default search action
Jun Pang 0001
Person information
- affiliation: University of Luxembourg, Esch-sur-Alzette, Luxembourg
Other persons with the same name
- Jun Pang 0002 — Wuhan University of Science and Technology, College of Computer Science and Technology, China (and 1 more)
- Jun Pang 0003 — University of Chinese Medicine, First Affiliated Hospital, Nanning, China
- Jun Pang 0004 — Tianjin University, Academy of Medical Engineering and Translational Medicine, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j77]Xian Mo, Jun Pang, Binyuan Wan, Rui Tang, Hao Liu, Shuyu Jiang:
Multi-relational graph contrastive learning with learnable graph augmentation. Neural Networks 181: 106757 (2025) - 2024
- [j76]Yi-Wei Cheng, Zhiqiang Zhong, Jun Pang, Cheng-Te Li:
Hierarchical Bipartite Graph Convolutional Network for Recommendation. IEEE Comput. Intell. Mag. 19(2): 49-60 (2024) - [j75]Ninghan Chen, Xihui Chen, Zhiqiang Zhong, Jun Pang:
A tale of two roles: exploring topic-specific susceptibility and influence in cascade prediction. Data Min. Knowl. Discov. 38(1): 79-109 (2024) - [j74]Xian Mo, Jun Pang, Zhiming Liu:
Deep autoencoder architecture with outliers for temporal attributed network embedding. Expert Syst. Appl. 240: 122596 (2024) - [j73]Yongjian Li, Bohua Zhan, Jun Pang:
Mechanizing the CMP Abstraction for Parameterized Verification. Proc. ACM Program. Lang. 8(OOPSLA1): 1324-1350 (2024) - [j72]George Panagopoulos, Nikolaos Tziortziotis, Michalis Vazirgiannis, Jun Pang, Fragkiskos D. Malliaros:
Learning graph representations for influence maximization. Soc. Netw. Anal. Min. 14(1): 203 (2024) - [j71]Ninghan Chen, Xihui Chen, Zhiqiang Zhong, Jun Pang:
Bridging Performance of X (formerly known as Twitter) Users: A Predictor of Subjective Well-Being During the Pandemic. ACM Trans. Web 18(1): 15:1-15:23 (2024) - [c149]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Formal Verification and Solutions for Estonian E-Voting. AsiaCCS 2024 - [c148]Zhiqiang Zhong, Cheng-Te Li, Jun Pang:
Multi-Grained Semantics-Aware Graph Neural Networks (Extended abstract). ICDE 2024: 5691-5692 - [c147]Aoran Wang, Jun Pang:
Structural Inference with Dynamics Encoding and Partial Correlation Coefficients. ICLR 2024 - [c146]George Panagopoulos, Daniele Malitesta, Fragkiskos D. Malliaros, Jun Pang:
Uplift Modeling Under Limited Supervision. ECML/PKDD (6) 2024: 127-144 - [c145]Kai Wang, Yakun Cheng, Michael Wen Tong, Zhenghao Niu, Jun Pang, Weili Han:
Exploring Unconfirmed Transactions for Effective Bitcoin Address Clustering. WWW 2024: 1880-1891 - [i49]George Panagopoulos, Daniele Malitesta, Fragkiskos D. Malliaros, Jun Pang:
Graph Neural Networks for Treatment Effect Prediction. CoRR abs/2403.19289 (2024) - [i48]Roman Bresson, Giannis Nikolentzos, George Panagopoulos, Michail Chatzianastasis, Jun Pang, Michalis Vazirgiannis:
KAGNNs: Kolmogorov-Arnold Networks meet Graph Learning. CoRR abs/2406.18380 (2024) - [i47]Wenrui Yu, Richard Heusdens, Jun Pang, Qiongxiu Li:
Privacy-Preserving Distributed Maximum Consensus Without Accuracy Loss. CoRR abs/2409.10226 (2024) - [i46]Tsz Pan Tong, Aoran Wang, George Panagopoulos, Jun Pang:
Integrating Optimal Transport and Structural Inference Models for GRN Inference from Single-cell Data. CoRR abs/2409.15080 (2024) - 2023
- [j70]Zhiqiang Zhong, Cheng-Te Li, Jun Pang:
Hierarchical message-passing graph neural networks. Data Min. Knowl. Discov. 37(1): 381-408 (2023) - [j69]Ganglin Hu, Jun Pang:
Relation-Aware Weighted Embedding for Heterogeneous Graphs. Inf. Technol. Control. 52(1): 199-214 (2023) - [j68]Cui Su, Jun Pang:
Target Control of Asynchronous Boolean Networks. IEEE ACM Trans. Comput. Biol. Bioinform. 20(1): 707-719 (2023) - [j67]Zhiqiang Zhong, Cheng-Te Li, Jun Pang:
Multi-Grained Semantics-Aware Graph Neural Networks. IEEE Trans. Knowl. Data Eng. 35(7): 7251-7262 (2023) - [c144]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Election Verifiability in Receipt-Free Voting Protocols. CSF 2023: 59-74 - [c143]Chunyan Mu, Jun Pang:
On Observability Analysis in Multiagent Systems. ECAI 2023: 1755-1762 - [c142]Guisen Wu, Jun Pang:
Single-Experiment Reconstructibility of Boolean Control Networks Revisited. ICINCO (2) 2023: 85-93 - [c141]Aoran Wang, Jun Pang:
Active Learning based Structural Inference. ICML 2023: 36224-36245 - [c140]Aoran Wang, Tsz Pan Tong, Jun Pang:
Effective and Efficient Structural Inference with Reservoir Computing. ICML 2023: 36391-36410 - [c139]Chaoxuan Shi, Tingwei Zhu, Tian Zhang, Jun Pang, Minxue Pan:
Structural-semantics Guided Program Simplification for Understanding Neural Code Intelligence Models. Internetware 2023: 1-11 - [c138]Hailong Hu, Jun Pang:
Loss and Likelihood Based Membership Inference of Diffusion Models. ISC 2023: 121-141 - [e8]Jun Pang, Joachim Niehren:
Computational Methods in Systems Biology - 21st International Conference, CMSB 2023, Luxembourg City, Luxembourg, September 13-15, 2023, Proceedings. Lecture Notes in Computer Science 14137, Springer 2023, ISBN 978-3-031-42696-4 [contents] - [i45]Hailong Hu, Jun Pang:
Membership Inference of Diffusion Models. CoRR abs/2301.09956 (2023) - [i44]Kai Wang, Maike Tong, Changhao Wu, Jun Pang, Chen Chen, Xiapu Luo, Weili Han:
Exploring Unconfirmed Transactions for Effective Bitcoin Address Clustering. CoRR abs/2303.01012 (2023) - [i43]Hailong Hu, Jun Pang:
PriSampler: Mitigating Property Inference of Diffusion Models. CoRR abs/2306.05208 (2023) - [i42]Hailong Hu, Jun Pang:
Ownership Protection of Generative Adversarial Networks. CoRR abs/2306.05233 (2023) - [i41]Chunyan Mu, Jun Pang:
On Quantified Observability Analysis in Multiagent Systems. CoRR abs/2310.02614 (2023) - 2022
- [j66]Zhiqiang Zhong, Cheng-Te Li, Jun Pang:
Personalised meta-path generation for heterogeneous graph neural networks. Data Min. Knowl. Discov. 36(6): 2299-2333 (2022) - [j65]Ninghan Chen, Xihui Chen, Zhiqiang Zhong, Jun Pang:
Exploring Spillover Effects for COVID-19 Cascade Prediction. Entropy 24(2): 222 (2022) - [j64]Xian Mo, Jun Pang, Zhiming Liu:
THS-GWNN: a deep learning framework for temporal network link prediction. Frontiers Comput. Sci. 16(2): 162304 (2022) - [j63]Ganglin Hu, Jun Pang, Xian Mo:
Effective attributed network embedding with information behavior extraction. PeerJ Comput. Sci. 8: e1030 (2022) - [j62]Chenyi Zhang, Jun Pang:
Modal characterisation of simulation relations in probabilistic concurrent games. Sci. Comput. Program. 215: 102762 (2022) - [j61]Zhiqiang Zhong, Guadalupe Gonzalez, Daniele Grattarola, Jun Pang:
Unsupervised Network Embedding Beyond Homophily. Trans. Mach. Learn. Res. 2022 (2022) - [j60]Zhiqiang Zhong, Sergei Ivanov, Jun Pang:
Simplifying Node Classification on Heterophilous Graphs with Compatible Label Propagation. Trans. Mach. Learn. Res. 2022 (2022) - [j59]Kai Wang, Jun Pang, Dingjie Chen, Yu Zhao, Dapeng Huang, Chen Chen, Weili Han:
A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin. ACM Trans. Web 16(2): 7:1-7:29 (2022) - [c137]Jiayi Chen, Zhixing Wang, Yuchen Jiang, Jun Pang, Tian Zhang, Minxue Pan, Jianwen Sun:
NEGAR: Network Embedding Guided Architecture Recovery for Software Systems. APSEC 2022: 367-376 - [c136]Olivier Zeyen, Jun Pang:
Target Control of Boolean Networks with Permanent Edgetic Perturbations. CDC 2022: 4236-4243 - [c135]Guiyin Li, Fengyi Zhu, Jun Pang, Tian Zhang, Minxue Pan, Xuandong Li:
Functional Scenario Classification for Android Applications using GNNs. Internetware 2022: 1-9 - [c134]Aoran Wang, Jun Pang:
Iterative Structural Inference of Directed Graphs. NeurIPS 2022 - [c133]Ninghan Chen, Xihui Chen, Zhiqiang Zhong, Jun Pang:
The Burden of Being a Bridge: Analysing Subjective Well-Being of Twitter Users During the COVID-19 Pandemic. ECML/PKDD (2) 2022: 241-257 - [c132]Ninghan Chen, Xihui Chen, Jun Pang, Liyousew G. Borga, Conchita D'Ambrosio, Claus Vögele:
Measuring COVID-19 Vaccine Hesitancy: Consistency of Social Media with Surveys. SocInfo 2022: 196-210 - [d1]Ninghan Chen, Xihui Chen, Zhiqiang Zhong, Jun Pang:
GR-ego COVID-19 Twitter dataset. IEEE DataPort, 2022 - [i40]Zhiqiang Zhong, Guadalupe Gonzalez, Daniele Grattarola, Jun Pang:
Unsupervised Heterophilous Network Embedding via r-Ego Network Discrimination. CoRR abs/2203.10866 (2022) - [i39]Zhiqiang Zhong, Sergey Ivanov, Jun Pang:
Simplifying Node Classification on Heterophilous Graphs with Compatible Label Propagation. CoRR abs/2205.09389 (2022) - [i38]Ninghan Chen, Xihui Chen, Zhiqiang Zhong, Jun Pang:
"Double vaccinated, 5G boosted!": Learning Attitudes towards COVID-19 Vaccination from Social Media. CoRR abs/2206.13456 (2022) - [i37]Ninghan Chen, Xihui Chen, Jun Pang:
A Multilingual Dataset of COVID-19 Vaccination Attitudes on Twitter. CoRR abs/2206.14619 (2022) - 2021
- [j58]Ninghan Chen, Zhiqiang Zhong, Jun Pang:
An Exploratory Study of COVID-19 Information on Twitter in the Greater Region. Big Data Cogn. Comput. 5(1): 5 (2021) - [j57]Cui Su, Jun Pang:
CABEAN: a software for the control of asynchronous Boolean networks. Bioinform. 37(6): 879-881 (2021) - [j56]Xian Mo, Jun Pang, Zhiming Liu:
Effective Link Prediction with Topological and Temporal Information using Wavelet Neural Network Embedding. Comput. J. 64(3): 325-336 (2021) - [j55]Huimin Dong, Jun Pang, Yì N. Wáng:
Preface of the special issue'Logic, argumentation and AI' in JLC. J. Log. Comput. 31(8): 1901-1902 (2021) - [j54]Diego Kozlowski, Jennifer Dusdal, Jun Pang, Andreas Zilian:
Semantic and relational spaces in science of science: deep learning models for article vectorisation. Scientometrics 126(7): 5881-5910 (2021) - [j53]Cui Su, Jun Pang, Soumya Paul:
Towards Optimal Decomposition of Boolean Networks. IEEE ACM Trans. Comput. Biol. Bioinform. 18(6): 2167-2176 (2021) - [c131]Hailong Hu, Jun Pang:
Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks. ACSAC 2021: 1-16 - [c130]Ninghan Chen, Xihui Chen, Zhiqiang Zhong, Jun Pang:
From #jobsearch to #mask: improving COVID-19 cascade prediction with spillover effects. ASONAM 2021: 455-462 - [c129]Hailong Hu, Jun Pang:
Membership Inference Attacks against GANs by Leveraging Over-representation Regions. CCS 2021: 2387-2389 - [c128]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. CSF 2021: 1-15 - [c127]Qian Li, Zhichao Wang, Gang Li, Jun Pang, Guandong Xu:
Hilbert Sinkhorn Divergence for Optimal Transport. CVPR 2021: 3835-3844 - [c126]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Provably Improving Election Verifiability in Belenios. E-VOTE-ID 2021: 1-16 - [c125]Cui Su, Jun Pang:
Cabean 2.0: Efficient and Efficacious Control of Asynchronous Boolean Networks. FM 2021: 581-598 - [c124]Weili Han, Dingjie Chen, Jun Pang, Kai Wang, Chen Chen, Dapeng Huang, Zhijie Fan:
Temporal Networks Based Industry Identification for Bitcoin Users. WASA (1) 2021: 108-120 - [i36]Cui Su, Jun Pang:
Target Control of Asynchronous Boolean Networks. CoRR abs/2101.00644 (2021) - [i35]Hailong Hu, Jun Pang:
Model Extraction and Defenses on Generative Adversarial Networks. CoRR abs/2101.02069 (2021) - [i34]Ninghan Chen, Xihui Chen, Zhiqiang Zhong, Jun Pang:
The Burden of Being a Bridge: Understanding the Role of Multilingual Users during the COVID-19 Pandemic. CoRR abs/2104.04331 (2021) - [i33]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Provably Improving Election Verifiability in Belenios. IACR Cryptol. ePrint Arch. 2021: 1201 (2021) - 2020
- [j52]Tao Xie, Zhi Jin, Xuandong Li, Gang Huang, Hausi A. Müller, Jun Pang, Li-Jun Zhang:
Preface. J. Comput. Sci. Technol. 35(6): 1231-1233 (2020) - [j51]Chenyi Zhang, Jun Pang:
Preface for the special issue of the 12th International Symposium on Theoretical Aspects of Software Engineering (TASE 2018). Sci. Comput. Program. 187: 102375 (2020) - [j50]Soumya Paul, Cui Su, Jun Pang, Andrzej Mizera:
An Efficient Approach Towards the Source-Target Control of Boolean Networks. IEEE ACM Trans. Comput. Biol. Bioinform. 17(6): 1932-1945 (2020) - [c123]Cui Su, Jun Pang:
A Dynamics-based Approach for the Target Control of Boolean Networks. BCB 2020: 50:1-50:8 - [c122]Cui Su, Jun Pang:
Sequential Temporary and Permanent Control of Boolean Networks. CMSB 2020: 234-251 - [c121]Yue Cheng, Lingyun Qiu, Jun Pang:
Effects of Avatar Cuteness on Users' Perceptions of System Errors in Anthropomorphic Interfaces. HCI (24) 2020: 322-330 - [c120]Yongjian Li, Taifeng Cao, David N. Jansen, Jun Pang, Xiaotao Wei:
Accelerated Verification of Parametric Protocols with Decision Trees. ICCD 2020: 397-404 - [c119]Chenyi Zhang, Jun Pang:
Characterising Probabilistic Alternating Simulation for Concurrent Games. TASE 2020: 121-128 - [c118]Xian Mo, Jun Pang, Zhiming Liu:
Higher-Order Graph Convolutional Embedding for Temporal Networks. WISE (1) 2020: 3-15 - [c117]Zhiqiang Zhong, Yang Zhang, Jun Pang:
NeuLP: An End-to-End Deep-Learning Model for Link Prediction. WISE (1) 2020: 96-108 - [e7]Grégoire Danoy, Jun Pang, Geoff Sutcliffe:
6th Global Conference on Artificial Intelligence, GCAI 2020, Hangzhou, China, April 6-9, 2020. EPiC Series in Computing 72, EasyChair 2020 [contents] - [e6]Jun Pang, Lijun Zhang:
Dependable Software Engineering. Theories, Tools, and Applications - 6th International Symposium, SETTA 2020, Guangzhou, China, November 24-27, 2020, Proceedings. Lecture Notes in Computer Science 12153, Springer 2020, ISBN 978-3-030-62821-5 [contents] - [i32]Cui Su, Jun Pang:
Sequential Control of Boolean Networks with Temporary and Permanent Perturbations. CoRR abs/2004.07184 (2020) - [i31]Cui Su, Jun Pang:
A Dynamics-based Approach for the Target Control of Boolean Networks. CoRR abs/2006.02304 (2020) - [i30]Ninghan Chen, Zhiqiang Zhong, Jun Pang:
An Exploratory Study of COVID-19 Information on Twitter in the Greater Region. CoRR abs/2008.05900 (2020) - [i29]Zhiqiang Zhong, Cheng-Te Li, Jun Pang:
Hierarchical Message-Passing Graph Neural Networks. CoRR abs/2009.03717 (2020) - [i28]Zhiqiang Zhong, Cheng-Te Li, Jun Pang:
Adaptive Multi-grained Graph Neural Networks. CoRR abs/2010.00238 (2020) - [i27]Zhiqiang Zhong, Cheng-Te Li, Jun Pang:
Reinforcement Learning Enhanced Heterogeneous Graph Neural Network. CoRR abs/2010.13735 (2020) - [i26]Diego Kozlowski, Jennifer Dusdal, Jun Pang, Andreas Zilian:
Semantic and Relational Spaces in Science of Science: Deep Learning Models for Article Vectorisation. CoRR abs/2011.02887 (2020) - [i25]Ninghan Chen, Zhiqiang Zhong, Jun Pang:
From #Jobsearch to #Mask: Improving COVID-19 Cascade Prediction with Spillover Effects. CoRR abs/2012.07088 (2020) - [i24]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. IACR Cryptol. ePrint Arch. 2020: 982 (2020)
2010 – 2019
- 2019
- [j49]Alexis Baudin, Soumya Paul, Cui Su, Jun Pang:
Controlling large Boolean networks with single-step perturbations. Bioinform. 35(14): i558-i567 (2019) - [j48]Andrzej Mizera, Jun Pang, Qixia Yuan:
GPU-accelerated steady-state computation of large probabilistic Boolean networks. Formal Aspects Comput. 31(1): 27-46 (2019) - [j47]Bo-Heng Chen, Cheng-Te Li, Kun-Ta Chuang, Jun Pang, Yang Zhang:
An active learning-based approach for location-aware acquaintance inference. Knowl. Inf. Syst. 59(3): 539-569 (2019) - [j46]Qixia Yuan, Andrzej Mizera, Jun Pang, Hongyang Qu:
A new decomposition-based method for detecting attractors in synchronous Boolean networks. Sci. Comput. Program. 180: 18-35 (2019) - [j45]Andrzej Mizera, Jun Pang, Hongyang Qu, Qixia Yuan:
Taming Asynchrony for Attractor Detection in Large Boolean Networks. IEEE ACM Trans. Comput. Biol. Bioinform. 16(1): 31-42 (2019) - [j44]Hugues Mandon, Cui Su, Jun Pang, Soumya Paul, Stefan Haar, Loïc Paulevé:
Algorithms for the Sequential Reprogramming of Boolean Networks. IEEE ACM Trans. Comput. Biol. Bioinform. 16(5): 1610-1619 (2019) - [c116]Hugues Mandon, Cui Su, Stefan Haar, Jun Pang, Loïc Paulevé:
Sequential Reprogramming of Boolean Networks Made Practical. CMSB 2019: 3-19 - [c115]Cui Su, Soumya Paul, Jun Pang:
Scalable Control of Asynchronous Boolean Networks. CMSB 2019: 364-367 - [c114]Cui Su, Soumya Paul, Jun Pang:
Controlling Large Boolean Networks with Temporary and Permanent Perturbations. FM 2019: 707-724 - [c113]Yongjian Li, Jialun Cao, Jun Pang:
A Learning-Based Framework for Automatic Parameterized Verification. ICCD 2019: 450-459 - [c112]Zhiqiang Zhong, Yang Zhang, Jun Pang:
A Graph-Based Approach to Explore Relationship Between Hashtags and Images. WISE 2019: 473-488 - [e5]Jun Pang, Jing Sun:
24th International Conference on Engineering of Complex Computer Systems, ICECCS 2019, Guangzhou, China, November 10-13, 2019. IEEE 2019, ISBN 978-1-7281-4646-1 [contents] - [i23]Guisen Wu, Liyun Dai, Zhiming Liu, Taolue Chen, Jun Pang, Hongyang Qu:
Online Observability of Boolean Control Networks. CoRR abs/1903.07462 (2019) - [i22]Chenyi Zhang, Jun Pang:
Characterising Probabilistic Alternating Simulation for Concurrent Games. CoRR abs/1907.03928 (2019) - 2018
- [j43]Jingyi Wang, Jun Sun, Qixia Yuan, Jun Pang:
Learning probabilistic models for model checking: an evolutionary approach and an empirical study. Int. J. Softw. Tools Technol. Transf. 20(6): 689-704 (2018) - [j42]Andrzej Mizera, Jun Pang, Cui Su, Qixia Yuan:
ASSA-PBN: A Toolbox for Probabilistic Boolean Networks. IEEE ACM Trans. Comput. Biol. Bioinform. 15(4): 1203-1216 (2018) - [j41]Andrzej Mizera, Jun Pang, Qixia Yuan:
Reviving the Two-State Markov Chain Approach. IEEE ACM Trans. Comput. Biol. Bioinform. 15(5): 1525-1537 (2018) - [j40]Yongjian Li, Kaiqiang Duan, David N. Jansen, Jun Pang, Lijun Zhang, Yi Lv, Shaowei Cai:
An Automatic Proving Approach to Parameterized Verification. ACM Trans. Comput. Log. 19(4): 27:1-27:25 (2018) - [c111]Soumya Paul, Cui Su, Jun Pang, Andrzej Mizera:
A Decomposition-based Approach towards the Control of Boolean Networks. BCB 2018: 11-20 - [c110]Andrzej Mizera, Jun Pang, Hongyang Qu, Qixia Yuan:
ASSA-PBN 3.0: Analysing Context-Sensitive Probabilistic Boolean Networks. CMSB 2018: 277-284 - [c109]Soumya Paul, Jun Pang, Cui Su:
On the Full Control of Boolean Networks. CMSB 2018: 313-317 - [c108]Jialun Cao, Yongjian Li, Jun Pang:
L-CMP: an automatic learning-based parameterized verification tool. ASE 2018: 892-895 - [c107]Soumya Paul, Jun Pang, Cui Su:
Towards the Existential Control of Boolean Networks: A Preliminary Report. SETTA 2018: 142-149 - [c106]Yang Zhang, Mathias Humbert, Tahleen A. Rahman, Cheng-Te Li, Jun Pang, Michael Backes:
Tagvisor: A Privacy Advisor for Sharing Hashtags. WWW 2018: 287-296 - [e4]Jun Pang, Chenyi Zhang, Jifeng He, Jian Weng:
2018 International Symposium on Theoretical Aspects of Software Engineering, TASE 2018, Guangzhou, China, August 29-31, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7305-8 [contents] - [i21]Yang Zhang, Mathias Humbert, Tahleen A. Rahman, Cheng-Te Li, Jun Pang, Michael Backes:
Tagvisor: A Privacy Advisor for Sharing Hashtags. CoRR abs/1802.04122 (2018) - [i20]Soumya Paul, Cui Su, Jun Pang, Andrzej Mizera:
A Decomposition-based Approach towards the Control of Boolean Networks (Technical Report). CoRR abs/1804.07221 (2018) - [i19]Soumya Paul, Jun Pang, Cui Su:
Towards the Existential Control of Boolean Networks: A Preliminary Report (Extended Abstract). CoRR abs/1806.10927 (2018) - [i18]Naipeng Dong, Hugo Jonker, Jun Pang:
Formal Analysis of an E-Health Protocol. CoRR abs/1808.08403 (2018) - 2017
- [j39]Naipeng Dong, Hugo L. Jonker, Jun Pang:
Formal modelling and analysis of receipt-free auction protocols in applied pi. Comput. Secur. 65: 405-432 (2017) - [j38]Yuan Li, Yuhai Zhao, Guoren Wang, Xiaofeng Zhu, Xiang Zhang, Zhanghui Wang, Jun Pang:
Finding susceptible and protective interaction patterns in large-scale genetic association study. Frontiers Comput. Sci. 11(3): 541-554 (2017) - [c105]Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang:
walk2friends: Inferring Social Links from Mobility Profiles. CCS 2017: 1943-1957 - [c104]Yan Wang, Zongxu Qin, Jun Pang, Yang Zhang, Jin Xin:
Semantic Annotation for Places in LBSN through Graph Embedding. CIKM 2017: 2343-2346 - [c103]Jingyi Wang, Jun Sun, Qixia Yuan, Jun Pang:
Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study. FASE 2017: 3-21 - [c102]Jun Pang, Yang Zhang:
Quantifying Location Sociality. HT 2017: 145-154 - [c101]Li Li, Naipeng Dong, Jun Pang, Jun Sun, Guangdong Bai, Yang Liu, Jin Song Dong:
A Verification Framework for Stateful Security Protocols. ICFEM 2017: 262-280 - [c100]Jun Pang, Yang Zhang:
DeepCity: A Feature Learning Framework for Mining Location Check-Ins. ICWSM 2017: 652-655 - [c99]Andrzej Mizera, Jun Pang, Hongyang Qu, Qixia Yuan:
A New Decomposition Method for Attractor Detection in Large Synchronous Boolean Networks. SETTA 2017: 232-249 - [c98]Yang Zhang, Minyue Ni, Weili Han, Jun Pang:
Does #like4like indeed provoke more likes? WI 2017: 179-186 - [i17]Andrzej Mizera, Jun Pang, Hongyang Qu, Qixia Yuan:
Taming Asynchrony for Attractor Detection in Large Boolean Networks (Technical Report). CoRR abs/1704.06530 (2017) - [i16]Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang:
walk2friends: Inferring Social Links from Mobility Profiles. CoRR abs/1708.08221 (2017) - 2016
- [j37]Qixia Yuan, Hongyang Qu, Jun Pang, Andrzej Mizera:
Improving BDD-based attractor detection for synchronous Boolean networks. Sci. China Inf. Sci. 59(8): 080101:1-080101:16 (2016) - [j36]Stephan Merz, Jun Pang, Jin Song Dong:
Editorial. Formal Aspects Comput. 28(3): 343-344 (2016) - [j35]Stephan Merz, Jun Pang, Jin Song Dong:
Editorial. Formal Aspects Comput. 28(5): 723-724 (2016) - [j34]Jun Pang, Lingyun Qiu:
Effect of Online Review Chunking on Product Attitude: The Moderating Role of Motivation to Think. Int. J. Electron. Commer. 20(3): 355-383 (2016) - [j33]Jun Pang, Mariëlle Stoelinga:
Selected and extended papers from ACM SVT 2014. Sci. Comput. Program. 123: 1 (2016) - [c97]Andrzej Mizera, Jun Pang, Qixia Yuan:
Fast Simulation of Probabilistic Boolean Networks. CMSB 2016: 216-231 - [c96]Andrzej Mizera, Jun Pang, Qixia Yuan:
ASSA-PBN 2.0: A Software Tool for Probabilistic Boolean Networks. CMSB 2016: 309-315 - [c95]Lu Zhou, Yang Zhang, Jun Pang, Cheng-Te Li:
Modeling City Locations as Complex Networks: An initial study. COMPLEX NETWORKS 2016: 735-747 - [c94]Yongjian Li, Kaiqiang Duan, Yi Lv, Jun Pang, Shaowei Cai:
A novel approach to parameterized verification of cache coherence protocols. ICCD 2016: 560-567 - [c93]Lingyun Qiu, Weiquan Wang, Jun Pang, Zhenhui Jack Jiang:
The Persuasive Impact of Emoticons in Online Word-of-Mouth Communication. PACIS 2016: 122 - [c92]Andrzej Mizera, Jun Pang, Qixia Yuan:
Parallel approximate steady-state analysis of large probabilistic Boolean networks. SAC 2016: 1-8 - [c91]Minyue Ni, Yang Zhang, Weili Han, Jun Pang:
An Empirical Study on User Access Control in Online Social Networks. SACMAT 2016: 13-23 - [c90]Andrzej Mizera, Jun Pang, Qixia Yuan:
GPU-Accelerated Steady-State Computation of Large Probabilistic Boolean Networks. SETTA 2016: 50-66 - [c89]Xiaohuan Shan, Xin Wang, Jun Pang, Liyan Jiang, Baoyan Song:
A Shortest Path Query Method Based on Tree Decomposition and Label Coverage. WAIM Workshops 2016: 239-248 - [c88]Junlu Wang, Jun Pang, Xiaoyan Li, Baishuo Han, Lei Huang, LinLin Ding:
An Efficient Two-Table Join Query Processing Based on Extended Bloom Filter in MapReduce. WAIM Workshops 2016: 249-258 - [c87]Jun Pang, Polina Zablotskaia, Yang Zhang:
On Impact of Weather on Human Mobility in Cities. WISE (2) 2016: 247-256 - [i15]Jun Pang, Yang Zhang:
Quantifying Location Sociality. CoRR abs/1604.00175 (2016) - [i14]Andrzej Mizera, Jun Pang, Qixia Yuan:
Fast Simulation of Probabilistic Boolean Networks (Technical Report). CoRR abs/1605.00854 (2016) - [i13]Jingyi Wang, Jun Sun, Qixia Yuan, Jun Pang:
Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study. CoRR abs/1605.08278 (2016) - [i12]Jun Pang, Yang Zhang:
DeepCity: A Feature Learning Framework for Mining Location Check-ins. CoRR abs/1610.03676 (2016) - 2015
- [j32]Jun Pang, Yang Zhang:
A new access control scheme for Facebook-style social networks. Comput. Secur. 54: 44-59 (2015) - [j31]Yongjian Li, Jun Pang:
Formalizing provable anonymity in Isabelle/HOL. Formal Aspects Comput. 27(2): 255-282 (2015) - [j30]Jun Pang, Christopher Dwyer, Alvin R. Lebeck:
mNoC: Large Nanophotonic Network-on-Chip Crossbars with Molecular Scale Devices. ACM J. Emerg. Technol. Comput. Syst. 12(1): 1:1-1:25 (2015) - [c86]Jun Pang, Yang Zhang:
Event Prediction with Community Leaders. ARES 2015: 238-243 - [c85]Yang Zhang, Jun Pang:
Distance and Friendship: A Distance-Based Model for Link Prediction in Social Networks. APWeb 2015: 55-66 - [c84]Jun Pang, Chris Dwyer, Alvin R. Lebeck:
More is Less, Less is More: Molecular-Scale Photonic NoC Power Topologies. ASPLOS 2015: 283-296 - [c83]Ran Cheng, Jun Pang, Yang Zhang:
Inferring Friendship from Check-in Data of Location-Based Social Networks. ASONAM 2015: 1284-1291 - [c82]Yongjian Li, Jun Pang, Yi Lv, Dongrui Fan, Shen Cao, Kaiqiang Duan:
ParaVerifier: An Automatic Framework for Proving Parameterized Cache Coherence Protocols. ATVA 2015: 207-213 - [c81]Andrzej Mizera, Jun Pang, Qixia Yuan:
ASSA-PBN: An Approximate Steady-State Analyser of Probabilistic Boolean Networks. ATVA 2015: 214-220 - [c80]Xihui Chen, Andrzej Mizera, Jun Pang:
Activity tracking: A new attack on location privacy. CNS 2015: 22-30 - [c79]Jun Pang, Yang Zhang:
Cryptographic Protocols for Enforcing Relationship-Based Access Control Policies. COMPSAC 2015: 484-493 - [c78]Jun Pang, Yang Zhang:
Location Prediction: Communities Speak Louder than Friends. COSN 2015: 161-171 - [c77]Yang Zhang, Jun Pang:
Community-Driven Social Influence Analysis and Applications. ICWE 2015: 644-647 - [c76]Hongyang Qu, Qixia Yuan, Jun Pang, Andrzej Mizera:
Improving BDD-based Attractor Detection for Synchronous Boolean Networks. Internetware 2015: 212-220 - [c75]Marcos Cramer, Jun Pang, Yang Zhang:
A Logical Approach to Restricting Access in Online Social Networks. SACMAT 2015: 75-86 - [c74]Jun Pang, Yang Zhang:
Exploring Communities for Effective Location Prediction. WWW (Companion Volume) 2015: 87-88 - [e3]Jun Pang, Yang Liu, Sjouke Mauw:
Proceedings 4th International Workshop on Engineering Safety and Security Systems, ESSS 2015, Oslo, Norway, June 22, 2015. EPTCS 184, 2015 [contents] - [i11]Andrzej Mizera, Jun Pang, Qixia Yuan:
Reviving the Two-state Markov Chain Approach (Technical Report). CoRR abs/1501.01779 (2015) - [i10]Andrzej Mizera, Jun Pang, Qixia Yuan:
Parallel Approximate Steady-state Analysis of Large Probabilistic Boolean Networks (Technical Report). CoRR abs/1508.07828 (2015) - 2014
- [j29]Yuanjie Si, Jun Sun, Yang Liu, Jin Song Dong, Jun Pang, Shao Jie Zhang, Xiaohu Yang:
Model checking with fairness assumptions using PAT. Frontiers Comput. Sci. 8(1): 1-16 (2014) - [j28]Xihui Chen, Jun Pang:
Protecting query privacy in location-based services. GeoInformatica 18(1): 95-133 (2014) - [j27]Konstantinos Chatzikokolakis, Sebastian Alexander Mödersheim, Catuscia Palamidessi, Jun Pang:
Foundational aspects of security. J. Comput. Secur. 22(2): 201-202 (2014) - [j26]Jun Pang, Alvin R. Lebeck, Christopher Dwyer:
Modeling and simulation of a nanoscale optical computing system. J. Parallel Distributed Comput. 74(6): 2470-2483 (2014) - [j25]Mohammad Reza Mousavi, Jun Pang:
Special section on Software Verification and Testing. Sci. Comput. Program. 95: 273-274 (2014) - [j24]Xihui Chen, Jun Pang, Ran Xue:
Constructing and Comparing User Mobility Profiles. ACM Trans. Web 8(4): 21:1-21:25 (2014) - [c73]Jun Pang, Yang Zhang:
A New Access Control Scheme for Facebook-Style Social Networks. ARES 2014: 1-10 - [c72]Xihui Chen, Ruipeng Lu, Xiaoxing Ma, Jun Pang:
Measuring User Similarity with Trajectory Patterns: Principles and New Metrics. APWeb 2014: 437-448 - [c71]Sandeep R. Agrawal, Valentin Pistol, Jun Pang, John Tran, David Tarjan, Alvin R. Lebeck:
Rhythm: harnessing data parallel hardware for server workloads. ASPLOS 2014: 19-34 - [c70]Li Li, Jun Pang, Yang Liu, Jun Sun, Jin Song Dong:
Symbolic Analysis of an Electric Vehicle Charging Protocol. ICECCS 2014: 11-18 - [c69]Andrzej Mizera, Jun Pang, Qixia Yuan:
Model-Checking Based Approaches to Parameter Estimation of Gene Regulatory Networks. ICECCS 2014: 206-209 - [c68]Xihui Chen, Piotr Kordy, Ruipeng Lu, Jun Pang:
MinUS: Mining User Similarity with Trajectory Patterns. ECML/PKDD (3) 2014: 436-439 - [c67]Yehia Elrakaiby, Jun Pang:
Dynamic Analysis of Usage Control Policies. SECRYPT 2014: 88-100 - [e2]Stephan Merz, Jun Pang:
Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, ICFEM 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings. Lecture Notes in Computer Science 8829, Springer 2014, ISBN 978-3-319-11736-2 [contents] - [e1]Jun Pang, Yang Liu:
Proceedings Third International Workshop on Engineering Safety and Security Systems, ESSS 2014, Singapore, Singapore, 13 May 2014. EPTCS 150, 2014 [contents] - [i9]Li Li, Jun Pang, Yang Liu, Jun Sun, Jin Song Dong:
Stateful Security Protocol Verification. CoRR abs/1403.2237 (2014) - [i8]Jun Pang, Yang Zhang:
Location Prediction: Communities Speak Louder than Friends. CoRR abs/1408.1228 (2014) - 2013
- [j23]Hugo Jonker, Sjouke Mauw, Jun Pang:
Privacy and verifiability in voting systems: Methods, developments and trends. Comput. Sci. Rev. 10: 1-30 (2013) - [j22]Yongjian Li, Jun Pang:
An inductive approach to strand spaces. Formal Aspects Comput. 25(4): 465-501 (2013) - [j21]Zhiyuan Liu, Jun Pang, Chenyi Zhang:
Design and formal verification of a CEM protocol with transparent TTP. Frontiers Comput. Sci. 7(2): 279-297 (2013) - [j20]Mohammad Reza Mousavi, Jun Pang:
Special issue: software verification and testing. Innov. Syst. Softw. Eng. 9(2): 57-58 (2013) - [j19]Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(1): 55-75 (2013) - [c66]Xihui Chen, Carlo Harpes, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang:
Demonstrating a trust framework for evaluating GNSS signal integrity. CCS 2013: 1329-1332 - [c65]Xihui Chen, Jun Pang:
Exploring dependency for query privacy protection in location-based services. CODASPY 2013: 37-48 - [c64]Xihui Chen, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang:
A Trust Framework for Evaluating GNSS Signal Integrity. CSF 2013: 179-192 - [c63]Naipeng Dong, Hugo Jonker, Jun Pang:
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. ESORICS 2013: 499-516 - [c62]Yongjian Li, Jun Pang:
A Strand Space Approach to Provable Anonymity. FTSCS 2013: 71-87 - [c61]Manman Chen, Tian Huat Tan, Jun Sun, Yang Liu, Jun Pang, Xiaohong Li:
Verification of Functional and Non-functional Requirements of Web Service Composition. ICFEM 2013: 313-328 - [c60]Jun Pang, Yang Liu, Sjouke Mauw:
Message from ESSS 2013 Workshop Co-chairs. ICST Workshops 2013: 1 - [c59]Jun Pang, Christopher Dwyer, Alvin R. Lebeck:
Exploiting emerging technologies for nanoscale photonic networks-on-chip. NoCArc@MICRO 2013: 53-58 - [c58]Xihui Chen, Jun Pang, Ran Xue:
Constructing and comparing user mobility profiles for location-based services. SAC 2013: 261-266 - [i7]Jun Pang, Yang Zhang:
A New Access Control Scheme for Facebook-style Social Networks. CoRR abs/1304.2504 (2013) - [i6]Xihui Chen, Carlo Harpes, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Location Assurance and Privacy in GNSS Navigation. ERCIM News 2013(94) (2013) - [i5]Hugo Jonker, Sjouke Mauw, Jun Pang:
Privacy and Verifiability in Voting Systems: Methods, Developments and Trends. IACR Cryptol. ePrint Arch. 2013: 615 (2013) - 2012
- [j18]Lingyun Qiu, Jun Pang, Kai H. Lim:
Effects of conflicting aggregated rating on eWOM review credibility and diagnosticity: The moderating role of review valence. Decis. Support Syst. 54(1): 631-643 (2012) - [j17]Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw:
Game-based verification of contract signing protocols with minimal messages. Innov. Syst. Softw. Eng. 8(2): 111-124 (2012) - [j16]Yanjie Sun, Chenyi Zhang, Jun Pang, Baptiste Alcalde, Sjouke Mauw:
A trust-augmented voting scheme for collaborative privacy management. J. Comput. Secur. 20(4): 437-459 (2012) - [j15]Qixia Yuan, Panuwat Trairatphisan, Jun Pang, Sjouke Mauw, Monique Wiesinger, Thomas Sauter:
Probabilistic Model Checking of the PDGF Signaling Pathway. Trans. Comp. Sys. Biology 14: 151-180 (2012) - [c57]Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. ARES 2012: 85-93 - [c56]Xihui Chen, Jun Pang:
Measuring query privacy in location-based services. CODASPY 2012: 49-60 - [c55]Xihui Chen, David Fonkwe, Jun Pang:
Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems. DPM/SETOP 2012: 29-42 - [c54]Naipeng Dong, Hugo Jonker, Jun Pang:
Formal Analysis of Privacy in an eHealth Protocol. ESORICS 2012: 325-342 - [c53]Chenyi Zhang, Jun Pang:
An Algorithm for Probabilistic Alternating Simulation. SOFSEM 2012: 431-442 - [c52]Qian Li, Péter Schaffer, Jun Pang, Sjouke Mauw:
Comparative Analysis of Clustering Protocols with Probabilistic Model Checking. TASE 2012: 249-252 - 2011
- [j14]Rena Bakhshi, Jörg Endrullis, Wan J. Fokkink, Jun Pang:
Fast leader election in anonymous rings with bounded expected delay. Inf. Process. Lett. 111(17): 864-870 (2011) - [c51]Hugo Jonker, Jun Pang:
Bulletin Boards in Voting Systems: Modelling and Measuring Privacy. ARES 2011: 294-300 - [c50]Yongjian Li, Jun Pang:
An Inductive Approach to Provable Anonymity. ARES 2011: 454-459 - [c49]Naipeng Dong, Hugo Jonker, Jun Pang:
Challenges in eHealth: From Enabling to Enforcing Privacy. FHIES 2011: 195-206 - [c48]Shao Jie Zhang, Jun Sun, Jun Pang, Yang Liu, Jin Song Dong:
On Combining State Space Reductions with Global Fairness Assumptions. FM 2011: 432-447 - [c47]Jun Pang:
Analysis of Remote Quality Inspection System for Construction Projects. ICEIS (2) 2011: 341-344 - [c46]Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Selective Location Blinding Using Hash Chains. Security Protocols Workshop 2011: 132-141 - [c45]Qixia Yuan, Jun Pang, Sjouke Mauw, Panuwat Trairatphisan, Monique Wiesinger, Thomas Sauter:
A Study of the PDGF Signaling Pathway with PRISM. CompMod 2011: 65-81 - [i4]Chenyi Zhang, Jun Pang:
An Algorithm for Probabilistic Alternating Simulation. CoRR abs/1106.1978 (2011) - [i3]Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. CoRR abs/1108.0574 (2011) - 2010
- [j13]Yongjian Li, Jun Pang:
Extending the Strand Space Method with Timestamps: Part I the Theory. J. Information Security 1(2): 45-55 (2010) - [j12]Yongjian Li, Jun Pang:
Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V. J. Information Security 1(2): 56-67 (2010) - [c44]Zhiyuan Liu, Jun Pang, Chenyi Zhang:
Extending a Key-Chain Based Certified Email Protocol with Transparent TTP. EUC 2010: 630-636 - [c43]Xin An, Jun Pang:
Model Checking Round-Based Distributed Algorithms. ICECCS 2010: 127-135 - [c42]Naipeng Dong, Hugo L. Jonker, Jun Pang:
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus. Formal Aspects in Security and Trust 2010: 223-238 - [c41]Chenyi Zhang, Jun Pang:
On Probabilistic Alternating Simulations. IFIP TCS 2010: 71-85 - [c40]Rena Bakhshi, Jörg Endrullis, Wan J. Fokkink, Jun Pang:
Brief announcement: asynchronous bounded expected delay networks. PODC 2010: 392-393 - [c39]Yanjie Sun, Chenyi Zhang, Jun Pang, Baptiste Alcalde, Sjouke Mauw:
A Trust-Augmented Voting Scheme for Collaborative Privacy Management. STM 2010: 132-146 - [c38]Zhiyuan Liu, Jun Pang, Chenyi Zhang:
Verification of A Key Chain Based TTP Transparent CEM Protocol. TTSS 2010: 51-65 - [i2]Chenyi Zhang, Jun Pang:
On Probabilistic Alternating Simulations. CoRR abs/1003.0788 (2010) - [i1]Rena Bakhshi, Jörg Endrullis, Wan J. Fokkink, Jun Pang:
Asynchronous Bounded Expected Delay Networks. CoRR abs/1003.2084 (2010)
2000 – 2009
- 2009
- [j11]Hugo L. Jonker, Sjouke Mauw, Jun Pang:
A formal framework for quantifying voter-controlled privacy. J. Algorithms 64(2-3): 89-105 (2009) - [c37]Hugo L. Jonker, Sjouke Mauw, Jun Pang:
Measuring Voter-Controlled Privacy. ARES 2009: 289-298 - [c36]Bixin Li, Yu Zhou, Jun Pang:
Model-Driven Automatic Generation of Verified BPEL Code for Web Service Composition. APSEC 2009: 355-362 - [c35]Jun Sun, Yang Liu, Jin Song Dong, Jun Pang:
PAT: Towards Flexible Verification under Fairness. CAV 2009: 709-714 - [c34]Lei Shi, Jun Pang, Lei Yang, Tiejun Zhang, Donghui Wang:
Fair-Priority-Expression-Based burst scheduling to enhance performance and fairness of shared dram systems. CCECE 2009: 190-194 - [c33]Xihui Chen, Ton van Deursen, Jun Pang:
Improving Automatic Verification of Security Protocols with XOR. ICFEM 2009: 107-126 - [c32]Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw:
Game-Based Verification of Multi-Party Contract Signing Protocols. Formal Aspects in Security and Trust 2009: 186-200 - [c31]Jun Pang, Bao Tang:
Message from T4CIA Workshop Co-chairs. SSIRI 2009: 323 - [c30]Yang Liu, Jun Pang, Jun Sun, Jianhua Zhao:
Verification of Population Ring Protocols in PAT. TASE 2009: 81-89 - [c29]Jun Pang, Chenyi Zhang:
How to Work with Honest but Curious Judges? (Preliminary Report). SECCO 2009: 31-45 - 2008
- [j10]Jun Pang, Zhengqin Luo, Yuxin Deng:
On automatic verification of self-stabilizing population protocols. Frontiers Comput. Sci. China 2(4): 357-367 (2008) - [j9]Wan J. Fokkink, Jun Pang, Anton Wijs:
Is Timed Branching Bisimilarity a Congruence Indeed? Fundam. Informaticae 87(3-4): 287-311 (2008) - [c28]Rena Bakhshi, Wan J. Fokkink, Jun Pang, Jaco van de Pol:
Leader Election in Anonymous Rings: Franklin Goes Probabilistic. IFIP TCS 2008: 57-72 - [c27]Jun Pang, Lei Yang, Lei Shi, Tiejun Zhang, Donghui Wang, Chaohuan Hou:
A priority-expression-based burst scheduling of memory reordering access. ICSAMOS 2008: 203-209 - [c26]Jun Pang, Zhengqin Luo, Yuxin Deng:
On Automatic Verification of Self-Stabilizing Population Protocols. TASE 2008: 185-192 - 2007
- [j8]Jun Pang, Wan J. Fokkink, Rutger F. H. Hofman, Ronald Veldema:
Model checking a cache coherence protocol of a Java DSM implementation. J. Log. Algebraic Methods Program. 71(1): 1-43 (2007) - [c25]Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng:
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus. ACNS 2007: 87-103 - [c24]Werner Damm, Stefan Disch, Hardi Hungar, Swen Jacobs, Jun Pang, Florian Pigorsch, Christoph Scholl, Uwe Waldmann, Boris Wirtz:
Exact State Set Representations in the Verification of Linear Hybrid Systems with Large Discrete State Space. ATVA 2007: 425-440 - [c23]Werner Damm, Alfred Mikschl, Jens Oehlerking, Ernst-Rüdiger Olderog, Jun Pang, André Platzer, Marc Segelken, Boris Wirtz:
Automating Verification of Cooperation, Control, and Design in Traffic Applications. Formal Methods and Hybrid Real-Time Systems 2007: 115-169 - [c22]Wan J. Fokkink, Allard Kakebeen, Jun Pang:
Adapting the UPPAAL Model of a Distributed Lift System. FSEN 2007: 81-97 - [c21]Yongjian Li, Jun Pang:
Extending the Strand Space Method to Verify Kerberos V. PDCAT 2007: 437-444 - [c20]Stefan Blom, Jens R. Calamé, Bert Lisser, Simona Orzan, Jun Pang, Jaco van de Pol, Muhammad Torabi Dashti, Anton Wijs:
Distributed Analysis with mu CRL: A Compendium of Case Studies. TACAS 2007: 683-689 - [c19]Tom Chothia, Jun Pang, Muhammad Torabi Dashti:
Keeping Secrets in Resource Aware Components. QAPL 2007: 79-94 - 2006
- [j7]Wan J. Fokkink, Jun Pang, Jaco van de Pol:
Cones and foci: A mechanical framework for protocol verification. Formal Methods Syst. Des. 29(1): 1-31 (2006) - [j6]Wan J. Fokkink, Jun Pang:
Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM. J. Univers. Comput. Sci. 12(8): 981-1006 (2006) - [c18]Werner Damm, Stefan Disch, Hardi Hungar, Jun Pang, Florian Pigorsch, Christoph Scholl, Uwe Waldmann, Boris Wirtz:
Automatic Verification of Hybrid Systems with Large Discrete State Space. ATVA 2006: 276-291 - [c17]Yuxin Deng, Jun Pang, Peng Wu:
Measuring Anonymity with Relative Entropy. Formal Aspects in Security and Trust 2006: 65-79 - [c16]Yongjian Li, Jun Pang:
Generalized Unsolicited Tests for Authentication Protocol Analysis. PDCAT 2006: 509-514 - [c15]Tom Chothia, Simona Orzan, Jun Pang, Muhammad Torabi Dashti:
A Framework for Automatically Checking Anonymity with mu CRL. TGC 2006: 301-318 - 2005
- [j5]Bahareh Badban, Wan J. Fokkink, Jan Friso Groote, Jun Pang, Jaco van de Pol:
Verification of a sliding window protocol in µCRL and PVS. Formal Aspects Comput. 17(3): 342-388 (2005) - [j4]Wan J. Fokkink, Jaap-Henk Hoepman, Jun Pang:
A Note on K-State Self-stabilization in a Ring with K=N. Nord. J. Comput. 12(1): 18-26 (2005) - [c14]Yuxin Deng, Catuscia Palamidessi, Jun Pang:
Compositional Reasoning for Probabilistic Finite-State Behaviors. Processes, Terms and Cycles 2005: 309-337 - [c13]Wan J. Fokkink, Jun Pang, Anton Wijs:
Is Timed Branching Bisimilarity an Equivalence Indeed?. FORMATS 2005: 258-272 - [c12]Yuxin Deng, Catuscia Palamidessi, Jun Pang:
Weak Probabilistic Anonymity. SecCO@CONCUR 2005: 55-76 - [c11]Yuxin Deng, Tom Chothia, Catuscia Palamidessi, Jun Pang:
Metrics for Action-labelled Quantitative Transition Systems. QAPL 2005: 79-96 - 2004
- [j3]Bixin Li, Xiaocong Fan, Jun Pang, Jianjun Zhao:
Model for Slicing JAVA Programs Hierarchically. J. Comput. Sci. Technol. 19(6): 848-858 (2004) - [c10]Wan J. Fokkink, Jan Friso Groote, Jun Pang, Bahareh Badban, Jaco van de Pol:
Verifying a Sliding Window Protocol in µCRL. AMAST 2004: 148-163 - [c9]Lu Yan, Kaisa Sere, Xinrong Zhou, Jun Pang:
Towards an Integrated Architecture for Peer-to-Peer and Ad Hoc Overlay Network Applications. FTDCS 2004: 312-318 - [c8]Jun Pang, Jaco van de Pol, Miguel Valero Espada:
Abstraction of Parallel Uniform Processes with Data. SEFM 2004: 14-23 - [c7]Wan J. Fokkink, Jun Pang:
Simplifying Itai-Rodeh Leader Election for Anonymous Rings. AVoCS 2004: 53-68 - [c6]Wan J. Fokkink, Jun Pang:
Formal Verification of Timed Systems Using Cones and Foci. ARTS 2004: 105-122 - 2003
- [j2]Jan Friso Groote, Jun Pang, Arno G. Wouters:
Analysis of a distributed system for lifting trucks. J. Log. Algebraic Methods Program. 55(1-2): 21-56 (2003) - [c5]Wan J. Fokkink, Jun Pang:
Cones and Foci for Protocol Verification Revisited. FoSSaCS 2003: 267-281 - [c4]Jun Pang, Bart Karstens, Wan J. Fokkink:
Analyzing the Redesign of a Distributed Lift System in UPPAAL. ICFEM 2003: 504-522 - [c3]Jun Pang, Wan J. Fokkink, Rutger F. H. Hofman, Ronald Veldema:
Model Checking a Cache Coherence Protocol for a Java DSM Implementation. IPDPS 2003: 238 - 2002
- [c2]Jun Pang:
Analysis of a Security Protocol in µCRL. ICFEM 2002: 396-400 - 2001
- [j1]Yunfeng Wang, Jun Pang, Ming Zha, Zhaohui Yang, Guoliang Zheng:
A Formal Software Development Approach Using Refinement Calculus. J. Comput. Sci. Technol. 16(3): 251-262 (2001)
1990 – 1999
- 1999
- [c1]Yunfeng Wang, Bixin Li, Jun Pang, Ming Zha, Guoliang Zheng:
A Formal Software Development Approach Based on COOZ and Refinement Calculus. TOOLS (31) 1999: 261-266
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint