Phan The Duy
Orcid: 0000-0002-5945-3712Affiliations:
- Vietnam National University, Ho Chi Minh City, Vietnam
According to our database1,
Phan The Duy
authored at least 59 papers
between 2018 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
On the effectiveness of adversarial samples against ensemble learning-based windows PE malware detectors.
Int. J. Inf. Sec., February, 2025
Vulnsense: efficient vulnerability detection in ethereum smart contracts by multimodal learning with graph neural network and language model.
Int. J. Inf. Sec., February, 2025
FedKD-IDS: A robust intrusion detection system using knowledge distillation-based semi-supervised federated learning and anti-poisoning attack mechanism.
Inf. Fusion, 2025
2024
Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection.
Int. J. Inf. Sec., December, 2024
Vietnam. J. Comput. Sci., May, 2024
Fed-LSAE: Thwarting poisoning attacks against federated cyber threat detection system via Autoencoder-based latent space inspection.
J. Inf. Secur. Appl., 2024
Fed-Evolver: An automated evolving approach for federated Intrusion Detection System using adversarial autoencoder in SDN-enabled networks.
Internet Things, 2024
Raiju: Reinforcement learning-guided post-exploitation for automating security assessment of network systems.
Comput. Networks, 2024
A Coverage-Guided Fuzzing Method for Automatic Software Vulnerability Detection Using Reinforcement Learning-Enabled Multi-Level Input Mutation.
IEEE Access, 2024
A Study on Adversarial Sample Resistance and Defense Mechanism for Multimodal Learning-Based Phishing Website Detection.
IEEE Access, 2024
Towards Transparent Spam Detection: Sentinel Call - A Distributed Ledger Solution for Call Filtering.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2024
An empirical study on the impact of graph representations for code vulnerability detection using graph learning.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2024
2023
FedChain-Hunter: A reliable and privacy-preserving aggregation for federated threat hunting framework in SDN-based IIoT.
Internet Things, December, 2023
Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks.
J. Inf. Secur. Appl., May, 2023
XGV-BERT: Leveraging Contextualized Language Model and Graph Neural Network for Efficient Software Vulnerability Detection.
CoRR, 2023
XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN.
CoRR, 2023
Shark-Eyes: A multimodal fusion framework for multi-view-based phishing website detection.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
DoppelSearch: A Novel Approach to Content-Based Video Retrieval for AI Challenge HCMC 2023.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
Binary Representation Embedding and Deep Learning For Binary Code Similarity Detection in Software Security Domain.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
Contextual Language Model and Transfer Learning for Reentrancy Vulnerability Detection in Smart Contracts.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
BlazeSearch: A multimomal semantic search engine for retrieving in-video information for AI Challenge HCMC 2023.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
WebGuardRL: An Innovative Reinforcement Learning-based Approach for Advanced Web Attack Detection.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
DeFL-BC: Empowering Reliable Cyberattack Detection through Decentralized Federated Learning and Poisoning Attack Defense.
Proceedings of the International Conference on Computing and Communication Technologies, 2023
On the effectiveness of transferability of adversarial Android malware samples against learning-based detectors.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2023
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2023
XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph.
Proceedings of the Information Security Practice and Experience, 2023
FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems Using Autoencoder-Based Latent Space Representations.
Proceedings of the Information Security Practice and Experience, 2023
A Consensus Protocol for Incentivizing Contribution from Decentralized Community for Machine Learning-based Scamming Website Detection.
Proceedings of the International Conference on System Science and Engineering, 2023
A Multimodal Deep Learning Approach for Efficient Vulnerability Detection in Smart Contracts.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023
2022
B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain.
J. Inf. Secur. Appl., 2022
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2022
A Privacy-Preserving Approach For Building Learning Models in Smart Healthcare using Blockchain and Federated Learning.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022
Leveraging Deep Learning Image Classifiers for Visual Similarity-based Phishing Website Detection.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022
A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022
Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware Detectors.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
Adversarial AutoEncoder and Generative Adversarial Networks for Semi-Supervised Learning Intrusion Detection System.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
Cyber Threat Intelligence for Proactive Defense against Adversary in SDN-assisted IIoTs context.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
Leveraging Deep Reinforcement Learning for Automating Penetration Testing in Reconnaissance and Exploitation Phase.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
DA-GAN: Domain Adaptation for Generative Adversarial Networks-assisted Cyber Threat Detection.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
A Blockchain-based approach and Attribute-based Encryption for Healthcare Record Data Exchange.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
A Method for Flexible Definition and Automatic Implementation of Laboratory Environment in Online Training Platforms.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement Learning.
Proceedings of the Information Security Practice and Experience, 2022
Federated Learning-Based Cyber Threat Hunting for APT Attack Detection in SDN-Enabled Networks.
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022
Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN.
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022
2021
DIGFuPAS: Deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks.
Comput. Secur., 2021
A Deep Transfer Learning Approach for Flow-Based Intrusion Detection in SDN-Enabled Network.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021
Strengthening IDS against Evasion Attacks with GAN-based Adversarial Samples in SDN-enabled network.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2021
Federated Learning-Based Intrusion Detection in the Context of IIoT Networks: Poisoning Attack and Defense.
Proceedings of the Network and System Security - 15th International Conference, 2021
A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System.
Proceedings of the Network and System Security - 15th International Conference, 2021
2020
A survey on Blockchain-based applications for reforming data protection, privacy and security.
CoRR, 2020
CVSS Based Attack Analysis Using a Graphical Security Model: Review and Smart Grid Case Study.
Proceedings of the Smart Grid and Internet of Things - 4th EAI International Conference, 2020
Forensic analysis of TikTok application to seek digital artifacts on Android smartphone.
Proceedings of the 2020 RIVF International Conference on Computing and Communication Technologies, 2020
2019
A Security-Enhanced Monitoring System for Northbound Interface in SDN using Blockchain.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019
Toward a Trust-Based Authentication Framework of Northbound Interface in Software Defined Networking.
Proceedings of the Industrial Networks and Intelligent Systems, 2019
Aloba: A Mechanism of Adaptive Load Balancing and Failure Recovery in Distributed SDN Controllers.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019
Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019
2018
A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation.
Proceedings of the Ninth International Symposium on Information and Communication Technology, 2018