Dr. Jun Pang
|
|
||||||||
| Faculty or Centre | Faculty of Science, Technology and Medicine | ||||||||
| Department | Department of Computer Science | ||||||||
| Postal Address |
Université du Luxembourg Maison du Nombre 6, Avenue de la Fonte L-4364 Esch-sur-Alzette |
||||||||
| Campus Office | MNO, E03 0335-010 | ||||||||
|
|
|||||||||
| Telephone | (+352) 46 66 44 5625 | ||||||||
| Speaks | English, Chinese | ||||||||
2023
Target Control of Asynchronous Boolean Networks;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2023), 20(1), 707-719
Hierarchical message-passing graph neural networks; ;
in Data Mining and Knowledge Discovery (2023), 37
2022
Measuring COVID-19 Vaccine Hesitancy: Consistency of Social Media with Surveys; ; ; ; ;
in Proceedings of the 2022 International Conference on Social Informatics (2022, October 12)
Effective attributed network embedding with information behavior extraction; ;
in PeerJ Computer Science (2022), 8
Review of Current Human Genome-Scale Metabolic Models for Brain Cancer and Neurodegenerative Diseases.; ; ; ; ; ; ;
in Cells (2022), 11(16),
Functional scenario classification for Android applications using GNNs; ; ; ; ;
in Proceedings of the 13th Asia-Pacific Symposium on Internetware (2022)
Proceedings of the 13th Asia-Pacific Symposium on Internetware; ; ; ; ; ; ;
Book published by ACM (2022)
THS-GWNN: a deep learning framework for temporal network link prediction; ;
in Frontiers of Computer Science (2022), 16(2), 162304
Iterative structural inference of directed graphs;
in Proceedings of the 36th Annual Conference on Neural Information Processing Systems (NeurIPS'22) (2022)
A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin; ; ; ; ; ;
in ACM Transactions on the Web (2022), 16(2), 1-29
Target Control of Boolean Networks with Permanent Edgetic Perturbations;
in Proceedings of the 61st International Conference on Decision and Control (CDC 2022) (2022)
Modal characterisation of simulation relations in probabilistic concurrent games;
in Science of Computer Programming (2022), 215
Unsupervised network embedding beyond homophily; ; ;
in Transactions on Machine Learning Research (2022)
Simplifying Node Classification on Heterophilous Graphs with Compatible Label Propagation; ;
in Transactions on Machine Learning Research (2022)
Personalised meta-path generation for heterogeneous graph neural networks; ;
in Data Mining and Knowledge Discovery (2022), 36(6), 2299-2333
2021
Provably Improving Election Verifiability in Belenios; ; ;
in Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (2021, October)
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios; ; ;
in IEEE 34th Computer Security Foundations Symposium, Dubrovnik 21-25 June 2021 (2021, June)
From #jobsearch to #mask: improving COVID-19 cascade prediction with spillover effects; ; ;
in Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (2021, October 12)
An Exploratory Study of COVID-19 Information on Twitter in the Greater Region; ;
in Big Data and Cognitive Computing (2021), 5(1), 5
Preface of the special issue ‘Logic, argumentation and AI’ in JLC; ;
in Journal of Logic and Computation (2021), 31(8), 1901-1902
Temporal Networks Based Industry Identification for Bitcoin Users; ; ; ; ; ;
in Proceedings of 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA'21) (2021)
Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks;
in Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC'21) (2021)
Membership Inference Attacks against GANs by Leveraging Over-representation Regions;
in Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS'21) (2021)
Semantic and Relational Spaces in Science of Science: Deep Learning Models for Article Vectorisation; ; ;
in Scientometrics (2021)
Hilbert Sinkhorn Divergence for Optimal Transport; ; ; ;
in Proceedings of 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition - CVPR'21 (2021)
Effective Link Prediction with Topological and Temporal Information using Wavelet Neural Network Embedding; ;
in Computer Journal (2021), 64(3), 325-336
CABEAN: a software for the control of asynchronous Boolean networks;
in Bioinformatics (2021), 36(6), 879-881
CABEAN 2.0: Efficient and Efficacious Control of Asynchronous Boolean Networks;
in Proceedings of the 24th International Symposium on Formal Methods (FM 2021) (2021)
Towards optimal decomposition of Boolean networks; ;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2021), 18(6), 2167-2176
2020
Flavors of Boolean network reprogramming in the CoLoMoTo notebook environment.; ; ; ; ; ;
Poster (2020)
Proceedings of the 6th Global Conference on Artificial Intelligence (GCAI 2020); ;
in 6th Global Conference on Artificial Intelligence (2020, May)
Accelerated verification of parametric protocols with decision trees; ; ; ;
in Proceedings of the 38th International Conference on Computer Design (ICCD) (2020)
Higher-order graph convolutional embedding for temporal networks; ;
in Proceedings of the 21st International Conference on Web Information System Engineering (WISE'20) (2020)
Preface for the special issue of the 12th International Symposium on Theoretical Aspects of Software Engineering (TASE 2018);
in Science of Computer Programming (2020), 187
Proceedings of the 6th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications;
Book published by Springer (2020)
An efficient approach towards the source-target control of Boolean networks; ; ;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2020), 17(6), 1932-1945
Sequential Temporary and Permanent Control of Boolean Networks.;
in Proceedings of the 18th International Conference on Computational Methods in Systems Biology (CMSB) (2020)
A Dynamics-based Approach for the Target Control of Boolean Networks;
in Proceedings of the 11th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics (2020)
Preface (Special section on software systems 2020); ; ; ; ; ;
in Journal of Computer Science and Technology (2020), 35(6), 1231-1233
Characterising probabilistic alternating simulation for concurrent games;
in Proceedings of the 14th IEEE Symposium on Theoretical Aspects of Software Engineering (TASE) (2020)
NeuLP: An End-to-End Deep-Learning Model for Link Prediction; ;
in Proceedings of the 21st International Conference on Web Information System Engineering (WISE'20) (2020)
2019
Controlling large Boolean networks with single-step perturbations; ; ;
in Bioinformatics (2019), 35(14), 558-567
An active learning-based approach for location-aware acquaintance inference; ; ; ;
in Knowledge and Information Systems (2019), 59(3), 539-569
A learning-based framework for automatic parameterized verification; ;
in Proceedings of the 37th International Conference on Computer Design (ICCD) (2019)
Sequential reprogramming of Boolean networks made practical; ; ; ;
in Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (2019)
Algorithms for the Sequential Reprogramming of Boolean Networks; ; ; ; ;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2019), 16(5), 1610-1619
Taming asynchrony for attractor detection in large Boolean networks; ; ;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2019), 16(1), 31-42
GPU-accelerated steady-state computation of large probabilistic Boolean networks; ;
in Formal Aspects of Computing (2019), 31(1), 27-46
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems;
Book published by IEEE (2019)
Scalable control of asynchronous Boolean networks; ;
in Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (2019)
Controlling large Boolean networks with temporary and permanent perturbations; ;
in Proceedings of the 23rd International Symposium on Formal Methods (FM'19) (2019)
A new decomposition-based method for detecting attractors in synchronous Boolean networks; ; ;
in Science of Computer Programming (2019), 180
A graph-based approach to explore relationship between hashtags and images; ;
in Proceedings of the 20th International Conference on Web Information System Engineering (2019)
2018
L-CMP: an automatic learning-based parameterized verification tool; ;
in Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (2018)
An Automatic Proving Approach to Parameterized Verification; ; ; ; ; ;
in ACM Transactions on Computational Logic (2018), 19(4), 1-27
ASSA-PBN 3.0: Analysing Context-Sensitive Probabilistic Boolean Networks; ; ;
in Proceedings of the 16th International Conference on Computational Methods in Systems Biology (2018)
ASSA-PBN: A Toolbox for Probabilistic Boolean Networks; ; ;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2018), 15(4), 1203-1216
Reviving the two-state Markov chain approach; ;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2018), 15(5), 1525-1537
Proceedings of the 12th International Symposium on Theoretical Aspects of Software Engineering; ; ;
Book published by IEEE Computer Society (2018)
On the Full Control of Boolean Networks; ;
in Proceedings of the 16th International Conference on Computational Methods in Systems Biology (2018)
Towards the Existential Control of Boolean Networks: A Preliminary Report; ;
in Proceedings of the 4th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications (2018)
A Decomposition-based Approach towards the Control of Boolean Networks; ; ;
in Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics (2018)
Learning probabilistic models for model checking: an evolutionary approach and an empirical study; ; ;
in International Journal on Software Tools for Technology Transfer (2018), 20(6), 689-704
Tagvisor: A privacy advisor for sharing hashtags; ; ; ; ;
in Proceedings of The Web Conference 2018 (WWW'18) (2018)
2017
walk2friends: Inferring Social Links from Mobility Profiles; ; ;
in Proceedings of the 24th ACM International Conference on Computer and Communications Security (2017)
Formal modelling and analysis of receipt-free auction protocols in applied pi; ;
in Computers and Security (2017), 65
A verification framework for stateful security protocols; ; ; ; ; ;
in Proceedings of the 19th International Conference on Formal Engineering Methods (2017)
A new decomposition method for attractor detection in large synchronous Boolean networks; ; ;
in Proceedings of the 3rd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (2017)
Quantifying location sociality;
in Proc. 28th ACM Conference on Hypertext and Social Media - HT'17 (2017)
DeepCity: A Feature Learning Framework for Mining Location Check-Ins;
in Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) (2017)
Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study; ; ;
in Proceedings of 20th International Conference on Fundamental Approaches to Software Engineering (2017)
Semantic annotation for places in LBSN through graph embedding; ; ; ;
in Proceedings of the 26th ACM International Conference on Information and Knowledge Management - CIKM'17 (2017)
Does #like4like indeed provoke more likes?; ; ;
in Proceedings of the 16th IEEE/WIC/ACM International Conference on Web Intelligence (WI'17) (2017)
2016
A novel approach to parameterized verification of cache coherence protocols; ; ; ;
in Proceedings of the 34th IEEE International Conference on Computer Design (2016)
Editorial (ICFEM 14 special issue, part II); ;
in Formal Aspects of Computing (2016), 28(5), 723-724
Parallel Approximate Steady-state Analysis of Large Probabilistic Boolean Networks; ;
in Proceedings of the 31st ACM Symposium on Applied Computing (2016, April)
ASSA-PBN 2.0: A software tool for probabilistic Boolean networks.; ;
in Proceedings of 14th International Conference on Computational Methods in Systems Biology (2016)
Fast simulation of probabilistic Boolean networks.; ;
in Proceedings of 14th International Conference on Computational Methods in Systems Biology (2016)
An Empirical Study on User Access Control in Online Social Networks; ; ;
in Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT'16) (2016)
On impact of weather on human mobility in cities; ;
in Proceedings of the 17th International Conference on Web Information System Engineering (2016)
Improving BDD-based attractor detection for synchronous Boolean networks.; ; ;
in Science China Information Sciences (2016), 59(8), 0801011-08010116
Modeling city locations as complex networks: An initial study; ; ;
in Proceedings of the 5th International Workshop on Complex Networks and their Applications (2016)
2015
Activity tracking: A new attack on location privacy; ;
in Proceedings of the 3rd IEEE Conference on Communications and Network Security (CNS'15) (2015)
Inferring friendship from check-in data of location-based social networks; ;
in Proceedings of the 7th International Conference on Advances in Social Networks Analysis and Mining (ASONAM'15) (2015)
A logical approach to restricting access in online social networks; ;
in Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (2015)
Formalizing provable anonymity in Isabelle/HOL;
in Formal Aspects of Computing (2015), 27(2), 255-282
paraVerifier: An automatic framework for proving parameterized cache coherence protocols; ; ; ; ;
in Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (2015)
ASSA-PBN: An approximate steady-state analyser for probabilistic Boolean networks; ;
in Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (2015)
Proceedings 4th International Workshop on Engineering Safety and Security Systems; ;
Book published by EPTCS - 184 (2015)
Cryptographic protocols for enforcing relationship-based access control policies;
in Proceedings of the 39th Annual IEEE Computers, Software & Applications Conference (COMPSAC'15) (2015)
Event prediction with community leaders;
in Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES'15) (2015)
Exploring communities for effective location prediction;
in Proceedings of the 24th World Wide Web Conference (2015)
A new access control scheme for Facebook-style social networks;
in Computers and Security (2015), 54
Location prediction: Communities speak louder than friends;
in Proceedings of the 3rd ACM Conference on Online Social Networks (COSN'15) (2015)
Improving BDD-based attractor detection for synchronous Boolean networks; ; ;
in Proceedings of the 7th Asia-Pacific Symposium on Internetware (2015)
Community-Driven Social Influence Analysis and Applications;
in Proceedings of the 15th International Conference on Web Engineering (2015)
2014
MinUS: Mining User Similarity with Trajectory Patterns; ; ;
in Proceedings of 17th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD) (2014)
Measuring User Similarity with Trajectory Patterns: Principles and New Metrics; ; ;
in Proceedings of the 16th Asia-Pacific Web Conference (2014)
Constructing and comparing user mobility profiles; ;
in ACM Transactions on the Web (2014), 8(4), 21
Dynamic analysis of usage control policies.;
in Proceedings of the 11th Conference on Security and Cryptography (SECRPT) (2014)
Symbolic analysis of an electric vehicle charging protocol.; ; ; ;
in Proceedings of 19th IEEE Conference on Engineering of Complex Computer Systems (ICECCS) (2014)
A strand space approach to provable anonymity;
in Proc. 2nd Workshop on Formal Techniques for Safety-Critical Systems (FTSCS'13) (2014)
Proceedings of the 16th International Conference on Formal Engineering Methods;
Book published by Springer (2014)
Model-checking based approaches to parameter estimation of gene regulatory networks; ;
in Proceedings of 19th IEEE Conference on Engineering of Complex Computer Systems (2014)
Special issue on software verification and testing (editorial message);
in Science of Computer Programming (2014), 95(3), 273-274
Proceedings Third International Workshop on Engineering Safety and Security Systems;
Book published by EPTCS (2014)
A new access control scheme for Facebook-style social networks;
in Proceedings of the 9th Conference on Availability, Reliability and Security (ARES 2014, Best Paper Award) (2014)
Model Checking with Fairness Assumptions using PAT; ; ; ; ; ;
in Frontiers of Computer Science (2014), 8(1), 1-16
optPBN: An Optimisation Toolbox for Probabilistic Boolean Networks; ; ; ;
in PLoS ONE (2014), 9(7), 980011-15
2013
Verification of functional and non-functional requirements of web service composition; ; ; ; ;
in Proceedings of 15th Conference on Formal Engineering Methods (ICFEM'13) (2013)
Post-hoc analysis of user traceability in electronic toll collection systems; ;
in Proc. 7th International Workshop on Data Privacy Management (2013)
DEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity; ; ; ; ;
in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)
A trust framework for evaluating GNSS signal integrity; ; ; ;
in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)
Design and formal analysis of a group signature based electronic toll pricing system; ; ;
in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75
Exploring dependency for query privacy protection in location-based services;
in Proc. 3rd ACM Conference on Data and Application Security and Privacy (2013)
Constructing and comparing user mobility profiles for location-based services; ;
in Proc. 28th ACM Symposium on Applied Computing (2013)
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations; ;
in Proceedings of the 18th European Symposium on Research in Computer Security (2013)
Privacy and verifiability in voting systems: Methods, developments and trends; ;
in Computer Science Review (2013)
Design and formal verification of a certified email protocol with transparent TTP; ;
in Frontiers of Computer Science (2013), 7(2), 279-297
Mathematical modelling of the Platelet-Derived Growth Factor (PDGF) signalling pathway; ; ;
in Proceedings of 4th Workshop on Computational Models for Cell Processes (CompMod'13) (2013)
A balancing act: Parameter estimation for biological models with steady-state measurements; ; ;
in Proceedings of 11th Conference on Computational Methods in Systems Biology (CMSB'13) (2013)
Special issue: software verification and testing;
in Innovations in Systems and Software Engineering (2013), 9(2), 57-58
Message from ESSS 2013 Workshop Co-chairs; ;
in 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (2013)
Editorial message: Special track on software verification and testing;
in Proc. 28th Symposium on Applied Computing (2013)
Recent development and biomedical applications of probabilistic Boolean networks; ; ; ; ;
in Cell Communication and Signaling (2013), 11(46),
2012
Implementation and Validation of a Localisation Assurance Service Provider; ; ; ; ;
in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)
A group signature based electronic toll pricing system; ; ;
in Proc. 7th International Conference on Availability, Reliability and Security (2012)
Measuring query privacy in location-based services;
in Proc. 2nd ACM Conference on Data and Application Security and Privacy (2012)
Challenges in eHealth: from enabling to enforcing privacy; ;
in Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (2012)
Formal analysis of privacy in an eHealth protocol; ;
in Proc. 17th European Symposium on Research in Computer Security (2012)
Location-Based Services: Privacy, Security and Assurance; ;
in Digital Enlightenment Yearbook 2012 (2012)
Comparative analysis of clustering protocols with probabilistic model checking; ; ;
in Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (2012)
Editorial message: Special track on software verification and testing;
in Proc. 27th Symposium on Applied Computing (2012)
A trust-augmented voting scheme for collaborative privacy management; ; ; ;
in Journal of Computer Security (2012), 20(4), 437-459
Probabilistic model checking of the PDGF signaling pathway; ; ; ; ;
in Transactions on Computational Systems Biology (2012), XIV
An Algorithm for Probabilistic Alternating Simulation;
in Proc. 38th International Conference on Current Trends in Theory and Practice of Computer Science (2012)
Game-based verification of contract signing protocols with minimal messages; ; ;
in Innovations in Systems and Software Engineering (2012), 8
2011
Fast leader election in anonymous rings with bounded expected delay; ; ;
in Information Processing Letters (2011), 111(17), 864-870
Analysis of a receipt-free auction protocol in the applied pi calculus; ;
in Proc. 7th Workshop on Formal Aspects in Security and Trust (2011)
Bulletin boards in voting systems: Modelling and measuring privacy;
in Proc. 6th International Conference on Availability, Reliability and Security (2011)
Selective location blinding using hash chains; ;
in Proc. 19th International Workshop on Security Protocols (2011)
An inductive approach to provable anonymity;
in Proc. 6th International Conference on Availability, Reliability and Security (2011)
Verification of a key-chain based TTP transparent CEM protocol; ;
in Proc. 3rd Workshop on Harnessing Theories for Tool Support in Software (2011)
Verification of a key-chain based TTP transparent CEM protocol; ;
in Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software (2011), ENTCS 274
A trust-augmented voting scheme for collaborative privacy management; ; ; ;
in Proc. 6th International Workshop on Security and Trust Management (2011)
A study of the PDGF signaling pathway with PRISM; ; ; ; ;
in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67
On combining state space reductions with global fairness assumptions; ; ; ;
in Proc. 17th International Symposium on Formal Methods (2011)
2010
Model checking round-based distributed algorithms;
in Proceedings of 15th IEEE International Conference on Engineering of Complex Computer Systems (2010)
Brief announcement: Asynchronous bounded expected delay networks; ; ;
in Proceedings of 29th Annual ACM Symposium on Principles of Distributed Computing (2010)
Extending the Strand Space Method with Timestamps: Part I the Theor;
in Journal of Information Security (2010), 1(2), 45-55
Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V;
in Journal of Information Security (2010), 1(2), 56-67
Extending a key-chain based certified email protocol with transparent TTP; ;
in Proceedings of 6th IEEE/IFIP Symposium on Trusted Computing and Communications (2010)
On probabilistic alternating simulations;
in Proc. 6th IFIP Conference on Theoretical Computer Science (2010)
Game-based verification of multi-party contract signing protocols; ; ;
in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)
2009
Improving automatic verification of security protocols with XOR; ;
in Proc. 11th International Conference on Formal Engineering Methods (2009)
A formal framework for quantifying voter-controlled privacy; ;
in Journal of Algorithms in Cognition, Informatics and Logic (2009)
Measuring voter-controlled privacy; ;
in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)
Verification of population ring protocols in PAT; ; ;
in Proceedings of 3rd IEEE Symposium on Theoretical Aspects of Software Engineering (2009)
Message from T4CIA workshop co-chairs;
in Proc. 3rd IEEE Conference on Secure Software Integration and Reliability Improvement (2009)
How to work with honest but curious judges? (preliminary report);
in Proc. 7th International Workshop on Security Issues in Concurrency (2009)
PAT: Towards flexible verification under fairness; ; ;
in Proc. 21th International Conference on Computer Aided Verification (2009)
2008
Leader election in anonymous rings: Franklin goes probabilistic; ; ;
in Proc. 5th IFIP Conference on Theoretical Computer Science (2008)
Is timed branching bisimilarity a congruence indeed?; ;
in Fundamenta Informaticae (2008), 87(3-4), 287311
On automatic verification of self-stabilizing population protocols; ;
in Frontiers of Computer Science in China (2008), 2(4), 357367
On automatic verification of self-stabilizing population protocols; ;
in Proceedings of 2nd IEEE Symposium on Theoretical Aspects of Software Engineering (TASE'08) (2008)













