Huy H. Nguyen

Orcid: 0000-0002-2000-7977

According to our database1, Huy H. Nguyen authored at least 56 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Reversible anonymization for privacy of facial biometrics via cyclic learning.
EURASIP J. Inf. Secur., December, 2024

LookupForensics: A Large-Scale Multi-Task Dataset for Multi-Phase Image-Based Fact Verification.
CoRR, 2024

Mitigating Backdoor Attacks using Activation-Guided Model Editing.
CoRR, 2024

Exploring Self-Supervised Vision Transformers for Deepfake Detection: A Comparative Analysis.
CoRR, 2024

Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation.
CoRR, 2024

Surface Normal Estimation with Transformers.
CoRR, 2024

Analysis of Fine-Grained Counting Methods for Masked Face Counting: A Comparative Study.
IEEE Access, 2024

eKYC-DF: A Large-Scale Deepfake Dataset for Developing and Evaluating eKYC Systems.
IEEE Access, 2024

Cross-Attention watermarking of Large Language Models.
Proceedings of the IEEE International Conference on Acoustics, 2024

Leveraging Chat-Based Large Vision Language Models for Multimodal Out-of-Context Detection.
Proceedings of the Advanced Information Networking and Applications, 2024

Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network.
CoRR, 2023

Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection.
CoRR, 2023

Cyber Vaccine for Deepfake Immunity.
IEEE Access, 2023

Closer Look at the Transferability of Adversarial Examples: How They Fool Different Models Differently.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

Face Forgery Detection Based on Facial Region Displacement Trajectory Series.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, 2023

Analysis of Master Vein Attacks on Finger Vein Recognition Systems.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

Physics-Based Adversarial Attack on Near-Infrared Human Detector for Nighttime Surveillance Camera Systems.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

From Deconstruction to Reconstruction: A Plug-In Module for Diffusion-Based Purification of Adversarial Examples.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023

How Close Are Other Computer Vision Tasks to Deepfake Detection?
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Image-Text Out-Of-Context Detection Using Synthetic Multimodal Misinformation.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Quality Assurance of A GPT-Based Sentiment Analysis System: Adversarial Review Data Generation and Detection.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
Master Face Attacks on Face Recognition Systems.
IEEE Trans. Biom. Behav. Identity Sci., 2022

Potential Attacks of DeepFake on eKYC Systems and Remedy for eKYC with DeepFake Detection Using Two-Stream Network of Facial Appearance and Motion Features.
SN Comput. Sci., 2022

Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images.
IEICE Trans. Inf. Syst., 2022

Robust Deepfake On Unrestricted Media: Generation And Detection.
CoRR, 2022

Rethinking Adversarial Examples for Location Privacy Protection.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022


Capsule-Forensics Networks for Deepfake Detection.
Proceedings of the Handbook of Digital Face Manipulation and Detection, 2022

2021
Generation and Detection of Media Clones.
IEICE Trans. Inf. Syst., 2021

Preventing Fake Information Generation Against Media Clone Attacks.
IEICE Trans. Inf. Syst., 2021

Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio.
CoRR, 2021

OpenForensics: Large-Scale Challenging Dataset For Multi-Face Forgery Detection And Segmentation In-The-Wild.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Potential Threat of Face Swapping to eKYC with Face Registration and Augmented Solution with Deepfake Detection.
Proceedings of the Future Data and Security Engineering - 8th International Conference, 2021

Fashion-Guided Adversarial Attack on Person Segmentation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021

Feature Extraction Based on Denoising Auto Encoder for Classification of Adversarial Examples.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

2020
Viable Threat on News Reading: Generating Biased News Using Natural Language Models.
CoRR, 2020

Security of Facial Forensics Models Against Adversarial Attacks.
Proceedings of the IEEE International Conference on Image Processing, 2020

Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems.
Proceedings of the 2020 IEEE International Joint Conference on Biometrics, 2020

A Method for Identifying Origin of Digital Images Using a Convolutional Neural Network.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Detection of Adversarial Examples Based on Sensitivities to Noise Removal Filter.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-Based Detection.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Spatio-temporal generative adversarial network for gait anonymization.
J. Inf. Secur. Appl., 2019

Detecting and Correcting Adversarial Images Using Image Processing Operations.
CoRR, 2019

A Method for Identifying Origin of Digital Images Using a Convolution Neural Network.
CoRR, 2019

Use of a Capsule Network to Detect Fake Images and Videos.
CoRR, 2019

Capsule-forensics: Using Capsule Networks to Detect Forged Images and Videos.
Proceedings of the IEEE International Conference on Acoustics, 2019

Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

An RGB Gait Anonymization Model for Low-Quality Silhouettes.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
Identifying Computer-Translated Paragraphs using Coherence Features.
Proceedings of the 32nd Pacific Asia Conference on Language, Information and Computation, 2018

Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
An approach for gait anonymization using deep learning.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Identifying computer-generated text using statistical analysis.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2015
Discriminating Between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

A Generalized Authentication Scheme for Mobile Phones Using Gait Signals.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015


  Loading...