Van-Hau Pham

Orcid: 0000-0003-3147-3356

According to our database1, Van-Hau Pham authored at least 69 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
FedChain-Hunter: A reliable and privacy-preserving aggregation for federated threat hunting framework in SDN-based IIoT.
Internet Things, December, 2023

Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks.
J. Inf. Secur. Appl., May, 2023

Raijū: Reinforcement Learning-Guided Post-Exploitation for Automating Security Assessment of Network Systems.
CoRR, 2023

XGV-BERT: Leveraging Contextualized Language Model and Graph Neural Network for Efficient Software Vulnerability Detection.
CoRR, 2023

On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors.
CoRR, 2023

Fed-LSAE: Thwarting Poisoning Attacks against Federated Cyber Threat Detection System via Autoencoder-based Latent Space Inspection.
CoRR, 2023

XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN.
CoRR, 2023

VulnSense: Efficient Vulnerability Detection in Ethereum Smart Contracts by Multimodal Learning with Graph Neural Network and Language Model.
CoRR, 2023

Shark-Eyes: A multimodal fusion framework for multi-view-based phishing website detection.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023

DoppelSearch: A Novel Approach to Content-Based Video Retrieval for AI Challenge HCMC 2023.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023

Binary Representation Embedding and Deep Learning For Binary Code Similarity Detection in Software Security Domain.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023

BlazeSearch: A multimomal semantic search engine for retrieving in-video information for AI Challenge HCMC 2023.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023

WebGuardRL: An Innovative Reinforcement Learning-based Approach for Advanced Web Attack Detection.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023

DeFL-BC: Empowering Reliable Cyberattack Detection through Decentralized Federated Learning and Poisoning Attack Defense.
Proceedings of the International Conference on Computing and Communication Technologies, 2023

On the effectiveness of transferability of adversarial Android malware samples against learning-based detectors.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2023

MalDEX: An Explainable Malware Detection System Based on Ensemble Learning.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2023

XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph.
Proceedings of the Information Security Practice and Experience, 2023

FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems Using Autoencoder-Based Latent Space Representations.
Proceedings of the Information Security Practice and Experience, 2023

A Consensus Protocol for Incentivizing Contribution from Decentralized Community for Machine Learning-based Scamming Website Detection.
Proceedings of the International Conference on System Science and Engineering, 2023

Uncovering the Resilience of Binarized Spiking Neural Networks under Adversarial Attacks.
Proceedings of the 12th International Conference on Control, 2023

A Multimodal Deep Learning Approach for Efficient Vulnerability Detection in Smart Contracts.
Proceedings of the IEEE Global Communications Conference, 2023

MIDAS: A Multi-chain Interoperable Data and Access System for Healthcare.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023

2022
B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain.
J. Inf. Secur. Appl., 2022

Intrusion Detection with Big Data Analysis in SDN-Enabled Networks.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2022

A Privacy-Preserving Approach For Building Learning Models in Smart Healthcare using Blockchain and Federated Learning.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022

Leveraging Deep Learning Image Classifiers for Visual Similarity-based Phishing Website Detection.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022

A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022

Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware Detectors.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022

A federated threat hunting system with big data analysis for SDN-enabled networks.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022

Adversarial AutoEncoder and Generative Adversarial Networks for Semi-Supervised Learning Intrusion Detection System.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022

Cyber Threat Intelligence for Proactive Defense against Adversary in SDN-assisted IIoTs context.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022

Leveraging Deep Reinforcement Learning for Automating Penetration Testing in Reconnaissance and Exploitation Phase.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022

DA-GAN: Domain Adaptation for Generative Adversarial Networks-assisted Cyber Threat Detection.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022

A Blockchain-based approach and Attribute-based Encryption for Healthcare Record Data Exchange.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022

A Method for Flexible Definition and Automatic Implementation of Laboratory Environment in Online Training Platforms.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022

Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement Learning.
Proceedings of the Information Security Practice and Experience, 2022

Federated Learning-Based Cyber Threat Hunting for APT Attack Detection in SDN-Enabled Networks.
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022

Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN.
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022

uitXkernel: Android Kernel Forensic for Security Analysis Purposes.
ICO, 2022

2021
DIGFuPAS: Deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks.
Comput. Secur., 2021

A Deep Transfer Learning Approach for Flow-Based Intrusion Detection in SDN-Enabled Network.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Strengthening IDS against Evasion Attacks with GAN-based Adversarial Samples in SDN-enabled network.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2021

Empirical Study on Reconnaissance Attacks in SDN-aware Network for Evaluating Cyber Deception.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2021

Federated Learning-Based Intrusion Detection in the Context of IIoT Networks: Poisoning Attack and Defense.
Proceedings of the Network and System Security - 15th International Conference, 2021

A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System.
Proceedings of the Network and System Security - 15th International Conference, 2021

Detect Android malware by using deep learning: Experiment and Evaluation.
Proceedings of the ICMLSC '21: 2021 The 5th International Conference on Machine Learning and Soft Computing, 2021

2020
A survey on Blockchain-based applications for reforming data protection, privacy and security.
CoRR, 2020

Forensic analysis of TikTok application to seek digital artifacts on Android smartphone.
Proceedings of the 2020 RIVF International Conference on Computing and Communication Technologies, 2020

2019
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis.
Clust. Comput., 2019

Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique.
Clust. Comput., 2019

A Security-Enhanced Monitoring System for Northbound Interface in SDN using Blockchain.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019

A Software Defined Networking Approach for Guaranteeing Delay in Wi-Fi Networks.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019

Targeting Bufferbloat in Wi-Fi Networks: An Emulator-based Approach.
Proceedings of the 19th International Symposium on Communications and Information Technologies, 2019

Toward a Trust-Based Authentication Framework of Northbound Interface in Software Defined Networking.
Proceedings of the Industrial Networks and Intelligent Systems, 2019

Aloba: A Mechanism of Adaptive Load Balancing and Failure Recovery in Distributed SDN Controllers.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Detect Malware in Android Firmware Based on Distributed Network Environment.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

Proposing Automatic Dataset Generation System to Support Android Sensitive Data Leakage Detection Systems.
Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, 2019

2018
A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation.
Proceedings of the Ninth International Symposium on Information and Communication Technology, 2018

2017
Sensitive Data Leakage Detection in Pre-Installed Applications of Custom Android Firmware.
Proceedings of the 18th IEEE International Conference on Mobile Data Management, 2017

eDSDroid: A Hybrid Approach for Information Leak Detection in Android.
Proceedings of the Information Science and Applications 2017, 2017

Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic Analysis.
Proceedings of the Information Science and Applications 2017, 2017

2013
Parallel Two-Phase K-Means.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

2011
Honeypot trace forensics: The observation viewpoint matters.
Future Gener. Comput. Syst., 2011

2009
Honeypot Traces Forensics: The Observation Viewpoint Matters.
Proceedings of the Third International Conference on Network and System Security, 2009

The WOMBAT Attack Attribution Method: Some Results.
Proceedings of the Information Systems Security, 5th International Conference, 2009

2008
Understanding threats: a prerequisite to enhance survivability of computing systems.
Int. J. Crit. Infrastructures, 2008

The Quest for Multi-headed Worms.
Proceedings of the Detection of Intrusions and Malware, 2008

2006
Collection and analysis of attack data based on honeypots deployed on the Internet.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006


  Loading...