default search action
Khoa D. Doan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j1]Thuy Dung Nguyen, Tuan Nguyen, Phi Le Nguyen, Hieu H. Pham, Khoa D. Doan, Kok-Seng Wong:
Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions. Eng. Appl. Artif. Intell. 127(Part A): 107166 (2024) - [c21]Duy C. Hoang, Nguyen Hung-Quang, Saurav Manchanda, Minlong Peng, Kok-Seng Wong, Khoa D. Doan:
Fooling the Textual Fooler via Randomizing Latent Representations. ACL (Findings) 2024: 14403-14421 - [c20]Tran Huynh, Anh Tran, Khoa D. Doan, Tung Pham:
Data Poisoning Quantization Backdoor Attack. ECCV (84) 2024: 38-54 - [c19]Hoang Pham, The-Anh Ta, Anh Tran, Khoa D. Doan:
Flatness-Aware Sequential Learning Generates Resilient Backdoors. ECCV (87) 2024: 89-107 - [c18]Nguyen Hung-Quang, Yingjie Lao, Tung Pham, Kok-Seng Wong, Khoa D. Doan:
Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks. ICLR 2024 - [c17]Banibrata Ghosh, Haripriya Harikumar, Khoa D. Doan, Svetha Venkatesh, Santu Rana:
Composite Concept Extraction Through Backdooring. ICPR (29) 2024: 276-290 - [i26]Hieu Trung Nguyen, Duy Nguyen, Khoa D. Doan, Viet Anh Nguyen:
Cold-start Recommendation by Personalized Embedding Region Elicitation. CoRR abs/2406.00973 (2024) - [i25]Banibrata Ghosh, Haripriya Harikumar, Khoa D. Doan, Svetha Venkatesh, Santu Rana:
Composite Concept Extraction through Backdooring. CoRR abs/2406.13411 (2024) - [i24]Nghia D. Nguyen, Hieu Trung Nguyen, Ang Li, Hoang Pham, Viet Anh Nguyen, Khoa D. Doan:
Forget but Recall: Incremental Latent Rectification in Continual Learning. CoRR abs/2406.17381 (2024) - [i23]Son Nguyen, Thinh Nguyen, Khoa D. Doan, Kok-Seng Wong:
Venomancer: Towards Imperceptible and Target-on-Demand Backdoor Attacks in Federated Learning. CoRR abs/2407.03144 (2024) - [i22]Tuan Nguyen, Dung Thuy Nguyen, Khoa D. Doan, Kok-Seng Wong:
Non-Cooperative Backdoor Attacks in Federated Learning: A New Threat Landscape. CoRR abs/2407.07917 (2024) - [i21]Quang H. Nguyen, Nguyen Ngoc-Hieu, The-Anh Ta, Thanh Nguyen-Tang, Kok-Seng Wong, Hoang Thanh-Tung, Khoa D. Doan:
Wicked Oddities: Selectively Poisoning for Effective Clean-Label Backdoor Attacks. CoRR abs/2407.10825 (2024) - [i20]Quang H. Nguyen, Duy C. Hoang, Juliette Decugis, Saurav Manchanda, Nitesh V. Chawla, Khoa D. Doan:
MetaLLM: A High-performant and Cost-efficient Dynamic Framework for Wrapping LLMs. CoRR abs/2407.10834 (2024) - [i19]Thinh Nguyen, Khoa D. Doan, Binh T. Nguyen, Danh Le Phuoc, Kok-Seng Wong:
Overcoming Catastrophic Forgetting in Federated Class-Incremental Learning via Federated Global Twin Generator. CoRR abs/2407.11078 (2024) - [i18]Duy C. Hoang, Hung T. Q. Le, Rui Chu, Ping Li, Weijie Zhao, Yingjie Lao, Khoa D. Doan:
Less is More: Sparse Watermarking in LLMs with Enhanced Text Quality. CoRR abs/2407.13803 (2024) - [i17]Hoang Pham, The-Anh Ta, Anh Tran, Khoa D. Doan:
Flatness-aware Sequential Learning Generates Resilient Backdoors. CoRR abs/2407.14738 (2024) - [i16]Thinh Dao, Cuong Chi Le, Khoa D. Doan, Kok-Seng Wong:
Towards Clean-Label Backdoor Attacks in the Physical World. CoRR abs/2407.19203 (2024) - 2023
- [c16]Khoa D. Doan, Yingjie Lao, Peng Yang, Ping Li:
Defending Backdoor Attacks on Vision Transformer via Patch Processing. AAAI 2023: 506-515 - [c15]Thai-Hung Nguyen, Hong-Phuc Vu, Thuy Dung Nguyen, Tuan Minh Nguyen, Khoa D. Doan, Kok-Seng Wong:
Empirical Study of Federated Unlearning: Efficiency and Effectiveness. ACML 2023: 959-974 - [c14]Thuy Dung Nguyen, Tuan Nguyen, Anh Tran, Khoa D. Doan, Kok-Seng Wong:
IBA: Towards Irreversible Backdoor Attacks in Federated Learning. NeurIPS 2023 - [c13]Khoa D. Doan, Shulong Tan, Weijie Zhao, Ping Li:
Asymmetric Hashing for Fast Ranking via Neural Network Measures. SIGIR 2023: 697-707 - [i15]Thuy Dung Nguyen, Tuan Nguyen, Phi Le Nguyen, Hieu H. Pham, Khoa D. Doan, Kok-Seng Wong:
Backdoor Attacks and Defenses in Federated Learning: Survey, Challenges and Future Research Directions. CoRR abs/2303.02213 (2023) - [i14]Hieu Ngoc Nguyen, Nguyen Hung-Quang, The-Anh Ta, Thanh Nguyen-Tang, Khoa D. Doan, Hoang Thanh-Tung:
A Cosine Similarity-based Method for Out-of-Distribution Detection. CoRR abs/2306.14920 (2023) - [i13]Sze Jue Yang, Quang H. Nguyen, Chee Seng Chan, Khoa D. Doan:
Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack. CoRR abs/2308.16684 (2023) - [i12]Quang H. Nguyen, Yingjie Lao, Tung Pham, Kok-Seng Wong, Khoa D. Doan:
Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks. CoRR abs/2310.00567 (2023) - [i11]Duy C. Hoang, Quang H. Nguyen, Saurav Manchanda, Minlong Peng, Kok-Seng Wong, Khoa D. Doan:
Fooling the Textual Fooler via Randomizing Latent Representations. CoRR abs/2310.01452 (2023) - [i10]Sze Jue Yang, Chinh D. La, Quang H. Nguyen, Eugene Bagdasaryan, Kok-Seng Wong, Anh Tuan Tran, Chee Seng Chan, Khoa D. Doan:
Synthesizing Physical Backdoor Datasets: An Automated Framework Leveraging Deep Generative Models. CoRR abs/2312.03419 (2023) - 2022
- [c12]Khoa D. Doan, Sarkhan Badirli, Chandan K. Reddy:
Unified Energy-Based Generative Network for Supervised Image Hashing. ACCV (6) 2022: 527-543 - [c11]Khoa D. Doan, Peng Yang, Ping Li:
One Loss for Quantization: Deep Hashing with Discrete Wasserstein Distributional Matching. CVPR 2022: 9437-9447 - [c10]Khoa D. Doan, Yingjie Lao, Ping Li:
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class. NeurIPS 2022 - [i9]Khoa D. Doan, Peng Yang, Ping Li:
One Loss for Quantization: Deep Hashing with Discrete Wasserstein Distributional Matching. CoRR abs/2205.15721 (2022) - [i8]Khoa D. Doan, Yingjie Lao, Peng Yang, Ping Li:
Defending Backdoor Attacks on Vision Transformer via Patch Processing. CoRR abs/2206.12381 (2022) - [i7]Khoa D. Doan, Jianwen Xie, Yaxuan Zhu, Yang Zhao, Ping Li:
CoopHash: Cooperative Learning of Multipurpose Descriptor and Contrastive Pair Generator via Variational MCMC Teaching for Supervised Image Hashing. CoRR abs/2210.04288 (2022) - [i6]Khoa D. Doan, Yingjie Lao, Ping Li:
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class. CoRR abs/2210.09194 (2022) - [i5]Khoa D. Doan, Shulong Tan, Weijie Zhao, Ping Li:
Asymmetric Hashing for Fast Ranking via Neural Network Measures. CoRR abs/2211.00619 (2022) - 2021
- [b1]Khoa D. Doan:
Generative models meet similarity search: efficient, heuristic-free and robust retrieval. Virginia Tech, Blacksburg, VA, USA, 2021 - [c9]Khoa D. Doan, Yingjie Lao, Weijie Zhao, Ping Li:
LIRA: Learnable, Imperceptible and Robust Backdoor Attacks. ICCV 2021: 11946-11956 - [c8]Khoa D. Doan, Yingjie Lao, Ping Li:
Backdoor Attack with Imperceptible Input and Latent Modification. NeurIPS 2021: 18944-18957 - [c7]Khoa D. Doan, Saurav Manchanda, Suchismit Mahapatra, Chandan K. Reddy:
Interpretable Graph Similarity Computation via Differentiable Optimal Alignment of Node Embeddings. SIGIR 2021: 665-674 - 2020
- [c6]Khoa D. Doan, Chandan K. Reddy:
Efficient Implicit Unsupervised Text Hashing using Adversarial Autoencoder. WWW 2020: 684-694 - [i4]Saurav Manchanda, Pranjul Yadav, Khoa D. Doan, S. Sathiya Keerthi:
Targeted display advertising: the case of preferential attachment. CoRR abs/2002.02879 (2020) - [i3]Khoa D. Doan, Amir Kimiyaie, Saurav Manchanda, Chandan K. Reddy:
Image Hashing by Minimizing Independent Relaxed Wasserstein Distance. CoRR abs/2003.00134 (2020) - [i2]Saurav Manchanda, Khoa D. Doan, Pranjul Yadav, S. Sathiya Keerthi:
Regression via Implicit Models and Optimal Transport Cost Minimization. CoRR abs/2003.01296 (2020) - [i1]Khoa D. Doan, Saurav Manchanda, Fengjiao Wang, S. Sathiya Keerthi, Avradeep Bhowmik, Chandan K. Reddy:
Image Generation Via Minimizing Fréchet Distance in Discriminator Feature Space. CoRR abs/2003.11774 (2020)
2010 – 2019
- 2019
- [c5]Saurav Manchanda, Pranjul Yadav, Khoa D. Doan, S. Sathiya Keerthi:
Targeted display advertising: the case of preferential attachment. IEEE BigData 2019: 1868-1877 - [c4]Khoa D. Doan, Pranjul Yadav, Chandan K. Reddy:
Adversarial Factorization Autoencoder for Look-alike Modeling. CIKM 2019: 2803-2812 - [c3]Khoa D. Doan, Guolei Yang, Chandan K. Reddy:
An Attentive Spatio-Temporal Neural Model for Successive Point of Interest Recommendation. PAKDD (3) 2019: 346-358 - 2016
- [c2]Khoa D. Doan, Amidu O. Oloso, Kwo-Sen Kuo, Thomas L. Clune, Hongfeng Yu, Brian Nelson, Jian Zhang:
Evaluating the impact of data placement to spark and SciDB with an Earth Science use case. IEEE BigData 2016: 341-346 - [c1]Kwo-Sen Kuo, Amidu Oloso, Khoa D. Doan, Thomas L. Clune, Hongfeng Yu:
Implications of data placement strategy to Big Data technologies based on shared-nothing architecture for geosciences. IGARSS 2016: 7605-7607
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint