default search action
Nghi Hoang Khoa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Doan Minh Trung, Nghi Hoang Khoa, Phan The Duy, Van-Hau Pham, Nguyen Tan Cam:
AAGAN: Android Malware Generation System Based on Generative Adversarial Network. Vietnam. J. Comput. Sci. 11(2): 275-299 (2024) - 2023
- [j3]Phan The Duy, Nguyen Huu Quyen, Nghi Hoang Khoa, Dung Tran Tuan, Van-Hau Pham:
FedChain-Hunter: A reliable and privacy-preserving aggregation for federated threat hunting framework in SDN-based IIoT. Internet Things 24: 100966 (2023) - [j2]Phan The Duy, Nghi Hoang Khoa, Do Thi Thu Hien, Hien Do Hoang, Van-Hau Pham:
Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks. J. Inf. Secur. Appl. 74: 103472 (2023) - [c13]Le Cong Trinh, Vu Trung Kien, Trinh Minh Hoang, Nguyen Huu Quyen, Nghi Hoang Khoa, Phan The Duy, Van-Hau Pham:
A Multimodal Deep Learning Approach for Efficient Vulnerability Detection in Smart Contracts. GLOBECOM 2023: 3421-3426 - [c12]Cong-Danh Nguyen, Nghi Hoang Khoa, Khoa Nguyen-Dang Doan, Nguyen Tan Cam:
Android Malware Category and Family Classification Using Static Analysis. ICOIN 2023: 162-167 - [c11]Doan Minh Trung, Nghi Hoang Khoa, Bui Tan Hai Dang, Phan The Duy, Nguyen Tan Cam, Van-Hau Pham:
On the effectiveness of transferability of adversarial Android malware samples against learning-based detectors. MAPR 2023: 1-6 - [i3]Phan The Duy, Nghi Hoang Khoa, Nguyen Huu Quyen, Le Cong Trinh, Vu Trung Kien, Trinh Minh Hoang, Van-Hau Pham:
VulnSense: Efficient Vulnerability Detection in Ethereum Smart Contracts by Multimodal Learning with Graph Neural Network and Language Model. CoRR abs/2309.08474 (2023) - [i2]Huynh Thai Thi, Ngo Duc Hoang Son, Phan The Duy, Nghi Hoang Khoa, Khoa Ngo-Khanh, Van-Hau Pham:
XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN. CoRR abs/2309.08485 (2023) - [i1]Trong-Nghia To, Danh Le Kim, Do Thi Thu Hien, Nghi Hoang Khoa, Hien Do Hoang, Phan The Duy, Van-Hau Pham:
On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors. CoRR abs/2309.13841 (2023) - 2022
- [c10]Nguyen Tan Cam, Pham Nhat Duy, Nghi Hoang Khoa, Le Hoang Vien, Phan Thanh Truoc, Trinh Gia Huy:
UIT-ADF: A System for Android Device Forensics. ICO 2022: 290-299 - [c9]Nguyen Tan Cam, To Ung Vu, Nghi Hoang Khoa, Van-Hau Pham:
uitXkernel: Android Kernel Forensic for Security Analysis Purposes. ICO 2022: 1148-1158 - [c8]Phan The Duy, Hien Do Hoang, Nghi Hoang Khoa, Do Thi Thu Hien, Van-Hau Pham:
Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN. ISCIT 2022: 27-32 - [c7]Nghi Hoang Khoa, Doan Minh Trung, Bui Cong Nguyen Khoa, To Thi My Au, Van-Giau Ung, Phan The Duy, Van-Hau Pham:
Cyber Threat Intelligence for Proactive Defense against Adversary in SDN-assisted IIoTs context. RIVF 2022: 1-6 - [c6]The Duy Phan, Tran Duc Luong, Nguyen Hoang Quoc An, Quyen Nguyen Huu, Nghi Hoang Khoa, Van-Hau Pham:
Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware Detectors. SoICT 2022: 31-38 - [c5]Do Thi Thu Hien, The Duy Phan, Hao Le Anh, Lan Nguyen Duy, Nghi Hoang Khoa, Van-Hau Pham:
A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation. SoICT 2022: 142-149 - 2021
- [j1]Phan The Duy, Le Khac Tien, Nghi Hoang Khoa, Do Thi Thu Hien, Anh Gia-Tuan Nguyen, Van-Hau Pham:
DIGFuPAS: Deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks. Comput. Secur. 109: 102367 (2021) - [c4]Nghi Hoang Khoa, Nguyen Tan Cam, Van-Hau Pham, Anh Gia-Tuan Nguyen:
Detect Android malware by using deep learning: Experiment and Evaluation. ICMLSC 2021: 129-134 - [c3]Phan The Duy, Nghi Hoang Khoa, Hoang Hiep, Nguyen Ba Tuan, Hien Do Hoang, Do Thi Thu Hien, Van-Hau Pham:
A Deep Transfer Learning Approach for Flow-Based Intrusion Detection in SDN-Enabled Network. SoMeT 2021: 327-339 - 2020
- [c2]Nghi Hoang Khoa, Phan The Duy, Hien Do Hoang, Do Thi Thu Hien, Van-Hau Pham:
Forensic analysis of TikTok application to seek digital artifacts on Android smartphone. RIVF 2020: 1-5
2010 – 2019
- 2019
- [c1]Nguyen Tan Cam, Nghi Hoang Khoa, Le Duc Thinh, Van-Hau Pham, Tuan A. Nguyen:
Proposing Automatic Dataset Generation System to Support Android Sensitive Data Leakage Detection Systems. ICCAI 2019: 78-83
Coauthor Index
aka: The Duy Phan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint