Jun Pang
TitleCited byYear
PAT: Towards flexible verification under fairness
J Sun, Y Liu, J Dong, J Pang
21st International Conference on Computer Aided Verification, 709-714, 2009
3452009
Metrics for action-labelled quantitative transition systems
Y Deng, T Chothia, C Palamidessi, J Pang
Electronic Notes in Theoretical Computer Science 153 (2), 79-96, 2006
812006
Measuring anonymity with relative entropy
Y Deng, J Pang, P Wu
Proceedings of 4th Workshop on Formal Aspects in Security and Trust (FAST'06 …, 2007
752007
Recent development and biomedical applications of probabilistic Boolean networks
P Trairatphisan, A Mizera, J Pang, AA Tantar, J Schneider, T Sauter
Cell communication and signaling 11 (1), 46, 2013
742013
Analysis of a Distributed System for Lifting Trucks
JF Groote, J Pang, AG Wouters
Journal of Logic and Algebraic Programming 55 (1-2), 21-56, 2003
612003
A new access control scheme for Facebook-style social networks
J Pang, Y Zhang
Computers & Security 54, 44-59, 2015
542015
Verification of a sliding window protocol in μCRL and PVS
B Badban, W Fokkink, JF Groote, J Pang, J van de Pol
Formal Aspects of Computing 17 (3), 342-388, 2005
482005
Exact state set representations in the verification of linear hybrid systems with large discrete state space
W Damm, S Disch, H Hungar, S Jacobs, J Pang, F Pigorsch, C Scholl, ...
International Symposium on Automated Technology for Verification and …, 2007
472007
Model checking a cache coherence protocol of a Java DSM implementation
J Pang, W Fokkink, R Hofman, R Veldema
The Journal of Logic and Algebraic Programming 71 (1), 1-43, 2007
46*2007
Verifying a sliding window protocol in μCRL
W Fokkink, JF Groote, J Pang, B Badban, J van de Pol
Proc. 10th Conference on Algebraic Methodology and Software Technology …, 2004
462004
Constructing and Comparing User Mobility Profiles for Location-based Services
X Chen, J Pang, R Xue
28th ACM Symposium on Applied Computing, 2013
452013
A framework for automatically checking anonymity with μCRL
T Chothia, S Orzan, J Pang, MT Dashti
Proc. 2nd Symposium on Trustworthy Global Computing (TGC'06), 301-318, 2007
452007
Cones and foci: A mechanical framework for protocol verification
W Fokkink, J Pang, J Van De Pol
Formal Methods in System Design 29 (1), 1-31, 2006
45*2006
Privacy and verifiability in voting systems: Methods, developments and trends
H Jonker, S Mauw, J Pang
Computer Science Review 10, 1-30, 2013
442013
Compositional reasoning for probabilistic finite-state behaviors
Y Deng, C Palamidessi, J Pang
Processes, Terms and Cycles: Steps on the Road to Infinity: Essays Dedicated …, 2005
442005
Weak probabilistic anonymity
Y Deng, C Palamidessi, J Pang
432005
walk2friends: Inferring social links from mobility profiles
M Backes, M Humbert, J Pang, Y Zhang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
422017
Measuring query privacy in location-based services
X Chen, J Pang
Proceedings of the second ACM conference on Data and Application Security …, 2012
422012
Challenges in ehealth: From enabling to enforcing privacy
N Dong, H Jonker, J Pang
International Symposium on Foundations of Health Informatics Engineering and …, 2011
412011
Automating verification of cooperation, control, and design in traffic applications
W Damm, A Mikschl, J Oehlerking, ER Olderog, J Pang, A Platzer, ...
Formal methods and hybrid real-time systems, 115-169, 2007
392007
The system can't perform the operation now. Try again later.
Articles 1–20