Follow
Jun Pang
Title
Cited by
Cited by
Year
PAT: Towards flexible verification under fairness
J Sun, Y Liu, J Dong, J Pang
21st International Conference on Computer Aided Verification, 709-714, 2009
5622009
walk2friends: Inferring social links from mobility profiles
M Backes, M Humbert, J Pang, Y Zhang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1432017
Recent development and biomedical applications of probabilistic Boolean networks
P Trairatphisan, A Mizera, J Pang, AA Tantar, J Schneider, T Sauter
Cell communication and signaling 11, 1-25, 2013
1202013
Metrics for action-labelled quantitative transition systems
Y Deng, T Chothia, C Palamidessi, J Pang
Electronic Notes in Theoretical Computer Science 153 (2), 79-96, 2006
972006
Measuring anonymity with relative entropy
Y Deng, J Pang, P Wu
Proceedings of 4th Workshop on Formal Aspects in Security and Trust (FAST'06 …, 2007
952007
A new access control scheme for Facebook-style social networks
J Pang, Y Zhang
Computers & Security 54, 44-59, 2015
942015
Privacy and verifiability in voting systems: Methods, developments and trends
H Jonker, S Mauw, J Pang
Computer Science Review 10, 1-30, 2013
912013
Challenges in ehealth: From enabling to enforcing privacy
N Dong, H Jonker, J Pang
Foundations of Health Informatics Engineering and Systems: First …, 2012
822012
Analysis of a Distributed System for Lifting Trucks
JF Groote, J Pang, AG Wouters
Journal of Logic and Algebraic Programming 55 (1-2), 21-56, 2003
702003
Constructing and Comparing User Mobility Profiles for Location-based Services
X Chen, J Pang, R Xue
28th ACM Symposium on Applied Computing, 2013
592013
Measuring query privacy in location-based services
X Chen, J Pang
Proceedings of the second ACM conference on Data and Application Security …, 2012
592012
Constructing and comparing user mobility profiles
X Chen, J Pang, R Xue
ACM Transactions on the Web (TWEB) 8 (4), 1-25, 2014
572014
Verification of a sliding window protocol in μCRL and PVS
B Badban, W Fokkink, JF Groote, J Pang, J Pol
Formal Aspects of Computing 17, 342-388, 2005
572005
Model checking a cache coherence protocol of a Java DSM implementation
J Pang, W Fokkink, R Hofman, R Veldema
The Journal of Logic and Algebraic Programming 71 (1), 1-43, 2007
54*2007
Cones and foci: A mechanical framework for protocol verification
W Fokkink, J Pang, J Van De Pol
Formal Methods in System Design 29 (1), 1-31, 2006
54*2006
Tagvisor: A privacy advisor for sharing hashtags
Y Zhang, M Humbert, T Rahman, CT Li, J Pang, M Backes
Proceedings of the 2018 World Wide Web Conference, 287-296, 2018
532018
Exact state set representations in the verification of linear hybrid systems with large discrete state space
W Damm, S Disch, H Hungar, S Jacobs, J Pang, F Pigorsch, C Scholl, ...
International Symposium on Automated Technology for Verification and …, 2007
522007
Stealing machine learning models: Attacks and countermeasures for generative adversarial networks
H Hu, J Pang
Annual Computer Security Applications Conference, 1-16, 2021
50*2021
Inferring friendship from check-in data of location-based social networks
R Cheng, J Pang, Y Zhang
Proceedings of the 2015 IEEE/ACM International Conference on Advances in …, 2015
502015
Verification of functional and non-functional requirements of web service composition
M Chen, TH Tan, J Sun, Y Liu, J Pang, X Li
Formal Methods and Software Engineering: 15th International Conference on …, 2013
502013
The system can't perform the operation now. Try again later.
Articles 1–20