Associate Professor Yun Bai

Associate Professor Yun Bai

DAP - Computer Science,
Computing & ICT

Associate Professor,
Computing & ICT

Biography

Yun Bai received her PhD in computer science in 2000 from the University of Western Sydney Nepean. Currently she is an associate professor and the Director for Computer Science Programs in the School of Computing, Engineering and Mathematics at the Western Sydney University. Prior to that, she worked as an associate lecturer at the School of Information Technology, Northern Territory University Australia; teaching assistant at the Mathematical Science Department, University of Alaska Fairbanks USA and associate lecturer at the Management School, Wuhan University China. Her research interests are information security, formal reasoning, AI application in security etc.

This information has been contributed by Associate Professor Bai.

Qualifications

  • PhD University of Western Sydney,Nepean
  • MSc University of Alaska Fairbank
  • MEng Wuhan University, China
  • BSc Wuhan University, China

Interests

  • Database Security
  • Formal Specification
  • Information Security
  • Logic Reasoning

Organisational Unit (School / Division)

  • Computing & ICT
  • Computing & ICT

Contact

Email: Y.Bai@westernsydney.edu.au
Phone: (02) 47360 335
Mobile:
Location: Y.2.16
Penrith (Kingswood)

PLEASE NOTE: obtaining information from this Directory must be for the legitimate purposes of doing business with and within Western Sydney University, and must not be used for unsolicited bulk e-mailing (spamming) or similar purposes.

Publications

Journal Articles

  • Hu, J., Khan, K., Zhang, Y., Bai, Y. and Li, R. (2017), 'Role updating in information systems using model checking', Knowledge and Information Systems, vol 51, no 1 , pp 187 - 234.
  • Hu, J., Khan, K., Bai, Y. and Zhang, Y. (2012), 'Compliance checking for usage-constrained credentials in trust negotiation systems', Lecture Notes in Computer Science, vol 7483 , pp 290 - 305.
  • Hu, J., Khan, K., Bai, Y. and Zhang, Y. (2012), 'Tracking and constraining authorization provenance', Lecture Notes in Computer Science, vol 7345 , pp 669 - 678.
  • Bai, Y. (2010), 'A formal approach for securing XML document', International Journal of Secure Software Engineering, vol 1, no 1 , pp 41 - 53.
  • Bai, Y. (2006), 'Authorizations: Their conflict and resolution', WSEAS Transactions on Computers, vol 5, no 5 , pp 878 - 884.
  • Bai, Y. (2006), 'A Formal Implementation of Database Security', Proceedings of the 3rd International Conference on Computer Science, , pp 90 - 92.
  • Bai, Y. (2006), 'Reasoning with Dynamic Domains and Computer Security', Proceedings of the 3rd International Conference on Computer Science, , pp 93 - 95.
  • Bai, Y., Zhang, Y. and Varadharajan, V. (2005), 'On the Sequence of Authorization Policy Transformations', International Journal of Information Security, vol 4, no 40575 , pp 120 - 131.
  • Bai, Y. and Zhang, Y. (2004), 'Artificial Intelligence in Database Security', International Journal of Pattern Recognition and Artificial Intelligence, vol 18 , pp 3 - 17.
  • Bai, Y. and Varadharajan, V. (2003), 'On transformation of authorization policies', Data and Knowledge Engineering, vol 45, no 3 , pp 333 - 357.
  • Zhang, Y., Wu, C. and Bai, Y. (2001), 'Implementing prioritized logic programming', Artificial Intelligence Communications, vol 14 , pp 183 - 196.

Conference Papers

  • Asuncion, V., Zhang, Y., Zhang, H., Bai, Y. and Si, W. (2018), 'Loop restricted existential rules and first-order rewritability for query answering', International Conference on Principles of Knowledge Representation and Reasoning, Tempe, Az..
  • Bai, Y., Caprin, E. and Zhang, Y. (2016), 'A prototype development of a declarative approach for computer system security', International Conference on Computer Applications in Industry and Engineering, Denver, Colo..
  • Bai, Y., Caprin, E. and Zhang, Y. (2015), 'Reasoning about the state change of authorization policies', International Conference on Industrial & Engineering Applications of Artificial Intelligence & Expert Systems, Seoul, South Korea.
  • Yang, C., Lou, Q., Liu, J., Gou, H. and Bai, Y. (2015), 'Particle filter-based approach to estimate remaining useful life for predictive maintenance', International Conference on Industrial & Engineering Applications of Artificial Intelligence & Expert Systems, Seoul, South Korea.
  • Bai, Y., Khan, K. and Yang, C. (2014), 'An approach and its implementation for cloud computing security', International Conference on Security and Management, Las Vegas, Nev..
  • Yang, C., Lou, Q., Liu, J., Yang, Y. and Bai, Y. (2014), 'Particle filter-based method for prognostics with application to auxiliary power unit', International Conference on Industrial & Engineering Applications of Artificial Intelligence & Expert Systems, Kaohsiung, Taiwan.
  • Bai, Y. and Zhang, Y. (2013), 'Program completion as constraint satisfaction : tight logic programs revisited', International Conference on Artificial Intelligence, Las Vegas, Nev..
  • Khan, K. and Bai, Y. (2013), 'Automatic verification of health regulatory compliance in cloud computing', IEEE International Conference on e-Health, Networking, Application and Services, Lisbon, Portugal.
  • Hu, J., Khan, K., Bai, Y. and Zhang, Y. (2012), 'Constraint-enhanced role engineering via answer set programming', ACM Symposium on Information, Computer and Communications Security, Seoul, Korea.
  • Bai, Y. and Khan, K. (2011), 'A Modal Logic for Information System Security', Australasian Information Security Conference, Perth.
  • Bai, Y. and Policarpio, S. (2011), 'On Cloud Computing Security', Recent Trend in Wireless and Mobile Networks, Ankara, Turkey.
  • Policarpio, S. and Bai, Y. (2011), 'An Implementation of Axml(T): An Answer Set Programming based Formal Language of Authorisation for XML Documents', Recent Trands in Wireless and Mobile Networks, Ankara, Turkey.
  • Bai, Y. (2009), 'A Modal Logic for Authorization Specification and Reasoning', IEEE International Conference on Intelligent Computing & Intelligent Systems, Shanghai, China.
  • Bai, Y. (2009), 'A Knowledge Based Formal Language for Securing Information Systems', Knowledge Based and Intelligent Information and Engineering Systems, Santiago, Chile.
  • Bai, Y. (2008), 'On Distributed System Security', The 2008 International Conference on Security Technology, Hainan, Island. China.
  • Bai, Y. (2008), 'Reasoning for Incomplete Authorizations', 12th International conference on Knowledge-Based Intelligent Information & Engineering Systems, Zagreb, Croatia.
  • Bai, Y. (2008), 'Access Control for XML Document', 21st International conference on Industrial, Engineering and Other Applications of Applied Intelligence Systems, Wroclaw, Poland.
  • Bai, Y. (2007), 'Logic Program for Authorizations', International Conference on Computer, Information and System Science & Engineering, Bangkok, Thailand.
  • Bai, Y. (2007), 'On XML Document Security', International Conference on Software Engineering & Data Engineering, Las Vegas, USA.
  • Bai, Y. (2005), 'A New Approach for Conflict Resolution of Authorization', The 9th International Conference, KES 2005, Melbourne.
  • Zhang, Y. and Bai, Y. (2003), 'The Characterization on the Uniqueness of Answer Set for Prioritized Logic Programs', The 14th International Symposium, ISMIS 2003, Maebashi City, Japan.
  • Zhang, Y. and Bai, Y. (2003), 'G-STRIPS - A Generalized STRIPS System for Handling STate Change over Dynamic Domains', The 14th International Symposium, ISMIS 2003, Maebashi City, Japan.
  • Bai, Y. (2002), 'Towards Secure Object Oriented Database Systems', Confederated International Conferences CoopLS, DOA, and ODBASE 2002, Irvin, California.
  • Bai, Y. and Zhang, Y. (2002), 'AI Application in Secure Database Systems', Knowledge-Based Intelligent Information Engineering Systems and Allied Technologies, Crema, Italy.
  • Bai, Y. and Zhang, Y. (2002), 'A Formal Semantics of Hybrid Symbolic-Neural Networks for Commonsense Reasoning', Knowledge-Based Intelligent Information Engineering Systems and Allied Technologies, Crema, Italy.
  • Bai, Y. and Zhang, Y. (2001), 'On the Computational Aspect of Rule Based Database Updates', The 14th International Conference on Industrial and Engineering Applications of Artificial Intelligence, Budapest, Hungary.

Previous Projects

Title: The specification and implementation of high level authorisation rules in information systems
Funder:
  • University of Western Sydney
Western Researchers: Yun Bai
Years: 2000-05-12 - 2001-05-31
ID: P0012930
Title: Answer Set Programming for Distributed Authorisations with Delegation
Funder:
  • University of Western Sydney
Western Researchers: Yun Bai and Yan Zhang
Years: 2006-12-20 - 2008-01-03
ID: P0015412
Title: Model updating knowledge for the correctness of security protocols
Funder:
  • University of Western Sydney
Western Researchers: Yan Zhang and Yun Bai
Years: 2004-02-16 - 2005-02-15
ID: P0011588
Title: Building robust network topologies against cyber attacks for critical infrastructure networks [via UNSW]
Funder:
  • The NSW Cyber Security Network
Western Researchers: Weisheng Si, Yun Bai and Wei Xing Zheng
Years: 2019-01-01 - 2020-12-31
ID: P00025091
Title: An answer set programming approach for specification and verification of distributed authorizations in complex environments [via Qatar Uni]
Funder:
  • Qatar National Research Fund
Western Researchers: Yan Zhang and Yun Bai
Years: 2010-12-01 - 2014-05-31
ID: P00017882

Western Sydney University

Locked Bag 1797
Penrith NSW 2751

Tel: +61 2 9852 5222

ABN 53 014 069 881
CRICOS Provider No: 00917k

Visit our mobile site