Dr. Jun Pang
![]() |
|
||||||||
Fakultät oder Zentrum | Fakultät für Naturwissenschaften, Technologie und Medizin | ||||||||
Department | Fachbereich Informatik | ||||||||
Postadresse |
Université du Luxembourg Maison du Nombre 6, Avenue de la Fonte L-4364 Esch-sur-Alzette |
||||||||
Büroadresse | MNO, E03 0335-010 | ||||||||
![]() |
|||||||||
Telefon | (+352) 46 66 44 5625 | ||||||||
Gesprochene Sprachen | English, Chinese | ||||||||

2023

;
in Information Technology and Control (2023), 52(1), 199-214

;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2023), 20(1), 707-719

; ; ; ; ; ;
in Frontiers in Materials (2023), 10

; ;
in Data Mining and Knowledge Discovery (2023), 37
2022

; ; ; ; ;
in Proceedings of the 2022 International Conference on Social Informatics (2022, October 12)

; ;
in PeerJ Computer Science (2022), 8

; ; ; ; ; ; ;
in Cells (2022), 11(16),

; ; ; ; ;
in Proceedings of the 13th Asia-Pacific Symposium on Internetware (2022)

; ; ; ; ; ; ;
Book published by ACM (2022)

; ;
in Frontiers of Computer Science (2022), 16(2), 162304

;
in Proceedings of the 36th Annual Conference on Neural Information Processing Systems (NeurIPS'22) (2022)

; ; ; ; ; ;
in ACM Transactions on the Web (2022), 16(2), 1-29

;
in Proceedings of the 61st International Conference on Decision and Control (CDC 2022) (2022)

;
in Science of Computer Programming (2022), 215

; ; ;
in Transactions on Machine Learning Research (2022)

; ;
in Transactions on Machine Learning Research (2022)

; ;
in Data Mining and Knowledge Discovery (2022), 36(6), 2299-2333
2021

; ; ;
in Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (2021, October)

; ; ;
in IEEE 34th Computer Security Foundations Symposium, Dubrovnik 21-25 June 2021 (2021, June)

; ; ;
in Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (2021, October 12)

; ;
in Big Data and Cognitive Computing (2021), 5(1), 5

; ;
in Journal of Logic and Computation (2021), 31(8), 1901-1902

; ; ; ; ; ;
in Proceedings of 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA'21) (2021)

;
in Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC'21) (2021)

;
in Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS'21) (2021)

; ; ;
in Scientometrics (2021)

; ; ; ;
in Proceedings of 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition - CVPR'21 (2021)

; ;
in Computer Journal (2021), 64(3), 325-336

;
in Bioinformatics (2021), 36(6), 879-881

;
in Proceedings of the 24th International Symposium on Formal Methods (FM 2021) (2021)

; ;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2021), 18(6), 2167-2176
2020

; ; ; ; ; ;
Poster (2020)

; ;
in 6th Global Conference on Artificial Intelligence (2020, May)

; ; ; ;
in Proceedings of the 38th International Conference on Computer Design (ICCD) (2020)

; ;
in Proceedings of the 21st International Conference on Web Information System Engineering (WISE'20) (2020)

;
in Science of Computer Programming (2020), 187

;
Book published by Springer (2020)

; ; ;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2020), 17(6), 1932-1945

;
in Proceedings of the 18th International Conference on Computational Methods in Systems Biology (CMSB) (2020)

;
in Proceedings of the 11th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics (2020)

; ; ; ; ; ;
in Journal of Computer Science and Technology (2020), 35(6), 1231-1233

;
in Proceedings of the 14th IEEE Symposium on Theoretical Aspects of Software Engineering (TASE) (2020)

; ;
in Proceedings of the 21st International Conference on Web Information System Engineering (WISE'20) (2020)
2019

; ; ;
in Bioinformatics (2019), 35(14), 558-567

; ; ; ;
in Knowledge and Information Systems (2019), 59(3), 539-569

; ;
in Proceedings of the 37th International Conference on Computer Design (ICCD) (2019)

; ; ; ;
in Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (2019)

; ; ; ; ;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2019), 16(5), 1610-1619

; ; ;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2019), 16(1), 31-42

; ;
in Formal Aspects of Computing (2019), 31(1), 27-46

;
Book published by IEEE (2019)

; ;
in Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (2019)

; ;
in Proceedings of the 23rd International Symposium on Formal Methods (FM'19) (2019)

; ; ;
in Science of Computer Programming (2019), 180

; ;
in Proceedings of the 20th International Conference on Web Information System Engineering (2019)
2018

; ;
in Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (2018)

; ; ; ; ; ;
in ACM Transactions on Computational Logic (2018), 19(4), 1-27

; ; ;
in Proceedings of the 16th International Conference on Computational Methods in Systems Biology (2018)

; ; ;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2018), 15(4), 1203-1216

; ;
in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2018), 15(5), 1525-1537

; ; ;
Book published by IEEE Computer Society (2018)

; ;
in Proceedings of the 16th International Conference on Computational Methods in Systems Biology (2018)

; ;
in Proceedings of the 4th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications (2018)

; ; ;
in Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics (2018)

; ; ;
in International Journal on Software Tools for Technology Transfer (2018), 20(6), 689-704

; ; ; ; ;
in Proceedings of The Web Conference 2018 (WWW'18) (2018)
2017

; ; ;
in Proceedings of the 24th ACM International Conference on Computer and Communications Security (2017)

; ;
in Computers and Security (2017), 65

; ; ; ; ; ;
in Proceedings of the 19th International Conference on Formal Engineering Methods (2017)

; ; ;
in Proceedings of the 3rd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (2017)

;
in Proc. 28th ACM Conference on Hypertext and Social Media - HT'17 (2017)

;
in Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) (2017)

; ; ;
in Proceedings of 20th International Conference on Fundamental Approaches to Software Engineering (2017)

; ; ; ;
in Proceedings of the 26th ACM International Conference on Information and Knowledge Management - CIKM'17 (2017)

; ; ;
in Proceedings of the 16th IEEE/WIC/ACM International Conference on Web Intelligence (WI'17) (2017)
2016

; ; ; ;
in Proceedings of the 34th IEEE International Conference on Computer Design (2016)

; ;
in Formal Aspects of Computing (2016), 28(5), 723-724

; ;
in Formal Aspects of Computing (2016), 28(3), 343-344

; ;
in Proceedings of the 31st ACM Symposium on Applied Computing (2016, April)

; ;
in Proceedings of 14th International Conference on Computational Methods in Systems Biology (2016)

; ;
in Proceedings of 14th International Conference on Computational Methods in Systems Biology (2016)

; ; ;
in Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT'16) (2016)

; ;
in Proceedings of the 17th International Conference on Web Information System Engineering (2016)

; ; ;
in Science China Information Sciences (2016), 59(8), 0801011-08010116

; ; ;
in Proceedings of the 5th International Workshop on Complex Networks and their Applications (2016)
2015

; ;
in Proceedings of the 3rd IEEE Conference on Communications and Network Security (CNS'15) (2015)

; ;
in Proceedings of the 7th International Conference on Advances in Social Networks Analysis and Mining (ASONAM'15) (2015)

; ;
in Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (2015)

;
in Formal Aspects of Computing (2015), 27(2), 255-282

; ; ; ; ;
in Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (2015)

; ;
in Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (2015)

; ;
Book published by EPTCS - 184 (2015)

;
in Proceedings of the 39th Annual IEEE Computers, Software & Applications Conference (COMPSAC'15) (2015)

;
in Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES'15) (2015)

;
in Proceedings of the 24th World Wide Web Conference (2015)

;
in Computers and Security (2015), 54

;
in Proceedings of the 3rd ACM Conference on Online Social Networks (COSN'15) (2015)

; ; ;
in Proceedings of the 7th Asia-Pacific Symposium on Internetware (2015)

;
in Proceedings of the 15th International Conference on Web Engineering (2015)
2014

; ; ;
in Proceedings of 17th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD) (2014)

; ; ;
in Proceedings of the 16th Asia-Pacific Web Conference (2014)

; ;
in ACM Transactions on the Web (2014), 8(4), 21

;
in Proceedings of the 11th Conference on Security and Cryptography (SECRPT) (2014)

; ; ; ;
in Proceedings of 19th IEEE Conference on Engineering of Complex Computer Systems (ICECCS) (2014)

;
in Proc. 2nd Workshop on Formal Techniques for Safety-Critical Systems (FTSCS'13) (2014)

;
Book published by Springer (2014)

; ;
in Proceedings of 19th IEEE Conference on Engineering of Complex Computer Systems (2014)

;
in Science of Computer Programming (2014), 95(3), 273-274

;
Book published by EPTCS (2014)

;
in Proceedings of the 9th Conference on Availability, Reliability and Security (ARES 2014, Best Paper Award) (2014)

; ; ; ; ; ;
in Frontiers of Computer Science (2014), 8(1), 1-16

; ; ; ;
in PLoS ONE (2014), 9(7), 980011-15
2013

; ; ; ; ;
in Proceedings of 15th Conference on Formal Engineering Methods (ICFEM'13) (2013)

; ;
in Proc. 7th International Workshop on Data Privacy Management (2013)

; ; ; ; ;
in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)

; ; ; ;
in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)

; ; ;
in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75

;
in Proc. 3rd ACM Conference on Data and Application Security and Privacy (2013)

; ;
in Proc. 28th ACM Symposium on Applied Computing (2013)

; ;
in Proceedings of the 18th European Symposium on Research in Computer Security (2013)

; ;
in Computer Science Review (2013)

; ;
in Frontiers of Computer Science (2013), 7(2), 279-297

; ; ;
in Proceedings of 4th Workshop on Computational Models for Cell Processes (CompMod'13) (2013)

; ; ;
in Proceedings of 11th Conference on Computational Methods in Systems Biology (CMSB'13) (2013)

;
in Innovations in Systems and Software Engineering (2013), 9(2), 57-58

; ;
in 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (2013)

;
in Proc. 28th Symposium on Applied Computing (2013)

; ; ; ; ;
in Cell Communication and Signaling (2013), 11(46),
2012

; ; ; ; ;
in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

; ; ;
in Proc. 7th International Conference on Availability, Reliability and Security (2012)

;
in Proc. 2nd ACM Conference on Data and Application Security and Privacy (2012)

; ;
in Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (2012)

; ;
in Proc. 17th European Symposium on Research in Computer Security (2012)

; ;
in Digital Enlightenment Yearbook 2012 (2012)

; ; ;
in Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (2012)

;
in Proc. 27th Symposium on Applied Computing (2012)

; ; ; ;
in Journal of Computer Security (2012), 20(4), 437-459

; ; ; ; ;
in Transactions on Computational Systems Biology (2012), XIV

;
in Proc. 38th International Conference on Current Trends in Theory and Practice of Computer Science (2012)

; ; ;
in Innovations in Systems and Software Engineering (2012), 8
2011

; ; ;
in Information Processing Letters (2011), 111(17), 864-870

; ;
in Proc. 7th Workshop on Formal Aspects in Security and Trust (2011)

;
in Proc. 6th International Conference on Availability, Reliability and Security (2011)

; ;
in Proc. 19th International Workshop on Security Protocols (2011)

;
in Proc. 6th International Conference on Availability, Reliability and Security (2011)

; ;
in Proc. 3rd Workshop on Harnessing Theories for Tool Support in Software (2011)

; ;
in Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software (2011), ENTCS 274

; ; ; ;
in Proc. 6th International Workshop on Security and Trust Management (2011)

; ; ; ; ;
in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67

; ; ; ;
in Proc. 17th International Symposium on Formal Methods (2011)
2010

;
in Proceedings of 15th IEEE International Conference on Engineering of Complex Computer Systems (2010)

; ; ;
in Proceedings of 29th Annual ACM Symposium on Principles of Distributed Computing (2010)

;
in Journal of Information Security (2010), 1(2), 45-55

;
in Journal of Information Security (2010), 1(2), 56-67

; ;
in Proceedings of 6th IEEE/IFIP Symposium on Trusted Computing and Communications (2010)

;
in Proc. 6th IFIP Conference on Theoretical Computer Science (2010)

; ; ;
in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)
2009

; ;
in Proc. 11th International Conference on Formal Engineering Methods (2009)

; ;
in Journal of Algorithms in Cognition, Informatics and Logic (2009)

; ;
in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)

; ; ;
in Proceedings of 3rd IEEE Symposium on Theoretical Aspects of Software Engineering (2009)

;
in Proc. 3rd IEEE Conference on Secure Software Integration and Reliability Improvement (2009)

;
in Proc. 7th International Workshop on Security Issues in Concurrency (2009)

; ; ;
in Proc. 21th International Conference on Computer Aided Verification (2009)
2008

; ; ;
in Proc. 5th IFIP Conference on Theoretical Computer Science (2008)

; ;
in Fundamenta Informaticae (2008), 87(3-4), 287311

; ;
in Frontiers of Computer Science in China (2008), 2(4), 357367

; ;
in Proceedings of 2nd IEEE Symposium on Theoretical Aspects of Software Engineering (TASE'08) (2008)