Quang Do

According to our database1, Quang Do authored at least 26 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
The role of the adversary model in applied security research.
Comput. Secur., 2019

2018
Cyber-physical systems information gathering: A smart home case study.
Comput. Networks, 2018


2017
Is the data on your wearable device secure? An Android Wear smartwatch case study.
Softw. Pract. Exp., 2017

2016
A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers.
IEEE Trans. Inf. Forensics Secur., 2016

2015
Mobile Cloud Forensics: An Analysis of Seven Popular Android Apps.
CoRR, 2015

Conceptual evidence collection and analysis methodology for Android devices.
CoRR, 2015

A Forensically Sound Adversary Model for Mobile Devices.
CoRR, 2015

Exfiltrating data from Android devices.
Comput. Secur., 2015

A Cloud-Focused Mobile Forensics Methodology.
IEEE Cloud Comput., 2015

Mobile cloud forensics: An analysis of seven popular Android apps.
Proceedings of the Cloud Security Ecosystem, 2015

Conceptual evidence collection and analysis methodology for Android devices.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Windows Event Forensic Process.
Proceedings of the Advances in Digital Forensics X, 2014

Enhancing User Privacy on Android Mobile Devices via Permissions Removal.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2012
Background knowledge in learning-based relation extraction
PhD thesis, 2012

A Robust Shallow Temporal Reasoning System.
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, 2012

Joint Inference for Event Timeline Construction.
Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, 2012

2011
Jyotish: Constructive approach for context predictions of people movement from joint Wifi/Bluetooth trace.
Pervasive Mob. Comput., 2011

3R: Fine-grained encounter-based routing in Delay Tolerant Networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Jyotish: A novel framework for constructing predictive model of people movement from joint Wifi/Bluetooth trace.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Minimally Supervised Event Causality Identification.
Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing, 2011

2010
Constraints Based Taxonomic Relation Classification.
Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing, 2010

2009
Relation Alignment for Textual Entailment Recognition.
Proceedings of the Second Text Analysis Conference, 2009

2006
A Pipeline Model for Bottom-Up Dependency Parsing.
Proceedings of the Tenth Conference on Computational Natural Language Learning, 2006

A Pipeline Framework for Dependency Parsing.
Proceedings of the ACL 2006, 2006


  Loading...