Hien Thi Thu Truong

According to our database1, Hien Thi Thu Truong authored at least 22 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures.
Pervasive Mob. Comput., January, 2023

2021
IoTCrawler: Challenges and Solutions for Searching the Internet of Things.
Sensors, 2021

2020
Auditable Asymmetric Password Authenticated Public Key Establishment.
IACR Cryptol. ePrint Arch., 2020

On the Security of Randomized Defenses Against Adversarial Samples.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
IoTCrawler. Managing Security and Privacy for IoT.
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019

Sensor-Based Proximity Detection in the Face of Active Adversaries.
IEEE Trans. Mob. Comput., 2019

DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

Towards Secure and Decentralized Sharing of IoT Data.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Mix'n'Squeeze: Thwarting Adaptive Adversarial Samples Using Randomized Squeezing.
CoRR, 2018

Proximity Verification Based on Acoustic Room Impulse Response.
CoRR, 2018


2015
Contextual Proximity Detection in the Face of Context-Manipulating Adversaries.
CoRR, 2015

2014
The company you keep: mobile malware infection rates and inexpensive risk indicators.
Proceedings of the 23rd International World Wide Web Conference, 2014

Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014

MDoctor: A Mobile Malware Prognosis Application.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing.
Proceedings of the Financial Cryptography and Data Security, 2014

2012
A Contract-based and Trust-aware Collaboration Model. (Un modèle de collaboration basé sur les contrats et la confiance).
PhD thesis, 2012

A Contract-Extended Push-Pull-Clone Model for Multi-Synchronous Collaboration.
Int. J. Cooperative Inf. Syst., 2012

Authenticating operation-based history in collaborative systems.
Proceedings of the ACM 2012 International Conference on Support Group Work, 2012

2011
Log Auditing for Trust Assessment in Peer-to-Peer Collaboration.
Proceedings of the 10th International Symposium on Parallel and Distributed Computing, 2011

A contract-extended push-pull-clone model.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

2010
A Log Auditing Approach for Trust Management in Peer-to-Peer Collaboration
CoRR, 2010


  Loading...