Tran Khanh Dang

Orcid: 0000-0002-7282-3589

Affiliations:
  • Van Lang University (VLU), Ho Chi Minh City, Vietnam
  • HCMC University of Industry and Trade (HUIT), Ho Chi Minh City, Vietnam (former)
  • HCMC University of Technology, VNUHCM, Ho Chi Minh City, Vietnam (former)


According to our database1, Tran Khanh Dang authored at least 156 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Pragmatic Privacy-Preserving Deep Learning Framework Satisfying Differential Privacy.
SN Comput. Sci., January, 2024

A review of in-memory computing for machine learning: architectures, options.
Int. J. Web Inf. Syst., 2024

Money Laundering Detection Using A Transaction-Based Graph Learning Approach.
Proceedings of the 18th International Conference on Ubiquitous Information Management and Communication, 2024

2023
Enhancing Big Data Conversion Validation with Alpha-Lightweight Coreset.
SN Comput. Sci., November, 2023

VNLES: A Reasoning-enable Legal Expert System using Ontology Modeling-based Method: A Case Study of Vietnam Criminal Code.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023

Differential Privacy Under Membership Inference Attacks.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023

An Enhanced Incentive Mechanism for Crowdsourced Federated Learning Based on Contract Theory and Shapley Value.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023

Differential Privacy for Consumer Data in Retail Data Partnerships.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023

2022
A Deeper Analysis of the Hierarchical Clustering and Set Unionability-Based Data Union Method.
SN Comput. Sci., 2022

A Hybrid Approach Using Decision Tree and Multiple Linear Regression for Predicting Students' Performance Based on Learning Progress and Behavior.
SN Comput. Sci., 2022

Inference attacks based on GAN in federated learning.
Int. J. Web Inf. Syst., 2022

Machine Learning for Multi-Classification of Botnets Attacks.
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022

Alpha Lightweight Coreset for k-Means Clustering.
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022

pPATE: A Pragmatic Private Aggregation of Teacher Ensembles Framework by Sparse Vector Technique Based Differential Privacy, Paillier Cryptosystem and Human-in-the-loop.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2022

In-Memory Computing Architectures for Big Data and Machine Learning Applications.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2022

Implement the Data Conversion System by Using α-Lightweight Coreset for Validation Process.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2022

Secure Recommender System based on Neural Collaborative Filtering and Federated Learning.
Proceedings of the 2022 International Conference on Advanced Computing and Analytics (ACOMPA), 2022

2021
An Elastic Data Conversion Framework: A Case Study for MySQL and MongoDB.
SN Comput. Sci., 2021

A lightweight authentication protocol for D2D-enabled IoT systems with privacy.
Pervasive Mob. Comput., 2021

Guest editorial.
Int. J. Web Inf. Syst., 2021

An effective and elastic blockchain-based provenance preserving solution for the open data.
Int. J. Web Inf. Syst., 2021

Machine Learning for Prediction of Imbalanced Data: Credit Fraud Detection.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

Non-Invertibility for Random Projection based Biometric Template Protection Scheme.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

Intermediate Data Format for the Elastic Data Conversion Framework.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

On Using Cryptographic Technologies in Privacy Protection of Online Conferencing Systems.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2021

A Data Union Method Using Hierarchical Clustering and Set Unionability.
Proceedings of the Future Data and Security Engineering - 8th International Conference, 2021

A Hybrid Approach Using Decision Tree and Multiple Linear Regression for Predicting Students' Performance.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2021

Motorbike Counting in Heavily Crowded Scenes.
Proceedings of the Future Data and Security Engineering - 8th International Conference, 2021

Comprehensive Analysis of Privacy in Black-Box and White-Box Inference Attacks Against Generative Adversarial Network.
Proceedings of the Future Data and Security Engineering - 8th International Conference, 2021

Privacy-Preserving Attribute-Based Access Control in Education Information Systems.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2021

Open<sup>K</sup>: An Elastic Data Cleansing System with A Clustering-based Data Anomaly Detection Approach.
Proceedings of the 15th International Conference on Advanced Computing and Applications, 2021

Implementation and Evaluation of PartyCrasher<sup>BLE</sup>: An Energy-Efficient and Privacy-Preserving Authentication Protocol for BLE Devices.
Proceedings of the 15th International Conference on Advanced Computing and Applications, 2021

2020
A Lightweight Indexing Approach for Efficient Batch Similarity Processing with MapReduce.
SN Comput. Sci., 2020

A Comparative Study of the Some Methods Used in Constructing Coresets for Clustering Large Datasets.
SN Comput. Sci., 2020

Security and Privacy Issues in Deep Learning: A Brief Review.
SN Comput. Sci., 2020

A Study of Deep Learning-Based Approaches for Session-Based Recommendation Systems.
SN Comput. Sci., 2020

Interaction and Visualization Design for User Privacy Interface on Online Social Networks.
SN Comput. Sci., 2020

XACs-DyPol: Towards an XACML-based Access Control Model for Dynamic Security Policy.
CoRR, 2020

A Farthest First Traversal based Sampling Algorithm for k-clustering.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

A Three-Way Energy Efficient Authentication Protocol Using Bluetooth Low Energy.
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020

An Elastic Anonymization Framework for Open Data.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2020

An Elastic Data Conversion Framework for Data Integration System.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2020

A Pragmatic Blockchain Based Solution for Managing Provenance and Characteristics in the Open Data Context.
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020

Investigating Local Differential Privacy and Generative Adversarial Network in Collecting Data.
Proceedings of the International Conference on Advanced Computing and Applications, 2020

Data Poisoning Attack on Deep Neural Network and Some Defense Methods.
Proceedings of the International Conference on Advanced Computing and Applications, 2020

2019
A Parallel Incremental Frequent Itemsets Mining IFIN+: Improvement and Extensive Evaluation.
Trans. Large Scale Data Knowl. Centered Syst., 2019

The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach.
Secur. Commun. Networks, 2019

On verifying the authenticity of e-commercial crawling data by a semi-crosschecking method.
Int. J. Web Inf. Syst., 2019

Flow aggregation for SDN-based delay-insensitive traffic control in mobile core networks.
IET Commun., 2019

Privacy preserving biometric-based remote authentication with secure processing unit on untrusted server.
IET Biom., 2019

Secure Biometric-based Remote Authentication Protocol using Chebyshev Polynomials and Fuzzy Extractor.
CoRR, 2019

A Visual Model for Web Applications Security Monitoring.
CoRR, 2019

A New Biometric Template Protection Using Random Orthonormal Projection and Fuzzy Commitment.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019

Dynamic Data Management Strategy on Cloud Network by Fog Computing Model.
Proceedings of the Future Data and Security Engineering - 6th International Conference, 2019

Resource-Constrained IoT Authentication Protocol: An ECC-Based Hybrid Scheme for Device-to-Server and Device-to-Device Communications.
Proceedings of the Future Data and Security Engineering - 6th International Conference, 2019

A Comparative Study of the Use of Coresets for Clustering Large Datasets.
Proceedings of the Future Data and Security Engineering - 6th International Conference, 2019

Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains.
Proceedings of the Future Data and Security Engineering - 6th International Conference, 2019

Visualizing Access Logs of a Scientific Digital Library Effectively as Multiple Time Series Using Modified Horizon Graphs.
Proceedings of the 2019 International Conference on Advanced Computing and Applications, 2019

Differential Privacy in Deep Learning: An Overview.
Proceedings of the 2019 International Conference on Advanced Computing and Applications, 2019

2018
A hybrid template protection approach using secure sketch and ANN for strong biometric key generation with revocability guarantee.
Int. Arab J. Inf. Technol., 2018

A Light-Weight Tightening Authentication Scheme for the Objects' Encounters in the Meetings.
Proceedings of the Future Data and Security Engineering - 5th International Conference, 2018

An Efficient Batch Similarity Processing with MapReduce.
Proceedings of the Future Data and Security Engineering - 5th International Conference, 2018

Motorbike Detection in Urban Environment.
Proceedings of the Future Data and Security Engineering - 5th International Conference, 2018

An effective flow aggregation for SDN-based background and foreground traffic control.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

A Context-Aware Privacy-Preserving Solution for Location-Based Services.
Proceedings of the 2018 International Conference on Advanced Computing and Applications, 2018

2017
Towards a Fine-Grained Privacy-Enabled Attribute-Based Access Control Mechanism.
Trans. Large Scale Data Knowl. Centered Syst., 2017

Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol.
Trans. Large Scale Data Knowl. Centered Syst., 2017

Using JSON to Specify Privacy Preserving-Enabled Attribute-Based Access Control Policies.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

An Iterative Algorithm for Computing Shortest Paths Through Line Segments in 3D.
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017

IFIN+: A Parallel Incremental Frequent Itemsets Mining in Shared-Memory Environment.
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017

Incremental Frequent Itemsets Mining with IPPC Tree.
Proceedings of the Database and Expert Systems Applications, 2017

A NoSQL Data-Based Personalized Recommendation System for C2C e-Commerce.
Proceedings of the Database and Expert Systems Applications, 2017

2016
An Adaptive Similarity Search in Massive Datasets.
Trans. Large Scale Data Knowl. Centered Syst., 2016

Enhance fuzzy vault security using nonrandom chaff point generator.
Inf. Process. Lett., 2016

Cancellable fuzzy vault with periodic transformation for biometric template protection.
IET Biom., 2016

Chaff point generation mechanism for improving fuzzy vault security.
IET Biom., 2016

Face Quality Measure for Face Authentication.
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016

Fine Grained Attribute Based Access Control Model for Privacy Protection.
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016

Delay-insensitive traffic detection and transfer on network edges.
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016

eHSim: An Efficient Hybrid Similarity Search with MapReduce.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

A Cross-Checking Based Method for Fraudulent Detection on E-Commercial Crawling Data.
Proceedings of the 2016 International Conference on Advanced Computing and Applications, 2016

Rew-XAC: An Approach to Rewriting Request for Elastic ABAC Enforcement with Dynamic Policies.
Proceedings of the 2016 International Conference on Advanced Computing and Applications, 2016

2015
Location Privacy-Aware Nearest-Neighbor Query with Complex Cloaked Regions.
Polibits, 2015

A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation.
Proceedings of the Information and Communication Technology, 2015

An Efficient Document Indexing-Based Similarity Search in Large Datasets.
Proceedings of the Future Data and Security Engineering - Second International Conference, 2015

KUR-Algorithm: From Position to Trajectory Privacy Protection in Location-Based Applications.
Proceedings of the Database and Expert Systems Applications, 2015

Combining Fuzzy Extractor in Biometric-Kerberos Based Authentication Protocol.
Proceedings of the 2015 International Conference on Advanced Computing and Applications, 2015

Extending Web Application IDS Interface: Visualizing Intrusions in Geographic and Web Space.
Proceedings of the 2015 International Conference on Advanced Computing and Applications, 2015

2014
Protecting Biometric Features by Periodic Function-Based Transformation and Fuzzy Vault.
Trans. Large Scale Data Knowl. Centered Syst., 2014

Visualizing Web Attack Scenarios in Space and Time Coordinate Systems.
Trans. Large Scale Data Knowl. Centered Syst., 2014

A Path-Consistency based Algorithm for Anomaly Detection of Spatial Constraints in GeoXACML Policies.
J. Mobile Multimedia, 2014

Editorial.
J. Mobile Multimedia, 2014

Towards a flexible framework to support a generalized extension of XACML for spatio-temporal RBAC model with reasoning ability.
Int. J. Web Inf. Syst., 2014

A Hash-Based Index Method for Securing Biometric Fuzzy Vaults.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

B<sup>dHCO</sup>-tree: integrating location privacy protection algorithms for frequent updates of moving objects.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems.
Proceedings of the Information and Communication Technology, 2014

An Elastic Approximate Similarity Search in Very Large Datasets with MapReduce.
Proceedings of the Data Management in Cloud, Grid and P2P Systems, 2014

An Efficient Similarity Search in Large Data Collections with MapReduce.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

2013
Visualization of web form submissions for security analysis.
Int. J. Web Inf. Syst., 2013

A survey on security visualization techniques for web information systems.
Int. J. Web Inf. Syst., 2013

An OpenLS privacy-aware middleware supporting location-based applications.
Int. J. Pervasive Comput. Commun., 2013

A Hilbert-based framework for preserving privacy in location-based services.
Int. J. Intell. Inf. Database Syst., 2013

Enhanced security in internet voting protocol using blind signature and dynamic ballots.
Electron. Commer. Res., 2013

A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Semantic-Aware Obfuscation for Location Privacy at Database Level.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Towards a Flexible Framework to Support a Generalized Extension of XACML for Spatio-temporal RBAC Model with Reasoning Ability.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Hybrid Stop Discovery in Trajectory Records.
Proceedings of the 24th International Workshop on Database and Expert Systems Applications, 2013

Utilizing Spatio-temporal Data Index for Location Privacy Protection.
Proceedings of the 24th International Workshop on Database and Expert Systems Applications, 2013

2012
Anonymizing but Deteriorating Location Databases.
Polibits, 2012

Semantic B<sup>ob</sup>-tree: a new obfuscation technique for location privacy protection.
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012

Enhanced security in internet voting protocol using blind signatures and dynamic ballots.
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012

An open design privacy-enhancing platform supporting location-based applications.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

X-STROWL: A generalized extension of XACML for context-aware spatio-temporal RBAC model with OWL.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

STRoBAC - Spatial Temporal Role Based Access Control.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012

A Novel Trajectory Privacy-Preserving Future Time Index Structure in Moving Object Databases.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012

2011
OST-Tree: An Access Method for Obfuscating Spatio-Temporal Data in Location Based Services.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Protecting Privacy While Discovering and Maintaining Association Rules.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

User Privacy Protection from Trajectory Perspective in Location-Based Applications.
Proceedings of the Interdisciplinarity in Complex Systems, 2011

On Guaranteeing k-Anonymity in Location Databases.
Proceedings of the Database and Expert Systems Applications, 2011

B<sup>ob</sup>-Tree: An Efficient B<sup> + </sup>-Tree Based Index Structure for Geographic-Aware Obfuscation.
Proceedings of the Intelligent Information and Database Systems, 2011

2010
An Adaptive Grid-Based Approach to Location Privacy Preservation.
Proceedings of the Advances in Intelligent Information and Database Systems, 2010

Towards Side-Effects-free Database Penetration Testing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Memorizing Algorithm: Protecting User Privacy using Historical Information of Location-Based Services.
Int. J. Mob. Comput. Multim. Commun., 2010

eM<sup>2</sup>: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

Two Novel Adaptive Symbolic Representations for Similarity Search in Time Series Databases.
Proceedings of the Advances in Web Technologies and Applications, 2010

HOT <i>a</i>SAX: A Novel Adaptive Symbolic Representation for Time Series Discords Discovery.
Proceedings of the Intelligent Information and Database Systems, 2010

2009
An Extended Payment Model for M-Commerce with Fair Non-Repudiation Protocols.
Polibits, 2009

Security Visualization for peer-to-peer resource sharing applications
CoRR, 2009

Privacy preserving through a memorizing algorithm in location-based services.
Proceedings of the MoMM'2009, 2009

BiB<sup>+</sup>-tree: an efficient multiversion access method for bitemporal databases.
Proceedings of the iiWAS'2009, 2009

Detecting, Monitoring and Preventing Database Security Breaches in a Housing-Based Outsourcing Model.
Proceedings of the Modeling, 2009

Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data.
Proceedings of the Database Technologies: Concepts, 2009

2008
An Extended Video Database Model for Supporting Finer-Grained Multi-Policy and Multi-Level Access Controls.
Polibits, 2008

A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases.
J. Softw., 2008

Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data.
Inf. Resour. Manag. J., 2008

2007
Solving approximate similarity queries.
Comput. Syst. Sci. Eng., 2007

An Extended Payment Model with Fair Non-Repudiation Protocols for M-Commerce.
Proceedings of the MoMM'2007, 2007

An Extensible Framework for Database Security Assessment and Visualization.
Proceedings of the iiWAS'2007, 2007

A Novel Approach to Fine-grained Content-based Access Control for Video Databases.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Query Assurance Verification for Dynamic Outsourced XML Databases.
Proceedings of the The Second International Conference on Availability, 2007

2006
The SH-Tree: A Novel and Flexible Super Hybrid Index Structure for Similarity Search on Multidimensional Data.
Int. J. Comput. Sci. Appl., 2006

A practical solution to supporting oblivious basic operations on dynamic outsourced search trees.
Comput. Syst. Sci. Eng., 2006

Providing Query Assurance for Outsourced Tree-Indexed Data.
Proceedings of the Modeling, 2006

2005
Oblivious Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers.
Int. J. Comput. Sci. Appl., 2005

Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers.
Proceedings of the Trust Management, Third International Conference, 2005

Privacy-Preserving Basic Operations on Outsourced Search Trees.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

2004
Extreme Security Protocols for Outsourcing Database Services.
Proceedings of the iiWAS'2004, 2004

2003
A Quick Review: What Have Been Presented at DEXA International Conferences?
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

2002
A General and Efficient Approach for Solving Nearest Neighbor Problem in the Vague Query System.
Proceedings of the Advances in Web-Age Information Management, 2002

An Efficient Incremental Lower Bound Approach for Solving Approximate Nearest-Neighbor Problem of Complex Vague Queries.
Proceedings of the Flexible Query Answering Systems, 5th International Conference, 2002

ISA - An Incremental Hyper-sphere Approach for Efficiently Solving Complex Vague Queries.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

2001
The SH-tree: A Super Hybrid Index Structure for Multidimensional Data.
Proceedings of the Database and Expert Systems Applications, 12th International Conference, 2001


  Loading...