References of "Pang, Jun 50002807"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailProvably Improving Election Verifiability in Belenios
Baloglu, Sevdenur UL; Bursuc, Sergiu UL; Mauw, Sjouke UL et al

in Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (2021, October)

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the ... [more ▼]

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the voting server is honest. It was formally proved to be secure, making the assump- tion that no further ballots are cast on the bulletin board after voters verified their ballots. In practice, however, revoting is allowed and voters can verify their ballots anytime. This gap between formal proofs and use in practice leaves open space for attacks, as has been shown recently. In this paper we make two simple additions to Belenios and we formally prove that the new version satisfies the expected verifiability properties. Our proofs are automatically performed with the Tamarin prover, under the assumption that voters are allowed to vote at most four times. [less ▲]

Detailed reference viewed: 77 (18 UL)
Full Text
Peer Reviewed
See detailProvably Improving Election Verifiability in Belenios
Baloglu, Sevdenur UL; Bursuc, Sergiu UL; Mauw, Sjouke UL et al

in Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (2021, October)

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the ... [more ▼]

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the voting server is honest. It was formally proved to be secure, making the assump- tion that no further ballots are cast on the bulletin board after voters verified their ballots. In practice, however, revoting is allowed and voters can verify their ballots anytime. This gap between formal proofs and use in practice leaves open space for attacks, as has been shown recently. In this paper we make two simple additions to Belenios and we formally prove that the new version satisfies the expected verifiability properties. Our proofs are automatically performed with the Tamarin prover, under the assumption that voters are allowed to vote at most four times. [less ▲]

Detailed reference viewed: 77 (18 UL)
Full Text
Peer Reviewed
See detailProvably Improving Election Verifiability in Belenios
Baloglu, Sevdenur UL; Bursuc, Sergiu UL; Mauw, Sjouke UL et al

in Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (2021, October)

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the ... [more ▼]

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the voting server is honest. It was formally proved to be secure, making the assump- tion that no further ballots are cast on the bulletin board after voters verified their ballots. In practice, however, revoting is allowed and voters can verify their ballots anytime. This gap between formal proofs and use in practice leaves open space for attacks, as has been shown recently. In this paper we make two simple additions to Belenios and we formally prove that the new version satisfies the expected verifiability properties. Our proofs are automatically performed with the Tamarin prover, under the assumption that voters are allowed to vote at most four times. [less ▲]

Detailed reference viewed: 77 (18 UL)
Full Text
Peer Reviewed
See detailProvably Improving Election Verifiability in Belenios
Baloglu, Sevdenur UL; Bursuc, Sergiu UL; Mauw, Sjouke UL et al

in Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (2021, October)

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the ... [more ▼]

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the voting server is honest. It was formally proved to be secure, making the assump- tion that no further ballots are cast on the bulletin board after voters verified their ballots. In practice, however, revoting is allowed and voters can verify their ballots anytime. This gap between formal proofs and use in practice leaves open space for attacks, as has been shown recently. In this paper we make two simple additions to Belenios and we formally prove that the new version satisfies the expected verifiability properties. Our proofs are automatically performed with the Tamarin prover, under the assumption that voters are allowed to vote at most four times. [less ▲]

Detailed reference viewed: 77 (18 UL)
Full Text
Peer Reviewed
See detailProvably Improving Election Verifiability in Belenios
Baloglu, Sevdenur UL; Bursuc, Sergiu UL; Mauw, Sjouke UL et al

in Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (2021, October)

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the ... [more ▼]

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the voting server is honest. It was formally proved to be secure, making the assump- tion that no further ballots are cast on the bulletin board after voters verified their ballots. In practice, however, revoting is allowed and voters can verify their ballots anytime. This gap between formal proofs and use in practice leaves open space for attacks, as has been shown recently. In this paper we make two simple additions to Belenios and we formally prove that the new version satisfies the expected verifiability properties. Our proofs are automatically performed with the Tamarin prover, under the assumption that voters are allowed to vote at most four times. [less ▲]

Detailed reference viewed: 77 (18 UL)
Full Text
Peer Reviewed
See detailProvably Improving Election Verifiability in Belenios
Baloglu, Sevdenur UL; Bursuc, Sergiu UL; Mauw, Sjouke UL et al

in Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (2021, October)

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the ... [more ▼]

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the voting server is honest. It was formally proved to be secure, making the assump- tion that no further ballots are cast on the bulletin board after voters verified their ballots. In practice, however, revoting is allowed and voters can verify their ballots anytime. This gap between formal proofs and use in practice leaves open space for attacks, as has been shown recently. In this paper we make two simple additions to Belenios and we formally prove that the new version satisfies the expected verifiability properties. Our proofs are automatically performed with the Tamarin prover, under the assumption that voters are allowed to vote at most four times. [less ▲]

Detailed reference viewed: 77 (18 UL)
Full Text
Peer Reviewed
See detailElection Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios
Baloglu, Sevdenur UL; Bursuc, Sergiu UL; Mauw, Sjouke UL et al

in IEEE 34th Computer Security Foundations Symposium, Dubrovnik 21-25 June 2021 (2021, June)

Election verifiability aims to ensure that the outcome produced by electronic voting systems correctly reflects the intentions of eligible voters, even in the presence of an adversary that may corrupt ... [more ▼]

Election verifiability aims to ensure that the outcome produced by electronic voting systems correctly reflects the intentions of eligible voters, even in the presence of an adversary that may corrupt various parts of the voting infrastructure. Protecting such systems from manipulation is challenging because of their distributed nature involving voters, election authorities, voting servers and voting platforms. An adversary corrupting any of these can make changes that, individually, would go unnoticed, yet in the end will affect the outcome of the election. It is, therefore, important to rigorously evaluate whether the measures prescribed by election verifiability achieve their goals. We propose a formal framework that allows such an evaluation in a systematic and automated way. We demonstrate its application to the verification of various scenarios in Helios and Belenios, two prominent internet voting systems, for which we capture features and corruption models previously outside the scope of formal verification. Relying on the Tamarin protocol prover for automation, we derive new security proofs and attacks on deployed versions of these protocols, illustrating trade-offs between usability and security. [less ▲]

Detailed reference viewed: 149 (11 UL)
Full Text
Peer Reviewed
See detailSemantic and Relational Spaces in Science of Science: Deep Learning Models for Article Vectorisation
Kozlowski, Diego UL; Dusdal, Jennifer UL; Pang, Jun UL et al

in Scientometrics (2021)

Over the last century, we observe a steady and exponentially growth of scientific publications globally. The overwhelming amount of available literature makes a holistic analysis of the research within a ... [more ▼]

Over the last century, we observe a steady and exponentially growth of scientific publications globally. The overwhelming amount of available literature makes a holistic analysis of the research within a field and between fields based on manual inspection impossible. Automatic techniques to support the process of literature review are required to find the epistemic and social patterns that are embedded in scientific publications. In computer sciences, new tools have been developed to deal with large volumes of data. In particular, deep learning techniques open the possibility of automated end-to-end models to project observations to a new, low-dimensional space where the most relevant information of each observation is highlighted. Using deep learning to build new representations of scientific publications is a growing but still emerging field of research. The aim of this paper is to discuss the potential and limits of deep learning for gathering insights about scientific research articles. We focus on document-level embeddings based on the semantic and relational aspects of articles, using Natural Language Processing (NLP) and Graph Neural Networks (GNNs). We explore the different outcomes generated by those techniques. Our results show that using NLP we can encode a semantic space of articles, while with GNN we are able to build a relational space where the social practices of a research community are also encoded. [less ▲]

Detailed reference viewed: 73 (18 UL)
Full Text
Peer Reviewed
See detailEffective Link Prediction with Topological and Temporal Information using Wavelet Neural Network Embedding
Mo, Xian; Pang, Jun UL; Liu, Zhiming

in Computer Journal (2021), 64(3), 325-336

Detailed reference viewed: 40 (3 UL)
Full Text
Peer Reviewed
See detailCABEAN: a software for the control of asynchronous Boolean networks
Su, Cui; Pang, Jun UL

in Bioinformatics (2021), 36(6), 879-881

Detailed reference viewed: 61 (1 UL)
Full Text
Peer Reviewed
See detailHilbert Sinkhorn Divergence for Optimal Transport
Li, Qian; Wang, Zhichao; Li, Gang et al

in Proceedings of 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition - CVPR'21 (2021)

Detailed reference viewed: 31 (2 UL)
Full Text
Peer Reviewed
See detailTemporal Networks Based Industry Identification for Bitcoin Users
Han, Weili; Chen, Dingjie; Pang, Jun UL et al

in Proceedings of 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA'21) (2021)

Detailed reference viewed: 21 (2 UL)
Full Text
Peer Reviewed
See detailAn Exploratory Study of COVID-19 Information on Twitter in the Greater Region
Chen, Ninghan UL; Zhong, Zhiqiang UL; Pang, Jun UL

in Big Data and Cognitive Computing (2021), 5(1), 5

Detailed reference viewed: 63 (3 UL)
Full Text
Peer Reviewed
See detailProceedings of the 6th Global Conference on Artificial Intelligence (GCAI 2020)
Danoy, Grégoire UL; Pang, Jun UL; Sutcliffe

in 6th Global Conference on Artificial Intelligence (2020, May)

Detailed reference viewed: 146 (17 UL)
Full Text
See detailPreface (Special section on software systems 2020)
Xie, Tao; Jin, Zhi; Li, Xuandong et al

in Journal of Computer Science and Technology (2020), 35(6), 1231-1233

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailAn efficient approach towards the source-target control of Boolean networks
Paul, Soumya UL; Su, Cui UL; Pang, Jun UL et al

in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2020), 17(6), 1932-1945

We study the problem of computing a minimal subset of nodes of a given asynchronous Boolean network that need to be perturbed in a single-step to drive its dynamics from an initial state to a target ... [more ▼]

We study the problem of computing a minimal subset of nodes of a given asynchronous Boolean network that need to be perturbed in a single-step to drive its dynamics from an initial state to a target steady state (or attractor), which we call the source-target control of Boolean networks. Due to the phenomenon of state-space explosion, a simple global approach that performs computations on the entire network, may not scale well for large networks. We believe that efficient algorithms for such networks must exploit the structure of the networks together with their dynamics. Taking this view, we derive a decomposition-based solution to the minimal source-target control problem which can be significantly faster than the existing approaches on large networks. We then show that the solution can be further optimised if we take into account appropriate information about the source state. We apply our solutions to both real-life biological networks and randomly generated networks, demonstrating the efficiency and efficacy of our approach. [less ▲]

Detailed reference viewed: 174 (23 UL)
Full Text
Peer Reviewed
See detailCharacterising probabilistic alternating simulation for concurrent games
Zhang, Chenyi; Pang, Jun UL

in Proceedings of the 14th IEEE Symposium on Theoretical Aspects of Software Engineering (TASE) (2020)

Detailed reference viewed: 36 (0 UL)
Full Text
Peer Reviewed
See detailAccelerated verification of parametric protocols with decision trees
Li, Yongjian; Cao, Taifeng; Jansen, David et al

in Proceedings of the 38th International Conference on Computer Design (ICCD) (2020)

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailA Dynamics-based Approach for the Target Control of Boolean Networks
Su, Cui; Pang, Jun UL

in Proceedings of the 11th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics (2020)

Detailed reference viewed: 47 (0 UL)
See detailProceedings of the 6th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications
Pang, Jun UL; Zhang, Lijun

Book published by Springer (2020)

Detailed reference viewed: 41 (0 UL)