Profil

PANG Jun

University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)

ORCID
0000-0002-4521-4112
Main Referenced Co-authors
MAUW, Sjouke  (23)
MIZERA, Andrzej  (22)
CHEN, Xihui  (18)
Su, Cui (16)
YUAN, Qixia  (13)
Main Referenced Keywords
Artificial Intelligence (4); privacy (4); location based services (3); anonymity (2); Boolean networks (2);
Main Referenced Unit & Research Centers
ULHPC - University of Luxembourg: High Performance Computing (3)
Life Sciences Research Unit (1)
Main Referenced Disciplines
Computer science (190)
Life sciences: Multidisciplinary, general & others (3)
Human health sciences: Multidisciplinary, general & others (2)
Biotechnology (1)

Publications (total 195)

The most downloaded
410 downloads
CHEN, X., & Pang, J. (2014). Protecting query privacy in location-based services. GeoInformatica, 18 (1), 95-133. doi:10.1007/s10707-013-0192-0 https://hdl.handle.net/10993/10297

The most cited

288 citations (Scopus®)

Sun, J., Liu, Y., Dong, J.-S., & Pang, J. (2009). PAT: Towards flexible verification under fairness. In Proc. 21th International Conference on Computer Aided Verification (pp. 709–714). Springer-Verlag. https://hdl.handle.net/10993/190

Wang, K., Cheng, Y., Tong, M. W., Niu, Z., PANG, J., & Han, W. (2024). Exploring Unconfirmed Transactions for Effective Bitcoin Address Clustering. In Proceedings of the ACM Web Conference 2024 (pp. 1880-1891). ACM. doi:10.1145/3589334.3645684
Peer reviewed

Cheng, Y.-W., Zhong, Z., PANG, J., & Li, C.-T. (May 2024). Hierarchical Bipartite Graph Convolutional Network for Recommendation. IEEE Computational Intelligence Magazine, 19 (2), 49-60. doi:10.1109/mci.2024.3363973
Peer reviewed

Mo, X., PANG, J., & Liu, Z. (15 April 2024). Deep autoencoder architecture with outliers for temporal attributed network embedding. Expert Systems with Applications, 240, 122596. doi:10.1016/j.eswa.2023.122596
Peer Reviewed verified by ORBi

Li, Y., Zhan, B., & PANG, J. (April 2024). Mechanizing the CMP Abstraction for Parameterized Verification. Proceedings of the ACM on Programming Languages, 8 (OOPSLA), 141:1-141:27.
Peer Reviewed verified by ORBi

WANG, A., & PANG, J. (2024). Structural Inference with Dynamics Encoding and Partial Correlation Coefficients. In Proceedings of the 12th International Conference on Learning Representations (ICLR'24). OpenReview.net.
Peer reviewed

CHEN, N., CHEN, X., ZHONG, Z., & PANG, J. (05 January 2024). Bridging Performance of X (formerly known as Twitter) Users: A Predictor of Subjective Well-Being During the Pandemic. ACM Transactions on the Web, 18 (1), 1-23. doi:10.1145/3635033
Peer Reviewed verified by ORBi

CHEN, N., CHEN, X., ZHONG, Z., & PANG, J. (2024). A tale of two roles: exploring topic-specific susceptibility and influence in cascade prediction. Data Mining and Knowledge Discovery, 38 (1), 79 - 109. doi:10.1007/s10618-023-00953-5
Peer Reviewed verified by ORBi

Wu, G., & PANG, J. (2023). Single-experiment reconstructibility of Boolean control networks revisited. In Proceedings of the 20th International Conference on Informatics in Control, Automation and Robotics (Volume 2) (pp. 85-93). SCITEPRESS. doi:10.5220/0012161100003543
Peer reviewed

PANG, J., & Niehren, J. (Eds.). (2023). Proceedings of 21st International Conference on Computational Methods in Systems Biology. Springer-Verlag. doi:10.1007/978-3-031-42697-1
Peer reviewed

Mu, C., & PANG, J. (2023). On Observability Analysis in Multiagent Systems. In Proceedings of the 26th European Conference on Artificial Intelligence (ECAI'23). IOS Press. doi:10.3233/faia230461
Peer reviewed

Shi, C., Zhu, T., Zhang, T., PANG, J., & Pan, M. (2023). Structural-semantics Guided Program Simplification for Understanding Neural Code Intelligence Models. In Proceedings of the 14th Asia-Pacific Symposium on Internetware. ACM. doi:10.1145/3609437.3609438
Peer reviewed

Waghorne, J., Howard, C., Hu, H., Pang, J., Peveler, W., Harris, L., & Barrera, O. (May 2023). The applicability of transperceptual and deep learning approaches to the study and mimicry of complex cartilaginous tissues. Frontiers in Materials, 10. doi:10.3389/fmats.2023.1092647
Peer Reviewed verified by ORBi

Chen, N., CHEN, X., Zhong, Z., & Pang, J. (2023). The Burden of Being a Bridge: Analysing Subjective Well-Being of Twitter Users During the COVID-19 Pandemic [Paper presentation]. Joint European Conference on Machine Learning and Knowledge Discovery in Databases, France. doi:10.1007/978-3-031-26390-3_15
Peer reviewed

Zhong, Z., Li, C.-T., & Pang, J. (2023). Multi-grained semantics-aware graph neural networks. IEEE Transactions on Knowledge and Data Engineering, 35 (7), 7251-7262. doi:10.1109/TKDE.2022.3195004
Peer Reviewed verified by ORBi

WANG, A., TONG, T. P., & PANG, J. (2023). Effective and Efficient Structural Inference with Reservoir Computing. In Proceedings of the 40th International Conference on Machine Learning (ICML'23) (pp. 36391-36410). PMLR.
Peer reviewed

WANG, A., & PANG, J. (2023). Active Learning based Structural Inference. In Proceedings of the 40th International Conference on Machine Learning (ICML'23) (pp. 36224-36245). PMLR.
Peer reviewed

BALOGLU, S., BURSUC, S., MAUW, S., & PANG, J. (2023). Election Verifiability in Receipt-Free Voting Protocols. In Proceedings of the 36th Computer Security Foundations Symposium (CSF 2023) (pp. 59-74). IEEE Computer Society. doi:10.1109/CSF57540.2023.00005
Peer reviewed

Zhong, Z., Li, C.-T., & Pang, J. (2023). Hierarchical message-passing graph neural networks. Data Mining and Knowledge Discovery, 37, 381-408. doi:10.1007/s10618-022-00890-9
Peer Reviewed verified by ORBi

Su, C., & Pang, J. (January 2023). Target Control of Asynchronous Boolean Networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 20 (1), 707-719. doi:10.1109/TCBB.2021.3133608
Peer Reviewed verified by ORBi

Hu, G., & Pang, J. (2023). Relation-aware weighted embedding for heterogeneous graphs. Information Technology and Control, 52 (1), 199-214. doi:10.5755/j01.itc.52.1.32390
Peer reviewed

HU, H., & PANG, J. (2023). Loss and Likelihood Based Membership Inference of Diffusion Models. In Proceedings of the 26th Information Security Conference (ISC'23) (pp. 121-141). Springer Nature Switzerland. doi:10.1007/978-3-031-49187-0_7
Peer reviewed

Zhong, Z., Gonzalez, G., Grattarola, D., & Pang, J. (2022). Unsupervised network embedding beyond homophily. Transactions on Machine Learning Research.
Peer reviewed

CHEN, N., CHEN, X., PANG, J., Borga, L., d'Ambrosio, C., & Vögele, C. (2022). Measuring COVID-19 Vaccine Hesitancy: Consistency of Social Media with Surveys. Proceedings of the 2022 International Conference on Social Informatics, 196–210. doi:10.1007/978-3-031-19097-1_12
Peer reviewed

Zhong, Z., Ivanov, S., & Pang, J. (2022). Simplifying Node Classification on Heterophilous Graphs with Compatible Label Propagation. Transactions on Machine Learning Research.
Peer reviewed

CHEN, N., CHEN, X., & PANG, J. (October 2022). A multilingual dataset of COVID-19 vaccination attitudes on Twitter. Data in Brief, 44, 108503. doi:10.1016/j.dib.2022.108503
Peer Reviewed verified by ORBi

Wang, K., Pang, J., Chen, D., Zhao, Y., Huang, D., Chen, C., & Han, W. (May 2022). A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin. ACM Transactions on the Web, 16 (2), 1-29. doi:10.1145/3494557
Peer reviewed

Zhang, C., & Pang, J. (March 2022). Modal characterisation of simulation relations in probabilistic concurrent games. Science of Computer Programming, 215, 102762. doi:10.1016/j.scico.2021.102762
Peer reviewed

Mo, X., Pang, J., & Liu, Z. (February 2022). THS-GWNN: a deep learning framework for temporal network link prediction. Frontiers of Computer Science, 16 (2), 162304. doi:10.1007/s11704-020-0092-z
Peer reviewed

Hu, G., Pang, J., & Mo, X. (2022). Effective attributed network embedding with information behavior extraction. PeerJ Computer Science, 8, 1030. doi:10.7717/peerj-cs.1030
Peer Reviewed verified by ORBi

Li, G., Zhu, F., Pang, J., Zhang, T., Pan, M., & Li, X. (2022). Functional scenario classification for Android applications using GNNs. In Proceedings of the 13th Asia-Pacific Symposium on Internetware (pp. 1-9). ACM. doi:10.1145/3545258.3545270
Peer reviewed

Mei, H., Lv, J., Jin, Z., Li, X., Gao, G., Pang, J., Bu, L., & Li, G. (Eds.). (2022). Proceedings of the 13th Asia-Pacific Symposium on Internetware. ACM.

Zhong, Z., Li, C.-T., & Pang, J. (2022). Personalised meta-path generation for heterogeneous graph neural networks. Data Mining and Knowledge Discovery, 36 (6), 2299-2333. doi:10.1007/s10618-022-00862-z
Peer Reviewed verified by ORBi

Wang, A., & Pang, J. (2022). Iterative structural inference of directed graphs. In Proceedings of the 36th Annual Conference on Neural Information Processing Systems (NeurIPS'22).
Peer reviewed

Zeyen, O. G. R., & Pang, J. (2022). Target Control of Boolean Networks with Permanent Edgetic Perturbations. In Proceedings of the 61st International Conference on Decision and Control (CDC 2022) (pp. 4236-4243). IEEE. doi:10.1109/CDC51059.2022.9992790
Peer reviewed

CHEN, N., CHEN, X., Zhong, Z., & Pang, J. (2022). Exploring Spillover Effects for COVID-19 Cascade Prediction. Entropy, 24 (2). doi:10.3390/e24020222
Peer Reviewed verified by ORBi

Kishk, A., Pires Pacheco, M. I., Heurtaux, T., Sinkkonen, L., Pang, J., Fritah, S., Niclou, S., & Sauter, T. (2022). Review of Current Human Genome-Scale Metabolic Models for Brain Cancer and Neurodegenerative Diseases. Cells, 11 (16). doi:10.3390/cells11162486
Peer Reviewed verified by ORBi

CCHEN, N., CHEN, X., Zhong, Z., & Pang, J. (2021). From #jobsearch to #mask: improving COVID-19 cascade prediction with spillover effects. Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 455–462. doi:10.1145/3487351.3488555
Peer reviewed

Baloglu, S., Bursuc, S., Mauw, S., & Pang, J. (2021). Provably Improving Election Verifiability in Belenios. In Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (pp. 1-16). Switzerland: Springer.
Peer reviewed

Baloglu, S., Bursuc, S., Mauw, S., & Pang, J. (2021). Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. In IEEE 34th Computer Security Foundations Symposium, Dubrovnik 21-25 June 2021. Los Alamitos, CA, United States: IEEE Computer Society. doi:10.1109/CSF51468.2021.00019
Peer reviewed

Kozlowski, D., Dusdal, J., Pang, J., & Zilian, A. (2021). Semantic and Relational Spaces in Science of Science: Deep Learning Models for Article Vectorisation. Scientometrics. doi:10.1007/s11192-021-03984-1
Peer Reviewed verified by ORBi

Mo, X., Pang, J., & Liu, Z. (2021). Effective Link Prediction with Topological and Temporal Information using Wavelet Neural Network Embedding. Computer Journal, 64 (3), 325-336. doi:10.1093/comjnl/bxaa085
Peer Reviewed verified by ORBi

Chen, N., Zhong, Z., & Pang, J. (2021). An Exploratory Study of COVID-19 Information on Twitter in the Greater Region. Big Data and Cognitive Computing, 5 (1), 5. doi:10.3390/bdcc5010005
Peer reviewed

Su, C., & Pang, J. (2021). CABEAN: a software for the control of asynchronous Boolean networks. Bioinformatics, 36 (6), 879-881. doi:10.1093/bioinformatics/btaa752
Peer reviewed

Han, W., Chen, D., Pang, J., Wang, K., Chen, C., Huang, D., & Fan, Z. (2021). Temporal Networks Based Industry Identification for Bitcoin Users. In Proceedings of 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA'21) (pp. 108-120). Springer. doi:10.1007/978-3-030-85928-2_9
Peer reviewed

Su, C., Pang, J., & Paul, S. (2021). Towards optimal decomposition of Boolean networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 18 (6), 2167-2176. doi:10.1109/TCBB.2019.2914051
Peer reviewed

Dong, H., Pang, J., & Wang, Y. (2021). Preface of the special issue ‘Logic, argumentation and AI’ in JLC. Journal of Logic and Computation, 31 (8), 1901-1902. doi:10.1093/logcom/exab047
Peer reviewed

Schommer, C., Sauter, T., Pang, J., Satagopam, V., Despotovic, V., & Goncalves, J. (2021). Proceedings of the AI4Health Lecture Series (2021) [Paper presentation]. AI4Health Lectures Series (2021), Campus Belval, University of Luxembourg, Luxembourg.

Li, Q., Wang, Z., Li, G., Pang, J., & Xu, G. (2021). Hilbert Sinkhorn Divergence for Optimal Transport. In Proceedings of 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition - CVPR'21 (pp. 3835-3844). IEEE.
Peer reviewed

Hu, H., & Pang, J. (2021). Membership Inference Attacks against GANs by Leveraging Over-representation Regions. In Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS'21) (pp. 2387-2389). ACM. doi:10.1145/3460120.3485338
Peer reviewed

Hu, H., & Pang, J. (2021). Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks. In Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC'21) (pp. 1-16). ACM. doi:10.1145/3485832.3485838
Peer reviewed

Su, C., & Pang, J. (2021). CABEAN 2.0: Efficient and Efficacious Control of Asynchronous Boolean Networks. In Proceedings of the 24th International Symposium on Formal Methods (FM 2021) (pp. 581-598). Springer. doi:10.1007/978-3-030-90870-6_31
Peer reviewed

Danoy, G., Pang, J., & Sutcliffe. (2020). Proceedings of the 6th Global Conference on Artificial Intelligence (GCAI 2020). In 6th Global Conference on Artificial Intelligence. Easychair.
Peer reviewed

Pang, J., & Zhang, C. (2020). Preface for the special issue of the 12th International Symposium on Theoretical Aspects of Software Engineering (TASE 2018). Science of Computer Programming, 187, 102375. doi:10.1016/j.scico.2019.102375

Pang, J., & Zhang, L. (Eds.). (2020). Proceedings of the 6th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications. Springer.

Xie, T., Jin, Z., Li, X., Huang, G., Muller, H., Pang, J., & Zhang, L. (2020). Preface (Special section on software systems 2020). Journal of Computer Science and Technology, 35 (6), 1231-1233. doi:10.1007/s11390-020-0006-4

Biane, C., Deritei, D., Rozum, J., Su, C., Pang, J., Zañudo, J., & Paulevé, L. (2020). Flavors of Boolean network reprogramming in the CoLoMoTo notebook environment [Poster presentation]. 18th International Conference on Computational Methods in Systems Biology.

Mo, X., Pang, J., & Liu, Z. (2020). Higher-order graph convolutional embedding for temporal networks. In Proceedings of the 21st International Conference on Web Information System Engineering (WISE'20) (pp. 3-15). Springer.
Peer reviewed

Paul, S., Su, C., Pang, J., & Mizera, A. (2020). An efficient approach towards the source-target control of Boolean networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 17 (6), 1932-1945. doi:10.1109/TCBB.2019.2915081
Peer Reviewed verified by ORBi

Zhang, C., & Pang, J. (2020). Characterising probabilistic alternating simulation for concurrent games. In Proceedings of the 14th IEEE Symposium on Theoretical Aspects of Software Engineering (TASE) (pp. 121-128). IEEE. doi:10.1109/TASE.2020.00025
Peer reviewed

Su, C., & Pang, J. (2020). Sequential Temporary and Permanent Control of Boolean Networks. In Proceedings of the 18th International Conference on Computational Methods in Systems Biology (CMSB) (pp. 234-251). Springer.
Peer reviewed

Zhong, Z., Zhang, Y., & Pang, J. (2020). NeuLP: An End-to-End Deep-Learning Model for Link Prediction. In Proceedings of the 21st International Conference on Web Information System Engineering (WISE'20) (pp. 96-108). Springer.
Peer reviewed

Su, C., & Pang, J. (2020). A Dynamics-based Approach for the Target Control of Boolean Networks. In Proceedings of the 11th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics (pp. 50:1-50:8). ACM Press. doi:10.1145/3388440.3412464
Peer reviewed

Li, Y., Cao, T., Jansen, D., Pang, J., & Wei, X. (2020). Accelerated verification of parametric protocols with decision trees. In Proceedings of the 38th International Conference on Computer Design (ICCD) (pp. 397-404). IEEE. doi:10.1109/ICCD50377.2020.00073
Peer reviewed

Schommer, C., Sauter, T., Pang, J., & Abankwa, D. (2020). Proceedings of the AI4Health Lecture Series (2020) [Paper presentation]. AI4Health Lectures Series (2020), Campus Belval, University of Luxembourg, Luxembourg.

Chen, B.-H., Li, C.-T., Chuang, K.-T., Pang, J., & Zhang, Y. (2019). An active learning-based approach for location-aware acquaintance inference. Knowledge and Information Systems, 59 (3), 539-569. doi:10.1007/s10115-018-1196-8
Peer reviewed

Yuan, Q., Mizera, A., Pang, J., & Qu, H. (2019). A new decomposition-based method for detecting attractors in synchronous Boolean networks. Science of Computer Programming, 180, 18-35. doi:10.1016/j.scico.2019.05.001
Peer Reviewed verified by ORBi

Baudin, A., Paul, S., Su, C., & Pang, J. (2019). Controlling large Boolean networks with single-step perturbations. Bioinformatics, 35 (14), 558-i567. doi:10.1093/bioinformatics/btz371
Peer reviewed

Mandon, H., Su, C., Haar, S., Pang, J., & Paulevé, L. (2019). Sequential reprogramming of Boolean networks made practical. In Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (pp. 3-19). Springer.
Peer reviewed

Su, C., Paul, S., & Pang, J. (2019). Scalable control of asynchronous Boolean networks. In Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (pp. 362-367). Springer.
Peer reviewed

Su, C., Paul, S., & Pang, J. (2019). Controlling large Boolean networks with temporary and permanent perturbations. In Proceedings of the 23rd International Symposium on Formal Methods (FM'19) (pp. 707-724). Springer.
Peer reviewed

Mandon, H., Su, C., Pang, J., Paul, S., Haar, S., & Pauleve, L. (2019). Algorithms for the Sequential Reprogramming of Boolean Networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16 (5), 1610-1619. doi:10.1109/TCBB.2019.2914383
Peer reviewed

Pang, J., & Sun, J. (Eds.). (2019). Proceedings of the 24th International Conference on Engineering of Complex Computer Systems. IEEE.

Mizera, A., Pang, J., & Yuan, Q. (2019). GPU-accelerated steady-state computation of large probabilistic Boolean networks. Formal Aspects of Computing, 31 (1), 27-46. doi:10.1007/s00165-018-0470-6
Peer Reviewed verified by ORBi

Mizera, A., Pang, J., Qu, H., & Yuan, Q. (2019). Taming asynchrony for attractor detection in large Boolean networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16 (1), 31-42. doi:10.1109/TCBB.2018.2850901
Peer reviewed

Li, Y., Cao, J., & Pang, J. (2019). A learning-based framework for automatic parameterized verification. In Proceedings of the 37th International Conference on Computer Design (ICCD) (pp. 450-459). IEEE. doi:10.1109/ICCD46524.2019.00070
Peer reviewed

Zhong, Z., Zhang, Y., & Pang, J. (2019). A graph-based approach to explore relationship between hashtags and images. In Proceedings of the 20th International Conference on Web Information System Engineering (pp. 473-488). springer. doi:10.1007/978-3-030-34223-4_30
Peer reviewed

Li, Y., Duan, K., Jansen, D., Pang, J., Zhang, L., Lv, Y., & Cai, S. (2018). An Automatic Proving Approach to Parameterized Verification. ACM Transactions on Computational Logic, 19 (4), 1-27. doi:10.1145/3232164
Peer reviewed

Wang, J., Sun, J., Yuan, Q., & Pang, J. (2018). Learning probabilistic models for model checking: an evolutionary approach and an empirical study. International Journal on Software Tools for Technology Transfer, 20 (6), 689-704. doi:10.1007/s10009-018-0492-7
Peer reviewed

Zhang, Y., Humbert, M., Rahman, T., Li, C.-T., Pang, J., & Backes, M. (2018). Tagvisor: A privacy advisor for sharing hashtags. In Proceedings of The Web Conference 2018 (WWW'18) (pp. 287-296). ACM Press.
Peer reviewed

Cao, J., Li, Y., & Pang, J. (2018). L-CMP: an automatic learning-based parameterized verification tool. In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (pp. 892-895). ACM. doi:10.1145/3238147.3240487
Peer reviewed

Paul, S., Pang, J., & Su, C. (2018). On the Full Control of Boolean Networks. In Proceedings of the 16th International Conference on Computational Methods in Systems Biology (pp. 313-317). Springer Science & Business Media B.V.
Peer reviewed

Mizera, A., Pang, J., & Yuan, Q. (2018). Reviving the two-state Markov chain approach. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15 (5), 1525-1537. doi:10.1109/TCBB.2017.2704592
Peer Reviewed verified by ORBi

Mizera, A., Pang, J., Su, C., & Yuan, Q. (2018). ASSA-PBN: A Toolbox for Probabilistic Boolean Networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15 (4), 1203-1216. doi:10.1109/TCBB.2017.2773477
Peer reviewed

Paul, S., Su, C., Pang, J., & Mizera, A. (2018). A Decomposition-based Approach towards the Control of Boolean Networks. In Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics. ACM. doi:10.1145/3233547.3233550
Peer reviewed

Mizera, A., Pang, J., Qu, H., & Yuan, Q. (2018). ASSA-PBN 3.0: Analysing Context-Sensitive Probabilistic Boolean Networks. In Proceedings of the 16th International Conference on Computational Methods in Systems Biology (pp. 277-284). Springer Science & Business Media B.V. doi:10.1007/978-3-319-99429-1_16
Peer reviewed

Paul, S., Pang, J., & Su, C. (2018). Towards the Existential Control of Boolean Networks: A Preliminary Report. In Proceedings of the 4th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications (pp. 142-149). Springer Science & Business Media B.V.
Peer reviewed

Pang, J., Zhang, C., He, J., & Weng, J. (Eds.). (2018). Proceedings of the 12th International Symposium on Theoretical Aspects of Software Engineering. IEEE Computer Society.

Backes, M., Humbert, M., Pang, J., & Zhang, Y. (2017). walk2friends: Inferring Social Links from Mobility Profiles. In Proceedings of the 24th ACM International Conference on Computer and Communications Security (pp. 1943-1957). ACM Press.
Peer reviewed

Li, L., Dong, N., Pang, J., Sun, J., Bai, G., Liu, Y., & Dong, J. S. (2017). A verification framework for stateful security protocols. In Proceedings of the 19th International Conference on Formal Engineering Methods (pp. 262-280). Springer Science & Business Media B.V.
Peer reviewed

Wang, Y., Qin, Z., Pang, J., Zhang, Y., & Jin, X. (2017). Semantic annotation for places in LBSN through graph embedding. In Proceedings of the 26th ACM International Conference on Information and Knowledge Management - CIKM'17 (pp. 2343-2346). ACM Press.
Peer reviewed

Wang, J., Sun, J., Yuan, Q., & Pang, J. (2017). Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study. In Proceedings of 20th International Conference on Fundamental Approaches to Software Engineering (pp. 3-21). Springer.
Peer reviewed

Pang, J., & Zhang, Y. (2017). Quantifying location sociality. In Proc. 28th ACM Conference on Hypertext and Social Media - HT'17 (pp. 145-154). ACM Press. doi:10.1145/3078714.3078729
Peer reviewed

zhang, Y., Ni, M., Han, W., & Pang, J. (2017). Does #like4like indeed provoke more likes? In Proceedings of the 16th IEEE/WIC/ACM International Conference on Web Intelligence (WI'17) (pp. 179-186). ACM.
Peer reviewed

Pang, J., & Zhang, Y. (2017). DeepCity: A Feature Learning Framework for Mining Location Check-Ins. In Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) (pp. 652-655). AAAI.
Peer reviewed

Mizera, A., Pang, J., Qu, H., & Yuan, Q. (2017). A new decomposition method for attractor detection in large synchronous Boolean networks. In Proceedings of the 3rd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (pp. 232-249). Springer Science & Business Media B.V.
Peer reviewed

Dong, N., Jonker, H., & Pang, J. (2017). Formal modelling and analysis of receipt-free auction protocols in applied pi. Computers and Security, 65, 405-432. doi:10.1016/j.cose.2016.09.002
Peer reviewed

Mizera, A., Pang, J., & Yuan, Q. (2016). Parallel Approximate Steady-state Analysis of Large Probabilistic Boolean Networks. In Proceedings of the 31st ACM Symposium on Applied Computing. ACM.
Peer reviewed

Pang, J., & Stoelinga, M. (2016). Selected and extended papers from ACM SVT 2014. Science of Computer Programming. doi:10.1016/j.scico.2016.03.002

Ni, M., Zhang, Y., Han, W., & Pang, J. (2016). An Empirical Study on User Access Control in Online Social Networks. In Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT'16) (pp. 13-23). ACM. doi:10.1145/2914642.2914644
Peer reviewed

Li, Y., Duan, K., Lv, L., Pang, J., & Cai, S. (2016). A novel approach to parameterized verification of cache coherence protocols. In Proceedings of the 34th IEEE International Conference on Computer Design (pp. 560-567). IEEE Computer Society. doi:10.1109/ICCD.2016.7753341
Peer reviewed

Zhou, L., Zhang, Y., Pang, J., & Li, C.-T. (2016). Modeling city locations as complex networks: An initial study. In Proceedings of the 5th International Workshop on Complex Networks and their Applications (pp. 735-747). Springer Science & Business Media B.V.
Peer reviewed

Pang, J., Zablotskaia, P., & Zhang, Y. (2016). On impact of weather on human mobility in cities. In Proceedings of the 17th International Conference on Web Information System Engineering (pp. 247-256). Springer Science & Business Media B.V.
Peer reviewed

Mizera, A., Pang, J., & Yuan, Q. (2016). GPU-accelerated steady-state analysis of probabilistic Boolean networks [Poster presentation]. 14th International Conference on Computational Methods in Systems Biology.

Merz, S., Pang, J., & Dong, J. S. (2016). Editorial (ICFEM 14 special issue, part I). Formal Aspects of Computing, 28 (3), 343-344.

Merz, S., Pang, J., & Dong, J. S. (2016). Editorial (ICFEM 14 special issue, part II). Formal Aspects of Computing, 28 (5), 723-724.

Mizera, A., Pang, J., & Yuan, Q. (2016). ASSA-PBN 2.0: A software tool for probabilistic Boolean networks. In Proceedings of 14th International Conference on Computational Methods in Systems Biology (pp. 309-315). Berlin, Germany: Springer.
Peer reviewed

Mizera, A., Pang, J., & Yuan, Q. (2016). Fast simulation of probabilistic Boolean networks. In Proceedings of 14th International Conference on Computational Methods in Systems Biology (pp. 216-231). Berlin, Germany: Springer.
Peer reviewed

Yuan, Q., Qu, H., Pang, J., & Mizera, A. (2016). Improving BDD-based attractor detection for synchronous Boolean networks. Science China Information Sciences, 59 (8), 080101:1-080101:16. doi:10.1007/s11432-016-5594-9
Peer reviewed

Pang, J., Liu, Y., & Mauw, S. (Eds.). (2015). Proceedings 4th International Workshop on Engineering Safety and Security Systems. (184). EPTCS.

Pang, J., & Zhang, Y. (2015). Cryptographic protocols for enforcing relationship-based access control policies. In Proceedings of the 39th Annual IEEE Computers, Software & Applications Conference (COMPSAC'15) (IEEE CS, pp. 484-493).
Peer reviewed

Cheng, R., Pang, J., & Zhang, Y. (2015). Inferring friendship from check-in data of location-based social networks. In Proceedings of the 7th International Conference on Advances in Social Networks Analysis and Mining (ASONAM'15) (pp. 1284-1291). IEEE CS.
Peer reviewed

Pang, J., & Zhang, Y. (2015). Event prediction with community leaders. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES'15) (pp. 238-243). IEEE CS.
Peer reviewed

Li, Y., Pang, J., Lv, Y., Fan, D., Cao, S., & Duan, K. (2015). paraVerifier: An automatic framework for proving parameterized cache coherence protocols. In Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (pp. 207-213).
Peer reviewed

Mizera, A., Pang, J., & Yuan, Q. (2015). ASSA-PBN: An approximate steady-state analyser for probabilistic Boolean networks. In Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (pp. 214-220). Springer.
Peer reviewed

Zhang, Y., & Pang, J. (2015). Community-Driven Social Influence Analysis and Applications. In Proceedings of the 15th International Conference on Web Engineering. Springer.
Peer reviewed

Pang, J., & Zhang, Y. (2015). Exploring communities for effective location prediction. In Proceedings of the 24th World Wide Web Conference. ACM. doi:10.1145/2740908.2742720
Peer reviewed

Qu, H., Yuan, Q., Pang, J., & Mizera, A. (2015). Improving BDD-based attractor detection for synchronous Boolean networks. In Proceedings of the 7th Asia-Pacific Symposium on Internetware. ACM.
Peer reviewed

Li, Y., & Pang, J. (2015). Formalizing provable anonymity in Isabelle/HOL. Formal Aspects of Computing, 27 (2), 255-282. doi:10.1007/s00165-014-0315-x
Peer reviewed

Cramer, M., Pang, J., & Zhang, Y. (2015). A logical approach to restricting access in online social networks. In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. ACM.
Peer reviewed

Pang, J., & Zhang, Y. (2015). Location prediction: Communities speak louder than friends. In Proceedings of the 3rd ACM Conference on Online Social Networks (COSN'15) (pp. 161-171). ACM.
Peer reviewed

Chen, X., Mizera, A., & Pang, J. (2015). Activity tracking: A new attack on location privacy. In Proceedings of the 3rd IEEE Conference on Communications and Network Security (CNS'15) (pp. 22-30). IEEE CS.
Peer reviewed

Pang, J., & Zhang, Y. (2015). A new access control scheme for Facebook-style social networks. Computers and Security, 54, 44-59. doi:10.1016/j.cose.2015.04.013
Peer reviewed

Trairatphisan, P., Mizera, A., Pang, J., Tantar, A.-A., & Sauter, T. (01 July 2014). optPBN: An Optimisation Toolbox for Probabilistic Boolean Networks. PLoS ONE, 9 (7), 98001 (1-15. doi:10.1371/journal.pone.0098001
Peer Reviewed verified by ORBi

Mousavi, M., & Pang, J. (2014). Special issue on software verification and testing (editorial message). Science of Computer Programming, 95 (3), 273-274. doi:10.1016/j.scico.2014.06.015

Merz, S., & Pang, J. (Eds.). (2014). Proceedings of the 16th International Conference on Formal Engineering Methods. Springer. doi:10.1007/978-3-319-11737-9

Chatzikokolakis, K., Mödersheim, S., Palamidessi, C., & Pang, J. (2014). Foundational aspects of security. Journal of Computer Security, 22 (2), 201-202. doi:10.3233/JCS-140497

Pang, J., & Liu, Y. (Eds.). (2014). Proceedings Third International Workshop on Engineering Safety and Security Systems. EPTCS.

CHEN, X., & Pang, J. (2014). Protecting query privacy in location-based services. GeoInformatica, 18 (1), 95-133. doi:10.1007/s10707-013-0192-0
Peer reviewed

Pang, J., & Zhang, Y. (2014). A new access control scheme for Facebook-style social networks. In Proceedings of the 9th Conference on Availability, Reliability and Security (ARES 2014, Best Paper Award) (pp. 1-10). IEEE CS. doi:10.1109/ARES.2014.9
Peer reviewed

Elrahaiby, Y., & Pang, J. (2014). Dynamic analysis of usage control policies. In Proceedings of the 11th Conference on Security and Cryptography (SECRPT). SciTePress.
Peer reviewed

Li, Y., & Pang, J. (2014). A strand space approach to provable anonymity. In Proc. 2nd Workshop on Formal Techniques for Safety-Critical Systems (FTSCS'13) (pp. 71-87).
Peer reviewed

Chen, X., Pang, J., & Xue, R. (2014). Constructing and comparing user mobility profiles. ACM Transactions on the Web, 8 (4), 21. doi:10.1145/2637483
Peer reviewed

Si, Y., Sun, J., Liu, Y., Dong, J. S., Pang, J., Zhang, S., & Yang, X. (2014). Model Checking with Fairness Assumptions using PAT. Frontiers of Computer Science, 8 (1), 1-16. doi:10.1007/s11704-013-3091-5
Peer reviewed

Li, L., Pang, J., Liu, Y., Sun, J., & Dong, J. S. (2014). Symbolic analysis of an electric vehicle charging protocol. In Proceedings of 19th IEEE Conference on Engineering of Complex Computer Systems (ICECCS). IEEE CS. doi:10.1109/ICECCS.2014.11
Peer reviewed

Chen, X., Lu, R., Ma, X., & Pang, J. (2014). Measuring User Similarity with Trajectory Patterns: Principles and New Metrics. In Proceedings of the 16th Asia-Pacific Web Conference (pp. 437-448). Springer. doi:10.1007/978-3-319-11116-2_38
Peer reviewed

Mizera, A., Pang, J., & Yuan, Q. (2014). Model-checking based approaches to parameter estimation of gene regulatory networks. In Proceedings of 19th IEEE Conference on Engineering of Complex Computer Systems (pp. 206-209). IEEE CS. doi:10.1109/ICECCS.2014.38
Peer reviewed

Chen, X., Kordy, P., Lu, R., & Pang, J. (2014). MinUS: Mining User Similarity with Trajectory Patterns. In Proceedings of 17th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD) (pp. 436-439). Springer. doi:10.1007/978-3-662-44845-8_29
Peer reviewed

CHEN, X., Harpes, C., Lenzini, G., Martins, M., Mauw, S., & Pang, J. (2013). DEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity. In Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (pp. 1329-1332). ACM.
Peer reviewed

Trairatphisan, P., Mizera, A., Pang, J., Tantar, A.-A., Schneider, J., & Sauter, T. (01 July 2013). Recent development and biomedical applications of probabilistic Boolean networks. Cell Communication and Signaling, 11 (46). doi:10.1186/1478-811X-11-46
Peer Reviewed verified by ORBi

Pang, J., & Mousavi, M. R. (2013). Editorial message: Special track on software verification and testing. In Proc. 28th Symposium on Applied Computing (pp. 1186-1187). ACM.

Mizera, A., Pang, J., Sauter, T., & Trairatphisan, P. (2013). Mathematical modelling of the Platelet-Derived Growth Factor (PDGF) signalling pathway. In Proceedings of 4th Workshop on Computational Models for Cell Processes (CompMod'13) (pp. 35).

Li, Y., & Pang, J. (2013). An inductive approach to strand spaces. Formal Aspects of Computing, 25 (4), 465-501. doi:10.1007/s00165-011-0187-2
Peer reviewed

Mizera, A., Pang, J., Sauter, T., & Trairatphisan, P. (2013). A balancing act: Parameter estimation for biological models with steady-state measurements. In Proceedings of 11th Conference on Computational Methods in Systems Biology (CMSB'13) (pp. 253-254). Springer.
Peer reviewed

Mousavi, M. R., & Pang, J. (2013). Special issue: software verification and testing. Innovations in Systems and Software Engineering, 9 (2), 57-58. doi:10.1007/s11334-013-0211-1
Peer reviewed

Pang, J., Liu, Y., & Mauw, S. (2013). Message from ESSS 2013 Workshop Co-chairs. In 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (pp. 1). IEEE Computer Society. doi:10.1109/ICSTW.2013.63

Chen, X., Harpes, C., Lenzini, G., Mauw, S., & Pang, J. (2013). Location Assurance and Privacy in GNSS Navigation. ERCIM News, 2013 (94).
Peer reviewed

CHEN, X., Lenzini, G., Martins, M., Mauw, S., & Pang, J. (2013). A trust framework for evaluating GNSS signal integrity. In Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (pp. 179-192). IEEE CS.
Peer reviewed

CHEN, X., Lenzini, G., Mauw, S., & Pang, J. (2013). Design and formal analysis of a group signature based electronic toll pricing system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (1), 55-75.
Peer reviewed

Dong, N., Jonker, H., & Pang, J. (2013). Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. In Proceedings of the 18th European Symposium on Research in Computer Security (pp. 499-516). Springer.
Peer reviewed

Chen, M., Tan, T. H., Sun, J., Liu, Y., Pang, J., & Li, X. (2013). Verification of functional and non-functional requirements of web service composition. In Proceedings of 15th Conference on Formal Engineering Methods (ICFEM'13) (pp. 314-329). Springer.
Peer reviewed

Jonker, H., Mauw, S., & Pang, J. (2013). Privacy and verifiability in voting systems: Methods, developments and trends. Computer Science Review. doi:10.1016/j.cosrev.2013.08.002
Peer reviewed

Liu, Z., Pang, J., & Zhang, C. (2013). Design and formal verification of a certified email protocol with transparent TTP. Frontiers of Computer Science, 7 (2), 279-297. doi:10.1007/s11704-013-1268-6
Peer reviewed

CHEN, X., & Pang, J. (2013). Exploring dependency for query privacy protection in location-based services. In Proc. 3rd ACM Conference on Data and Application Security and Privacy (pp. 37-47). ACM. doi:10.1145/2435349.2435354
Peer reviewed

CHEN, X., Fonkwe, D., & Pang, J. (2013). Post-hoc analysis of user traceability in electronic toll collection systems. In Proc. 7th International Workshop on Data Privacy Management (pp. 29-42). Springer-Verlag.
Peer reviewed

CHEN, X., Pang, J., & Xue, R. (2013). Constructing and comparing user mobility profiles for location-based services. In Proc. 28th ACM Symposium on Applied Computing (pp. 261-266). ACM. doi:10.1145/2480362.2480418
Peer reviewed

Jonker, H., Mauw, S., & Pang, J. (2012). Location-Based Services: Privacy, Security and Assurance. In Digital Enlightenment Yearbook 2012 (pp. 235-244). IOS Press. doi:10.3233/978-1-61499-057-4-235

Pang, J., & Mousavi, M. R. (2012). Editorial message: Special track on software verification and testing. In Proc. 27th Symposium on Applied Computing (pp. 1262-1263). ACM.

CHEN, X., & Pang, J. (2012). Measuring query privacy in location-based services. In Proc. 2nd ACM Conference on Data and Application Security and Privacy (pp. 49 - 61).
Peer reviewed

Sun, Y., Zhang, C., Pang, J., Alcalde, B., & Mauw, S. (2012). A trust-augmented voting scheme for collaborative privacy management. Journal of Computer Security, 20 (4), 437-459. doi:10.3233/JCS-2012-0453
Peer Reviewed verified by ORBi

Zhang, Y., Zhang, C., Pang, J., & Mauw, S. (2012). Game-based verification of contract signing protocols with minimal messages. Innovations in Systems and Software Engineering, 8, 111-124. doi:10.1007/s11334-012-0180-9
Peer reviewed

CHEN, X., Harpes, C., Lenzini, G., Martins, M., Mauw, S., & Pang, J. (2012). Implementation and Validation of a Localisation Assurance Service Provider. In Proc. 6th ESA Workshop on Satellite Navigation Technologies (pp. 1-7). doi:10.1109/NAVITEC.2012.6423097
Peer reviewed

Dong, N., Jonker, H., & Pang, J. (2012). Formal analysis of privacy in an eHealth protocol. In Proc. 17th European Symposium on Research in Computer Security (pp. 325-342). Springer-Verlag.
Peer reviewed

Zhang, C., & Pang, J. (2012). An Algorithm for Probabilistic Alternating Simulation. In Proc. 38th International Conference on Current Trends in Theory and Practice of Computer Science (pp. 431-442).
Peer reviewed

CHEN, X., Lenzini, G., Mauw, S., & Pang, J. (2012). A group signature based electronic toll pricing system. In Proc. 7th International Conference on Availability, Reliability and Security (pp. 85-93). IEEE Computer Society. doi:10.1109/ARES.2012.67
Peer reviewed

Dong, N., Jonker, H., & Pang, J. (2012). Challenges in eHealth: from enabling to enforcing privacy. In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (pp. 195-206). Springer-Verlag.
Peer reviewed

Li, Q., Schaffer, P., Pang, J., & Mauw, S. (2012). Comparative analysis of clustering protocols with probabilistic model checking. In Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (pp. 249-252). IEEE Computer Society. doi:10.1109/TASE.2012.28
Peer reviewed

Yuan, Q., Trairatphisan, P., Pang, J., Mauw, S., Wiesinger, M., & Sauter, T. (2012). Probabilistic model checking of the PDGF signaling pathway. Transactions on Computational Systems Biology, XIV, 151-180.
Peer reviewed

Liu, Z., Pang, J., & Zhang, C. (2011). Verification of a key-chain based TTP transparent CEM protocol. In Proc. 3rd Workshop on Harnessing Theories for Tool Support in Software. Elsevier.
Peer reviewed

Zhang, S., Sun, J., Pang, J., Liu, Y., & Dong, J. (2011). On combining state space reductions with global fairness assumptions. In Proc. 17th International Symposium on Formal Methods (pp. 432-447). Springer-Verlag.
Peer reviewed

Dong, N., Jonker, H., & Pang, J. (2011). Analysis of a receipt-free auction protocol in the applied pi calculus. In Proc. 7th Workshop on Formal Aspects in Security and Trust (pp. 223–238). Springer-Verlag.
Peer reviewed

Sun, Y., Zhang, C., Pang, J., Alcalde, B., & Mauw, S. (2011). A trust-augmented voting scheme for collaborative privacy management. In Proc. 6th International Workshop on Security and Trust Management (pp. 132-146).
Peer reviewed

Liu, Z., Pang, J., & Zhang, C. (2011). Verification of a key-chain based TTP transparent CEM protocol. Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software, ENTCS 274, 51-65.
Peer reviewed

Li, Y., & Pang, J. (2011). An inductive approach to provable anonymity. In Proc. 6th International Conference on Availability, Reliability and Security (pp. 454-459). IEEE CS. doi:10.1109/ARES.2011.70
Peer reviewed

Jonker, H., & Pang, J. (2011). Bulletin boards in voting systems: Modelling and measuring privacy. In Proc. 6th International Conference on Availability, Reliability and Security (pp. 294-300). IEEE CS. doi:10.1109/ARES.2011.50
Peer reviewed

Bakhshi, R., Endrullis, J., Fokkink, W., & Pang, J. (2011). Fast leader election in anonymous rings with bounded expected delay. Information Processing Letters, 111 (17), 864-870. doi:10.1016/j.ipl.2011.06.003
Peer Reviewed verified by ORBi

Lenzini, G., Mauw, S., & Pang, J. (2011). Selective location blinding using hash chains. In Proc. 19th International Workshop on Security Protocols (pp. 132-141). Springer-Verlag.
Peer reviewed

Yuan, Q., Pang, J., Mauw, S., Trairatphisan, P., Wiesinger, M., & Sauter, T. (2011). A study of the PDGF signaling pathway with PRISM. Proceedings of the 3rd Workshop on Computational Models for Cell Processes, EPTCS 67, 65-81.
Peer reviewed

Zhang, C., & Pang, J. (2010). On probabilistic alternating simulations. In Proc. 6th IFIP Conference on Theoretical Computer Science (pp. 71–85). IFIP International Federation for Information Processing.
Peer reviewed

Li, Y., & Pang, J. (2010). Extending the Strand Space Method with Timestamps: Part I the Theor. Journal of Information Security, 1 (2), 45-55.
Peer reviewed

Li, Y., & Pang, J. (2010). Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V. Journal of Information Security, 1 (2), 56-67.
Peer reviewed

Zhang, Y., Zhang, C., Pang, J., & Mauw, S. (2010). Game-based verification of multi-party contract signing protocols. In Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (pp. 186-200). Springer-Verlag.
Peer reviewed

An, X., & Pang, J. (2010). Model checking round-based distributed algorithms. Proceedings of 15th IEEE International Conference on Engineering of Complex Computer Systems, 127-135. doi:10.1109/ICECCS.2010.22
Peer reviewed

Liu, Z., Pang, J., & Zhang, C. (2010). Extending a key-chain based certified email protocol with transparent TTP. Proceedings of 6th IEEE/IFIP Symposium on Trusted Computing and Communications, 630–636. doi:10.1109/EUC.2010.101
Peer reviewed

Bakhshi, R., Endrullis, J., Fokkink, W. J., & Pang, J. (2010). Brief announcement: Asynchronous bounded expected delay networks. Proceedings of 29th Annual ACM Symposium on Principles of Distributed Computing, 392–393. doi:10.1145/1835698.1835787
Peer reviewed

Jonker, H., Mauw, S., & Pang, J. (2009). A formal framework for quantifying voter-controlled privacy. Journal of Algorithms in Cognition, Informatics and Logic, 89-105. doi:10.1016/j.jalgor.2009.02.007
Peer reviewed

Pang, J., & Tang, B. (2009). Message from T4CIA workshop co-chairs. In Proc. 3rd IEEE Conference on Secure Software Integration and Reliability Improvement (pp. 323). IEEE Computer Society. doi:10.1109/SSIRI.2009.5

Jonker, H., Mauw, S., & Pang, J. (2009). Measuring voter-controlled privacy. In Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (pp. 289-298). IEEE Computer Society. doi:10.1109/ARES.2009.81
Peer reviewed

Sun, J., Liu, Y., Dong, J.-S., & Pang, J. (2009). PAT: Towards flexible verification under fairness. In Proc. 21th International Conference on Computer Aided Verification (pp. 709–714). Springer-Verlag.
Peer reviewed

CHEN, X., van Deursen, T., & Pang, J. (2009). Improving automatic verification of security protocols with XOR. In Proc. 11th International Conference on Formal Engineering Methods (pp. 107-126). Springer.
Peer reviewed

Pang, J., & Zhang, C. (2009). How to work with honest but curious judges? (preliminary report). In Proc. 7th International Workshop on Security Issues in Concurrency (pp. 31–45).
Peer reviewed

Liu, Y., Pang, J., Sun, J., & Zhao, J. (2009). Verification of population ring protocols in PAT. Proceedings of 3rd IEEE Symposium on Theoretical Aspects of Software Engineering, 81–89. doi:10.1109/TASE.2009.51
Peer reviewed

Bakhshi, R., Fokkink, W. J., Pang, J., & van de Pol, J. C. (2008). Leader election in anonymous rings: Franklin goes probabilistic. In Proc. 5th IFIP Conference on Theoretical Computer Science (pp. 57–72). Springer-Verlag.
Peer reviewed

Pang, J., Luo, Z., & Deng, Y. (2008). On automatic verification of self-stabilizing population protocols. In Proceedings of 2nd IEEE Symposium on Theoretical Aspects of Software Engineering (TASE'08) (pp. 185–192). IEEE Computer Society. doi:10.1109/TASE.2008.8
Peer reviewed

Pang, J., Luo, Z., & Deng, Y. (2008). On automatic verification of self-stabilizing population protocols. Frontiers of Computer Science in China, 2 (4), 357–367. doi:10.1007/s11704-008-0040-9
Peer Reviewed verified by ORBi

Fokkink, W. J., Pang, J., & Wijs, A. J. (2008). Is timed branching bisimilarity a congruence indeed? Fundamenta Informaticae, 87 (3-4), 287–311.
Peer Reviewed verified by ORBi

Contact ORBilu