Thanh Ha Le

According to our database1, Thanh Ha Le authored at least 38 papers between 2006 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks.
IACR Cryptol. ePrint Arch., 2019

A Hierarchical Deep Deterministic Policy Gradients for Swarm Navigation.
Proceedings of the 11th International Conference on Knowledge and Systems Engineering, 2019

Reinforcement Learning Based Navigation with Semantic Knowledge of Indoor Environments.
Proceedings of the 11th International Conference on Knowledge and Systems Engineering, 2019

Sharing Experience in Multitask Reinforcement Learning.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Discriminate Natural versus Loudspeaker Emitted Speech.
Proceedings of the IEEE International Conference on Acoustics, 2019

Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis.
Proceedings of the 3rd ACM Workshop on Software Protection, 2019

2018
Compressive Online Video Background-Foreground Separation Using Multiple Prior Information and Optical Flow.
J. Imaging, 2018

View synthesis method for 3D video coding based on temporal and inter view correlation.
IET Image Process., 2018

Pavement Crack Detection using Convolutional Neural Network.
Proceedings of the Ninth International Symposium on Information and Communication Technology, 2018

Vision Memory for Target Object Navigation Using Deep Reinforcement Learning: An Empirical Study.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Real-Time Image Semantic Segmentation Networks with Residual Depth-Wise Separable Blocks.
Proceedings of the 2018 Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) and 19th International Symposium on Advanced Intelligent Systems (ISIS), 2018

DoSE: Deobfuscation based on Semantic Equivalence.
Proceedings of the 8th Software Security, 2018

2017
A new depth image quality metric using a pair of color and depth images.
Multim. Tools Appl., 2017

Compressive Online Robust Principal Component Analysis with Optical Flow for Video Foreground-Background Separation.
Proceedings of the Eighth International Symposium on Information and Communication Technology, 2017

Moving Object Detection in Compressed Domain for High Resolution Videos.
Proceedings of the Eighth International Symposium on Information and Communication Technology, 2017

2016
Single camera based fall detection using motion and human shape features.
Proceedings of the Seventh Symposium on Information and Communication Technology, 2016

FISSC: A Fault Injection and Simulation Secure Collection.
Proceedings of the Computer Safety, Reliability, and Security, 2016

2015
A novel simulation approach for fault injection resistance evaluation on smart cards.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

2014
Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage.
IEICE Trans. Electron., 2014

Electromagnetic analysis, deciphering and reverse engineering of integrated circuits (E-MATA HARI).
Proceedings of the 22nd International Conference on Very Large Scale Integration, 2014

Forecasting moving object position based on temporal patterns.
Proceedings of the 2014 International Conference on Indoor Positioning and Indoor Navigation, 2014

Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Idea: Embedded Fault Injection Simulator on Smartcard.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

High-Level Simulation for Multiple Fault Injection Evaluation.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

2013
Power Analysis of Hardware Implementations Protected with Secret Sharing.
IACR Cryptol. ePrint Arch., 2013

Trademark image retrieval based on scale, rotation, translation invariant features.
Proceedings of the 2013 IEEE RIVF International Conference on Computing and Communication Technologies, 2013

Particulate Matter Concentration Estimation from Satellite Aerosol and Meteorological Parameters: Data-Driven Approaches.
Proceedings of the Knowledge and Systems Engineering, 2013

Exploring the Relations between Fault Sensitivity and Power Consumption.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Protecting AES against side-channel analysis using wire-tap codes.
J. Cryptogr. Eng., 2012

Profiled Model Based Power Simulator for Side Channel Evaluation.
IACR Cryptol. ePrint Arch., 2012

2011
"Re-synchronization by moments": An efficient solution to align Side-Channel traces.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Blur Estimation for Barcode Recognition in Out-of-Focus Images.
Proceedings of the Pattern Recognition and Machine Intelligence, 2011

2010
Mutual Information Analysis under the View of Higher-Order Statistics.
Proceedings of the Advances in Information and Computer Security, 2010

2008
An overview of side channel analysis attacks.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant.
IEEE Trans. Inf. Forensics Secur., 2007

Novel Approaches for Improving the Power Consumption Models in Correlation Analysis.
IACR Cryptol. ePrint Arch., 2007

Efficient Solution for Misalignment of Signal in Side Channel Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
A Proposition for Correlation Power Analysis Enhancement.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006


  Loading...