Thanh Bui

Orcid: 0000-0002-5137-8551

According to our database1, Thanh Bui authored at least 17 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Ergo, SMIRK is safe: a safety case for a machine learning component in a pedestrian automatic emergency brake system.
Softw. Qual. J., June, 2023

2021
Security Failures in Modern Software.
PhD thesis, 2021

2020
Rotat3D: A Knowledge Graph Embedding using Relational Rotation in 3D Vector Space.
Proceedings of the 12th International Conference on Knowledge and Systems Engineering, 2020

XSS Vulnerabilities in Cloud-Application Add-Ons.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Client-Side Vulnerabilities in Commercial VPNs.
Proceedings of the Secure IT Systems, 2019

Analysis of Topology Poisoning Attacks in Software-Defined Networking.
Proceedings of the Secure IT Systems, 2019

Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet.
Proceedings of the 12th European Workshop on Systems Security, 2019

Designing HMIs for an active safety system on bicycles.
Proceedings of the Adjunct Proceedings of the 11th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2019

2018
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer.
Proceedings of the 27th USENIX Security Symposium, 2018

Building a Hyperspectral Library and its Incorporation into Sparse Unmixing for Mineral Identification.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Application of Public Ledgers to Revocation in Distributed Access Control.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Key Exchange with the Help of a Public Ledger.
Proceedings of the Security Protocols XXV, 2017

Key Exchange with the Help of a Public Ledger (Transcript of Discussion).
Proceedings of the Security Protocols XXV, 2017

GPASS: A Password Manager with Group-Based Access Control.
Proceedings of the Secure IT Systems, 2017

2015
Analysis of Docker Security.
CoRR, 2015

SpotShare and nearbyPeople: applications of the Social PaL framework.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015


  Loading...