References of "Pang, Jun 50002807"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailFast simulation of probabilistic Boolean networks.
Mizera, Andrzej UL; Pang, Jun UL; Yuan, Qixia UL

in Proceedings of 14th International Conference on Computational Methods in Systems Biology (2016)

Detailed reference viewed: 137 (5 UL)
See detailEditorial (ICFEM 14 special issue, part I)
Merz, Stephan; Pang, Jun UL; Dong, Jin Song

in Formal Aspects of Computing (2016), 28(3), 343-344

Detailed reference viewed: 57 (4 UL)
See detailEditorial (ICFEM 14 special issue, part II)
Merz, Stephan; Pang, Jun UL; Dong, Jin Song

in Formal Aspects of Computing (2016), 28(5), 723-724

Detailed reference viewed: 49 (3 UL)
Full Text
Peer Reviewed
See detailASSA-PBN 2.0: A software tool for probabilistic Boolean networks.
Mizera, Andrzej UL; Pang, Jun UL; Yuan, Qixia UL

in Proceedings of 14th International Conference on Computational Methods in Systems Biology (2016)

Detailed reference viewed: 199 (10 UL)
Full Text
Peer Reviewed
See detailA novel approach to parameterized verification of cache coherence protocols
Li, Yongjian; Duan, Kaiqiang; Lv, Li et al

in Proceedings of the 34th IEEE International Conference on Computer Design (2016)

Detailed reference viewed: 334 (2 UL)
Full Text
Peer Reviewed
See detailModeling city locations as complex networks: An initial study
Zhou, Lu UL; Zhang, Yang; Pang, Jun UL et al

in Proceedings of the 5th International Workshop on Complex Networks and their Applications (2016)

Detailed reference viewed: 173 (17 UL)
Full Text
Peer Reviewed
See detailOn impact of weather on human mobility in cities
Pang, Jun UL; Zablotskaia, Polina; Zhang, Yang

in Proceedings of the 17th International Conference on Web Information System Engineering (2016)

Detailed reference viewed: 126 (4 UL)
Full Text
Peer Reviewed
See detailAn Empirical Study on User Access Control in Online Social Networks
Ni, Minyue; Zhang, Yang UL; Han, Weili et al

in Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT'16) (2016)

Detailed reference viewed: 126 (5 UL)
Full Text
Peer Reviewed
See detailASSA-PBN: An approximate steady-state analyser for probabilistic Boolean networks
Mizera, Andrzej UL; Pang, Jun UL; Yuan, Qixia UL

in Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (2015)

Detailed reference viewed: 157 (10 UL)
Full Text
Peer Reviewed
See detailImproving BDD-based attractor detection for synchronous Boolean networks
Qu, Hongyang; Yuan, Qixia UL; Pang, Jun UL et al

in Proceedings of the 7th Asia-Pacific Symposium on Internetware (2015)

Boolean networks are an important formalism for modelling biological systems and have attracted much attention in recent years. An important direction in Boolean networks is to exhaustively find ... [more ▼]

Boolean networks are an important formalism for modelling biological systems and have attracted much attention in recent years. An important direction in Boolean networks is to exhaustively find attractors, which represent steady states when a biological network evolves for a long term. In this paper, we propose a new approach to improve the efficiency of BDD-based attractor detection. Our approach includes a monolithic algorithm for small networks, an enumerative strategy to deal with large networks, and two heuristics on ordering BDD variables. We demonstrate the performance of our approach on a number of examples, and compare it with one existing technique in the literature. [less ▲]

Detailed reference viewed: 134 (6 UL)
Full Text
Peer Reviewed
See detailCommunity-Driven Social Influence Analysis and Applications
Zhang, Yang UL; Pang, Jun UL

in Proceedings of the 15th International Conference on Web Engineering (2015)

Detailed reference viewed: 131 (1 UL)
Full Text
Peer Reviewed
See detailA new access control scheme for Facebook-style social networks
Pang, Jun UL; Zhang, Yang UL

in Computers and Security (2015), 54

Detailed reference viewed: 124 (7 UL)
See detailProceedings 4th International Workshop on Engineering Safety and Security Systems
Pang, Jun UL; Liu, Yang; Mauw, Sjouke UL

Book published by EPTCS - 184 (2015)

Detailed reference viewed: 124 (4 UL)
Full Text
Peer Reviewed
See detailCryptographic protocols for enforcing relationship-based access control policies
Pang, Jun UL; Zhang, Yang UL

in Proceedings of the 39th Annual IEEE Computers, Software & Applications Conference (COMPSAC'15) (2015)

Detailed reference viewed: 137 (9 UL)
Full Text
Peer Reviewed
See detailInferring friendship from check-in data of location-based social networks
Cheng, Ran; Pang, Jun UL; Zhang, Yang UL

in Proceedings of the 7th International Conference on Advances in Social Networks Analysis and Mining (ASONAM'15) (2015)

Detailed reference viewed: 230 (7 UL)
Full Text
Peer Reviewed
See detailA logical approach to restricting access in online social networks
Cramer, Marcos UL; Pang, Jun UL; Zhang, Yang UL

in Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (2015)

Detailed reference viewed: 167 (9 UL)
Full Text
Peer Reviewed
See detailLocation prediction: Communities speak louder than friends
Pang, Jun UL; Zhang, Yang UL

in Proceedings of the 3rd ACM Conference on Online Social Networks (COSN'15) (2015)

Detailed reference viewed: 100 (2 UL)
Full Text
Peer Reviewed
See detailFormalizing provable anonymity in Isabelle/HOL
Li, Yongjian; Pang, Jun UL

in Formal Aspects of Computing (2015), 27(2), 255-282

Detailed reference viewed: 133 (2 UL)
Full Text
Peer Reviewed
See detailActivity tracking: A new attack on location privacy
Chen, Xihui; Mizera, Andrzej UL; Pang, Jun UL

in Proceedings of the 3rd IEEE Conference on Communications and Network Security (CNS'15) (2015)

Detailed reference viewed: 145 (11 UL)