- LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking. Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong, Haoyu Wang. In Information Security Conference - ISC 2019 (to appear).
- Deep Attentive Factorization Machine for App Recommendation Service. Hongcan Gao, Chenkai Guo, Yanfeng Wu, Naipeng Dong, Xiaolei Hou, Sihan Xu and Jing Xu. In IEEE International Conference on Web Services (to appear).
- AutoPer: Automatic Recommender for Runtime-Permission in Android Applications. In IEEE Computer Society Signature Conference on Computers, Software and Applications - COMPSAC (to appear).
- Formal Analysis of a Proof-of-Stake Blockchain. Wai Yan Maung Maung Thin, Naipeng Dong, Guangdong Bai and Jin Song Dong. In 23rd International Conference on Engineering of Complex Computer Systems - ICECCS'18.
- The Foul Adversary: Formal Models. Naipeng Dong and Tim Muller. In 20th International Conference on Formal Engineering Methods - ICFEM'18.
- Verification of Strong Nash-equilibrium for Probabilistic BAR Systems. Dileepa Fernando, Naipeng Dong, Cyrille Jegourel and Jin Song Dong. In 20th International Conference on Formal Engineering Methods - ICFEM'18.
- A Projection-Based Approach for Memory Leak Detection. Xiaohui Sun, Sihan Xu, Chenkai Guo, Jing Xu, Naipeng Dong, Xiujuan Ji, Sen Zhang. In IEEE 42nd Annual Computer Software and Applications Conference - COMPSAC'18.
- A verification framework for stateful security protocols. Li Li, Naipeng Dong, Jun Pang, Jun Sun, Guangdong Bai, Yang Liu and Jin Song Dong. In 19th International Conference on Formal Engineering Methods - ICFEM 2017.
- A Framework for Formal Analysis of Privacy on SSO protocols. Kailong Wang, Guangdong Bai, Naipeng Dong and Jin Song Dong. In 13th EAI International Conference on Security and Privacy in communication Networks - SecureComm 2017.
- Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocol. Quanqi Ye, Guangdong Bai, Naipeng Dong and Jin Song Dong. In 13th EAI International Conference on Security and Privacy in communication Networks - SecureComm 2017.
- Goal Analytics via Model Checking for Autonomous Systems. Jin Song Dong, Naipeng Dong, Zhe Hou, Brendan Mahony and Martin Oxenham. In Proc. 5th Goal Reasoning Workshop at IJCAI - 2017. http://makro.ink/ijcai2017grw/#proceedings.
- Formal modelling and analysis of receipt-free auction protocols in applied pi. Naipeng Dong, Hugo Jonker, and Jun Pang. Computers & Security, volume 65, pp. 405-432.
- App gnome: callback sequencing in Android. Chenkai Guo, Naipeng Dong, Guangdong Bai, Quanqi Ye, Jin Song dong, Jing Xu, and Guannan Si. In Proc. 39th International conference on Software Engineering - ICSE (Companion Volume) 2017. 149-151.
- Verification of Nash-equilibrium for probabilistic BAR systems. Dileepa Fernando, Naipeng Dong, Cyrille Jegourel, and Jin Song dong. In Proc. 21st International Conference on Engineering of Complex Computer Systems - ICECCS’16, IEEE Computer Society, pp. 53-62.
- Automatic construction of callback model for Android application. Chenkai Guo, Quanqi Ye, Naipeng Dong, Guangdong Bai, Jin Song Dong, and Jing Xu. In Proc. 21st International Conference on Engineering of Complex Computer Systems - ICECCS’16, IEEE Computer Society, pp. 231-234.
- ProRef:An automatic authentication protocol refinement tool for extracting formal models. Quangi Ye, Guangdong Bai, Naipeng Dong and Jin Song Dong. In 1st Workshop on Formal and Model-Driven Techniques for Developing Trustworthy Systems - FM&MDD 2016.
- Enforcing privacy in the presence of others: notions, formalisations and relations. Naipeng Dong, Hugo Jonker, and Jun Pang. In Proc. 18th European Symposium on Research in Computer Security - ESORICS’13, Lecture Notes in Computer Science 8134, pp. 499-516.
- Formal analysis of privacy in an eHealth protocol. Naipeng Dong, Hugo Jonker, and Jun Pang. In Proc. 17th European Symposium on Research in Computer Security - ESORICS’12, Lecture Notes in Computer Science 7459, pp. 325-342.
- Challenges in eHealth: from enabling to enforcing privacy. Naipeng Dong, Hugo Jonker, and Jun Pang. In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems - FHIES’11, Lecture Notes in Computer Science 7151, pp. 195-206.
- A Foul Adversary: Bribery, Extortion and Blackmail (Abstract). Naipeng Dong and Tim Muller. In Joint Symposium on Security & Intelligent Information Systems - S&IIS 2011.
- Analysis of a receipt-free auction protocol in the applied pi calculus. Naipeng Dong, Hugo Jonker, and Jun Pang. In Proc. 7th Workshop on Formal Aspects in Security and Trust - FAST’10, Lecture Notes in Computer Science 6561, pp. 223-238.