Van Long Do

According to our database1, Van Long Do authored at least 11 papers between 2014 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Clock Synchronization in Passive Localization Systems using ADS-B Signals.
Proceedings of the 15th International Conference on Signal Processing and Communication Systems, 2021

2020
A Parallel Neural Network-based Scheme for Radar Emitter Recognition.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

A Hierarchical Convolution Neural Network Scheme for Radar Pulse Detection.
Proceedings of the 9th International Conference on Pattern Recognition Applications and Methods, 2020

A Deep Double-Q Learning-based Scheme for Anti-Jamming Communications.
Proceedings of the 28th European Signal Processing Conference, 2020

2019
TDOA-based Passive Tracking of Multiple Civilian Airplanes.
Proceedings of the 13th International Conference on Signal Processing and Communication Systems, 2019

Deep Learning for Radar Pulse Detection.
Proceedings of the 8th International Conference on Pattern Recognition Applications and Methods, 2019

2017
Statistical detection and isolation of cyber-physical attacks on SCADA systems.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Direction finding in multipath environments using moving uniform circular arrays.
Proceedings of the 3rd International Conference on Frontiers of Signal Processing, 2017

2015
Sequential Detection and Isolation of Cyber-physical Attacks on SCADA Systems. (Détection et localisation séquentielle d'attaques cyber-physiques aux systèmes SCADA).
PhD thesis, 2015

Sensitivity analysis of the sequential test for detecting cyber-physical attacks.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
A statistical method for detecting cyber/physical attacks on SCADA systems.
Proceedings of the 2014 IEEE Conference on Control Applications, 2014


  Loading...