Using deep learning model for network scanning detection HN Viet, QN Van, LLT Trang, S Nathan Proceedings of the 4th International Conference on Frontiers of Educational …, 2018 | 47 | 2018 |
Clustering-based deep autoencoders for network anomaly detection VQ Nguyen, VH Nguyen, NA Le-Khac, VL Cao Future Data and Security Engineering: 7th International Conference, FDSE …, 2020 | 16 | 2020 |
A novel deep clustering variational auto-encoder for anomaly-based network intrusion detection VQ Nguyen, VH Nguyen, TH Hoang, N Shone 2022 14th International Conference on Knowledge and Systems Engineering (KSE …, 2022 | 10 | 2022 |
Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network NV Hung, PN Dung, TN Ngoc, VD Phai, Q Shi 2019 11th International Conference on Knowledge and Systems Engineering (KSE …, 2019 | 10 | 2019 |
Behaviour-aware malware classification: Dynamic feature selection PV Dinh, N Shone, PH Dung, Q Shi, NV Hung, TN Ngoc 2019 11th International Conference on Knowledge and Systems Engineering (KSE …, 2019 | 10 | 2019 |
A Robust PCA Feature Selection to Assist Deep Clustering Autoencoder-Based Network Anomaly Detection NV Quan, VH Nguyen, VL Cao, NA Le-Khac, N Shone 2021 8th NAFOSTED Conference on Information and Computer Science (NICS)(NICS’21), 2021 | 9 | 2021 |
Using deep graph learning to improve dynamic analysis-based malware detection in PE files MT Nguyen, VH Nguyen, N Shone Journal of Computer Virology and Hacking Techniques 20 (1), 153-172, 2024 | 5 | 2024 |
Multiple Error Correction in Redundant Residue Number Systems: A Modified Modular Projection Method with Maximum Likelihood Decoding M Babenko, A Nazarov, M Deryabin, N Kucherov, A Tchernykh, NV Hung, ... Applied Sciences 12 (1), 463, 2022 | 4 | 2022 |
A multi-scale context encoder for high quality restoration of facial images TD Do, QK Nguyen, VH Nguyen 2020 International conference on multimedia analysis and pattern recognition …, 2020 | 4 | 2020 |
Computationally secure threshold secret sharing scheme with minimal redundancy M Babenko, A Tchernykh, E Golimblevskaia, NV Hung, VK Chaurasiya THE 2ND INTERNATIONAL WORKSHOP ON INFORMATION, COMPUTATION, AND CONTROL …, 2020 | 4 | 2020 |
Detecting malware based on dynamic analysis techniques using deep graph learning NM Tu, NV Hung, PV Anh, C Van Loi, N Shone Future Data and Security Engineering: 7th International Conference, FDSE …, 2020 | 4 | 2020 |
Deep Nested Clustering Auto-Encoder for Anomaly-Based Network Intrusion Detection VQ Nguyen, TL Ngo, VH Nguyen, N Shone 2023 RIVF International Conference on Computing and Communication …, 2023 | 2 | 2023 |
Automatically estimate clusters in autoencoder-based clustering model for anomaly detection VQ Nguyen, VH Nguyen, NA Le Khac 2021 RIVF International Conference on Computing and Communication …, 2021 | 2 | 2021 |
Cryptographic Primitives Optimization Based on the Concepts of the Residue Number System and Finite Ring Neural Network A Tchernykh, M Babenko, B Pulido-Gaytan, E Shiryaev, E Golimblevskaia, ... International Conference on Optimization and Learning, 241-253, 2021 | 2 | 2021 |
Применение нейронных сетей для нахождения вектора движения в задаче кодирования видеопоследовательности со стандартом H. 264/AVC ХВ Нгуен Труды, 2011 | 2 | 2011 |
Hybrid of Deep Auto-Encoder and Maximum Mean Discrepancy for Cyber Reconnaissance Detection VQ Nguyen, TL Ngo, VH Nguyen, TH Nguyen 2023 15th International Conference on Knowledge and Systems Engineering (KSE …, 2023 | 1 | 2023 |
Network attack classification framework based on Autoencoder model and online stream analysis technology NV Hung, DT Mai, NT Tung Journal of Science and Technology on Information security, 3-19, 2023 | 1 | 2023 |
udCATS: A Comprehensive Unsupervised Deep Learning Framework for Detecting Collective Anomalies in Time Series TS Pham, VH Nguyen, AT Le, VD Bui Annals of Computer Science and Information Systems 33, 2022 | 1 | 2022 |
Нейросетевые алгоритмы для решения задач кодирования изображений с использованием технологии CUDA ВХ Нгуен Центр информационных технологий и систем органов исполнительной власти, 2012 | 1 | 2012 |
Deep clustering hierarchical latent representation for anomaly-based cyber-attack detection VQ Nguyen, LT Ngo, VH Nguyen, N Shone Knowledge-Based Systems 301, 112366, 2024 | | 2024 |