Results 81-100 of 147.
Bookmark and Share    
Full Text
Peer Reviewed
See detailA strand space approach to provable anonymity
Li, Yongjian; Pang, Jun UL

in Proc. 2nd Workshop on Formal Techniques for Safety-Critical Systems (FTSCS'13) (2014)

Detailed reference viewed: 108 (1 UL)
Full Text
Peer Reviewed
See detailDynamic analysis of usage control policies.
Elrahaiby, Yehia; Pang, Jun UL

in Proceedings of the 11th Conference on Security and Cryptography (SECRPT) (2014)

Detailed reference viewed: 90 (2 UL)
Full Text
Peer Reviewed
See detailModel-checking based approaches to parameter estimation of gene regulatory networks
Mizera, Andrzej UL; Pang, Jun UL; Yuan, Qixia UL

in Proceedings of 19th IEEE Conference on Engineering of Complex Computer Systems (2014)

Detailed reference viewed: 118 (11 UL)
Full Text
Peer Reviewed
See detailConstructing and comparing user mobility profiles
Chen, Xihui; Pang, Jun UL; Xue, Ran

in ACM Transactions on the Web (2014), 8(4), 21

Detailed reference viewed: 94 (1 UL)
Full Text
See detailFoundational aspects of security
Chatzikokolakis, Konstantinos; Mödersheim, Sebastian; Palamidessi, Catuscia et al

in Journal of Computer Security (2014), 22(2), 201-202

Detailed reference viewed: 104 (3 UL)
Full Text
Peer Reviewed
See detailMinUS: Mining User Similarity with Trajectory Patterns
Chen, Xihui; Kordy, Piotr; Lu, Ruipeng et al

in Proceedings of 17th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD) (2014)

Detailed reference viewed: 92 (3 UL)
Full Text
Peer Reviewed
See detailMeasuring User Similarity with Trajectory Patterns: Principles and New Metrics
Chen, Xihui; Lu, Ruipeng; Ma, Xiaoxing et al

in Proceedings of the 16th Asia-Pacific Web Conference (2014)

Detailed reference viewed: 96 (2 UL)
Full Text
Peer Reviewed
See detailSymbolic analysis of an electric vehicle charging protocol.
Li, Li; Pang, Jun UL; Liu, Yang et al

in Proceedings of 19th IEEE Conference on Engineering of Complex Computer Systems (ICECCS) (2014)

Detailed reference viewed: 97 (0 UL)
Full Text
Peer Reviewed
See detailModel Checking with Fairness Assumptions using PAT
Si, Yuanjie; Sun, Jun; Liu, Yang et al

in Frontiers of Computer Science (2014), 8(1), 1-16

Detailed reference viewed: 115 (5 UL)
Full Text
Peer Reviewed
See detailDEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity
Chen, Xihui UL; Harpes, Carlo; Lenzini, Gabriele UL et al

in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)

Through real-life experiments, it has been proved that spoofing is a practical threat to applications using the free civil service provided by Global Navigation Satellite Systems (GNSS). In this paper, we ... [more ▼]

Through real-life experiments, it has been proved that spoofing is a practical threat to applications using the free civil service provided by Global Navigation Satellite Systems (GNSS). In this paper, we demonstrate a prototype that can verify the integrity of GNSS civil signals. By integrity we intuitively mean that civil signals originate from a GNSS satellite without having been artificially interfered with. Our prototype provides interfaces that can incorporate existing spoofing detection methods whose results are then combined into an overall evaluation of the signal’s integrity, which we call integrity level. Considering the various security requirements from different applications, integrity levels can be calculated in many ways determined by their users. We also present an application scenario that deploys our prototype and offers a public central service – localisation assurance certification. Through experiments, we successfully show that our prototype is not only effective but also efficient in practice. [less ▲]

Detailed reference viewed: 292 (13 UL)
Full Text
Peer Reviewed
See detailRecent development and biomedical applications of probabilistic Boolean networks
Trairatphisan, Panuwat UL; Mizera, Andrzej UL; Pang, Jun UL et al

in Cell Communication and Signaling (2013), 11(46),

Probabilistic Boolean network (PBN) modelling is a semi-quantitative approach widely used for the study of the topology and dynamic aspects of biological systems. The combined use of rule-based ... [more ▼]

Probabilistic Boolean network (PBN) modelling is a semi-quantitative approach widely used for the study of the topology and dynamic aspects of biological systems. The combined use of rule-based representation and probability makes PBN appealing for large-scale modelling of biological networks where degrees of uncertainty need to be considered. A considerable expansion of our knowledge in the field of theoretical research on PBN can be observed over the past few years, with a focus on network inference, network intervention and control. With respect to areas of applications, PBN is mainly used for the study of gene regulatory networks though with an increasing emergence in signal transduction, metabolic, and also physiological networks. At the same time, a number of computational tools, facilitating the modelling and analysis of PBNs, are continuously developed. A concise yet comprehensive review of the state-of-the-art on PBN modelling is offered in this article, including a comparative discussion on PBN versus similar models with respect to concepts and biomedical applications. Due to their many advantages, we consider PBN to stand as a suitable modelling framework for the description and analysis of complex biological systems, ranging from molecular to physiological levels. [less ▲]

Detailed reference viewed: 278 (32 UL)
Full Text
Peer Reviewed
See detailExploring dependency for query privacy protection in location-based services
Chen, Xihui UL; Pang, Jun UL

in Proc. 3rd ACM Conference on Data and Application Security and Privacy (2013)

Detailed reference viewed: 111 (7 UL)
Full Text
See detailEditorial message: Special track on software verification and testing
Pang, Jun UL; Mousavi, Mohammad Reza

in Proc. 28th Symposium on Applied Computing (2013)

Detailed reference viewed: 34 (7 UL)
Full Text
See detailMathematical modelling of the Platelet-Derived Growth Factor (PDGF) signalling pathway
Mizera, Andrzej UL; Pang, Jun UL; Sauter, Thomas UL et al

in Proceedings of 4th Workshop on Computational Models for Cell Processes (CompMod'13) (2013)

Detailed reference viewed: 96 (10 UL)
Full Text
See detailMessage from ESSS 2013 Workshop Co-chairs
Pang, Jun UL; Liu, Yang; Mauw, Sjouke UL

in 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (2013)

Detailed reference viewed: 105 (1 UL)
Full Text
Peer Reviewed
See detailA balancing act: Parameter estimation for biological models with steady-state measurements
Mizera, Andrzej UL; Pang, Jun UL; Sauter, Thomas UL et al

in Proceedings of 11th Conference on Computational Methods in Systems Biology (CMSB'13) (2013)

Detailed reference viewed: 88 (8 UL)
Full Text
Peer Reviewed
See detailSpecial issue: software verification and testing
Mousavi, Mohammad Reza; Pang, Jun UL

in Innovations in Systems and Software Engineering (2013), 9(2), 57-58

Detailed reference viewed: 120 (1 UL)
Full Text
Peer Reviewed
See detailAn inductive approach to strand spaces
Li, Yongjian; Pang, Jun UL

in Formal Aspects of Computing (2013), 25(4), 465-501

Detailed reference viewed: 106 (0 UL)
Full Text
Peer Reviewed
See detailConstructing and comparing user mobility profiles for location-based services
Chen, Xihui UL; Pang, Jun UL; Xue, Ran

in Proc. 28th ACM Symposium on Applied Computing (2013)

Detailed reference viewed: 113 (4 UL)
Full Text
Peer Reviewed
See detailEnforcing Privacy in the Presence of Others: Notions, Formalisations and Relations
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proceedings of the 18th European Symposium on Research in Computer Security (2013)

Detailed reference viewed: 79 (2 UL)