic concurrent games.
Chenyi Zhang and Jun Pang.
Science of Computer Programming
215: article 102762, 2022.
-
A large-scale empirical analysis of ransomware activities in Bitcoin.
Kai Wang, Jun Pang,
Dingjie Chen, Yu Zhao,
Dapeng Huang, Chen Chen, and Weili Han.
ACM Transactions on the Web 16(2): 7:1-7:29, 2022.
-
THS-GWNN: A deep learning framework for temporal network link prediction.
Xian Mo,
Jun Pang, and Zhiming Liu.
Frontiers of Computer Science
16(2): 162304, 2022.
-
Towards optimal decomposition of Boolean networks.
Cui Su, Jun Pang,
and Soumya Paul.
IEEE/ACM Transactions on Computational Biology and Bioinformatics
18(6): 2167-2176, 2021.
(Special issue of 17th Asia Pacific Bioinformatics Conference - APBC'19)
-
Semantic and relational spaces in science of science: Deep learning models for article vectorisation.
Diego Kozlowski, Jennifer Dusdal,
Jun Pang, and Andreas Zilian.
Scientometrics
126(7): 5881-5910, 2021.
-
CABEAN: A software for the control of asynchronous Boolean networks.
Cui Su and Jun Pang.
Bioinformatics
37(6): 879-881, 2021.
-
Effective link prediction with topological and temporal information using wavelet neural network embedding.
Xian Mo,
Jun Pang, and Zhiming Liu.
The Computer Journal
64(3): 325-336, 2021.
-
An exploratory study of COVID-19 information on Twitter in the Greater Region.
Ninghan Chen, Zhiqiang Zhong,
and Jun Pang.
Big Data and Cognitive Computing
5(1): article 5, 2021.
-
An efficient approach towards the source-target control of Boolean networks.
Soumya Paul, Cui Su,
Jun Pang, and Andrzej Mizera.
IEEE/ACM Transactions on Computational Biology and Bioinformatics
17(6): 1932-1945, 2020.
-
Algorithms for the sequential reprogramming of Boolean networks.
Hugues Mandon, Cui Su,
Jun Pang, Soumya Paul,
Stefan Haar, and Loïc Paulevé.
IEEE/ACM Transactions on Computational Biology and Bioinformatics
16(5): 1610-1619, 2019.
-
Controlling large Boolean networks with single-step perturbations.
Alexis Baudin, Soumya Paul,
Cui Su, and Jun Pang.
Bioinformatics
35(14): i558-i567, 2019.
(Special issue of 27th Conference on Intelligent Systems for Moblecular Biology and
18th European Conference on Computational Biology - ISMB/ECCB'19)
-
A new decomposition-based method for detecting attractors in synchronous Boolean networks.
Qixia Yuan, Andrzej Mizera,
Jun Pang, and Hongyang Qu.
Science of Computer Programming
180: 18-35, 2019.
-
An active learning-based approach for location-aware acquaintance inference.
Bo-Heng Chen, Cheng-Te Li,
Kun-Ta Chuang, Jun Pang,
and Yang Zhang.
Knowledge and Information Systems
59(3): 539-560, 2019.
-
GPU-accelerated steady-state computation of large probabilistic Boolean networks.
Andrzej Mizera, Jun Pang,
and Qixia Yuan.
Formal Aspects of Computing 31(1): 27-46, 2019.
-
Taming asynchrony for attractor detection in large Boolean networks.
Andrzej Mizera, Jun Pang,
Hongyang Qu, and Qixia Yuan.
IEEE/ACM Transactions on Computational Biology and Bioinformatics
16(1): 31-42, 2019.
(Special issue of 16th Asia Pacific Bioinformatics Conference - APBC'18)
-
An automatic proving approach to parameterized verification.
Yongjian Li, Kaiqiang Duan,
David Jansen, Jun Pang,
Lijun Zhang, Yi Lv,
and Shaowei Cai.
ACM Transactions on Computational Logic
19(4): 27:1-27, 2018.
-
Reviving the two-state Markov chain approach.
Andrzej Mizera,
Jun Pang, and Qixia Yuan.
IEEE/ACM Transactions on Computational Biology and Bioinformatics
15(5): 1525-1537, 2018.
(Special issue of 15th Asia Pacific Bioinformatics Conference - APBC'17)
-
Probabilistic model learning for model checking: An empirical study and a new approach.
Jingyi Wang, Jun Sun,
Qixia Yuan, and Jun Pang.
International Journal on Software Tools for Technology Transfer
20(6): 689-704, 2018.
-
ASSA-PBN: A toolbox for probabilistic Boolean networks.
Andrzej Mizera, Jun Pang,
Cui Su, and Qixia Yuan.
IEEE/ACM Transactions on Computational Biology and Bioinformatics
15(4): 1203-1216, 2018.
-
Formal modelling and analysis of receipt-free auction protocols in applied pi.
Naipeng Dong, Hugo Jonker,
and Jun Pang.
Computers & Security, 65: 405-432, 2017.
-
Improving BDD-based attractor detection for synchronous Boolean networks.
Qixia Yuan, Hongyang Qu,
Jun Pang, and Andrzej Mizera.
SCIENCE CHINA Information Sciences 59(8): 080101:1-080101:16, 2016.
-
A new access control scheme for Facebook-style social networks.
Jun Pang and Yang Zhang.
Computers & Security, 54: 44-59, 2015.
-
Formalizing provable anonymity in Isabelle/HOL.
Yongjian Li and Jun Pang.
Formal Aspects of Computing 27(2): 255-282, 2015.
-
Constructing and comparing user mobility profiles.
Xihui Chen, Jun Pang,
and Ran Xue.
ACM Transactions on the Web 8(4): 21:1-21:25, 2014.
-
optPBN: an optimisation toolbox for probabilistic Boolean networks.
Panuwat Trairatphisan, Andrzej Mizera,
Jun Pang, Alexandru-Adrian Tantar,
and Thomas Sauter.
PLOS ONE 9(7): e98001, 2014.
-
Protecting query privacy in location-based services.
Xihui Chen and Jun Pang.
GeoInformatica 18(1): 95-133, 2014.
-
Model checking with fairness assumptions using PAT.
Yuanjie Si, Jun Sun,
Yang Liu, Jin Song Dong,
Jun Pang, Shaojie Zhang,
and Xiaohu Yang.
Frontiers of Computer Science 8(1): 1-16, 2014.
-
Privacy and verifiability in voting systems: Methods, developments and trends.
Hugo Jonker, Sjouke Mauw,
and Jun Pang.
Computer Science Review 10: 1-30, 2013.
-
Recent development and biomedical applications of probabilistic Boolean networks.
Panuwat Trairatphisan, Andrzej Mizera,
Jun Pang, Alexandru-Adrian Tantar,
Jochen Schneider, and Thomas Sauter.
Cell Communication and Signaling 11: 46, 2013.
-
An inductive approach to strand spaces.
Yongjian Li and Jun Pang.
Formal Aspects of Computing 25(4): 465-501, 2013.
-
Design and formal verification of a certified email protocol with transparent TTP.
Zhiyuan Liu, Jun Pang,
and Chenyi Zhang.
Frontiers of Computer Science 7(2): 279-297, 2013.
-
Design and formal analysis of a group signature based electronic toll pricing system.
Xihui Chen, Gabriele Lenzini,
Sjouke Mauw and Jun Pang.
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 4(1): 55-75, 2013.
-
A trust-augmented voting scheme for collaborative privacy management.
Yanjie Sun, Chenyi Zhang,
Jun Pang, Baptiste Alcalde,
and Sjouke Mauw.
Journal of Computer Security 20(4): 437-459, 2012.
-
Probabilistic model checking of the PDGF signaling pathway.
Qixia Yuan, Panuwat Trairatphisan,
Jun Pang, Sjouke Mauw,
Monique Wiesinger, and Thomas Sauter.
Transactions on Computational Systems Biology XIV,
Lecture Notes in Bioinformatics 7625, pp. 151-180. ©Springer-Verlag, 2012.
-
Game-based verification of contract signing protocols with minimal messages.
Ying Zhang, Chenyi Zhang,
Jun Pang, and Sjouke Mauw.
Innovations in Systems and Software Engineering 8(2): 111-124, 2012.
-
Fast leader election in anonymous rings with bounded expected delay.
Rena Bakhshi, Jörg Endrullis,
Wan Fokkink, and Jun Pang.
Information Processing Letters 111(17): 864-870, 2011.
-
Extending the strand space method with timestamps: (Part II) Application to Kerberos V.
Yongjian Li and Jun Pang.
Journal of Information Security 1(1): 56-67. 2010.
-
Extending the strand space method with timestamps: (Part I) The theory.
Yongjian Li and Jun Pang.
Journal of Information Security 1(1): 45-55. 2010.
-
A formal framework for quantifying voter-controlled privacy.
Hugo Jonker, Sjouke Mauw,
and Jun Pang.
Journal of Algorithms 64(2-3): 89-105, 2009.
-
On automatic verification of self-stabilizing population protocols.
Jun Pang, Zhengqin Luo,
and Yuxin Deng.
Frontiers of Computer Science, 2(4): 357-367, 2008.
-
Is timed branching bisimilarity a congruence indeed?.
Wan Fokkink, Jun Pang,
and Anton Wijs.
Fundamenta Informaticae, 87(3-4): 287-311, 2008.
-
Model checking a cache coherence protocol of a Java DSM implementation.
Jun Pang, Wan Fokkink,
Rutger Hofman, and Ronald Veldema.
Journal of Logic and Algebraic Programming, 71(1): 1-43, 2007.
-
Variations on Itai-Rodeh leader election for anonymous rings and their analysis in PRISM.
Wan Fokkink and Jun Pang.
Journal of Universal Computer Science, 12(8): 981-1006, 2006.
-
Cones and foci: A mechanical framework for protocol verification.
Wan Fokkink, Jun Pang,
and Jaco van de Pol.
Formal Methods in System Design, 29(1): 1-31, 2006.
-
Verification of a sliding window protocol in µCRL and PVS.
Bahareh Badban, Wan Fokkink,
Jan Friso Groote, Jun Pang,
and Jaco van de Pol.
Formal Aspects of Computing, 17(3): 342-388, 2005.
-
A note on K-state self-stabilization in a ring with K=N.
Wan Fokkink, Jaap-Henk Hoepman,
and Jun Pang.
Nordic Journal of Computing, 12(1): 18-26, 2005.
-
A model to slice Java programs hierarchically.
Bixin Li, Xiaocong Fan,
Jun Pang, and Jianjun Zhao.
Journal of Computer Science and Technology, 19(6): 848-858, 2004.
-
Analysis of a distributed system for lifting trucks.
Jan Friso Groote, Jun Pang,
and Arno Wouters.
Journal of Logic and Algebraic Programming, 55(1-2): 21-56, 2003.
-
A formal software development approach using refinement calculus.
Yunfeng Wang, Jun Pang,
Ming Zha, Zhaohui Yang,
and Guoliang Zheng.
Journal of Computer Science and Technology, 16(3): 251-262, 2001.
International Conference and Workshop Proceedings
-
Privacy-preserving distributed maximum consensus without accuracy loss.
Wenrui Yu, Richard Heusdens,
Jun Pang, and Qiongxiu Li.
In Proc. 2025 IEEE International Conference on Acoustics, Speech, and Signal Processing - ICASSP'25,
pp, 1-5.
©IEEE Signal Processing Society, 2025.
-
Structural inference of dynamical systems with conjoined state space models.
Aoran Wang and Jun Pang.
In Proc. 38th Annual Conference on Neural Information Processing Systems - NeurIPS'24, 2024.
-
Benchmarking structural inference methods for interacting dynamical systems with synthetic data.
Aoran Wang, Tsz Pan Tong,
Andrzej Mizera, and Jun Pang.
In Proc. 38th Annual Conference on Neural Information Processing Systems (Datasets and Benchmarks Track) - NeurIPS'24, 2024.
-
Integrating optimal transport and structural inference models for GRN inference from single-cell data.
Tsz Pan Tong, Aoran Wang,
George Panagopoulos, and Jun Pang.
In Proc. 3rd International Workshop on Machine Learning for Irregular Time Series - ML4ITS'24,
Communications in Computer and Information Science xxxxx, pp. xxx-xxx.
©Springer-Verlag, 2024. (To appear)
-
Observability of Boolean control networks: New definition and verification algorithm.
Guisen Wu, Zhiming Liu,
and Jun Pang.
In Proc. 25th International Conference on Formal Engineering Methods - ICFEM'24,
Lecture Notes in Computer Science 15394, pp. 278-296.
©Springer-Verlag, 2024.
-
Uplift modeling under limited supervision.
George Panagopoulos, Daniele Malitesta,
Fragkiskos D. Malliaros, and Jun Pang.
In Proc. 35th European Conference on Machine Learning and 28th European Conference on Principles and Practice of Knowledge Discovery in Databases - ECML/PKDD'24,
Lecture Notes in Computer Science 14946, pp. 127-144.
©Springer-Verlag, 2024.
-
Formal verification and solutions for Estonian e-voting.
Sevdenur Baloglu, Sergiu Bursuc,
Sjouke Mauw, and Jun Pang.
In Proc. 19th ACM Asia Conference on Computer and Communications Security - AsiaCCS'24,
pp. 728-741. ©ACM Press, 2024.
-
Exploring unconfirmed transactions for effective Bitcoin address clustering.
Kai Wang, Yakun Cheng,
Maike Tong, Zhenghao Niu,
Jun Pang, and Weili Han.
In Proc. The Web Conference 2024 - WWW'24,
pp. 1880-1891. ©ACM Press, 2024.
-
Structural inference with dynamics encoding and partial correlation coefficients.
Aoran Wang and Jun Pang.
In Proc. 12th International Conference on Learning Representations - ICLR'24.
OpenReview.net, 2024.
-
Loss and likelihood based membership inference of diffusion models.
Hailong Hu and Jun Pang.
In Proc. 26th International Conference on Information Security - ISC'23,
Lecture Notes in Computer Science 14411, pp. 121-141.
©Springer-Verlag, 2023.
-
Single-experiment reconstructibility of Boolean control networks revisited.
Guisen Wu and Jun Pang.
In Proc. 20th International Conference on Informatics in Control, Automation and Robotics - ICINCO'23 (Volume 2),
pp. 85-93.
©SciTePress, 2023.
-
On observability analysis in multiagent systems.
Chunyan Mu and Jun Pang.
In Proc. 26th European Conference on Artificial Intelligence - ECAI'23,
pp. 1755-1762.
©IOS Press, 2023.
-
Structural-semantics guided program simplification for understanding neural code intelligence models.
Chaoxuan Shi, Tingwei Zhu,
Tian Zhang, Jun Pang,
and Minxue Pan.
In Proc. 14th Asia-Pacific Symposium on Internetware - Internetware'23,
pp. 1-11. ©ACM Press, 2023.
-
Active learning based structural inference.
Aoran Wang and Jun Pang.
In Proc. 40th International Conference on Machine Learning - ICML'23,
pp. 36224-36245.
PMRL, 2023.
-
Effective and efficient structural inference with reservoir computing.
Aoran Wang, Tsz Pan Tong,
and Jun Pang.
In Proc. 40th International Conference on Machine Learning - ICML'23,
pp. 36391-36410.
PMRL, 2023.
-
Election verifiability in receipt-free voting protocols.
Sevdenur Baloglu, Sergiu Bursuc,
Sjouke Mauw, and Jun Pang.
In Proc. 36th IEEE Computer Security Foundations Symposium - CSF'23,
pp. 63-78.
©IEEE Computer Society, 2023.
-
Iterative structural inference of directed graphs.
Aoran Wang and Jun Pang.
In Proc. 36th Annual Conference on Neural Information Processing Systems - NeurIPS'22, 2022.
-
NEGAR: Network embedding guided architecture recovery for software systems.
Jiayi Chen, Zhixing Wang,
Yuchen Jiang, Tian Zhang,
Jun Pang, Minxue Pan,
and Jianwen Sun.
In Proc. 29th Asia-Pacific Software Engineering Conference - APSEC'22,
pp. 367-376.
©IEEE Computer Society, 2022.
-
Measuring COVID-19 vaccine hesitancy: Consistency of social media with surveys.
Ninghan Chen, Xihui Chen,
Jun Pang Chen, Liyousew Borga,
Conchita D'Ambrosio, and Claus Vögele.
In Proc. 13th International Conference on Social Informatics - SocInfo'22,
Lecture Notes in Computer Science 13618, pp. 196-210.
©Springer-Verlag, 2022.
-
Target control of Boolean networks with permanent edgetic perturbations.
Olivier Zeyen and Jun Pang.
In Proc. 61st IEEE Conference on Decision and Control - CDC'22,
pp. 4236-4243.
©IEEE Control Systems Society, 2022.
-
The burden of being a bridge: Analysing subjective well-being of Twitter users during the COVID-19 pandemic.
Ninghan Chen, Xihui Chen,
Zhiqiang Zhong, and Jun Pang.
In Proc. 33rd European Conference on Machine Learning and 26th European Conference on Principles and Practice of Knowledge Discovery in Databases - ECML/PKDD'22,
Lecture Notes in Computer Science 13714, pp. 241-257.
©Springer-Verlag, 2022.
-
Functional scenario classification for Android applications using GNNs.
Guiyin Li, Fengyi Zhu,
Jun Pang, Tian Zhang,
Minxue Pan, and Xuandong Li.
In Proc. 13th Asia-Pacific Symposium on Internetware - Internetware'22,
pp. 1-9. ACM Press, 2022.
-
From #Jobsearch to #Mask: Improving COVID-19 cascade prediction with spillover effects.
Ninhang Chen, Xihui Chen,
Zhiqiang Zhong, and Jun Pang.
In Proc. 2021 Workshop on Social Influence - SI'21
(as part of 13th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining - ASONAM'21),
pp. 455-462.
©IEEE Computer Society, 2021.
-
Stealing machine learning models: Attacks and countermeasures for generative adversarial networks.
Hailong Hu and Jun Pang.
In Proc. 37th Annual Computer Security Applications Conference - ACSAC'21,
pp. 1-16. ©ACM Press, 2021.
(Best Paper Award Honorable Mention)
-
CABEAN 2.0: Efficient and efficacious control of asynchronous Boolean networks.
Cui Su and Jun Pang.
In Proc. 24th International Symposium on Formal Methods - FM'21,
Lecture Notes in Computer Science 13047, pp. 581-598.
©Springer-Verlag, 2021.
-
Provably improving election verifiability in Belenios.
Sevdenur Baloglu, Sergiu Bursuc,
Sjouke Mauw,and Jun Pang.
In Proc. 6th International Joint Conference on Electronic Voting - E-VOTE-ID'21,
Lecture Notes in Computer Science 12900, pp. 1-16.
©Springer-Verlag, 2021.
-
Temporal networks based industry identification for Bitcoin users.
Weili Han, Dingjie Chen,
Jun Pang, Kai Wang,
Chen Chen, Dapeng Huang, and Zhijie Fan.
In Proc. 16th International Conference on Wireless Algorithms, Systems, and Applications - WASA'21,
Lecture Notes in Computer Science 12937, pp. 108-120.
©Springer-Verlag, 2021.
-
Hilbert Sinkhorn divergence for optimal transport.
Qian Li, Zhichao Wang,
Gang Li, Jun Pang,
and Guandong Xu.
In Proc. 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition - CVPR'21,
pp. 3835-3844.
Computer Vision Foundation, 2021.
-
Election verifiability revisited: Automated security proofs and attacks on Helios and Belenios.
Sevdenur Baloglu, Sergiu Bursuc,
Sjouke Mauw, and Jun Pang.
In Proc. 34th IEEE Computer Security Foundations Symposium - CSF'21,
pp. 1-15.
©IEEE Computer Society, 2021.
-
Accelerated verification of parametric protocols with decision trees.
Yongjian Li, Taifeng Cao,
David Jansen, Jun Pang,
and Xiaotao Wei.
In Proc. 38th IEEE International Conference on Computer Design - ICCD'20,
pp. 397-404.
©IEEE Computer Society, 2020.
-
NeuLP: An end-to-end deep-learning model for link prediction.
Zhiqiang Zhong,
Yang Zhang, and Jun Pang.
In Proc. 21st International Conference on Web Information System Engineering - WISE'20,
Lecture Notes in Computer Science 12342, pp. 96-108.
©Springer-Verlag, 2020.
-
Higher-order graph convolutional embedding for temporal networks.
Xian Mo,
Jun Pang, and Zhiming Liu.
In Proc. 21st International Conference on Web Information System Engineering - WISE'20,
Lecture Notes in Computer Science 12342, pp. 3-15.
©Springer-Verlag, 2020.
-
A dynamics-based approach for the target control of Boolean networks.
Cui Su and Jun Pang.
In Proc. 11th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics - BCB'20,
pp. 50:1-50:8. ©ACM Press, 2020.
-
Sequential temporary and permanent control of Boolean networks.
Cui Su and Jun Pang.
In Proc. 18th International Conference on Computational Methods in Systems Biology - CMSB'20,
Lecture Notes in Computer Science 12314, pp. 234-251.
©Springer-Verlag, 2020.
-
Characterising probabilistic alternating simulation for concurrent games.
Chenyi Zhang and Jun Pang.
In Proc. 14th IEEE Symposium on Theoretical Aspects of Software Engineering - TASE'20, pp. 121-128.
©IEEE Computer Society, 2020.
-
Online observability of Boolean control networks.
Guisen Wu, Liyun Dai
Zhiming Liu, Taolue Chen,
and Jun Pang.
In Proc. 21st World Congress of the International Federation of Automatic Control - IFAC'20,
IFAC-Papers On Line 53(2): 1057-1064,
©IFAC, 2020.
-
A learning-based framework for automatic parameterized verification.
Yongjian Li, Jialun Cao,
and Jun Pang.
In Proc. 37th IEEE International Conference on Computer Design - ICCD'19,
pp. 450-459.
©IEEE Computer Society, 2019.
-
A graph-based approach to explore relationship between hashtags and images.
Zhiqiang Zhong,
Yang Zhang, and Jun Pang.
In Proc. 20th International Conference on Web Information System Engineering - WISE'19,
Lecture Notes in Computer Science 11881, pp. 473-488.
©Springer-Verlag, 2019.
-
Controlling large Boolean networks with temporary and permanent perturbations.
Cui Su, Soumya Paul,
and Jun Pang.
In Proc. 23rd International Symposium on Formal Methods - FM'19,
Lecture Notes in Computer Science 11800, pp. 707-724.
©Springer-Verlag, 2019.
-
Sequential reprogramming of Boolean networks made practical.
Hugues Mandon, Cui Su,
Stefan Haar, Jun Pang,
and Loïc Paulevé.
In Proc. 17th International Conference on Computational Methods in Systems Biology - CMSB'19,
Lecture Notes in Computer Science 11773, pp. 3-19.
©Springer-Verlag, 2019.
(Best Paper Award)
-
L-CMP: An automatic learning-based parameterized verification tool.
Jialun Cao, Yongjian Li,
and Jun Pang.
In Proc. 33rd IEEE/ACM International Conference on Automated Software Engineering - ASE'18,
pp. 892-895. ©ACM Press, 2018.
-
A decomposition-based approach towards the control of Boolean networks.
Soumya Paul, Cui Su,
Jun Pang, and Andrzej Mizera.
In Proc. 9th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics - BCB'18,
pp. 11-20. ©ACM Press, 2018.
-
Towards the existential control of Boolean networks: a preliminary report.
Soumya Paul, Jun Pang,
and Cui Su.
In Proc. 4th International Symposium on Dependable Software Engineering: Theories, Tools, and Applications - SETTA'18,
Lecture Notes in Computer Science 10998, pp. 142-149.
©Springer-Verlag, 2018.
-
ASSA-PBN 3.0: Analysing context-sensitive probabilistic Boolean networks.
Andrzej Mizera, Jun Pang,
Hongyang Qu, and Qixia Yuan.
In Proc. 16th International Conference on Computational Methods in Systems Biology - CMSB'18,
Lecture Notes in Computer Science 11095, pp. 277-284.
©Springer-Verlag, 2018.
-
Tagvisor: A privacy advisor for sharing hashtags.
Yang Zhang, Mathias Humbert,
Tahleen Rahman, Cheng-Te Li,
Jun Pang, and Michael Backes.
In Proc. The Web Conference 2018 - WWW'18,
pp. 287-296. ©ACM Press, 2018.
-
Semantic annotation for places in LBSN through graph embedding.
Yan Wang, Zongxu Qin,
Jun Pang, Yang Zhang,
and Xin Jin.
In Proc. 26th ACM International Conference on Information and Knowledge Management - CIKM'17,
pp. 2343-2346. ©ACM Press, 2017.
-
walk2friends: Inferring social links from mobility profiles.
Michael Backes, Mathias Humbert,
Jun Pang, and Yang Zhang.
In Proc. 24th ACM International Conference on Computer and Communications Security - CCS'17,
pp. 1943-1957. ©ACM Press, 2017.
-
A new decomposition method for attractor detection in large synchronous Boolean networks.
Andrzej Mizera, Jun Pang,
Hongyang Qu, and Qixia Yuan.
In Proc. 3rd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications - SETTA'17,
Lecture Notes in Computer Science 10606, pp. 232-249.
©Springer-Verlag, 2017.
(Best Paper Award Honorable Mention)
-
A verification framework for stateful security protocols.
Li Li, Naipeng Dong,
Jun Pang, Jun Sun,
Guandong Bai, Yang Liu,
and Jin Song Dong.
In Proc. 19th International Conference on Formal Engineering Methods - ICFEM'17,
Lecture Notes in Computer Science 10610, pp. 262-280.
©Springer-Verlag, 2017.
-
Does #like4like Indeed Provoke More Likes?.
Yang Zhang, Minyue Ni,
Weili Han, and Jun Pang.
In Proc. 16th IEEE/WIC/ACM International Conference on Web Intelligence - WI'17,
pp. 179-186. ©ACM Press, 2017.
-
Quantifying location sociality.
Jun Pang and Yang Zhang.
In Proc. 28th ACM Conference on Hypertext and Social Media - HT'17,
pp. 145-154. ©ACM Press, 2017.
-
DeepCity: A feature learning framework for mining location check-ins.
Jun Pang and Yang Zhang.
In Proc. 11th International AAAI Conference on Web and Social Media - ICWSM'17,
pp. 652-655. ©AAAI Press, 2017.
-
Should we learn probabilistic models for model checking? A new approach and an empirical study.
Jingyi Wang, Jun Sun,
Qixia Yuan, and Jun Pang.
In Proc. 20th International Conference on Fundamental Approaches to Software Engineering - FASE'17,
Lecture Notes in Computer Science 10202, pp. 3-21.
©Springer-Verlag, 2017.
-
Modeling city locations as complex networks: An initial study.
Lu Zhou, Yang Zhang,
Jun Pang, and Cheng-Te Li.
In Proc. 5th International Workshop on Complex Networks and their Applications - CNA'16,
Studies in Computational Intelligence Series 693, pp. 735-747.
©Springer-Verlag, 2016.
-
A novel approach to parameterized verification of cache coherence protocols.
Yongjian Li, Kaiqiang Duan,
Yi Lv, Jun Pang,
and Shaowei Cai.
In Proc. 34th IEEE International Conference on Computer Design - ICCD'16,
pp. 560-567.
©IEEE Computer Society, 2016.
-
GPU-accelerated steady-state computation of large probabilistic Boolean networks.
Andrzej Mizera,
Jun Pang, and Qixia Yuan.
In Proc. 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications - SETTA'16,
Lecture Notes in Computer Science 9984, pp. 50-66.
©Springer-Verlag, 2016.
-
On impact of weather on human mobility in cities.
Jun Pang,
Polina Zablotskaia, and Yang Zhang.
In Proc. 17th International Conference on Web Information System Engineering - WISE'16,
Lecture Notes in Computer Science 10042, pp. 247-256.
©Springer-Verlag, 2016.
-
Fast simulation of probabilistic Boolean networks.
Andrzej Mizera,
Jun Pang, and Qixia Yuan.
In Proc. 14th International Conference on Computational Methods in Systems Biology - CMSB'16,
Lecture Notes in Computer Science 9859, pp. 216-231.
©Springer-Verlag, 2016.
-
ASSA-PBN 2.0: A software tool for probabilistic Boolean networks.
Andrzej Mizera,
Jun Pang, and Qixia Yuan.
In Proc. 14th International Conference on Computational Methods in Systems Biology - CMSB'16,
Lecture Notes in Computer Science 9859, pp. 309-315.
©Springer-Verlag, 2016.
-
Towards novel public transport services via real-time optimisation of demand and supply with traveller incentivisation.
Marcin Seredynski, Jun Pang,
Dzmitry Kliazovich, and Djamel Khadraoui.
In Proc. 23rd World Congress on Intelligent Transport Systems - ITS'16', 2016.
-
An empirical study on user access control in online social networks.
Minyue Ni, Yang Zhang,
Weili Han, and Jun Pang.
In Proc. 21st ACM Symposium on Access Control Models and Technologies - SACMAT'16,
pp. 13-23. ©ACM Press, 2016.
-
Parallel approximate steady-state analysis of large probabilistic Boolean networks.
Andrzej Mizera,
Jun Pang, and Qixia Yuan.
In Proc. 31st ACM Symposium on Applied Computing - SAC'16,
pp. 1-8. ©ACM Press, 2016.
-
Improving BDD-based attractor detection for synchronous Boolean networks.
Hongyang Qu, Qixia Yuan,
Jun Pang, and Andrzej Mizera.
In Proc. 7th Asia-Pacific Symposium on Internetware - Internetware'15,
pp. 212-220. ©ACM Press, 2015.
-
Location prediction: Communities speak louder than friends.
Jun Pang and Yang Zhang.
In Proc. 3rd ACM Conference on Online Social Networks - COSN'15,
pp. 161-171. ©ACM Press, 2015.
-
Activity tracking: A new attack on location privacy.
Xihui Chen,
Andrzej Mizera, and Jun Pang.
In Proc. 3rd IEEE Conference on Communications and Network Security - CNS'15,
pp. 22-30.
©IEEE Computer Society, 2015.
-
ASSA-PBN: An approximate steady-state analyser for probabilistic Boolean networks.
Andrzej Mizera,
Jun Pang, and Qixia Yuan.
In Proc. 13th International Symposium on Automated Technology for Verification and Analysis - ATVA'15,
Lecture Notes in Computer Science 9364, pp. 214-220.
©Springer-Verlag, 2015.
-
paraVerifier: An automatic framework for proving parameterized cache coherence protocols.
Yongjian Li, Jun Pang,
Yi Lv, Dongrui Fan,
Shen Cao, and Kaiqiang Duan.
In Proc. 13th International Symposium on Automated Technology for Verification and Analysis - ATVA'15,
Lecture Notes in Computer Science 9364, pp. 207-213.
©Springer-Verlag, 2015.
-
Inferring friendship from check-in data of location-based social networks.
Ran Cheng,
Jun Pang, and Yang Zhang.
In Proc. 5th Workshop on Social Network Analysis in Applications - SNAA'15
(as part of 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining - ASONAM'15),
pp. 1284-1291. ©ACM Press, 2015.
-
Distance and friendship: A distance-based model for link prediction in social networks.
Yang Zhang and Jun Pang.
In Proc. 17th Asia-Pacific Web Conference - APWeb'15,
Lecture Notes in Computer Science 9313, pp. 55-66.
©Springer-Verlag, 2015.
-
Event prediction with community leaders.
Jun Pang and Yang Zhang.
In Proc. 10th International Conference on Availability, Reliability and Security - ARES'15,
pp. 238-243.
©IEEE Computer Society, 2015.
-
Community-driven social influence analysis and applications.
Yang Zhang and Jun Pang.
In Proc. 15th International Conference on Web Engineering (PhD Symposium) - ICWE'15,
Lecture Notes in Computer Science 9114, pp. 644-647.
©Springer-Verlag, 2015.
-
A logical approach to restricting access in online social networks.
Marcos Cramer, Jun Pang,
and Yang Zhang.
In Proc. 20th ACM Symposium on Access Control Models and Technologies - SACMAT'15,
pp. 75-86. ©ACM Press, 2015.
-
Cryptographic protocols for enforcing relationship-based access control policies.
Jun Pang and Yang Zhang.
In Proc. 39th Annual IEEE Computers, Software & Applications Conference - COMPSAC'15,
pp. 484-493.
©IEEE Computer Society, 2015.
-
Dynamic analysis of usage control policies.
Yehia Elrahaiby and Jun Pang.
In Proc. 11th International Conference on Security and Cryptography - SECRYPT'14,
pp. 88-100. ©SciTePress, 2014.
-
MinUS: Mining user similarity with trajectory patterns.
Xihui Chen, Piotr Kordy,
Ruipeng Lu, and Jun Pang.
In Proc. 25th European Conference on Machine Learning and 18th European Conference on Principles and Practice of Knowledge Discovery in Databases - ECML/PKDD'14,
Lecture Notes in Computer Science 8726, pp. 436-439.
©Springer-Verlag, 2014.
-
A new access control scheme for Facebook-style social networks.
Jun Pang and Yang Zhang.
In Proc. 9th International Conference on Availability, Reliability and Security - ARES'14,
pp. 1-10.
©IEEE Computer Society, 2014.
(Best Paper Award)
-
Measuring user similarity with trajectory patterns: Principles and new metrics.
Xihui Chen, Ruipeng Lu,
Xiaoxing Ma, and Jun Pang.
In Proc. 16th Asia-Pacific Web Conference - APWeb'14,
Lecture Notes in Computer Science 8709, pp. 437-448.
©Springer-Verlag, 2014.
-
Model-checking based approaches to parameter estimation of gene regulatory networks.
Andrzej Mizera, Jun Pang,
and Qixia Yuan.
In Proc. 19th IEEE Conference on Engineering of Complex Computer Systems - ICECCS'14,
pp. 206-209.
©IEEE Computer Society, 2014.
-
Symbolic analysis of an electric vehicle charging protocol.
Li Li, Jun Pang,
Yang Liu, Jun Sun,
and Jin Song Dong.
In Proc. 19th IEEE Conference on Engineering of Complex Computer Systems - ICECCS'14,
pp. 11-18.
©IEEE Computer Society, 2014.
-
A strand space approach to provable anonymity.
Yongjian Li and Jun Pang.
In Proc. 2nd International Workshop on Formal Techniques for Safety-Critical Systems - FTSCS'13,
Communications in Computer and Information Science 419, pp. 71-87.
©Springer-Verlag, 2014.
-
DEMO: Demonstrating a trust framework for evaluating GNSS signal integrity.
Xihui Chen, Carlo Harpes,
Gabriele Lenzini, Miguel Martins,
Sjouke Mauw, and Jun Pang.
In Proc. 20th ACM International Conference on Computer and Communications Security - CCS'13,
pp. 1329-1332. ©ACM Press, 2013.
-
Verification of functional and non-functional requirements of web service composition.
Manman Chen, Tian Huat Tan,
Jun Sun, Yang Liu,
Jun Pang, and Xiaohong Li.
In Proc. 15th International Conference on Formal Engineering Methods - ICFEM'13,
Lecture Notes in Computer Science 8144, pp.313-328.
©Springer-Verlag, 2013.
-
Enforcing privacy in the presence of others: Notions, formalisations and relations.
Naipeng Dong, Hugo Jonker,
and Jun Pang.
In Proc. 18th European Symposium on Research in Computer Security - ESORICS'13,
Lecture Notes in Computer Science 8134, pp. 499-516.
©Springer-Verlag, 2013.
-
A trust framework for evaluating GNSS signal integrity.
Xihui Chen, Gabriele Lenzini,
Miguel Martins, Sjouke Mauw,
and Jun Pang.
In Proc. 26th IEEE Computer Security Foundations Symposium - CSF'13,
pp. 179-192.
©IEEE Computer Society, 2013.
-
Mathematical modelling of the Platelet-Derived Growth Factor (PDGF) signalling pathway (abstract).
Andrzej Mizera, Jun Pang,
Thomas Sauter, and Panuwat Trairatphisan.
In Proc. 4th International Workshop on Computational Models for Cell Processes - CompMod'13,
Electronic Proceedings in Theoretical Computer Science 116, pp. 35. 2013.
-
Constructing and comparing user mobility profiles for location-based services.
Xihui Chen, Jun Pang,
and Ran Xue.
In Proc. 28th ACM Symposium on Applied Computing - SAC'13,
pp. 261-266. ©ACM Press, 2013.
-
Exploring dependency for query privacy protection in location-based services.
Xihui Chen and Jun Pang.
In Proc. 3rd ACM Conference on Data and Application Security and Privacy - CODASPY'13,
pp.37-47. ©ACM Press, 2013.
(Outstanding Paper Award)
-
Post-hoc analysis of user traceability in electronic toll collection systems.
Xihui Chen, David Fonkwe,
and Jun Pang.
In Proc. 7th International Workshop on Data Privacy Management - DPM'12,
Lecture Notes in Computer Science 7731, pp. 29-42.
©Springer-Verlag, 2013.
-
Implementation and validation of a localisation assurance service provider.
Xihui Chen, Carlo Harpes,
Gabriele Lenzini, Miguel Martins,
Sjouke Mauw, and Jun Pang.
In Proc. 6th ESA Workshop on Satellite Navigation Technologies - NAVITEC'12,
pp. 1-8.
©IEEE Computer Society, 2012.
-
Formal analysis of privacy in an eHealth protocol.
Naipeng Dong, Hugo Jonker,
and Jun Pang.
In Proc. 17th European Symposium on Research in Computer Security - ESORICS'12,
Lecture Notes in Computer Science 7459, pp. 325-342.
©Springer-Verlag, 2012.
-
A group signature based electronic toll pricing system.
Xihui Chen, Gabriele Lenzini,
Sjouke Mauw, and Jun Pang.
In Proc. 7th International Conference on Availability, Reliability and Security - ARES'12,
pp. 85-93.
©IEEE Computer Society, 2012.
-
Comparative analysis of clustering protocols with probabilistic model checking.
Qian Li, Péter Schaffer,
Jun Pang, and Sjouke Mauw.
In Proc. 6th IEEE Symposium on Theoretical Aspects of Software Engineering - TASE'12, pp. 249-252.
©IEEE Computer Society, 2012.
-
Challenges in eHealth: from enabling to enforcing privacy.
Naipeng Dong, Hugo Jonker,
and Jun Pang.
In Proc. 1st International Symposium on Foundations of Health Information Engineering and Systems - FHIES'11,
Lecture Notes in Computer Science 7151, pp. 195-206.
©Springer-Verlag, 2012.
-
Measuring query privacy in location-based services.
Xihui Chen and Jun Pang.
In Proc. 2nd ACM Conference on Data and Application Security and Privacy - CODASPY'12,
pp. 49-60. ©ACM Press, 2012.
-
An algorithm for probabilistic alternating simulation.
Chenyi Zhang and Jun Pang.
In Proc. 38th International Conference on Current Trends in Theory and Practice of Computer Science - SOFSEM'12,
Lecture Notes in Computer Science 7147, pp. 431-442.
©Springer-Verlag, 2012.
-
Selective location blinding using hash chains.
Gabriele Lenzini, Sjouke Mauw,
and Jun Pang.
In Proc. 19th International Workshop on Security Protocols - SPW'11,
Lecture Notes in Computer Science 7114, pp. 132-141.
©Springer-Verlag, 2011.
-
A study of the PDGF signaling pathway with PRISM.
Qixia Yuan, Jun Pang,
Sjouke Mauw, Panuwat Trairatphisan,
Monique Wiesinger, and Thomas Sauter.
In Proc. 3rd International Workshop on Computational Models for Cell Processes - CompMod'11,
Electronic Proceedings in Theoretical Computer Science 67, pp. 65-81. 2011.
-
An inductive approach to provable anonymity.
Yongjian Li and Jun Pang.
In Proc. 6th International Conference on Availability, Reliability and Security - ARES'11,
pp. 454-459.
©IEEE Computer Society, 2011.
-
Bulletin boards in voting systems: Modelling and measuring privacy.
Hugo Jonker and Jun Pang.
In Proc. 6th International Conference on Availability, Reliability and Security - ARES'11,
pp. 294-300.
©IEEE Computer Society, 2011.
-
Verification of a key-chain based TTP transparent CEM protocol.
Zhiyuan Liu, Jun Pang,
and Chenyi Zhang.
In Proc. 3rd International Workshop on Harnessing Theories for Tool Support in Software - TTSS'10,
Electronic Notes in Theoretical Computer Science 274, pp 51-65.
©Elsevier, 2011.
-
A trust-augmented voting scheme for collaborative privacy management.
Yanjie Sun, Chenyi Zhang,
Jun Pang, Baptiste Alcalde,
and Sjouke Mauw.
In Proc. 6th International Workshop on Security and Trust Management - STM'10,
Lecture Notes in Computer Science 6710, pp. 132-146.
©Springer-Verlag, 2011.
-
On combining state space reductions with global fairness assumptions.
Shaojie Zhang, Jun Sun,
Jun Pang, Yang Liu,
and Jin Song Dong.
In Proc. 17th International Symposium on Formal Methods - FM'11,
Lecture Notes in Computer Science 6664, pp 432-447.
©Springer-Verlag, 2011.
-
Analysis of a receipt-free auction protocol in the applied pi calculus.
Naipeng Dong, Hugo Jonker,
and Jun Pang.
In Proc. 7th International Workshop on Formal Aspects in Security and Trust - FAST'10,
Lecture Notes in Computer Science 6561, pp. 223-238.
©Springer-Verlag, 2011.
-
Extending a key-chain based certified email protocol with transparent TTP.
Zhiyuan Liu, Jun Pang,
and Chenyi Zhang.
In Proc. 6th IEEE/IFIP Symposium on Trusted Computing and Communications - TrustCom'10,
pp. 630-636.
©IEEE Computer Society, 2010.
-
On probabilistic alternating simulations.
Chenyi Zhang and Jun Pang.
In Proc. 6th IFIP Conference on Theoretical Computer Science - TCS'10 (track B),
IFIP Advances in Information and Communication Technology 323, pp. 71-85.
©IFIP International Federation for Information Processing, 2010.
-
Brief announcement: Asynchronous bounded expected delay networks.
Rena Bakhshi, Jörg Endrullis,
Wan Fokkink, and Jun Pang.
In Proc. 29th Annual ACM Symposium on Principles of Distributed Computing - PODC'10,
pp. 392-393. ©ACM Press, 2010.
-
Model checking round-based distributed algorithms.
Xin An and Jun Pang.
In Proc. 15th IEEE Conference on Engineering of Complex Computer Systems - ICECCS'10,
pp. 127-135.
©IEEE Computer Society, 2010.
-
Game-based verification of multi-party contract signing protocols.
Ying Zhang, Chenyi Zhang,
Jun Pang, and Sjouke Mauw.
In Proc. 6th International Workshop on Formal Aspects in Security and Trust - FAST'09,
Lecture Notes in Computer Science 5983, pp. 186-200.
©Springer-Verlag, 2010.
-
Improving automatic verification of security protocols with XOR.
Xihui Chen, Ton van Deursen,
and Jun Pang.
In Proc. 11th International Conference on Formal Engineering Methods - ICFEM'09,
Lecture Notes in Computer Science 5885, pp. 107-126.
©Springer-Verlag, 2009.
-
Model-driven automatic generation of verified BPEL code for web service composition.
Bixin Li, Yu Zhou
and Jun Pang.
In Proc. 16th Asia-Pacific Software Engineering Conference - APSEC'09,
pp. 355-362.
©IEEE Computer Society, 2009.
-
How to work with honest but curious judges? (preliminary report).
Jun Pang and Chenyi Zhang.
In Proc. 7th International Workshop on Security Issues in Concurrency - SecCo'09,
Electronic Proceedings in Theoretical Computer Science 7, pp. 31-45. 2009.
-
Verification of population ring protocols in PAT.
Yang Liu, Jun Pang,
Jun Sun and Jianhua Zhao.
In Proc. 3rd IEEE Symposium on Theoretical Aspects of Software Engineering - TASE'09,
pp. 81-89.
©IEEE Computer Society, 2009.
-
PAT: Towards flexible verification under fairness.
Jun Sun, Yang Liu,
Jin Song Dong and Jun Pang.
In Proc. 21th International Conference on Computer Aided Verification - CAV'09,
Lecture Notes in Computer Science 5643, pp. 709-714.
©Springer-Verlag, 2009.
-
Measuring voter-controlled privacy.
Hugo Jonker, Sjouke Mauw,
and Jun Pang.
In Proc. 4th International Conference on Availability, Reliability and Security - ARES'09,
pp. 289-298.
©IEEE Computer Society, 2009.
-
Leader election in anonymous rings: Franklin goes probabilistic.
Rena Bakhshi, Wan Fokkink,
Jun Pang, and Jaco van de Pol.
In Proc. 5th IFIP Conference on Theoretical Computer Science - TCS'08 (track A),
IFIP International Federation for Information Processing 273, pp. 57-72.
©Springer-Verlag, 2008.
-
On automatic verification of self-stabilizing population protocols.
Jun Pang, Zhengqin Luo,
and Yuxin Deng.
In Proc. 2nd IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering - TASE'08,
pp. 185-192.
©IEEE Computer Society, 2008.
-
Extending the strand space method to verify Kerberos V.
Yongjian Li and Jun Pang.
In Proc. 8th International Conference on Parallel and Distributed Computing, Applications and Technologies - PDCAT'07,
pp. 437-444.
©IEEE Computer Society, 2007.
-
Keeping secrets in resource aware components.
Tom Chothia, Jun Pang,
and Mohammad Torabi Dashti.
In Proc. 5th International Workshop on Quantitative Aspects of Programming Languages - QAPL'07,
Electronic Notes in Theoretical Computer Science, 190(3): 79-94.
©Elsevier, 2007.
-
Adapting the UPPAAL model of a distributed lift system.
Wan Fokkink, Allard Kakebeen,
and Jun Pang.
In Proc. 2nd IPM Symposium on Fundamentals of Software Engineering - FSEN'07,
Lecture Notes in Computer Science 4767, pp. 81-97.
©Springer-Verlag, 2007.
-
Exact state set representations in the verification of linear hybrid systems with large discrete state-space.
Werner Damm, Stefan Disch,
Hardi Hungar, Swen Jacobs, Jun Pang,
Florian Pigorsch, Christoph Scholl,
Uwe Waldmann, and Boris Wirtz.
In Proc. 5th International Symposium on Automated Technology for Verification and Analysis - ATVA'07,
Lecture Notes in Computer Science 4762, pp. 425-440.
©Springer-Verlag, 2007.
-
Measuring anonymity with relative entropy.
Yuxin Deng, Jun Pang,
and Peng Wu.
In Proc. 4th International Workshop on Formal Aspects in Security and Trust - FAST'06,
Lecture Notes in Computer Science 4691, pp. 65-79.
©Springer-Verlag, 2007.
-
A framework for automatically checking anonymity with µCRL.
Tom Chothia, Simona Orzan,
Jun Pang, and Mohammad Torabi Dashti.
In Proc. 2nd International Symposium on Trustworthy Global Computing - TGC'06,
Lecture Notes in Computer Science 4661, pp. 301-318.
©Springer-Verlag, 2007.
-
Weak probabilistic anonymity.
Yuxin Deng, Catuscia Palamidessi,
and Jun Pang.
In Proc. 3rd International Workshop on Security Issues in Concurrency - SecCo'05,
Electronic Notes in Theoretical Computer Science, 180(1): 55-76.
©Elsevier, 2007.
-
Analyzing an electronic cash protocol using applied pi-calculus.
Zhengqin Luo, Xiaojuan Cai,
Jun Pang, and Yuxin Deng.
In Proc. 5th International Conference on Applied Cryptography and Network Security - ACNS'07,
Lecture Notes in Computer Science 4521, pp. 87-103.
©Springer-Verlag, 2007.
-
Distributed analysis with µCRL: A compendium of case studies.
Stefan Blom, Jens Calamé,
Bert Lisser, Simona Orzan,
Jun Pang, Jaco van de Pol,
Mohammad Torabi Dashti, and Anton Wijs.
In Proc. 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems - TACAS'07,
Lecture Notes in Computer Science 4424, pp. 683-689.
©Springer-Verlag, 2007.
-
Generalized unsolicited tests for authentication protocol analysis.
Yongjian Li and Jun Pang.
In Proc. 7th International Conference on Parallel and Distributed Computing, Applications and Technologies - PDCAT'06,
pp. 509-514.
©IEEE Computer Society, 2006.
-
Automatic verification of hybrid systems with large discrete state space.
Werner Damm, Stefan Disch,
Hardi Hungar, Jun Pang,
Florian Pigorsch, Christoph Scholl,
Uwe Waldmann, and Boris Wirtz.
In Proc. 4th International Symposium on Automated Technology for Verification and Analysis - ATVA'06,
Lecture Notes in Computer Science 4218, pp. 276-291.
©Springer-Verlag, 2006.
-
Metrics for action-labelled quantitative transition systems.
Yuxin Deng, Tom Chothia,
Catuscia Palamidessi, and Jun Pang.
In Proc. 3rd International Workshop on Quantitative Aspects of Programming Languages - QAPL'05,
Electronic Notes in Theoretical Computer Science, 153(2): 79-96.
©Elsevier, 2006.
-
Formal verification of timed systems using cones and foci.
Wan Fokkink and Jun Pang.
In Proc. 6th AMAST Workshop on Real-Time Systems - ARTS'04,
Electronic Notes in Theoretical Computer Science, 139(1): 105-122.
©Elsevier, 2005.
-
Is timed branching bisimularity an equivalence indeed?.
Wan Fokkink, Jun Pang,
and Anton Wijs.
In Proc. 3rd International Conference on Formal Modelling and Analysis of Timed Systems - FORMATS'05,
Lecture Notes in Computer Science 3829, pp. 258-272.
©Springer-Verlag, 2005.
-
Simplifying Itai-Rodeh leader election for anonymous rings.
Wan Fokkink and Jun Pang.
In Proc. 4th International Workshop on Automated Verification of Critical Systems - AVoCS'04,
Electronic Notes in Theoretical Computer Science, 128(6): 53-68.
©Elsevier, 2005.
-
Abstraction of parallel uniform processes with data.
Jun Pang, Jaco van de Pol,
and Miguel Valero Espada.
In Proc. 2nd International Conference on Software Engineering and Formal Methods - SEFM'04,
pp. 14-23.
©IEEE Computer Society, 2004.
-
Verifying a sliding window protocol in µCRL.
Wan Fokkink, Jan Friso Groote,
Jun Pang, Bahareh Badban,
and Jaco van de Pol.
In Proc. 10th International Conference on Algebraic Methodology and Software Technology - AMAST'04,
Lecture Notes in Computer Science 3116, pp. 148-163.
©Springer-Verlag, 2004.
-
Towards an integrated architecture for peer-to-peer and ad hoc overlay network applications.
Lu Yan, Kaisa Sere,
Xinrong Zhou, and Jun Pang.
In Proc. 10th International Workshop on Future Trends in Distributed Computing Systems - FTDCS'04,
pp. 312-318.
©IEEE Computer Society, 2004
-
Analyzing the redesign of a distributed lift system in UPPAAL.
Jun Pang, Bart Karstens,
and Wan Fokkink.
In Proc. 5th International Conference on Formal Engineering Methods - ICFEM'03,
Lecture Notes in Computer Science 2885, pp. 504-522.
©Springer-Verlag, 2003.
-
Model checking a cache coherence protocol for a Java DSM implementation.
Jun Pang, Wan Fokkink,
Rutger Hofman, and Ronald Veldema.
In Proc. 17th International Parallel and Distributed Processing Symposium - IPDPS'03,
8th International Workshop on Formal Methods for Parallel Programming: Theory and Applications - FMPPTA'03,
238. ©IEEE Computer Society, 2003.
-
Cones and foci for protocol verification revisited.
Wan Fokkink and Jun Pang.
In Proc. 6th International Conference on Foundations of Software Science and Computation Structures - FoSSaCS'03,
Lecture Notes in Computer Science 2620, pp. 267-281.
©Springer-Verlag, 2003.
-
Analysis of a security protocol in µCRL.
Jun Pang.
In Proc. 4th International Conference on Formal Engineering Methods - ICFEM'02,
Lecture Notes in Computer Science 2495, pp. 396-400.
©Springer-Verlag, 2002.
-
A balancing act: Analyzing a distributed lift system.
Jan Friso Groote, Jun Pang,
and Arno Wouters.
In Proc. 6th International Workshop on Formal Methods for Industrial Critical Systems - FMICS'01,
pp. 1-12, 2001.
-
On refinement calculus with program window inference.
Yunfeng Wang, Jun Pang,
Ming Zha, Zhaohui Yang,
and Guoliang Zheng.
In Proc. 16th IFIP World Computer Congress - WCC'00, Conference on Software: Theory and Practice - ICS'00,
pp. 403-406, 2000.
-
A formal software development approach based on COOZ and refinement calculus.
Yunfeng Wang, Bixin Li,
Jun Pang, Ming Zha,
and Guoliang Zheng.
In Proc. 31st International Conference on Technology of Object Oriented Language and Systems - TOOLS'99,
pp. 261-266.
©IEEE Computer Society, 1999.
-
On refinement of formal object-oriented specification.
Yunfeng Wang, Jun Pang,
Bixin Li, and Guoliang Zheng.
In Proc. 5th International Conference for Young Computer Scientist - ICYCS'99,
Advanced in Computer Science and Technology, pp. 243-245. International Academic Publishers, 1999.
Chinese Journals
-
From object-oriented Z specification to code by refinement calculus.
Yunfeng Wang, Jun Pang,
Ming Zha, Zhaohui Yang,
and Guoliang Zheng.
Journal of Software,
11(8): 1041-1046, 2000.
-
On refinement calculus with program window inference.
Yunfeng Wang, Bixin Li,
Jun Pang, Ming Zha,
and Guoliang Zheng.
Journal of Software,
11(8): 1071-1077, 2000.
-
On analysis and design for a refinement calculus supporting tool.
Yunfeng Wang, Bixin Li,
Jun Pang, Ming Zha,
and Guoliang Zheng.
Journal of Nanjing University (Natural Science),
36(5): 560-567, 2000.
-
Towards a formalization of UML class structures in COOZ.
Jun Pang, Yunfeng Wang,
and Guoliang Zheng.
Computer Engineering and Applications,
36(6): 86-89, 2000.
-
Comparison of current tools for Z.
Jun Pang, Yunfeng Wang,
and Guoliang Zheng.
Computer Science,
26(10): 78-80, 1999.
Chapters in Books and Festschrifts
-
Location-based services: Privacy, security and assurance.
Hugo Jonker, Sjouke Mauw,
and Jun Pang.
In
Digital Enlightenment Yearbook 2012, pp 235-244, 2012.
-
Automating verification of cooperation, control, and design in traffic applications.
Werner Damm, Alfred Mikschl,
Jens Oehlerking, Ernst-Rüdiger Olderog,
Jun Pang, André Platzer,
Marc Segelken, and Boris Wirtz.
In Formal Methods and Hybrid Real-Time Systems,
Essays in Honor of Dines Bjørner and Zhou Chaochen on the Occasion of Their 70th Birthdays,
Lecture Notes in Computer Science 4700, pp. 115-169.
©Springer-Verlag, 2007.
-
Compositional reasoning for probabilistic finite-state behaviors.
Yuxin Deng, Catuscia Palamidessi,
and Jun Pang.
In Processes, Terms and Cycles: Steps on the Road to Infinity:
Essays Dedicated to Jan Willem Klop on the Occasion of His 60th Birthday,
Lecture Notes in Computer Science 3838, pp. 309-337.
©Springer-Verlag, 2005.
Edited Proceedings
-
Proceedings of the 17th International Conference on Multi-disciplinary Trends in Artificial Intelligence (Part II).
Chattrakul Sombattheera, Paul Weng,
and Jun Pang.
Lecture Notes in Computer Science 15432. Springer-Verlag, 2024.
-
Proceedings of the 17th International Conference on Multi-disciplinary Trends in Artificial Intelligence (Part I).
Chattrakul Sombattheera, Paul Weng,
and Jun Pang.
Lecture Notes in Computer Science 15431. Springer-Verlag, 2024.
-
Proceedings of the 21st International Conference on Computational Methods in Systems Biology.
Jun Pang and Joachim Niehren.
Lecture Notes in Computer Science 14137. Springer-Verlag, 2023.
-
Proceedings of the 13th Asia-Pacific Symposium on Internetware.
Hong Mei, Jian Lv,
Zhi Jin, Xuandong Li,
Guanglai Gao, Jun Pang,
Lei Bu, and Ge Li.
ACM Press, 2022.
-
Proceedings of the 6th International Symposium on Dependable Software Engineering: Theories, Tools, and Applications.
Jun Pang and Lijun Zhang.
Lecture Notes in Computer Science 12153. Springer-Verlag, 2020.
-
Proceedings of the 6th Global Conference on Artificial Intelligence.
Gregoire Danoy, Jun Pang,
and Geoff Sutcliffe.
EPiC Series in Computing 72. Easychair, 2020.
-
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems.
Jun Pang and Jing Sun.
IEEE Computer Society, 2019.
-
Proceedings of the 12th International Symposium on Theoretical Aspects of Software Engineering.
Jun Pang, Chenyi Zhang,
Jifeng He, and Jian Weng.
IEEE Computer Society, 2018.
-
Proceedings of the 4th International Workshop on Engineering Safety and Security Systems.
Jun Pang, Yang Liu,
and Sjouke Mauw.
Electronic Proceedings in Theoretical Computer Science 184, 2015.
-
Proceedings of the 16th International Conference on Formal Engineering Methods.
Stephan Merz and Jun Pang.
Lecture Notes in Computer Science 8829. Springer-Verlag, 2014.
-
Proceedings of the 3rd International Workshop on Engineering Safety and Security Systems.
Jun Pang and Yang Liu.
Electronic Proceedings in Theoretical Computer Science 150, 2014.
Editorials
-
Preface of the special issue ‘Logic, argumentation and AI’ in JLC.
Huimin Dong, Jun Pang,
and Yi N Wang.
Journal of Logic and Computation,
31(8): 1901-1902, 2021.
-
Preface: Special section on software systems 2020.
Tao Xie, Zhi Jin,
Xuandong Li, Gang Huang,
Hausi Muller, Jun Pang,
and Lijun Zhang.
Journal of Computer Science and Technology,
35(6): 1231-1233, 2020.
-
Preface for the special issue of the 12th international symposium on theoretical aspects of software engineering.
Chenyi Zhang and Jun Pang.
Science of Computer Programming,
187: article 102375, 2020.
-
Editorial (ICFEM 14 special issue, part II).
Stephan Merz, Jun Pang,
and Jin Song Dong.
Formal Aspects of Computing,
28(5): 723-724, 2016.
-
Editorial (ICFEM 14 special issue, part I).
Stephan Merz, Jun Pang,
and Jin Song Dong.
Formal Aspects of Computing,
28(3): 343-344, 2016.
-
Preface: Selected and extended papers from ACM SVT 2014.
Jun Pang and Mariëlle Stoelinga.
Science of Computer Programming,
123: 1, 2016.
-
Special issue on software verification and testing.
MohammadReza Mousavi and Jun Pang.
Science of Computer Programming,
95(3): 273-274, 2014.
-
Preface: Foundational aspects of security.
Konstantinos Chatzikokolakis, Sebastian Alexander Mödersheim,
Catuscia Palamidessi, and Jun Pang.
Journal of Computer Security,
22(2): 201-202, 2014.
-
Message from ESSS 2013 workshop co-chairs.
Jun Pang, Yang Liu,
and Sjouke Mauw.
In 6th IEEE Conference on Software Testing, Verification and Validation Workshop Proceedings - ICST'13,
pp .1.
©IEEE Computer Society, 2013.
-
Special issue: Software verification and testing.
MohammadReza Mousavi and Jun Pang.
Innovations in Systems and Software Engineering,
9(2): 57-58, 2013.
-
Editorial message: Special track on software verification and testing.
Jun Pang and MohammadReza Mousavi.
In Proc. 28th Symposium on Applied Computing - SAC'13,
pp. 1186-1187. ACM Press, 2013.
-
Editorial message: Special track on software verification and testing.
Jun Pang and MohammadReza Mousavi.
In Proc. 27th Symposium on Applied Computing - SAC'12,
pp. 1262-1263. ACM Press, 2012.
-
Message from T4CIA workshop co-chairs.
Jun Pang and Bao Tang.
In Proc. 3rd IEEE Conference on Secure Software Integration and Reliability Improvement - SSIRI'09,
pp. 323.
©IEEE Computer Society, 2009.
Theses
-
Formal Verification of Distributed Systems.
Jun Pang.
Ph.D. thesis (ISBN 90-6464-865-4), Vrije Universiteit Amsterdam, October 2004.
-
Design and Implementation of a Tool Supporting COOZ Refinement (in Chinese).
Jun Pang.
Master thesis, Nanjing University, March 2000.
Exposure and Posters
-
Membership inference attacks against GANs by leveraging over-representation regions.
Hailong Hu and Jun Pang.
In Proc. 28th ACM International Conference on Computer and Communications Security - CCS'21,
pp. 2387-2389. ©ACM Press, 2021.
-
Flavors of Boolean network reprogramming in the CoLoMoTo notebook environment.
Célia Biane, David Deritei,
Jordan Rozum, Cui Su
Jun Pang, Jorge Zañudo,
and Loïc Paulevé.
Presented at Proc. 18th International Conference on Computational Methods in Systems Biology - CMSB'20, 2020.
-
Scalable control of asynchronous Boolean networks.
Cui Su, Soumya Paul,
and Jun Pang.
In Proc. 17th International Conference on Computational Methods in Systems Biology - CMSB'19,
Lecture Notes in Computer Science 11773, pp. 364-367.
©Springer-Verlag, 2019.
-
Tagvisor: A privacy advisor for sharing hashtags.
Yang Zhang, Mathias Humbert,
Tahleen Rahman, Cheng-Te Li,
Jun Pang, and Michael Backes.
Presented at 26th Annual Network and Distributed System Security Symposium - NDSS'19, 2019.
-
On the full control of Boolean networks.
Soumya Paul,
Jun Pang, and Cui Su.
In Proc. 16th International Conference on Computational Methods in Systems Biology - CMSB'18,
Lecture Notes in Computer Science 11095, pp. 313-317.
©Springer-Verlag, 2018.
-
ASSA-PBN: A software tool for large probabilistic Boolean networks.
Andrzej Mizera,
Jun Pang, and Qixia Yuan.
Presented at 25th European Conference on Computational Biology - ISMB/ECCB'17 and
1st Student Research Fair at University of Luxembourg (Best poster award) in 2017,
16th Asia Pacific Bioinformatics Conference - APBC'18 (Best poster award) in 2018.
-
GPU-accelerated steady-state analysis of probabilistic Boolean networks.
Andrzej Mizera,
Jun Pang, and Qixia Yuan.
In Proc. 14th International Conference on Computational Methods in Systems Biology - CMSB'16,
Lecture Notes in Computer Science 9859, pp. 343-345.
©Springer-Verlag, 2016.
-
Exploring communities for effective location prediction.
Jun Pang and Yang Zhang.
In Proc. 24th World Wide Web Conference (Companion Volume) - WWW'15,
pp. 87-88. ©ACM Press, 2015.
-
A balancing act: Parameter estimation for biological models with steady-state measurements.
Andrzej Mizera, Jun Pang,
Thomas Sauter, and Panuwat Trairatphisan.
In Proc. 11th International Conference on Computational Methods in Systems Biology - CMSB'13,
Lecture Notes in Computer Science 8130, pp. 253-254.
©Springer-Verlag, 2013.
-
Location assurance and privacy in GNSS navigation.
Xihui Chen, Carlo Harpes,
Gabriele Lenzini, Sjouke Mauw,
and Jun Pang.
ERCIM News 24 (special issue on Intelligent Cars), 2013.
Technical Reports
-
Data-driven inference of Boolean networks from transcriptomes to predict cellular differentiation and reprogramming.
Stèphanie Chevalier, Julia Becker,
Yujuan Gui, Vincent Noël,
Cui Su, Sascha Jung,
Laurence Calzone, Andrei Zinovyev,
Antonio de Sol, Jun Pang,
Lasse Sinkkonen, Thomas Sauter,
and Loïc Paulevé.
bioRxiv 2024.10.21.618706, 2024.
-
Integrating optimal transport and structural inference models for GRN inference from single-cell data.
Tsz Pan Tong, Aoran Wang,
George Panagopoulos, and Jun Pang.
CoRR abs/2409.15080, 2024.
-
Privacy-preserving distributed maximum consensus without accuracy loss.
Wenrui Yu, Richard Heusdens,
Jun Pang, and Qiongxiu Li.
CoRR abs/2409.10226, 2024.
-
Revealing chemical trends: Insights from data-driven visualisation and patent analysis in exposomics research.
Dagny Aurich, Emma Schymanski,
Flavio de Jesus Matias, Paul Thiessen,
and Jun Pang.
ChemRxiv, 2024.
-
KAGNNs: Kolmogorov-Arnold networks meet graph learning.
Roman Bresson, Giannis Nikolentzos,
George Panagopoulos, Michail Chatzianastasis,
Jun Pang, and Michalis Vazirgiannis.
CoRR abs/2406.18380, 2024.
-
Graph neural networks for treatment effect prediction.
George Panagopoulos, Daniele Malitesta,
Fragkiskos D. Malliaros, and Jun Pang.
CoRR abs/2403.19289, 2024.
-
On quantified observability analysis in multiagent systems.
Chunyan Mu and Jun Pang.
CoRR abs/2310.02614, 2023.
-
Ownership protection of generative adversarial networks.
Hailong Hu and Jun Pang.
CoRR abs/2306.05233, 2023.
-
PriSampler: Mitigating property inference of diffusion models.
Hailong Hu and Jun Pang.
CoRR abs/2306.05208, 2023.
-
Exploring unconfirmed transactions for effective Bitcoin address clustering.
Kai Wang, Maike Tong,
Changhao Wu, Jun Pang,
Chen Chen, Xiapu Luo,
and Weili Han.
CoRR abs/2303.01012, 2023.
-
Membership inference of diffusion models.
Hailong Hu and Jun Pang.
CoRR abs/2301.09956, 2023.
-
A multilingual dataset of COVID-19 vaccination attitudes on Twitter.
Ninghan Chen, Xihui Chen,
and Jun Pang.
CoRR abs/2206.14619, 2022.
-
"Double vaccinated, 5G boosted!": Learning attitudes towards COVID-19 vaccination from social media.
Ninghan Chen, Xihui Chen,
Zhiqiang Zhong, and Jun Pang.
CoRR abs/2206.13456, 2022.
-
Simplifying node classification on heterophilous graphs with compatible label propagation.
Zhiqiang Zhong, Sergey Ivanov,
and Jun Pang.
CoRR abs/2205.09389, 2022.
-
Unsupervised heterophilous network embedding via r-ego network discrimination.
Zhiqiang Zhong, Guadalupe Gonzalez,
Daniele Grattarola, and Jun Pang.
CoRR abs/2203.10866, 2022.
-
Provably improving election verifiability in Belenios.
Sevdenur Baloglu, Sergiu Bursuc,
Sjouke Mauw,and Jun Pang.
Cryptology ePrint Archive, Report 2021/1201, 2021.
-
The burden of being a bridge: Understanding the role of multilingual users during the COVID-19 pandemic.
Ninghan Chen, Xihui Chen,
Zhiqiang Zhong, and Jun Pang.
CoRR abs/2104.04331, 2021.
-
Model extraction and defenses on generative adversarial networks.
Hailong Hu and Jun Pang.
CoRR abs/2101.02069, 2021.
-
Target control of asynchronous Boolean networks.
Cui Su and Jun Pang.
CoRR abs/2101.00644, 2021.
-
From #Jobsearch to #Mask: Improving COVID-19 cascade prediction with spillover effects.
Ninghan Chen, Zhiqiang Zhong,
and Jun Pang.
CoRR abs/2012.07088, 2020.
-
Semantic and relational spaces in science of science: Deep learning models for article vectorisation.
Diego Kozlowski, Jennifer Dusdal,
Jun Pang, and Andreas Zilian.
CoRR abs/2011.02887, 2020.
-
Reinforcement learning enhanced heterogeneous graph neural network.
Zhiqiang Zhong, Cheng-Te Li,
and Jun Pang.
CoRR abs/2010.13735, 2020.
-
Adaptive multi-grained graph neural networks.
Zhiqiang Zhong, Cheng-Te Li,
and Jun Pang.
CoRR abs/2010.00238, 2020.
-
Hierarchical message-passing graph neural networks.
Zhiqiang Zhong, Cheng-Te Li,
and Jun Pang.
CoRR abs/2009.03717, 2020.
-
Election verifiability revisited: Automated security proofs and attacks on Helios and Belenios.
Sevdenur Baloglu, Sergiu Bursuc,
Sjouke Mauw,and Jun Pang.
Cryptology ePrint Archive, Report 2020/982, 2020.
-
An exploratory study of COVID-19 information on Twitter in the Greater Region.
Ninghan Chen, Zhiqiang Zhong,
and Jun Pang.
CoRR abs/2008.05900, 2020.
-
A dynamics-based approach for the target control of Boolean networks.
Cui Su and Jun Pang.
CoRR abs/2006.02304, 2020.
-
Sequential control of Boolean networks with temporary and permanent perturbations.
Cui Su and Jun Pang.
CoRR abs/2004.07184, 2020.
-
Characterising probabilistic alternating simulation for concurrent games.
Chenyi Zhang and Jun Pang.
CoRR abs/1907.03928, 2019.
-
Online observability of Boolean control networks.
Guisen Wu, Liyun Dai,
Zhiming Liu, Taolue Chen,
Jun Pang, and Hongyang Qu.
CoRR abs/1903.07462, 2019.
-
Formal analysis of an e-health protocol.
Naipeng Dong, Hugo Jonker,
and Jun Pang.
CoRR abs/1808.08403, 2018.
-
Towards the existential control of Boolean networks: A preliminary report (extended abstract).
Soumya Paul, Jun Pang,
and Cui Su.
CoRR abs/1806.10927, 2018.
-
A decomposition-based approach towards the control of Boolean networks (technical report).
Soumya Paul, Cui Su,
Jun Pang, and Andrzej Mizera.
CoRR abs/1804.07221, 2018.
-
Tagvisor: A privacy advisor for sharing hashtags.
Yang Zhang, Mathias Humbert,
Tahleen Rahman, Cheng-Te Li,
Jun Pang, and Michael Backes.
CoRR abs/1802.04122, 2018.
-
walk2friends: Inferring social links from mobility profiles.
Michael Backes, Mathias Humbert,
Jun Pang and Yang Zhang.
CoRR abs/1708.08221, 2017.
-
Taming asynchrony for attractor detection in large Boolean networks (technical report).
Andrzej Mizera, Jun Pang,
Hongyang Qu, and Qixia Yuan.
CoRR abs/1704.06530, 2017.
-
DeepCity: A feature learning framework for mining location check-ins.
Jun Pang and Yang Zhang.
CoRR abs/1610.03676, 2016.
-
Should we learn probabilistic models for model checking? A new approach and an empirical study.
Jingyi Wang, Jun Sun,
Qixia YUan, and Jun Pang.
CoRR abs/1605.08278, 2016.
-
Fast simulation of large probabilistic Boolean networks (technical report).
Andrzej Mizera, Jun Pang,
and Qixia YUan.
CoRR abs/1605.00854, 2016.
-
Quantifying location sociality.
Jun Pang and Yang Zhang.
CoRR abs/1604.00175, 2016.
-
Parallel approximate steady-state analysis of large probabilistic Boolean networks (technical report).
Andrzej Mizera, Jun Pang,
and Qixia YUan.
CoRR abs/1508.07828, 2015.
-
Reviving the two-state Markov chain approach (technical report).
Andrzej Mizera, Jun Pang,
and Qixia YUan.
CoRR abs/1501.01779, 2015.
-
Location prediction: Communities speak louder than friends.
Jun Pang and Yang Zhang.
CoRR abs/1408.1228, 2014.
-
Stateful security protocol verification.
Li Li, Jun Pang,
Yang Liu, Jun Sun,
and Jin Song Dong.
CoRR abs/1403.2237, 2014.
-
Privacy and verifiability in voting systems: Methods, developments and trends.
Hugo Jonker, Sjouke Mauw,
and Jun Pang.
Cryptology ePrint Archive 2013/615, 2013.
-
A new access control scheme for Facebook-style social networks.
Jun Pang and Yang Zhang.
CoRR abs/1304.2504, 2013.
-
A group signature based electronic toll pricing system.
Xihui Chen, Gabriele Lenzini,
Sjouke Mauw, and Jun Pang.
CoRR abs/1108.0574, 2011.
-
An algorithm for probabilistic alternating simulation.
Chenyi Zhang and Jun Pang.
CoRR abs/1106.1978, 2011.
-
Asynchronous bounded expected delay networks.
Rena Bakhshi, Jörg Endrullis,
Wan Fokkink, and Jun Pang.
CoRR abs/1003.2084, 2010.
-
On probabilistic alternating simulations.
Chenyi Zhang and Jun Pang.
CoRR abs/1003.0788, 2010.
-
Towards a toolkit for efficient and flexible verification under fairness.
Jun Sun, Yang Liu,
Jin Song Dong and Jun Pang.
Technical Report No. TRB2/09,
National University of Singapore, School of Computing, 2009.
-
Exact state set representations in the verification of linear hybrid systems with large discrete state-space.
Werner Damm, Stefan Disch,
Hardi Hungar, Swen Jacobs, Jun Pang,
Florian Pigorsch, Christoph Scholl,
Uwe Waldmann, and Boris Wirtz.
Technical Report No. 21, SFB/TR 14 AVACS, 2007.
-
Simplifying Itai-Rodeh leader election for anonymous rings.
Wan Fokkink and Jun Pang.
Technical Report SEN-R0405, CWI Amsterdam, 2004.
-
A note on K-state self-stabilization in a ring with K=N.
Wan Fokkink, Jaap-Henk Hoepman,
and Jun Pang.
Technical Report SEN-R0402, CWI Amsterdam, 2004.
-
Verifying a sliding window protocol in µCRL.
Wan Fokkink, Jan Friso Groote,
Jun Pang, Bahareh Badban,
and Jaco van de Pol.
Technical Report SEN-R0308, CWI Amsterdam, 2003.
-
Cones and foci for protocol verification revisited.
Wan Fokkink and Jun Pang.
Technical Report SEN-R0229, CWI Amsterdam, 2002.
-
Analysis of a security protocol in µCRL.
Jun Pang.
Technical Report SEN-R0201, CWI Amsterdam, 2002.
-
Analysis of a distributed system for lifting trucks.
Jan Friso Groote, Jun Pang,
and Arno Wouters.
Technical Report SEN-R0111, CWI Amsterdam, 2001.
The documents contained in this page are included to ensure timely
dissemination of scholarly and technical work on a non-commercial basis.
Copyright and all rights therein are maintained by the authors or by other copyright holders,
notwithstanding that they have offered their works here electronically.
It is understood that all persons copying this information will adhere to the terms
and constraints invoked by each author's copyright.