Senior Lecturer
- About
-
- Email Address
- chunyan.mu@abdn.ac.uk
- Office Address
- School/Department
- School of Natural and Computing Sciences
- Research
-
Research Overview
My current research is mainly focused on Trustworthy AI and Safe Autonomy: I am interested in reasoning about trustworthiness of autonomous intelligent systems, particularly specifying and verifying responsibility, accountability, resilience, and privacy of multi-agent systems. I am also interested in information flow security.
Research Areas
Accepting PhDs
I am currently accepting PhDs in Computing Science.
Please get in touch if you would like to discuss your research ideas further.

Computing Science
Accepting PhDsResearch Specialisms
- Computer Science
- Artificial Intelligence
- Computer and Information Security
Our research specialisms are based on the Higher Education Classification of Subjects (HECoS) which is HESA open data, published under the Creative Commons Attribution 4.0 International licence.
- Teaching
-
- Publications
-
Page 1 of 1 Results 1 to 19 of 19
Probabilistic Strategy Logic with Degrees of Observability
Contributions to Journals: Conference ArticlesResponsibility-aware Strategic Reasoning in Probabilistic Multi-Agent Systems
Contributions to Journals: Conference ArticlesMeasuring Responsibility in Multi-Agent Systems
Working Papers: Preprint PapersResponsibility-aware Strategic Reasoning in Probabilistic Multi-Agent Systems
Working Papers: Preprint PapersBunch theory: Axioms, logic, applications and model
Journal of Logical and Algebraic Methods in Programming, vol. 140, 100977Contributions to Journals: ArticlesOn Observability Analysis in Multiagent Systems
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.3233/FAIA230461
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstreams/96e55dde-d95c-4e3f-9b75-8aa775836c2b/download
- [ONLINE] View publication in Scopus
Quantitative Verification of Opacity Properties in Security Systems
Working Papers: Preprint PapersVerifying Opacity Properties in Security Systems
IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 2, pp. 1450-1460Contributions to Journals: ArticlesIntegrating Information Flow Analysis in Unifying Theories of Programming
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsFirst Order Predicate Logic with Null (FOPLN) Proof of Equivalence Laws
17 pagesBooks and Reports: Other ReportsFOPL and FOPLN Backward Proofs of Equivalence Laws
25 pagesBooks and Reports: Other ReportsA Language-based Approach to Analysing Flow Security Properties in Virtualised Computing Systems
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsAnalysing Flow Security Properties in Virtualised Computing Systems
Working Papers: Preprint PapersAutomated Game-Theoretic Verification of Security Systems
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsMulti-scale stochastic organization-oriented coarse-graining exemplified on the human mitotic checkpoint
Nature Scientific Reports, vol. 9, no. 1, pp. 1-17Contributions to Journals: ArticlesOrganisation-Oriented Coarse Graining and Refinement of Stochastic Reaction Networks
IEEE/ACM Transactions on Computational Biology and Bioinformatics., vol. 15, no. 4, pp. 1152-1166Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1109/TCBB.2018.2804395
Time-sensitive information flow control in timed event-B
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsFormal Quantitative Analysis of Reaction Networks Using Chemical Organisation Theory
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-45177-0_15
Asymptotic behaviour in temporal logic
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings