var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https://dblp.org/pid/306/0533.bib&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https://dblp.org/pid/306/0533.bib&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https://dblp.org/pid/306/0533.bib&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Ookpik- A Collection of Out-of-Context Image-Caption Pairs.\n \n \n \n \n\n\n \n Pham, K.; Nguyen-Nhat, M.; Dinh, A.; Le, Q.; Nguyen, M.; Tran, A.; Tran, M.; and Dang-Nguyen, D.\n\n\n \n\n\n\n In Rudinac, S.; Hanjalic, A.; Liem, C. C. S.; Worring, M.; Jónsson, B. Þ.; Liu, B.; and Yamakata, Y., editor(s), MultiMedia Modeling - 30th International Conference, MMM 2024, Amsterdam, The Netherlands, January 29 - February 2, 2024, Proceedings, Part IV, volume 14557, of Lecture Notes in Computer Science, pages 132–144, 2024. Springer\n \n\n\n\n
\n\n\n\n \n \n \"Ookpik-Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mmm/PhamNDLNTTD24,\n  author       = {Kha{-}Luan Pham and\n                  Minh{-}Khoi Nguyen{-}Nhat and\n                  Anh{-}Huy Dinh and\n                  Quang{-}Tri Le and\n                  Manh{-}Thien Nguyen and\n                  Anh{-}Duy Tran and\n                  Minh{-}Triet Tran and\n                  Duc{-}Tien Dang{-}Nguyen},\n  editor       = {Stevan Rudinac and\n                  Alan Hanjalic and\n                  Cynthia C. S. Liem and\n                  Marcel Worring and\n                  Bj{\\"{o}}rn {\\TH}{\\'{o}}r J{\\'{o}}nsson and\n                  Bei Liu and\n                  Yoko Yamakata},\n  title        = {Ookpik- {A} Collection of Out-of-Context Image-Caption Pairs},\n  booktitle    = {MultiMedia Modeling - 30th International Conference, {MMM} 2024, Amsterdam,\n                  The Netherlands, January 29 - February 2, 2024, Proceedings, Part\n                  {IV}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {14557},\n  pages        = {132--144},\n  publisher    = {Springer},\n  year         = {2024},\n  url          = {https://doi.org/10.1007/978-3-031-53302-0\\_10},\n  doi          = {10.1007/978-3-031-53302-0\\_10},\n  timestamp    = {Sat, 02 Mar 2024 21:19:05 +0100},\n  biburl       = {https://dblp.org/rec/conf/mmm/PhamNDLNTTD24.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Detecting Cheapfakes using Self-Query Adaptive-Context Learning.\n \n \n \n \n\n\n \n Pham, K.; Nguyen, M.; Tran, A.; Dao, M.; and Dang-Nguyen, D.\n\n\n \n\n\n\n In Habault, G.; Dao, M.; Riegler, M. A.; Dang-Nguyen, D.; Nakashima, Y.; and Gurrin, C., editor(s), Proceedings of the 4th ACM Workshop on Intelligent Cross-Data Analysis and Retrieval, ICDAR 2023, Thessaloniki, Greece, June 12-15, 2023, pages 60–63, 2023. ACM\n \n\n\n\n
\n\n\n\n \n \n \"DetectingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdar2/PhamNTDD23,\n  author       = {Kha{-}Luan Pham and\n                  Manh{-}Thien Nguyen and\n                  Anh{-}Duy Tran and\n                  Minh{-}Son Dao and\n                  Duc{-}Tien Dang{-}Nguyen},\n  editor       = {Guillaume Habault and\n                  Minh{-}Son Dao and\n                  Michael Alexander Riegler and\n                  Duc{-}Tien Dang{-}Nguyen and\n                  Yuta Nakashima and\n                  Cathal Gurrin},\n  title        = {Detecting Cheapfakes using Self-Query Adaptive-Context Learning},\n  booktitle    = {Proceedings of the 4th {ACM} Workshop on Intelligent Cross-Data Analysis\n                  and Retrieval, {ICDAR} 2023, Thessaloniki, Greece, June 12-15, 2023},\n  pages        = {60--63},\n  publisher    = {{ACM}},\n  year         = {2023},\n  url          = {https://doi.org/10.1145/3592571.3592972},\n  doi          = {10.1145/3592571.3592972},\n  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/icdar2/PhamNTDD23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Practical Analyses of How Common Social Media Platforms and Photo Storage Services Handle Uploaded Images.\n \n \n \n \n\n\n \n Dang-Nguyen, D.; Sjøen, V. V.; Le, D.; Dao, T.; Tran, A.; and Tran, M.\n\n\n \n\n\n\n In Dang-Nguyen, D.; Gurrin, C.; Larson, M. A.; Smeaton, A. F.; Rudinac, S.; Dao, M.; Trattner, C.; and Chen, P., editor(s), MultiMedia Modeling - 29th International Conference, MMM 2023, Bergen, Norway, January 9-12, 2023, Proceedings, Part II, volume 13834, of Lecture Notes in Computer Science, pages 164–176, 2023. Springer\n \n\n\n\n
\n\n\n\n \n \n \"PracticalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mmm/Dang-NguyenSLDT23,\n  author       = {Duc{-}Tien Dang{-}Nguyen and\n                  Vegard Velle Sj{\\o}en and\n                  Dinh{-}Hai Le and\n                  Thien{-}Phu Dao and\n                  Anh{-}Duy Tran and\n                  Minh{-}Triet Tran},\n  editor       = {Duc{-}Tien Dang{-}Nguyen and\n                  Cathal Gurrin and\n                  Martha A. Larson and\n                  Alan F. Smeaton and\n                  Stevan Rudinac and\n                  Minh{-}Son Dao and\n                  Christoph Trattner and\n                  Phoebe Chen},\n  title        = {Practical Analyses of How Common Social Media Platforms and Photo\n                  Storage Services Handle Uploaded Images},\n  booktitle    = {MultiMedia Modeling - 29th International Conference, {MMM} 2023, Bergen,\n                  Norway, January 9-12, 2023, Proceedings, Part {II}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {13834},\n  pages        = {164--176},\n  publisher    = {Springer},\n  year         = {2023},\n  url          = {https://doi.org/10.1007/978-3-031-27818-1\\_14},\n  doi          = {10.1007/978-3-031-27818-1\\_14},\n  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/mmm/Dang-NguyenSLDT23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n AndrAS: Automated Attack Surface Extraction for Android Applications.\n \n \n \n \n\n\n \n Tran, A.; Yskout, K.; and Joosen, W.\n\n\n \n\n\n\n In 23rd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2023, Chiang Mai, Thailand, October 22-26, 2023, pages 406–417, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"AndrAS:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/qrs/TranYJ23,\n  author       = {Anh{-}Duy Tran and\n                  Koen Yskout and\n                  Wouter Joosen},\n  title        = {AndrAS: Automated Attack Surface Extraction for Android Applications},\n  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,\n                  and Security, {QRS} 2023, Chiang Mai, Thailand, October 22-26, 2023},\n  pages        = {406--417},\n  publisher    = {{IEEE}},\n  year         = {2023},\n  url          = {https://doi.org/10.1109/QRS60937.2023.00047},\n  doi          = {10.1109/QRS60937.2023.00047},\n  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/qrs/TranYJ23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ArmorDroid: A Rule-Set Customizable Plugin for Secure Android Application Development.\n \n \n \n \n\n\n \n Le, C.; Nguyen-Le, B.; Truong, P.; Tran, M.; and Tran, A.\n\n\n \n\n\n\n In di Vimercati, S. D. C.; and Samarati, P., editor(s), Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023, pages 634–641, 2023. SCITEPRESS\n \n\n\n\n
\n\n\n\n \n \n \"ArmorDroid:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/secrypt/LeNTTT23,\n  author       = {Cong{-}Binh Le and\n                  Bao{-}Thi Nguyen{-}Le and\n                  Phuoc{-}Loc Truong and\n                  Minh{-}Triet Tran and\n                  Anh{-}Duy Tran},\n  editor       = {Sabrina De Capitani di Vimercati and\n                  Pierangela Samarati},\n  title        = {ArmorDroid: {A} Rule-Set Customizable Plugin for Secure Android Application\n                  Development},\n  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,\n                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},\n  pages        = {634--641},\n  publisher    = {{SCITEPRESS}},\n  year         = {2023},\n  url          = {https://doi.org/10.5220/0012049500003555},\n  doi          = {10.5220/0012049500003555},\n  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/secrypt/LeNTTT23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Practical Analyses of How Common Social Media Platforms and Photo Storage Services Handle Uploaded Images.\n \n \n \n \n\n\n \n Dang-Nguyen, D.; Sjøen, V. V.; Le, D.; Dao, T.; Tran, A.; and Tran, M.\n\n\n \n\n\n\n CoRR, abs/2302.12133. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"PracticalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2302-12133,\n  author       = {Duc{-}Tien Dang{-}Nguyen and\n                  Vegard Velle Sj{\\o}en and\n                  Dinh{-}Hai Le and\n                  Thien{-}Phu Dao and\n                  Anh{-}Duy Tran and\n                  Minh{-}Triet Tran},\n  title        = {Practical Analyses of How Common Social Media Platforms and Photo\n                  Storage Services Handle Uploaded Images},\n  journal      = {CoRR},\n  volume       = {abs/2302.12133},\n  year         = {2023},\n  url          = {https://doi.org/10.48550/arXiv.2302.12133},\n  doi          = {10.48550/ARXIV.2302.12133},\n  eprinttype    = {arXiv},\n  eprint       = {2302.12133},\n  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-12133.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n MemInspect2: OS-Independent Memory Forensics for IoT Devices in Cybercrime Investigations.\n \n \n \n \n\n\n \n Tran, A.; Nguyen, Q. T.; Nguyen, A.; and Tran, M.\n\n\n \n\n\n\n In Yao, Z.; Xu, S.; Ma, J.; Du, W.; and Lu, W., editor(s), 22nd IEEE/ACIS International Conference on Computer and Information Science, ICIS 2022, Zhuhai, China, June 26-28, 2022, pages 162–169, 2022. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"MemInspect2:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ACISicis/TranNNT22,\n  author       = {Anh{-}Duy Tran and\n                  Quoc Thang Nguyen and\n                  Anh{-}Minh Nguyen and\n                  Minh{-}Triet Tran},\n  editor       = {Zheng{-}an Yao and\n                  Simon Xu and\n                  Jixin Ma and\n                  Wencai Du and\n                  Wei Lu},\n  title        = {MemInspect2: OS-Independent Memory Forensics for IoT Devices in Cybercrime\n                  Investigations},\n  booktitle    = {22nd {IEEE/ACIS} International Conference on Computer and Information\n                  Science, {ICIS} 2022, Zhuhai, China, June 26-28, 2022},\n  pages        = {162--169},\n  publisher    = {{IEEE}},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/ICIS54925.2022.9882517},\n  doi          = {10.1109/ICIS54925.2022.9882517},\n  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/ACISicis/TranNNT22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Provably Secure User Authentication Scheme Over Unreliable Networks.\n \n \n \n \n\n\n \n Truong, T.; Tran, M.; Duong, A. D.; and Tran, A.\n\n\n \n\n\n\n In Barolli, L.; Hussain, F.; and Enokido, T., editor(s), Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Sydney, NSW, Australia, 13-15 April 2022, Volume 1, volume 449, of Lecture Notes in Networks and Systems, pages 602–613, 2022. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/aina/TruongTDT22,\n  author       = {Toan{-}Thinh Truong and\n                  Minh{-}Triet Tran and\n                  Anh Duc Duong and\n                  Anh{-}Duy Tran},\n  editor       = {Leonard Barolli and\n                  Farookh Hussain and\n                  Tomoya Enokido},\n  title        = {A Provably Secure User Authentication Scheme Over Unreliable Networks},\n  booktitle    = {Advanced Information Networking and Applications - Proceedings of\n                  the 36th International Conference on Advanced Information Networking\n                  and Applications (AINA-2022), Sydney, NSW, Australia, 13-15 April\n                  2022, Volume 1},\n  series       = {Lecture Notes in Networks and Systems},\n  volume       = {449},\n  pages        = {602--613},\n  publisher    = {Springer},\n  year         = {2022},\n  url          = {https://doi.org/10.1007/978-3-030-99584-3\\_52},\n  doi          = {10.1007/978-3-030-99584-3\\_52},\n  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/aina/TruongTDT22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards an Attention-Based Threat Detection System for IoT Networks.\n \n \n \n \n\n\n \n Nguyen, T.; Dang, K.; Tran, A.; and Le, K.\n\n\n \n\n\n\n In Dang, T. K.; Küng, J.; and Chung, T. M., editor(s), Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications - 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022, Proceedings, volume 1688, of Communications in Computer and Information Science, pages 301–315, 2022. Springer\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/fdse/NguyenDTL22,\n  author       = {Thanh{-}Nhan Nguyen and\n                  Khanh{-}Mai Dang and\n                  Anh{-}Duy Tran and\n                  Kim{-}Hung Le},\n  editor       = {Tran Khanh Dang and\n                  Josef K{\\"{u}}ng and\n                  Tai M. Chung},\n  title        = {Towards an Attention-Based Threat Detection System for IoT Networks},\n  booktitle    = {Future Data and Security Engineering. Big Data, Security and Privacy,\n                  Smart City and Industry 4.0 Applications - 9th International Conference,\n                  {FDSE} 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022, Proceedings},\n  series       = {Communications in Computer and Information Science},\n  volume       = {1688},\n  pages        = {301--315},\n  publisher    = {Springer},\n  year         = {2022},\n  url          = {https://doi.org/10.1007/978-981-19-8069-5\\_20},\n  doi          = {10.1007/978-981-19-8069-5\\_20},\n  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/fdse/NguyenDTL22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Multimodal Cheapfakes Detection by Utilizing Image Captioning for Global Context.\n \n \n \n \n\n\n \n La, T.; Tran, Q.; Tran, T.; Tran, A.; Dang-Nguyen, D.; and Dao, M.\n\n\n \n\n\n\n In Dao, M.; Dang-Nguyen, D.; and Riegler, M., editor(s), ICDAR@ICMR 2022: Proceedings of the 3rd ACM Workshop on Intelligent Cross-Data Analysis and Retrieval, Newark, NJ, USA, June 27 - 30, 2022, pages 9–16, 2022. ACM\n \n\n\n\n
\n\n\n\n \n \n \"MultimodalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mir/LaTTTDD22,\n  author       = {Tuan{-}Vinh La and\n                  Quang{-}Tien Tran and\n                  Thanh{-}Phuc Tran and\n                  Anh{-}Duy Tran and\n                  Duc{-}Tien Dang{-}Nguyen and\n                  Minh{-}Son Dao},\n  editor       = {Minh{-}Son Dao and\n                  Duc{-}Tien Dang{-}Nguyen and\n                  Michael Riegler},\n  title        = {Multimodal Cheapfakes Detection by Utilizing Image Captioning for\n                  Global Context},\n  booktitle    = {ICDAR@ICMR 2022: Proceedings of the 3rd {ACM} Workshop on Intelligent\n                  Cross-Data Analysis and Retrieval, Newark, NJ, USA, June 27 - 30,\n                  2022},\n  pages        = {9--16},\n  publisher    = {{ACM}},\n  year         = {2022},\n  url          = {https://doi.org/10.1145/3512731.3534210},\n  doi          = {10.1145/3512731.3534210},\n  timestamp    = {Wed, 08 Mar 2023 16:35:14 +0100},\n  biburl       = {https://dblp.org/rec/conf/mir/LaTTTDD22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DeDigi: A Privacy-by-Design Platform for Image Forensics.\n \n \n \n \n\n\n \n Tran, C.; Tran, Q.; Long-Vu, Q.; Nguyen, H.; Tran, A.; and Dang-Nguyen, D.\n\n\n \n\n\n\n In Dao, M.; Dang-Nguyen, D.; and Riegler, M., editor(s), ICDAR@ICMR 2022: Proceedings of the 3rd ACM Workshop on Intelligent Cross-Data Analysis and Retrieval, Newark, NJ, USA, June 27 - 30, 2022, pages 58–62, 2022. ACM\n \n\n\n\n
\n\n\n\n \n \n \"DeDigi:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mir/TranTLNTD22,\n  author       = {Chi{-}Hao Tran and\n                  Quoc{-}Thang Tran and\n                  Quynh{-}Chau Long{-}Vu and\n                  Hai{-}Son Nguyen and\n                  Anh{-}Duy Tran and\n                  Duc{-}Tien Dang{-}Nguyen},\n  editor       = {Minh{-}Son Dao and\n                  Duc{-}Tien Dang{-}Nguyen and\n                  Michael Riegler},\n  title        = {DeDigi: {A} Privacy-by-Design Platform for Image Forensics},\n  booktitle    = {ICDAR@ICMR 2022: Proceedings of the 3rd {ACM} Workshop on Intelligent\n                  Cross-Data Analysis and Retrieval, Newark, NJ, USA, June 27 - 30,\n                  2022},\n  pages        = {58--62},\n  publisher    = {{ACM}},\n  year         = {2022},\n  url          = {https://doi.org/10.1145/3512731.3534213},\n  doi          = {10.1145/3512731.3534213},\n  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/mir/TranTLNTD22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Combination of Visual-Semantic Reasoning and Text Entailment-based Boosting Algorithm for Cheapfake Detection.\n \n \n \n \n\n\n \n La, T.; Dao, M.; Tran, Q.; Tran, T.; Tran, A.; and Dang-Nguyen, D.\n\n\n \n\n\n\n In Magalhães, J.; Bimbo, A. D.; Satoh, S.; Sebe, N.; Alameda-Pineda, X.; Jin, Q.; Oria, V.; and Toni, L., editor(s), MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10 - 14, 2022, pages 7140–7144, 2022. ACM\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mm/LaDTTTD22,\n  author       = {Tuan{-}Vinh La and\n                  Minh{-}Son Dao and\n                  Quang{-}Tien Tran and\n                  Thanh{-}Phuc Tran and\n                  Anh{-}Duy Tran and\n                  Duc{-}Tien Dang{-}Nguyen},\n  editor       = {Jo{\\~{a}}o Magalh{\\~{a}}es and\n                  Alberto Del Bimbo and\n                  Shin'ichi Satoh and\n                  Nicu Sebe and\n                  Xavier Alameda{-}Pineda and\n                  Qin Jin and\n                  Vincent Oria and\n                  Laura Toni},\n  title        = {A Combination of Visual-Semantic Reasoning and Text Entailment-based\n                  Boosting Algorithm for Cheapfake Detection},\n  booktitle    = {{MM} '22: The 30th {ACM} International Conference on Multimedia, Lisboa,\n                  Portugal, October 10 - 14, 2022},\n  pages        = {7140--7144},\n  publisher    = {{ACM}},\n  year         = {2022},\n  url          = {https://doi.org/10.1145/3503161.3551595},\n  doi          = {10.1145/3503161.3551595},\n  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/mm/LaDTTTD22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Textual-Visual-Entailment-based Unsupervised Algorithm for Cheapfake Detection.\n \n \n \n \n\n\n \n Tran, Q.; Tran, T.; Dao, M.; La, T.; Tran, A.; and Dang-Nguyen, D.\n\n\n \n\n\n\n In Magalhães, J.; Bimbo, A. D.; Satoh, S.; Sebe, N.; Alameda-Pineda, X.; Jin, Q.; Oria, V.; and Toni, L., editor(s), MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10 - 14, 2022, pages 7145–7149, 2022. ACM\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mm/TranTDLTD22,\n  author       = {Quang{-}Tien Tran and\n                  Thanh{-}Phuc Tran and\n                  Minh{-}Son Dao and\n                  Tuan{-}Vinh La and\n                  Anh{-}Duy Tran and\n                  Duc{-}Tien Dang{-}Nguyen},\n  editor       = {Jo{\\~{a}}o Magalh{\\~{a}}es and\n                  Alberto Del Bimbo and\n                  Shin'ichi Satoh and\n                  Nicu Sebe and\n                  Xavier Alameda{-}Pineda and\n                  Qin Jin and\n                  Vincent Oria and\n                  Laura Toni},\n  title        = {A Textual-Visual-Entailment-based Unsupervised Algorithm for Cheapfake\n                  Detection},\n  booktitle    = {{MM} '22: The 30th {ACM} International Conference on Multimedia, Lisboa,\n                  Portugal, October 10 - 14, 2022},\n  pages        = {7145--7149},\n  publisher    = {{ACM}},\n  year         = {2022},\n  url          = {https://doi.org/10.1145/3503161.3551596},\n  doi          = {10.1145/3503161.3551596},\n  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/mm/TranTDLTD22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adversarial Attacks on Deepfake Detectors: A Practical Analysis.\n \n \n \n \n\n\n \n Vo, N. H.; Phan, K. D.; Tran, A.; and Dang-Nguyen, D.\n\n\n \n\n\n\n In Jónsson, B. Þ.; Gurrin, C.; Tran, M.; Dang-Nguyen, D.; Hu, A. M.; Binh, H. T. T.; and Huet, B., editor(s), MultiMedia Modeling - 28th International Conference, MMM 2022, Phu Quoc, Vietnam, June 6-10, 2022, Proceedings, Part II, volume 13142, of Lecture Notes in Computer Science, pages 318–330, 2022. Springer\n \n\n\n\n
\n\n\n\n \n \n \"AdversarialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mmm/VoPTD22,\n  author       = {Ngan Hoang Vo and\n                  Khoa D. Phan and\n                  Anh{-}Duy Tran and\n                  Duc{-}Tien Dang{-}Nguyen},\n  editor       = {Bj{\\"{o}}rn {\\TH}{\\'{o}}r J{\\'{o}}nsson and\n                  Cathal Gurrin and\n                  Minh{-}Triet Tran and\n                  Duc{-}Tien Dang{-}Nguyen and\n                  Anita Min{-}Chun Hu and\n                  Huynh Thi Thanh Binh and\n                  Benoit Huet},\n  title        = {Adversarial Attacks on Deepfake Detectors: {A} Practical Analysis},\n  booktitle    = {MultiMedia Modeling - 28th International Conference, {MMM} 2022, Phu\n                  Quoc, Vietnam, June 6-10, 2022, Proceedings, Part {II}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {13142},\n  pages        = {318--330},\n  publisher    = {Springer},\n  year         = {2022},\n  url          = {https://doi.org/10.1007/978-3-030-98355-0\\_27},\n  doi          = {10.1007/978-3-030-98355-0\\_27},\n  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/mmm/VoPTD22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Deep Reinforcement Learning Approach Using Customized Technical Indicators for A Pre-emerging Market: A Case Study of Vietnamese Stock Market.\n \n \n \n \n\n\n \n Nguyen, H. N.; Mac, B. N.; Tran, A.; Nguyen, N.; and Pham, D.\n\n\n \n\n\n\n In RIVF International Conference on Computing and Communication Technologies, RIVF 2022, Ho Chi Minh City, Vietnam, December 20-22, 2022, pages 737–742, 2022. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"DeepPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/rivf/NguyenMTNP22,\n  author       = {Hoang{-}Thi Nguyen Nguyen and\n                  Bao{-}Ngoc Nguyen Mac and\n                  Anh{-}Duy Tran and\n                  Ngoc{-}Thao Nguyen and\n                  Duc{-}Thinh Pham},\n  title        = {Deep Reinforcement Learning Approach Using Customized Technical Indicators\n                  for {A} Pre-emerging Market: {A} Case Study of Vietnamese Stock Market},\n  booktitle    = {{RIVF} International Conference on Computing and Communication Technologies,\n                  {RIVF} 2022, Ho Chi Minh City, Vietnam, December 20-22, 2022},\n  pages        = {737--742},\n  publisher    = {{IEEE}},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/RIVF55975.2022.10013836},\n  doi          = {10.1109/RIVF55975.2022.10013836},\n  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/rivf/NguyenMTNP22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n OS-Independent Malware Detection: Applying Machine Learning and Computer Vision in Memory Forensics.\n \n \n \n \n\n\n \n Tran, A.; Vo, N.; Tran, Q.; Nguyen, H.; and Tran, M.\n\n\n \n\n\n\n In 17th International Conference on Computational Intelligence and Security CIS 2021, Chengdu, China, November 19-22, 2021, pages 616–620, 2021. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"OS-IndependentPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cis/TranVTNT21,\n  author       = {Anh{-}Duy Tran and\n                  Ngoc{-}Huy Vo and\n                  Quang{-}Khai Tran and\n                  Hai{-}Dang Nguyen and\n                  Minh{-}Triet Tran},\n  title        = {OS-Independent Malware Detection: Applying Machine Learning and Computer\n                  Vision in Memory Forensics},\n  booktitle    = {17th International Conference on Computational Intelligence and Security\n                  {CIS} 2021, Chengdu, China, November 19-22, 2021},\n  pages        = {616--620},\n  publisher    = {{IEEE}},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/CIS54983.2021.00134},\n  doi          = {10.1109/CIS54983.2021.00134},\n  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/cis/TranVTNT21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Security Issues in Android Application Development and Plug-in for Android Studio to Support Secure Programming.\n \n \n \n \n\n\n \n Tran, A.; Nguyen, M.; Phan, G.; and Tran, M.\n\n\n \n\n\n\n In Dang, T. K.; Küng, J.; Chung, T. M.; and Takizawa, M., editor(s), Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications - 8th International Conference, FDSE 2021, Virtual Event, November 24-26, 2021, Proceedings, volume 1500, of Communications in Computer and Information Science, pages 105–122, 2021. Springer\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/fdse/TranNPT21,\n  author       = {Anh{-}Duy Tran and\n                  Minh{-}Quan Nguyen and\n                  Gia{-}Hao Phan and\n                  Minh{-}Triet Tran},\n  editor       = {Tran Khanh Dang and\n                  Josef K{\\"{u}}ng and\n                  Tai M. Chung and\n                  Makoto Takizawa},\n  title        = {Security Issues in Android Application Development and Plug-in for\n                  Android Studio to Support Secure Programming},\n  booktitle    = {Future Data and Security Engineering. Big Data, Security and Privacy,\n                  Smart City and Industry 4.0 Applications - 8th International Conference,\n                  {FDSE} 2021, Virtual Event, November 24-26, 2021, Proceedings},\n  series       = {Communications in Computer and Information Science},\n  volume       = {1500},\n  pages        = {105--122},\n  publisher    = {Springer},\n  year         = {2021},\n  url          = {https://doi.org/10.1007/978-981-16-8062-5\\_7},\n  doi          = {10.1007/978-981-16-8062-5\\_7},\n  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/fdse/TranNPT21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards OS-Independent Memory Images Analyzing: Using Paging Structures in Memory Forensics.\n \n \n \n \n\n\n \n Tran-Quoc, T.; Huynh-Minh, C.; and Tran, A.\n\n\n \n\n\n\n In Moradpoor, N.; Elçi, A.; and Petrovski, A., editor(s), 14th International Conference on Security of Information and Networks, SIN 2021, Edinburgh, United Kingdom, December 15-17, 2021, pages 1–8, 2021. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sin/Tran-QuocHT21,\n  author       = {Truong{-}An Tran{-}Quoc and\n                  Chi Huynh{-}Minh and\n                  Anh{-}Duy Tran},\n  editor       = {Naghmeh Moradpoor and\n                  Atilla El{\\c{c}}i and\n                  Andrei Petrovski},\n  title        = {Towards OS-Independent Memory Images Analyzing: Using Paging Structures\n                  in Memory Forensics},\n  booktitle    = {14th International Conference on Security of Information and Networks,\n                  {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021},\n  pages        = {1--8},\n  publisher    = {{IEEE}},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/SIN54109.2021.9699263},\n  doi          = {10.1109/SIN54109.2021.9699263},\n  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sin/Tran-QuocHT21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);