Cam Nguyen Tan

Orcid: 0000-0002-3909-7650

According to our database1, Cam Nguyen Tan authored at least 27 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models.
Clust. Comput., February, 2025

2024
Uit-DGAdetector: detect domains generated by algorithms using machine learning.
Clust. Comput., September, 2024

AAGAN: Android Malware Generation System Based on Generative Adversarial Network.
Vietnam. J. Comput. Sci., May, 2024

XLMR4MD: New Vietnamese dataset and framework for detecting the consistency of description and permission in Android applications using large language models.
Comput. Secur., 2024

A multimodal Windows malware detection method based on hybrid analysis and graph representations.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2024

uitPEclaFL: A Study on PE Malware Classification Using Federated Learning.
Proceedings of the 21st International Joint Conference on Computer Science and Software Engineering, 2024

2023
An Intelligent Approach to Improving the Performance of Threat Detection in IoT.
IEEE Access, 2023

FlwrBC: Incentive Mechanism Design for Federated Learning by Using Blockchain.
IEEE Access, 2023

On the effectiveness of transferability of adversarial Android malware samples against learning-based detectors.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2023

Android Malware Category and Family Classification Using Static Analysis.
Proceedings of the International Conference on Information Networking, 2023

2022
A Study on Accounting Information System Security.
ICO, 2022

A Research on Countering Virtual Machine Evasion Techniques of Malware in Dynamic Analysis.
ICO, 2022

uitXkernel: Android Kernel Forensic for Security Analysis Purposes.
ICO, 2022

Fall Detection System Based on Pose Estimation in Videos.
ICO, 2022

Inter-application Communications Using Covert Channels in Android Applications.
ICO, 2022

UIT-ADF: A System for Android Device Forensics.
ICO, 2022

2021
Detect Android malware by using deep learning: Experiment and Evaluation.
Proceedings of the ICMLSC '21: 2021 The 5th International Conference on Machine Learning and Soft Computing, 2021

2019
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis.
Clust. Comput., 2019

Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique.
Clust. Comput., 2019

Detect Malware in Android Firmware Based on Distributed Network Environment.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Proposing Automatic Dataset Generation System to Support Android Sensitive Data Leakage Detection Systems.
Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, 2019

2017
Sensitive Data Leakage Detection in Pre-Installed Applications of Custom Android Firmware.
Proceedings of the 18th IEEE International Conference on Mobile Data Management, 2017

eDSDroid: A Hybrid Approach for Information Leak Detection in Android.
Proceedings of the Information Science and Applications 2017, 2017

Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic Analysis.
Proceedings of the Information Science and Applications 2017, 2017

2014
Semantic Set Analysis for Malware Detection.
Proceedings of the Computer Information Systems and Industrial Management, 2014

SSSM-semantic set and string matching based malware detection.
Proceedings of the Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2014

2009
Early Abnormal Overload Detection and the Solution on Content Delivery Network.
Proceedings of the Innovations in Computing Sciences and Software Engineering, 2009


  Loading...