Phuong Ha Nguyen

According to our database1, Phuong Ha Nguyen authored at least 50 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Breaking XOR Arbiter PUFs without Reliability Information.
CoRR, 2023

Batch Clipping and Adaptive Layerwise Clipping for Differential Private Stochastic Gradient Descent.
CoRR, 2023

Considerations on the Theory of Training Models with Differential Privacy.
CoRR, 2023

Practical Budget Pacing Algorithms and Simulation Test Bed for eBay Marketplace Sponsored Search.
Proceedings of the Workshop on Data Mining for Online Advertising (AdKDD 2023) co-located with the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2023), 2023

2022
Generalizing DP-SGD with Shuffling and Batching Clipping.
CoRR, 2022

Secure Remote Attestation with Strong Key Insulation Guarantees.
CoRR, 2022

Finite-sum smooth optimization with SARAH.
Comput. Optim. Appl., 2022

Besting the Black-Box: Barrier Zones for Adversarial Example Defense.
IEEE Access, 2022

2021
A Unified Convergence Analysis for Shuffling-Type Gradient Methods.
J. Mach. Learn. Res., 2021

Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure.
IACR Cryptol. ePrint Arch., 2021

Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak.
IACR Cryptol. ePrint Arch., 2021

Differential Private Hogwild! over Distributed Local Data Sets.
CoRR, 2021

Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes.
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021

2020
Splitting the Interpose PUF: A Novel Modeling Attack Strategy.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise.
CoRR, 2020

Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples.
CoRR, 2020

A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning.
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020

2019
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

New Convergence Aspects of Stochastic Gradient Algorithms.
J. Mach. Learn. Res., 2019

BUZz: BUffer Zones for defending adversarial examples in image classification.
CoRR, 2019

Optimal Finite-Sum Smooth Non-Convex Optimization with SARAH.
CoRR, 2019

Tight Dimension Independent Lower Bound on the Expected Convergence Rate for Diminishing Step Sizes in SGD.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD.
Proceedings of the 36th International Conference on Machine Learning, 2019

2018
A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security.
IEEE Trans. Computers, 2018

Tight Dimension Independent Lower Bound on Optimal Expected Convergence Rate for Diminishing Step Sizes in SGD.
CoRR, 2018

SGD and Hogwild! Convergence Without the Bounded Gradients Assumption.
Proceedings of the 35th International Conference on Machine Learning, 2018

2017
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test.
ACM Trans. Design Autom. Electr. Syst., 2017

MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks.
IACR Cryptol. ePrint Arch., 2017

Weak-Unforgeable Tags for Secure Supply Chain Management.
IACR Cryptol. ePrint Arch., 2017

FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise.
Cryptogr., 2017

Intrinsically Reliable and Lightweight Physical Obfuscated Keys.
CoRR, 2017

Side Channel Evaluation of PUF-Based Pseudorandom Permutation.
Proceedings of the Euromicro Conference on Digital System Design, 2017

2016
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants.
IACR Cryptol. ePrint Arch., 2016

An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function.
IACR Cryptol. ePrint Arch., 2016

2015
A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Tutorial T7: Physically Unclonable Function: A Promising Security Primitive for Internet of Things.
Proceedings of the 28th International Conference on VLSI Design, 2015

Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

A Biased Fault Attack on the Time Redundancy Countermeasure for AES.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

2014
Cryptanalysis of Composite PUFs (Extended abstract-invited talk).
Proceedings of the 18th International Symposium on VLSI Design and Test, 2014

Lightweight and Secure PUFs: A Survey (Invited Paper).
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

Minimizing S-Boxes in Hardware by Utilizing Linear Transformations.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks.
IEEE Trans. Inf. Forensics Secur., 2013

Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

2012
On 3-share Threshold Implementations for 4-bit S-boxes.
IACR Cryptol. ePrint Arch., 2012

Enabling 3-share Threshold Implementations for any 4-bit S-box.
IACR Cryptol. ePrint Arch., 2012

Improved Differential Cache Attacks on SMS4.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

Differential Attacks against Stream Cipher ZUC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
On Related-Key Attacks and KASUMI: The Case of A5/3.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
On Multidimensional Linear Cryptanalysis.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010


  Loading...