关注
Long Nguyen-Vu, PhD
Long Nguyen-Vu, PhD
在 ssu.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
AdMat: A CNN-on-matrix approach to Android malware detection and classification
L Nguyen-Vu, S Jung
IEEE Access 9, 39680-39694, 2021
622021
Android rooting: An arms race between evasion and detection
L Nguyen-Vu, NT Chau, S Kang, S Jung
Security and Communication Networks 2017 (1), 4121765, 2017
402017
Android fragmentation in malware detection
L Nguyen-Vu, J Ahn, S Jung
Computers & Security 87, 101573, 2019
352019
Bts-e: Audio deepfake detection using breathing-talking-silence encoder
TP Doan, L Nguyen-Vu, S Jung, K Hong
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
142023
A-pot: a comprehensive android analysis platform based on container technology
J Park, NT Chau, L Nguyen-Vu, J Yoon, S Jung
IEEE Access 8, 199638-199645, 2020
52020
A Study on Vulnerability Prevention Mechanism Due to Logout Problem Using OAuth
J Kim, J Park, L Nguyen-Vu, S Jung
Journal of the Korea Institute of Information Security & Cryptology 27 (1), 5-14, 2017
52017
On the defense of spoofing countermeasures against adversarial attacks
L Nguyen-Vu, TP Doan, M Bui, K Hong, S Jung
IEEE Access, 2023
32023
Android adware detection using soot and CFG
J Park, S Jung
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2022
32022
Privacy enhancement using selective encryption scheme in data outsourcing
L Nguyen-Vu, J Park, M Park, S Jung
International Journal of Distributed Sensor Networks 12 (7), 1550147716657255, 2016
32016
Signing key leak detection in Google Play Store
L Nguyen-Vu, J Park, NT Chau, S Jung
2016 International Conference on Information Networking (ICOIN), 13-16, 2016
32016
DroidSecure: a technique to mitigate privilege escalation in android application
L Nguyen-Vu, S Jung
Journal of The Korea Institute of Information Security & Cryptology 26 (1 …, 2016
22016
TL-SMOTE: Re-balancing Data in Federated Learning for Anomaly Detection
L Nguyen-Thuy, L Nguyen-Vu, J Park, K Hong, S Jung
International Conference on Computer Science and its Applications and the …, 2022
12022
Empirical feature learning in application-based samples: A case study
L Nguyen-Vu, S Jung
Journal of Computational Science 64, 101839, 2022
12022
Automatic generation of maec and stix standards for android malware threat intelligence
J Park, L Nguyen Vu, G Bencivengo, S Jung
KSII Transactions on Internet and Information Systems (TIIS) 14 (8), 3420-3436, 2020
12020
An Empirical Study on Android malware behavior signature extraction
TP Doan, L Nguyen-Vu, HH Nguyen, S Jung
Research Briefs on Information and Communication Technology Evolution 5, 102-110, 2019
12019
Android application call relationship analysis based on dex and elf binary reverse engineering
J Ahn, J Park, L Nguyen-Vu, S Jung
Journal of the Korea Institute of Information Security & Cryptology 29 (1 …, 2019
12019
Privacy enhancement for data outsourcing
L Nguyen-Vu, M Park, J Park, S Jung
2015 International Conference on Information and Communication Technology …, 2015
12015
Improve Dynamic Sandbox on the Cloud with Non-QEMU Based OS Through Hooks and Mocks Techniques
NT Chau, LN Vu, S Jung
Information Science and Applications (ICISA) 2016, 523-531, 2016
2016
POSTER: Feature Reduction in Machine Learning for Application-based Examples
L Nguyen-Vu, S Jung
Practical Application of Machine Learning Algorithms to Android Malware Analysis
L Nguyen-Vu, H Cho, S Jung
系统目前无法执行此操作,请稍后再试。
文章 1–20