Jun Pang

Jun Pang

Research scientist

Academic Area(s) Computer science / Multidisciplinary, general & others
Research Topics Formal methods, Security and privacy, Computational systems biology
Faculty or Centre Faculté des Sciences, de la Technologie et de la Communication
Research Unit CSC
Postal Address Campus Kirchberg, Université du Luxembourg
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg
Campus Office E 204
Email
Telephone (+352) 46 66 44 5625
Fax (+352) 46 66 44 35625
Speaks English, Chinese
powered by
orbilu.uni.lu

2016

See detailEditorial: Extended versions of papers presented at ICFEM 14
Merz, Stephan; Pang, Jun; Dong, Jin Song

in Formal Aspects of Computing (2016), 28(3), 343-344

Full Text
See detailParallel Approximate Steady-state Analysis of Large Probabilistic Boolean Networks
Mizera, Andrzej; Pang, Jun; Yuan, Qixia

in Proceedings of the 31st ACM Symposium on Applied Computing (2016, April)

See detailSelected and extended papers from ACM SVT 2014
Pang, Jun; Stoelinga, Marielle

in Science of Computer Programming (2016)

Top of Page

2015

Full Text
See detailActivity tracking: A new attack on location privacy
Chen, Xihui; Mizera, Andrzej; Pang, Jun

in Proceedings of the 3rd IEEE Conference on Communications and Network Security (CNS'15) (2015)

Full Text
See detailInferring friendship from check-in data of location-based social networks
Cheng, Ran; Pang, Jun; Zhang, Yang

in Proceedings of the 7th International Conference on Advances in Social Networks Analysis and Mining (ASONAM'15) (2015)

Full Text
See detailA logical approach to restricting access in online social networks
Cramer, Marcos; Pang, Jun; Zhang, Yang

in Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (2015)

Full Text
See detailFormalizing provable anonymity in Isabelle/HOL
Li, Yongjian; Pang, Jun

in Formal Aspects of Computing (2015), 27(2), 255-282

Full Text
See detailparaVerifier: An automatic framework for proving parameterized cache coherence protocols
Li, Yongjian; Pang, Jun; Lv, Yi; Fan, Dongrui; Cao, Shen; Duan, Kaiqiang

in Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (2015)

Full Text
See detailASSA-PBN: An approximate steady-state analyser for probabilistic Boolean networks
Mizera, Andrzej; Pang, Jun; Yuan, Qixia

in Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (2015)

See detailProceedings 4th International Workshop on Engineering Safety and Security Systems
Pang, Jun; Liu, Yang; Mauw, Sjouke

Book published by EPTCS - 184 (2015)

Full Text
See detailCryptographic protocols for enforcing relationship-based access control policies
Pang, Jun; Zhang, Yang

in Proceedings of the 39th Annual IEEE Computers, Software & Applications Conference (COMPSAC'15) (2015)

Full Text
See detailEvent prediction with community leaders
Pang, Jun; Zhang, Yang

in Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES'15) (2015)

Full Text
See detailExploring communities for effective location prediction
Pang, Jun; Zhang, Yang

in Proceedings of the 24th World Wide Web Conference (2015)

Full Text
See detailLocation prediction: Communities speak louder than friends
Pang, Jun; Zhang, Yang

in Proceedings of the 3rd ACM Conference on Online Social Networks (COSN'15) (2015)

Full Text
See detailA new access control scheme for Facebook-style social networks
Pang, Jun; Zhang, Yang

in Computers & Security (2015), 54

Full Text
See detailImproving BDD-based attractor detection for synchronous Boolean networks
Qu, Hongyang; Yuan, Qixia; Pang, Jun; Mizera, Andrzej

in Proceedings of the 7th Asia-Pacific Symposium on Internetware (2015)

Full Text
See detailCommunity-Driven Social Influence Analysis and Applications
Zhang, Yang; Pang, Jun

in Proceedings of the 15th International Conference on Web Engineering (2015)

Top of Page

2014

Full Text
See detailFoundational aspects of security
Chatzikokolakis, Konstantinos; Mödersheim, Sebastian; Palamidessi, Catuscia; Pang, Jun

in Journal of Computer Security (2014), 22(2), 201-202

Full Text
See detailMinUS: Mining User Similarity with Trajectory Patterns
Chen, Xihui; Kordy, Piotr; Lu, Ruipeng; Pang, Jun

in Proceedings of 17th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD) (2014)

Full Text
See detailMeasuring User Similarity with Trajectory Patterns: Principles and New Metrics
Chen, Xihui; Lu, Ruipeng; Ma, Xiaoxing; Pang, Jun

in Proceedings of the 16th Asia-Pacific Web Conference (2014)

Full Text
See detailProtecting query privacy in location-based services
Chen, Xihui; Pang, Jun

in GeoInformatica (2014), 18(1), 95-133

Full Text
See detailConstructing and comparing user mobility profiles
Chen, Xihui; Pang, Jun; Xue, Ran

in ACM Transactions on the Web (2014), 8(4), 21

Full Text
See detailDynamic analysis of usage control policies.
Elrahaiby, Yehia; Pang, Jun

in Proceedings of the 11th Conference on Security and Cryptography (SECRPT) (2014)

Full Text
See detailSymbolic analysis of an electric vehicle charging protocol.
Li, Li; Pang, Jun; Liu, Yang; Sun, Jun; Dong, Jin Song

in Proceedings of 19th IEEE Conference on Engineering of Complex Computer Systems (ICECCS) (2014)

Full Text
See detailA strand space approach to provable anonymity
Li, Yongjian; Pang, Jun

in Proc. 2nd Workshop on Formal Techniques for Safety-Critical Systems (FTSCS'13) (2014)

See detailProceedings of the 16th International Conference on Formal Engineering Methods
Merz, Stephan; Pang, Jun

Book published by Springer (2014)

Full Text
See detailModel-checking based approaches to parameter estimation of gene regulatory networks
Mizera, Andrzej; Pang, Jun; Yuan, Qixia

in Proceedings of 19th IEEE Conference on Engineering of Complex Computer Systems (2014)

Full Text
See detailSpecial issue on software verification and testing (editorial message)
Mousavi, MohammadReza; Pang, Jun

in Science of Computer Programming (2014), 95(3), 273-274

Full Text
See detailA new access control scheme for Facebook-style social networks
Pang, Jun; Zhang, Yang

in Proceedings of the 9th Conference on Availability, Reliability and Security (ARES 2014, Best Paper Award) (2014)

Full Text
See detailModel Checking with Fairness Assumptions using PAT
Si, Yuanjie; Sun, Jun; Liu, Yang; Dong, Jin Song; Pang, Jun; Zhang, Shaojie; Yang, Xiaohu

in Frontiers of Computer Science (2014), 8(1), 1-16

Full Text
See detailoptPBN: An Optimisation Toolbox for Probabilistic Boolean Networks
Trairatphisan, Panuwat; Mizera, Andrzej; Pang, Jun; Tantar, Alexandru-Adrian; Sauter, Thomas

in PLoS ONE (2014), 9(7), 980011-15

Top of Page

2013

Full Text
See detailVerification of functional and non-functional requirements of web service composition
Chen, Manman; Tan, Tian Huat; Sun, Jun; Liu, Yang; Pang, Jun; Li, Xiaohong

in Proceedings of 15th Conference on Formal Engineering Methods (ICFEM'13) (2013)

Full Text
See detailPost-hoc analysis of user traceability in electronic toll collection systems
Chen, Xihui; Fonkwe, David; Pang, Jun

in Proc. 7th International Workshop on Data Privacy Management (2013)

Full Text
See detailDEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity
Chen, Xihui; Harpes, Carlo; Lenzini, Gabriele; Martins, Miguel; Mauw, Sjouke; Pang, Jun

in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)

Full Text
See detailLocation Assurance and Privacy in GNSS Navigation
Chen, Xihui; Harpes, Carlo; Lenzini, Gabriele; Mauw, Sjouke; Pang, Jun

in ERCIM News (2013), 2013(94),

Full Text
See detailA trust framework for evaluating GNSS signal integrity
Chen, Xihui; Lenzini, Gabriele; Martins, Miguel; Mauw, Sjouke; Pang, Jun

in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)

Full Text
See detailDesign and formal analysis of a group signature based electronic toll pricing system
Chen, Xihui; Lenzini, Gabriele; Mauw, Sjouke; Pang, Jun

in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75

Full Text
See detailExploring dependency for query privacy protection in location-based services
Chen, Xihui; Pang, Jun

in Proc. 3rd ACM Conference on Data and Application Security and Privacy (2013)

Full Text
See detailConstructing and comparing user mobility profiles for location-based services
Chen, Xihui; Pang, Jun; Xue, Ran

in Proc. 28th ACM Symposium on Applied Computing (2013)

Full Text
See detailEnforcing Privacy in the Presence of Others: Notions, Formalisations and Relations
Dong, Naipeng; Jonker, Hugo; Pang, Jun

in Proceedings of the 18th European Symposium on Research in Computer Security (2013)

Full Text
See detailPrivacy and verifiability in voting systems: Methods, developments and trends
Jonker, Hugo; Mauw, Sjouke; Pang, Jun

in Computer Science Review (2013)

Full Text
See detailAn inductive approach to strand spaces
Li, Yongjian; Pang, Jun

in Formal Aspects of Computing (2013), 25(4), 465-501

Full Text
See detailDesign and formal verification of a certified email protocol with transparent TTP
Liu, Zhiyuan; Pang, Jun; Zhang, Chenyi

in Frontiers of Computer Science (2013), 7(2), 279-297

Full Text
See detailA balancing act: Parameter estimation for biological models with steady-state measurements
Mizera, Andrzej; Pang, Jun; Sauter, Thomas; Trairatphisan, Panuwat

in Proceedings of 11th Conference on Computational Methods in Systems Biology (CMSB'13) (2013)

Full Text
See detailMathematical modelling of the Platelet-Derived Growth Factor (PDGF) signalling pathway
Mizera, Andrzej; Pang, Jun; Sauter, Thomas; Trairatphisan, Panuwat

in Proceedings of 4th Workshop on Computational Models for Cell Processes (CompMod'13) (2013)

Full Text
See detailSpecial issue: software verification and testing
Mousavi, Mohammad Reza; Pang, Jun

in Innovations in Systems and Software Engineering (2013), 9(2), 57-58

Full Text
See detailMessage from ESSS 2013 Workshop Co-chairs
Pang, Jun; Liu, Yang; Mauw, Sjouke

in 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (2013)

Full Text
See detailEditorial message: Special track on software verification and testing
Pang, Jun; Mousavi, Mohammad Reza

in Proc. 28th Symposium on Applied Computing (2013)

Full Text
See detailRecent development and biomedical applications of probabilistic Boolean networks
Trairatphisan, Panuwat; Mizera, Andrzej; Pang, Jun; Tantar, Alexandru-Adrian; Schneider, Jochen; Sauter, Thomas

in Cell Communication and Signaling (2013), 11(46),

Top of Page

2012

Full Text
See detailImplementation and Validation of a Localisation Assurance Service Provider
Chen, Xihui; Harpes, Carlo; Lenzini, Gabriele; Martins, Miguel; Mauw, Sjouke; Pang, Jun

in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

Full Text
See detailA group signature based electronic toll pricing system
Chen, Xihui; Lenzini, Gabriele; Mauw, Sjouke; Pang, Jun

in Proc. 7th International Conference on Availability, Reliability and Security (2012)

Full Text
See detailMeasuring query privacy in location-based services
Chen, Xihui; Pang, Jun

in Proc. 2nd ACM Conference on Data and Application Security and Privacy (2012)

Full Text
See detailChallenges in eHealth: from enabling to enforcing privacy
Dong, Naipeng; Jonker, Hugo; Pang, Jun

in Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (2012)

Full Text
See detailFormal analysis of privacy in an eHealth protocol
Dong, Naipeng; Jonker, Hugo; Pang, Jun

in Proc. 17th European Symposium on Research in Computer Security (2012)

Full Text
See detailLocation-Based Services: Privacy, Security and Assurance
Jonker, Hugo; Mauw, Sjouke; Pang, Jun

in Digital Enlightenment Yearbook 2012 (2012)

Full Text
See detailComparative analysis of clustering protocols with probabilistic model checking
Li, Qian; Schaffer, Peter; Pang, Jun; Mauw, Sjouke

in Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (2012)

Full Text
See detailEditorial message: Special track on software verification and testing
Pang, Jun; Mousavi, Mohammad Reza

in Proc. 27th Symposium on Applied Computing (2012)

Full Text
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie; Zhang, Chenyi; Pang, Jun; Alcalde, Baptiste; Mauw, Sjouke

in Journal of Computer Security (2012), 20(4), 437-459

Full Text
See detailProbabilistic model checking of the PDGF signaling pathway
Yuan, Qixia; Trairatphisan, Panuwat; Pang, Jun; Mauw, Sjouke; Wiesinger, Monique; Sauter, Thomas

in Transactions on Computational Systems Biology (2012), XIV

Full Text
See detailAn Algorithm for Probabilistic Alternating Simulation
Zhang, Chenyi; Pang, Jun

in Proc. 38th International Conference on Current Trends in Theory and Practice of Computer Science (2012)

Full Text
See detailGame-based verification of contract signing protocols with minimal messages
Zhang, Ying; Zhang, Chenyi; Pang, Jun; Mauw, Sjouke

in Innovations in Systems and Software Engineering (2012), 8

Top of Page

2011

Full Text
See detailFast leader election in anonymous rings with bounded expected delay
Bakhshi, R.; Endrullis, Joerg; Fokkink, Wan; Pang, Jun

in Information Processing Letters (2011), 111(17), 864-870

Full Text
See detailAnalysis of a receipt-free auction protocol in the applied pi calculus
Dong, Naipeng; Jonker, Hugo; Pang, Jun

in Proc. 7th Workshop on Formal Aspects in Security and Trust (2011)

Full Text
See detailBulletin boards in voting systems: Modelling and measuring privacy
Jonker, Hugo; Pang, Jun

in Proc. 6th International Conference on Availability, Reliability and Security (2011)

Full Text
See detailSelective location blinding using hash chains
Lenzini, Gabriele; Mauw, Sjouke; Pang, Jun

in Proc. 19th International Workshop on Security Protocols (2011)

Full Text
See detailAn inductive approach to provable anonymity
Li, Yongjian; Pang, Jun

in Proc. 6th International Conference on Availability, Reliability and Security (2011)

Full Text
See detailVerification of a key-chain based TTP transparent CEM protocol
Liu, Z.; Pang, Jun; Zhang, C.

in Proc. 3rd Workshop on Harnessing Theories for Tool Support in Software (2011)

Full Text
See detailVerification of a key-chain based TTP transparent CEM protocol
Liu, Zhiyuan; Pang, Jun; Zhang, Chenyi

in Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software (2011), ENTCS 274

Full Text
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie; Zhang, Chenyi; Pang, Jun; Alcalde, Baptiste; Mauw, Sjouke

in Proc. 6th International Workshop on Security and Trust Management (2011)

Full Text
See detailA study of the PDGF signaling pathway with PRISM
Yuan, Qixia; Pang, Jun; Mauw, Sjouke; Trairatphisan, Panuwat; Wiesinger, Monique; Sauter, Thomas

in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67

Full Text
See detailOn combining state space reductions with global fairness assumptions
Zhang, Shaojie; Sun, Jun; Pang, Jun; Liu, Yang; Dong, Jinsong

in Proc. 17th International Symposium on Formal Methods (2011)

Top of Page

2010

Full Text
See detailModel checking round-based distributed algorithms
An, X.; Pang, Jun

in Proc. 15th IEEE International Conference on Engineering of Complex Computer Systems (2010)

Full Text
See detailBrief announcement: Asynchronous bounded expected delay networks
Bakhshi, R.; Endrullis, Joerg; Fokkink, W. J.; Pang, Jun

in Proc. 29th Annual ACM Symposium on Principles of Distributed Computing (2010)

Full Text
See detailExtending the Strand Space Method with Timestamps: Part I the Theor
Li, Yongjian; Pang, Jun

in Journal of Information Security (2010), 1(2), 45-55

Full Text
See detailExtending the Strand Space Method with Timestamps: Part II Application to Kerberos V
Li, Yongjiang; Pang, Jun

in Journal of Information Security (2010), 1(2), 56-67

Full Text
See detailExtending a key-chain based certified email protocol with transparent TTP
Liu, Z.; Pang, Jun; Zhang, C.

in Proc. 6th IEEE/IFIP Symposium on Trusted Computing and Communications (2010)

Full Text
See detailOn probabilistic alternating simulations
Zhang, C.; Pang, Jun

in Proc. 6th IFIP Conference on Theoretical Computer Science (2010)

Full Text
See detailGame-based verification of multi-party contract signing protocols
Zhang, Ying; Zhang, Chenyi; Pang, Jun; Mauw, Sjouke

in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)

Top of Page

2009

Full Text
See detailImproving automatic verification of security protocols with XOR
Chen, Xihui; van Deursen, Ton; Pang, Jun

in Proc. 11th International Conference on Formal Engineering Methods (2009)

Full Text
See detailA formal framework for quantifying voter-controlled privacy
Jonker, Hugo; Mauw, Sjouke; Pang, Jun

in Journal of Algorithms in Cognition, Informatics and Logic (2009)

Full Text
See detailMeasuring voter-controlled privacy
Jonker, Hugo; Mauw, Sjouke; Pang, Jun

in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)

Full Text
See detailVerification of population ring protocols in PAT
Liu, Y.; Pang, Jun; Sun, J.; Zhao, J.

in Proc. 3rd IEEE Symposium on Theoretical Aspects of Software Engineering (2009)

Full Text
See detailMessage from T4CIA workshop co-chairs
Pang, Jun; Tang, Bao

in Proc. 3rd IEEE Conference on Secure Software Integration and Reliability Improvement (2009)

Full Text
See detailHow to work with honest but curious judges? (preliminary report)
Pang, Jun; Zhang, C.

in Proc. 7th International Workshop on Security Issues in Concurrency (2009)

Full Text
See detailPAT: Towards flexible verification under fairness
Sun, J.; Liu, Y.; Dong, J.-S.; Pang, Jun

in Proc. 21th International Conference on Computer Aided Verification (2009)

Top of Page

2008

Full Text
See detailLeader election in anonymous rings: Franklin goes probabilistic
Bakhshi, R.; Fokkink, W. J.; Pang, Jun; van de Pol, J. C.

in Proc. 5th IFIP Conference on Theoretical Computer Science (2008)

Full Text
See detailIs timed branching bisimilarity a congruence indeed?
Fokkink, W. J.; Pang, Jun; Wijs, A. J.

in Fundamenta Informaticae (2008), 87(3-4), 287311

Full Text
See detailOn automatic verification of self-stabilizing population protocols
Pang, Jun; Luo, Z.; Deng, Y.

in Frontiers of Computer Science in China (2008), 2(4), 357367

Full Text
See detailOn automatic verification of self-stabilizing population protocols
Pang, Jun; Luo, Zhengqin; Deng, Yuxin

in Proceedings of 2nd IEEE Symposium on Theoretical Aspects of Software Engineering (TASE'08) (2008)

Top of Page