关注
Long Nguyen-Vu, PhD
Long Nguyen-Vu, PhD
MoaData
在 moadata.ai 的电子邮件经过验证
标题
引用次数
引用次数
年份
AdMat: A CNN-on-matrix approach to Android malware detection and classification
L Nguyen-Vu, S Jung
IEEE Access 9, 39680-39694, 2021
732021
Android rooting: An arms race between evasion and detection
L Nguyen-Vu, NT Chau, S Kang, S Jung
Security and Communication Networks 2017 (1), 4121765, 2017
432017
Android fragmentation in malware detection
L Nguyen-Vu, J Ahn, S Jung
Computers & Security 87, 101573, 2019
372019
Bts-e: Audio deepfake detection using breathing-talking-silence encoder
TP Doan, L Nguyen-Vu, S Jung, K Hong
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
282023
On the defense of spoofing countermeasures against adversarial attacks
L Nguyen-Vu, TP Doan, M Bui, K Hong, S Jung
IEEE Access, 2023
82023
A-pot: a comprehensive android analysis platform based on container technology
J Park, NT Chau, L Nguyen-Vu, J Yoon, S Jung
IEEE Access 8, 199638-199645, 2020
62020
A Study on Vulnerability Prevention Mechanism Due to Logout Problem Using OAuth
J Kim, J Park, L Nguyen-Vu, S Jung
Journal of the Korea Institute of Information Security & Cryptology 27 (1), 5-14, 2017
52017
Privacy enhancement using selective encryption scheme in data outsourcing
L Nguyen-Vu, J Park, M Park, S Jung
International Journal of Distributed Sensor Networks 12 (7), 1550147716657255, 2016
32016
Signing key leak detection in Google Play Store
L Nguyen-Vu, J Park, NT Chau, S Jung
2016 International Conference on Information Networking (ICOIN), 13-16, 2016
32016
Automatic generation of maec and stix standards for android malware threat intelligence
J Park, L Nguyen Vu, G Bencivengo, S Jung
KSII Transactions on Internet and Information Systems (TIIS) 14 (8), 3420-3436, 2020
22020
DroidSecure: a technique to mitigate privilege escalation in android application
L Nguyen-Vu, S Jung
Journal of The Korea Institute of Information Security & Cryptology 26 (1 …, 2016
22016
TL-SMOTE: Re-balancing Data in Federated Learning for Anomaly Detection
L Nguyen-Thuy, L Nguyen-Vu, J Park, K Hong, S Jung
International Conference on Computer Science and its Applications and the …, 2022
12022
Empirical feature learning in application-based samples: A case study
L Nguyen-Vu, S Jung
Journal of Computational Science 64, 101839, 2022
12022
An Empirical Study on Android malware behavior signature extraction
TP Doan, L Nguyen-Vu, HH Nguyen, S Jung
Res. Briefs Inf. Commun. Technol. Evol. 5, 102-110, 2019
12019
Android application call relationship analysis based on dex and elf binary reverse engineering
J Ahn, J Park, L Nguyen-Vu, S Jung
Journal of the Korea Institute of Information Security & Cryptology 29 (1 …, 2019
12019
Privacy enhancement for data outsourcing
L Nguyen-Vu, M Park, J Park, S Jung
2015 International Conference on Information and Communication Technology …, 2015
12015
CHAWA: Overcoming Phase Anomalies in Sound Localization
L Nguyen-Vu, J Lee
IEEE Access, 2024
2024
Balance, Multiple Augmentation, and Re-synthesis: A Triad Training Strategy for Enhanced Audio Deepfake Detection
TP Doan, L Nguyen-Vu, K Hong, S Jung
Proc. Interspeech 2024, 2105-2109, 2024
2024
Implementation of Opensource-Based Automatic Monitoring Service Deployment and Image Integrity Checkers for Cloud-Native Environment
S Gwak, L Nguyen-Vu, S Jung
Journal of the Korea Institute of Information Security & Cryptology 32 (4 …, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–19