关注
Thang Hoang
Thang Hoang
其他姓名Hoang Minh Thang
在 vt.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Gait Identification Using Accelerometer on Mobile Phone
T Hoang, VQ Viet, ND Thuc, D Choi
International Conference on Control, Automation and Information Sciences …, 2012
1732012
Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer
T Hoang, TD Nguyen, C Luong, S Do, D Choi
Journal of Information Processing System (JIPS) 9 (2), 333, 2013
852013
Gait Authentication on Mobile Phone Using Biometric Cryptosystem and Fuzzy Commitment Scheme
T Hoang, D Choi, T Nguyen
International Journal of Information Security 14 (6), 549-560, 2015
792015
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
T Hoang, MO Ozmen, Y Jang, AA Yavuz
Privacy Enhancing Technologies Symposium (PETS) 2019 (1), 172-191, 2019
592019
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing
T Hoang, CD Ozkaptan, AA Yavuz, J Guajardo, T Nguyen
ACM SIGSAC Conference on Computer and Communications Security (CCS), 491-505, 2017
582017
Secure and Privacy Enhanced Gait Authentication on Smart Phone
T Hoang, D Choi
The Scientific World Journal 2014, 2014
582014
Multi-Model Long Short-Term Memory Network for Gait Recognition Using Window-Based Data Segment
L Tran, T Hoang, T Nguyen, H Kim, D Choi
IEEE Access 9, 23826-23839, 2021
552021
Personalization in Mobile Activity Recognition System Using -Medoids Clustering Algorithm
QV Vo, MT Hoang, D Choi
International Journal of Distributed Sensor Networks 9 (7), 2013
532013
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
T Hoang, AA Yavuz, J Guajardo
IEEE Transactions on Services Computing 14 (6), 1675-1689, 2019
432019
On the Instability of Sensor Orientation in Gait Verification on Mobile Phone
T Hoang, D Choi, T Nguyen
International Conference on Security and Cryptography (SECRYPT), 148-159, 2015
402015
Practical and Secure Dynamic Searchable Encryption via Oblivious Access on Distributed Data Structure
T Hoang, AA Yavuz, J Guajardo
Annual Computer Security Applications Conference (ACSAC), 302-313, 2016
382016
A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error
T Hoang, D Choi, V Vo, A Nguyen, T Nguyen
IFIP International Information Security Conference (SEC), 83-101, 2013
352013
MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves
T Hoang, R Behnia, Y Jang, AA Yavuz
ACM Conference on Data and Application Security and Privacy (CODASPY), 17-28, 2020
242020
Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems
T Hoang, AA Yavuz, FB Durak, J Guajardo
IFIP Annual Conference on Data and Applications Security and Privacy (DBSec …, 2018
21*2018
Adaptive Energy-Saving Strategy for Activity Recognition on Mobile Phone
VQ Viet, HM Thang, D Choi
IEEE International Symposium on Signal Processing and Information Technology …, 2012
192012
Polynomial Commitment with a {One-to-Many} Prover and Applications
J Zhang, T Xie, T Hoang, E Shi, Y Zhang
31st USENIX Security Symposium (USENIX Security), 2965-2982, 2022
152022
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework
T Hoang, J Guajardo, AA Yavuz
Annual Network and Distributed System Security Symposium (NDSS), 2020
152020
Efficient Oblivious Data Structures for Database Services on the Cloud
T Hoang, CD Ozkaptan, G Hackebeil, AA Yavuz
IEEE Transactions on Cloud Computing 9 (2), 598-609, 2018
152018
Balancing Precision and Battery Drain in Activity Recognition on Mobile Phone
VQ Viet, HM Thang, DJ Choi
IEEE International Conference on Parallel and Distributed Systems (ICPADS …, 2012
142012
Titanium: A Metadata-Hiding File-Sharing System with Malicious Security
W Chen, T Hoang, J Guajardo, AA Yavuz
Annual Network and Distributed System Security Symposium (NDSS), 2022
122022
系统目前无法执行此操作,请稍后再试。
文章 1–20