AdMat: A CNN-on-matrix approach to Android malware detection and classification L Nguyen-Vu, S Jung IEEE Access 9, 39680-39694, 2021 | 73 | 2021 |
Android rooting: An arms race between evasion and detection L Nguyen-Vu, NT Chau, S Kang, S Jung Security and Communication Networks 2017 (1), 4121765, 2017 | 43 | 2017 |
Android fragmentation in malware detection L Nguyen-Vu, J Ahn, S Jung Computers & Security 87, 101573, 2019 | 37 | 2019 |
Bts-e: Audio deepfake detection using breathing-talking-silence encoder TP Doan, L Nguyen-Vu, S Jung, K Hong ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | 28 | 2023 |
On the defense of spoofing countermeasures against adversarial attacks L Nguyen-Vu, TP Doan, M Bui, K Hong, S Jung IEEE Access, 2023 | 8 | 2023 |
A-pot: a comprehensive android analysis platform based on container technology J Park, NT Chau, L Nguyen-Vu, J Yoon, S Jung IEEE Access 8, 199638-199645, 2020 | 6 | 2020 |
A Study on Vulnerability Prevention Mechanism Due to Logout Problem Using OAuth J Kim, J Park, L Nguyen-Vu, S Jung Journal of the Korea Institute of Information Security & Cryptology 27 (1), 5-14, 2017 | 5 | 2017 |
Privacy enhancement using selective encryption scheme in data outsourcing L Nguyen-Vu, J Park, M Park, S Jung International Journal of Distributed Sensor Networks 12 (7), 1550147716657255, 2016 | 3 | 2016 |
Signing key leak detection in Google Play Store L Nguyen-Vu, J Park, NT Chau, S Jung 2016 International Conference on Information Networking (ICOIN), 13-16, 2016 | 3 | 2016 |
Automatic generation of maec and stix standards for android malware threat intelligence J Park, L Nguyen Vu, G Bencivengo, S Jung KSII Transactions on Internet and Information Systems (TIIS) 14 (8), 3420-3436, 2020 | 2 | 2020 |
DroidSecure: a technique to mitigate privilege escalation in android application L Nguyen-Vu, S Jung Journal of The Korea Institute of Information Security & Cryptology 26 (1 …, 2016 | 2 | 2016 |
TL-SMOTE: Re-balancing Data in Federated Learning for Anomaly Detection L Nguyen-Thuy, L Nguyen-Vu, J Park, K Hong, S Jung International Conference on Computer Science and its Applications and the …, 2022 | 1 | 2022 |
Empirical feature learning in application-based samples: A case study L Nguyen-Vu, S Jung Journal of Computational Science 64, 101839, 2022 | 1 | 2022 |
An Empirical Study on Android malware behavior signature extraction TP Doan, L Nguyen-Vu, HH Nguyen, S Jung Res. Briefs Inf. Commun. Technol. Evol. 5, 102-110, 2019 | 1 | 2019 |
Android application call relationship analysis based on dex and elf binary reverse engineering J Ahn, J Park, L Nguyen-Vu, S Jung Journal of the Korea Institute of Information Security & Cryptology 29 (1 …, 2019 | 1 | 2019 |
Privacy enhancement for data outsourcing L Nguyen-Vu, M Park, J Park, S Jung 2015 International Conference on Information and Communication Technology …, 2015 | 1 | 2015 |
CHAWA: Overcoming Phase Anomalies in Sound Localization L Nguyen-Vu, J Lee IEEE Access, 2024 | | 2024 |
Balance, Multiple Augmentation, and Re-synthesis: A Triad Training Strategy for Enhanced Audio Deepfake Detection TP Doan, L Nguyen-Vu, K Hong, S Jung Proc. Interspeech 2024, 2105-2109, 2024 | | 2024 |
Implementation of Opensource-Based Automatic Monitoring Service Deployment and Image Integrity Checkers for Cloud-Native Environment S Gwak, L Nguyen-Vu, S Jung Journal of the Korea Institute of Information Security & Cryptology 32 (4 …, 2022 | | 2022 |