Dr Chunyan Mu
Senior Lecturer
- About
-
- Email Address
- chunyan.mu@abdn.ac.uk
- Office Address
- School/Department
- School of Natural and Computing Sciences
- Research
-
Research Overview
Information flow security, language-based security, privacy issues in mulit-agent systems & machine learning, and quantitative verification.
Research Areas
Accepting PhDs
I am currently accepting PhDs in Computing Science.
Please get in touch if you would like to discuss your research ideas further.
Computing Science
Accepting PhDsResearch Specialisms
- Computer Science
- Computer and Information Security
Our research specialisms are based on the Higher Education Classification of Subjects (HECoS) which is HESA open data, published under the Creative Commons Attribution 4.0 International licence.
- Publications
-
Page 1 of 2 Results 1 to 10 of 15
Bunch theory: Axioms, logic, applications and model
Journal of Logical and Algebraic Methods in Programming, vol. 140, 100977Contributions to Journals: ArticlesOn Observability Analysis in Multiagent Systems
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsQuantitative Verification of Opacity Properties in Security Systems
Working Papers: Preprint Papers- [ONLINE] DOI: https://doi.org/10.48550/arXiv.2206.14317
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/21378/1/2206.14317v1.pdf
Verifying Opacity Properties in Security Systems
IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 2, pp. 1450-1460Contributions to Journals: ArticlesIntegrating Information Flow Analysis in Unifying Theories of Programming
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/PRDC53464.2021.00018
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/22325/1/flow_utp.pdf
FOPL and FOPLN Backward Proofs of Equivalence Laws
25 pages.Other Contributions: Other ContributionsFirst Order Predicate Logic with Null (FOPLN) Proof of Equivalence Laws
17 pages.Other Contributions: Other ContributionsA Language-based Approach to Analysing Flow Security Properties in Virtualised Computing Systems
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/TASE49443.2020.00033
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/19956/1/main.pdf
Analysing Flow Security Properties in Virtualised Computing Systems
Working Papers: Preprint Papers- [ONLINE] http://arxiv.org/abs/2004.05500v1
- [ONLINE] DOI: https://doi.org/10.48550/arXiv.2004.05500
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/20510/1/2004.05500v1.pdf
Automated Game-Theoretic Verification of Security Systems
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-030-30281-8_14
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/19837/1/main_nash.pdf