Tran Thao Phuong

Orcid: 0000-0002-1801-8810

According to our database1, Tran Thao Phuong authored at least 38 papers between 2012 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Enhancing Boundary Attack in Adversarial Image Using Square Random Constraint.
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022

Multi-factor Behavioral Authentication Using Correlations Enhanced by Neural Network-based Score Fusion.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data.
IEEE Trans. Big Data, 2021

Machine Translated Text Detection Through Text Similarity with Round-Trip Translation.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

OPA2D: One-Pixel Attack, Detection, and Defense in Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2021

Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Lifestyle Authentication Using a Correlation Between Activity and GPS/Wi-Fi Data.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Influences of Temporal Factors on GPS-based Human Mobility Lifestyle.
CoRR, 2020

Location-based Behavioral Authentication Using GPS Distance Coherence.
CoRR, 2020

Improving Homograph Attack Classification.
CoRR, 2020

Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Enhanced Classification Method for Homograph Attack Detection.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

Predicting Smartphone Users' Future Locations through Deep Reinforcement Learning.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

GPS-Based Behavioral Authentication Utilizing Distance Coherence.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

Self-enhancing GPS-Based Authentication Using Corresponding Address.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

Enhancing A New Classification for IDN Homograph Attack Detection.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Effects of Temporal Factors on Human Mobility Lifestyle Through GPS Information.
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020

Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

Human Factors in Homograph Attack Recognition.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Identifying Adversarial Sentences by Analyzing Text Complexity.
CoRR, 2019

Peek-a-boo, I Can See You, Forger: Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition.
CoRR, 2019

Detecting Malicious Websites by Query Templates.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Detecting Machine-Translated Text using Back Translation.
Proceedings of the 12th International Conference on Natural Language Generation, 2019

Detecting Machine-Translated Paragraphs by Matching Similar Words.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2019

2017
Classification of Landing and Distribution Domains Using Whois' Text Mining.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Robust ORAM: Enhancing Availability, Confidentiality and Integrity.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Anonymous and analysable web browsing.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

2016
D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability.
IEICE Trans. Inf. Syst., 2016

ELAR: extremely lightweight auditing and repairing for cloud security.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability.
Int. J. Distributed Sens. Networks, 2015

ND-POR: A POR Based on Network Coding and Dispersal Coding.
IEICE Trans. Inf. Syst., 2015

POR-2P: Network Coding-Based POR for Data Provision-Payment System.
Proceedings of the Risks and Security of Internet and Systems, 2015

DD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of Retrievability.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

SW-SSS: Slepian-Wolf Coding-Based Secret Sharing Scheme.
Proceedings of the International Joint Conference, 2015

2014
SW-POR: A Novel POR Scheme Using Slepian-Wolf Coding for Cloud Storage.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

A New Efficient and Secure POR Scheme Based on Network Coding.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2012
Improvement of multi-user searchable encrypted data scheme.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012


  Loading...