Nghi Hoang Khoa

Orcid: 0000-0001-6418-4169

According to our database1, Nghi Hoang Khoa authored at least 20 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
AAGAN: Android Malware Generation System Based on Generative Adversarial Network.
Vietnam. J. Comput. Sci., May, 2024

2023
FedChain-Hunter: A reliable and privacy-preserving aggregation for federated threat hunting framework in SDN-based IIoT.
Internet Things, December, 2023

Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks.
J. Inf. Secur. Appl., May, 2023

On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors.
CoRR, 2023

XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN.
CoRR, 2023

VulnSense: Efficient Vulnerability Detection in Ethereum Smart Contracts by Multimodal Learning with Graph Neural Network and Language Model.
CoRR, 2023

On the effectiveness of transferability of adversarial Android malware samples against learning-based detectors.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2023

Android Malware Category and Family Classification Using Static Analysis.
Proceedings of the International Conference on Information Networking, 2023

A Multimodal Deep Learning Approach for Efficient Vulnerability Detection in Smart Contracts.
Proceedings of the IEEE Global Communications Conference, 2023

2022
A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022

Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware Detectors.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022

Cyber Threat Intelligence for Proactive Defense against Adversary in SDN-assisted IIoTs context.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022

Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN.
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022

uitXkernel: Android Kernel Forensic for Security Analysis Purposes.
ICO, 2022

UIT-ADF: A System for Android Device Forensics.
ICO, 2022

2021
DIGFuPAS: Deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks.
Comput. Secur., 2021

A Deep Transfer Learning Approach for Flow-Based Intrusion Detection in SDN-Enabled Network.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Detect Android malware by using deep learning: Experiment and Evaluation.
Proceedings of the ICMLSC '21: 2021 The 5th International Conference on Machine Learning and Soft Computing, 2021

2020
Forensic analysis of TikTok application to seek digital artifacts on Android smartphone.
Proceedings of the 2020 RIVF International Conference on Computing and Communication Technologies, 2020

2019
Proposing Automatic Dataset Generation System to Support Android Sensitive Data Leakage Detection Systems.
Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, 2019


  Loading...