\n \n \n
\n
\n\n \n \n \n \n \n \n MemInspect2: OS-Independent Memory Forensics for IoT Devices in Cybercrime Investigations.\n \n \n \n \n\n\n \n Tran, A.; Nguyen, Q. T.; Nguyen, A.; and Tran, M.\n\n\n \n\n\n\n In Yao, Z.; Xu, S.; Ma, J.; Du, W.; and Lu, W., editor(s),
22nd IEEE/ACIS International Conference on Computer and Information Science, ICIS 2022, Zhuhai, China, June 26-28, 2022, pages 162–169, 2022. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ACISicis/TranNNT22,\n author = {Anh{-}Duy Tran and\n Quoc Thang Nguyen and\n Anh{-}Minh Nguyen and\n Minh{-}Triet Tran},\n editor = {Zheng{-}an Yao and\n Simon Xu and\n Jixin Ma and\n Wencai Du and\n Wei Lu},\n title = {MemInspect2: OS-Independent Memory Forensics for IoT Devices in Cybercrime\n Investigations},\n booktitle = {22nd {IEEE/ACIS} International Conference on Computer and Information\n Science, {ICIS} 2022, Zhuhai, China, June 26-28, 2022},\n pages = {162--169},\n publisher = {{IEEE}},\n year = {2022},\n url = {https://doi.org/10.1109/ICIS54925.2022.9882517},\n doi = {10.1109/ICIS54925.2022.9882517},\n timestamp = {Wed, 07 Dec 2022 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/ACISicis/TranNNT22.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Provably Secure User Authentication Scheme Over Unreliable Networks.\n \n \n \n \n\n\n \n Truong, T.; Tran, M.; Duong, A. D.; and Tran, A.\n\n\n \n\n\n\n In Barolli, L.; Hussain, F.; and Enokido, T., editor(s),
Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Sydney, NSW, Australia, 13-15 April 2022, Volume 1, volume 449, of
Lecture Notes in Networks and Systems, pages 602–613, 2022. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/aina/TruongTDT22,\n author = {Toan{-}Thinh Truong and\n Minh{-}Triet Tran and\n Anh Duc Duong and\n Anh{-}Duy Tran},\n editor = {Leonard Barolli and\n Farookh Hussain and\n Tomoya Enokido},\n title = {A Provably Secure User Authentication Scheme Over Unreliable Networks},\n booktitle = {Advanced Information Networking and Applications - Proceedings of\n the 36th International Conference on Advanced Information Networking\n and Applications (AINA-2022), Sydney, NSW, Australia, 13-15 April\n 2022, Volume 1},\n series = {Lecture Notes in Networks and Systems},\n volume = {449},\n pages = {602--613},\n publisher = {Springer},\n year = {2022},\n url = {https://doi.org/10.1007/978-3-030-99584-3\\_52},\n doi = {10.1007/978-3-030-99584-3\\_52},\n timestamp = {Wed, 07 Dec 2022 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/aina/TruongTDT22.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Towards an Attention-Based Threat Detection System for IoT Networks.\n \n \n \n \n\n\n \n Nguyen, T.; Dang, K.; Tran, A.; and Le, K.\n\n\n \n\n\n\n In Dang, T. K.; Küng, J.; and Chung, T. M., editor(s),
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications - 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022, Proceedings, volume 1688, of
Communications in Computer and Information Science, pages 301–315, 2022. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/fdse/NguyenDTL22,\n author = {Thanh{-}Nhan Nguyen and\n Khanh{-}Mai Dang and\n Anh{-}Duy Tran and\n Kim{-}Hung Le},\n editor = {Tran Khanh Dang and\n Josef K{\\"{u}}ng and\n Tai M. Chung},\n title = {Towards an Attention-Based Threat Detection System for IoT Networks},\n booktitle = {Future Data and Security Engineering. Big Data, Security and Privacy,\n Smart City and Industry 4.0 Applications - 9th International Conference,\n {FDSE} 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022, Proceedings},\n series = {Communications in Computer and Information Science},\n volume = {1688},\n pages = {301--315},\n publisher = {Springer},\n year = {2022},\n url = {https://doi.org/10.1007/978-981-19-8069-5\\_20},\n doi = {10.1007/978-981-19-8069-5\\_20},\n timestamp = {Sun, 04 Aug 2024 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/fdse/NguyenDTL22.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Multimodal Cheapfakes Detection by Utilizing Image Captioning for Global Context.\n \n \n \n \n\n\n \n La, T.; Tran, Q.; Tran, T.; Tran, A.; Dang-Nguyen, D.; and Dao, M.\n\n\n \n\n\n\n In Dao, M.; Dang-Nguyen, D.; and Riegler, M., editor(s),
ICDAR@ICMR 2022: Proceedings of the 3rd ACM Workshop on Intelligent Cross-Data Analysis and Retrieval, Newark, NJ, USA, June 27 - 30, 2022, pages 9–16, 2022. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mir/LaTTTDD22,\n author = {Tuan{-}Vinh La and\n Quang{-}Tien Tran and\n Thanh{-}Phuc Tran and\n Anh{-}Duy Tran and\n Duc{-}Tien Dang{-}Nguyen and\n Minh{-}Son Dao},\n editor = {Minh{-}Son Dao and\n Duc{-}Tien Dang{-}Nguyen and\n Michael Riegler},\n title = {Multimodal Cheapfakes Detection by Utilizing Image Captioning for\n Global Context},\n booktitle = {ICDAR@ICMR 2022: Proceedings of the 3rd {ACM} Workshop on Intelligent\n Cross-Data Analysis and Retrieval, Newark, NJ, USA, June 27 - 30,\n 2022},\n pages = {9--16},\n publisher = {{ACM}},\n year = {2022},\n url = {https://doi.org/10.1145/3512731.3534210},\n doi = {10.1145/3512731.3534210},\n timestamp = {Wed, 08 Mar 2023 16:35:14 +0100},\n biburl = {https://dblp.org/rec/conf/mir/LaTTTDD22.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Combination of Visual-Semantic Reasoning and Text Entailment-based Boosting Algorithm for Cheapfake Detection.\n \n \n \n \n\n\n \n La, T.; Dao, M.; Tran, Q.; Tran, T.; Tran, A.; and Dang-Nguyen, D.\n\n\n \n\n\n\n In Magalhães, J.; Bimbo, A. D.; Satoh, S.; Sebe, N.; Alameda-Pineda, X.; Jin, Q.; Oria, V.; and Toni, L., editor(s),
MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10 - 14, 2022, pages 7140–7144, 2022. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mm/LaDTTTD22,\n author = {Tuan{-}Vinh La and\n Minh{-}Son Dao and\n Quang{-}Tien Tran and\n Thanh{-}Phuc Tran and\n Anh{-}Duy Tran and\n Duc{-}Tien Dang{-}Nguyen},\n editor = {Jo{\\~{a}}o Magalh{\\~{a}}es and\n Alberto Del Bimbo and\n Shin'ichi Satoh and\n Nicu Sebe and\n Xavier Alameda{-}Pineda and\n Qin Jin and\n Vincent Oria and\n Laura Toni},\n title = {A Combination of Visual-Semantic Reasoning and Text Entailment-based\n Boosting Algorithm for Cheapfake Detection},\n booktitle = {{MM} '22: The 30th {ACM} International Conference on Multimedia, Lisboa,\n Portugal, October 10 - 14, 2022},\n pages = {7140--7144},\n publisher = {{ACM}},\n year = {2022},\n url = {https://doi.org/10.1145/3503161.3551595},\n doi = {10.1145/3503161.3551595},\n timestamp = {Sun, 12 Nov 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/mm/LaDTTTD22.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Textual-Visual-Entailment-based Unsupervised Algorithm for Cheapfake Detection.\n \n \n \n \n\n\n \n Tran, Q.; Tran, T.; Dao, M.; La, T.; Tran, A.; and Dang-Nguyen, D.\n\n\n \n\n\n\n In Magalhães, J.; Bimbo, A. D.; Satoh, S.; Sebe, N.; Alameda-Pineda, X.; Jin, Q.; Oria, V.; and Toni, L., editor(s),
MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10 - 14, 2022, pages 7145–7149, 2022. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mm/TranTDLTD22,\n author = {Quang{-}Tien Tran and\n Thanh{-}Phuc Tran and\n Minh{-}Son Dao and\n Tuan{-}Vinh La and\n Anh{-}Duy Tran and\n Duc{-}Tien Dang{-}Nguyen},\n editor = {Jo{\\~{a}}o Magalh{\\~{a}}es and\n Alberto Del Bimbo and\n Shin'ichi Satoh and\n Nicu Sebe and\n Xavier Alameda{-}Pineda and\n Qin Jin and\n Vincent Oria and\n Laura Toni},\n title = {A Textual-Visual-Entailment-based Unsupervised Algorithm for Cheapfake\n Detection},\n booktitle = {{MM} '22: The 30th {ACM} International Conference on Multimedia, Lisboa,\n Portugal, October 10 - 14, 2022},\n pages = {7145--7149},\n publisher = {{ACM}},\n year = {2022},\n url = {https://doi.org/10.1145/3503161.3551596},\n doi = {10.1145/3503161.3551596},\n timestamp = {Sun, 12 Nov 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/mm/TranTDLTD22.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Adversarial Attacks on Deepfake Detectors: A Practical Analysis.\n \n \n \n \n\n\n \n Vo, N. H.; Phan, K. D.; Tran, A.; and Dang-Nguyen, D.\n\n\n \n\n\n\n In Jónsson, B. Þ.; Gurrin, C.; Tran, M.; Dang-Nguyen, D.; Hu, A. M.; Binh, H. T. T.; and Huet, B., editor(s),
MultiMedia Modeling - 28th International Conference, MMM 2022, Phu Quoc, Vietnam, June 6-10, 2022, Proceedings, Part II, volume 13142, of
Lecture Notes in Computer Science, pages 318–330, 2022. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mmm/VoPTD22,\n author = {Ngan Hoang Vo and\n Khoa D. Phan and\n Anh{-}Duy Tran and\n Duc{-}Tien Dang{-}Nguyen},\n editor = {Bj{\\"{o}}rn {\\TH}{\\'{o}}r J{\\'{o}}nsson and\n Cathal Gurrin and\n Minh{-}Triet Tran and\n Duc{-}Tien Dang{-}Nguyen and\n Anita Min{-}Chun Hu and\n Huynh Thi Thanh Binh and\n Benoit Huet},\n title = {Adversarial Attacks on Deepfake Detectors: {A} Practical Analysis},\n booktitle = {MultiMedia Modeling - 28th International Conference, {MMM} 2022, Phu\n Quoc, Vietnam, June 6-10, 2022, Proceedings, Part {II}},\n series = {Lecture Notes in Computer Science},\n volume = {13142},\n pages = {318--330},\n publisher = {Springer},\n year = {2022},\n url = {https://doi.org/10.1007/978-3-030-98355-0\\_27},\n doi = {10.1007/978-3-030-98355-0\\_27},\n timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/mmm/VoPTD22.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Deep Reinforcement Learning Approach Using Customized Technical Indicators for A Pre-emerging Market: A Case Study of Vietnamese Stock Market.\n \n \n \n \n\n\n \n Nguyen, H. N.; Mac, B. N.; Tran, A.; Nguyen, N.; and Pham, D.\n\n\n \n\n\n\n In
RIVF International Conference on Computing and Communication Technologies, RIVF 2022, Ho Chi Minh City, Vietnam, December 20-22, 2022, pages 737–742, 2022. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/rivf/NguyenMTNP22,\n author = {Hoang{-}Thi Nguyen Nguyen and\n Bao{-}Ngoc Nguyen Mac and\n Anh{-}Duy Tran and\n Ngoc{-}Thao Nguyen and\n Duc{-}Thinh Pham},\n title = {Deep Reinforcement Learning Approach Using Customized Technical Indicators\n for {A} Pre-emerging Market: {A} Case Study of Vietnamese Stock Market},\n booktitle = {{RIVF} International Conference on Computing and Communication Technologies,\n {RIVF} 2022, Ho Chi Minh City, Vietnam, December 20-22, 2022},\n pages = {737--742},\n publisher = {{IEEE}},\n year = {2022},\n url = {https://doi.org/10.1109/RIVF55975.2022.10013836},\n doi = {10.1109/RIVF55975.2022.10013836},\n timestamp = {Mon, 05 Feb 2024 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/rivf/NguyenMTNP22.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n