Challenges in ehealth: From enabling to enforcing privacy N Dong, H Jonker, J Pang Foundations of Health Informatics Engineering and Systems: First …, 2012 | 81 | 2012 |
Formal analysis of a proof-of-stake blockchain WYMM Thin, N Dong, G Bai, JS Dong 2018 23rd International Conference on Engineering of Complex Computer …, 2018 | 73 | 2018 |
Analysis of a receipt-free auction protocol in the applied pi calculus N Dong, H Jonker, J Pang Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011 | 33 | 2011 |
Formal analysis of privacy in an eHealth protocol N Dong, H Jonker, J Pang Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 29 | 2012 |
AutoPer: Automatic recommender for runtime-permission in android applications H Gao, C Guo, Y Wu, N Dong, X Hou, S Xu, J Xu 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019 | 16 | 2019 |
Deep review sharing C Guo, D Huang, N Dong, Q Ye, J Xu, Y Fan, H Yang, Y Xu 2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019 | 13 | 2019 |
An analytics framework for heuristic inference attacks against industrial control systems T Choi, G Bai, RKL Ko, N Dong, W Zhang, S Wang 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 12 | 2020 |
Deep attentive factorization machine for app recommendation service C Guo, Y Xu, X Hou, N Dong, J Xu, Q Ye 2019 IEEE International Conference on Web Services (ICWS), 134-138, 2019 | 12 | 2019 |
A projection-based approach for memory leak detection X Sun, S Xu, C Guo, J Xu, N Dong, X Ji, S Zhang 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 12 | 2018 |
Enforcing privacy in the presence of others: Notions, formalisations and relations N Dong, H Jonker, J Pang Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 12 | 2013 |
A uniform framework for anomaly detection in deep neural networks F Zhao, C Zhang, N Dong, Z You, Z Wu Neural Processing Letters 54 (4), 3467-3488, 2022 | 11 | 2022 |
Review sharing via deep semi-supervised code clone detection C Guo, H Yang, D Huang, J Zhang, N Dong, J Xu, J Zhu IEEE Access 8, 24948-24965, 2020 | 11 | 2020 |
A blockchain-based decentralized booking system N Dong, G Bai, LC Huang, EKH Lim, JS Dong The Knowledge Engineering Review 35, e17, 2020 | 9 | 2020 |
Verification of strong Nash-equilibrium for probabilistic BAR systems D Fernando, N Dong, C Jegourel, JS Dong Formal Methods and Software Engineering: 20th International Conference on …, 2018 | 9 | 2018 |
A framework for formal analysis of privacy on SSO protocols K Wang, G Bai, N Dong, JS Dong Security and Privacy in Communication Networks: 13th International …, 2018 | 9 | 2018 |
Security analysis of unmanned aircraft systems MD Nguyen, N Dong, A Roychoudhury | 8 | 2017 |
Early prediction for mode anomaly in generative adversarial network training: an empirical study C Guo, D Huang, J Zhang, J Xu, G Bai, N Dong Information Sciences 534, 117-138, 2020 | 7 | 2020 |
Systematic comprehension for developer reply in mobile system forum C Guo, W Wang, Y Wu, N Dong, Q Ye, J Xu, S Zhang 2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019 | 7 | 2019 |
Automatic construction of callback model for android application C Guo, Q Ye, N Dong, G Bai, JS Dong, J Xu 2016 21st International Conference on Engineering of Complex Computer …, 2016 | 7 | 2016 |
Inferring implicit assumptions and correct usage of mobile payment protocols Q Ye, G Bai, N Dong, JS Dong Security and Privacy in Communication Networks: 13th International …, 2018 | 6 | 2018 |