Phuong Ha Nguyen
Orcid: 0000-0002-0801-7187
According to our database1,
Phuong Ha Nguyen
authored at least 52 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
Batch Clipping and Adaptive Layerwise Clipping for Differential Private Stochastic Gradient Descent.
CoRR, 2023
CoRR, 2023
Practical Budget Pacing Algorithms and Simulation Test Bed for eBay Marketplace Sponsored Search.
Proceedings of the Workshop on Data Mining for Online Advertising (AdKDD 2023) co-located with the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2023), 2023
2022
IEEE Access, 2022
2021
J. Mach. Learn. Res., 2021
IACR Cryptol. ePrint Arch., 2021
Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise.
CoRR, 2020
CoRR, 2020
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020
2019
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
J. Mach. Learn. Res., 2019
CoRR, 2019
Tight Dimension Independent Lower Bound on the Expected Convergence Rate for Diminishing Step Sizes in SGD.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD.
Proceedings of the 36th International Conference on Machine Learning, 2019
2018
IEEE Trans. Computers, 2018
Tight Dimension Independent Lower Bound on Optimal Expected Convergence Rate for Diminishing Step Sizes in SGD.
CoRR, 2018
Proceedings of the 35th International Conference on Machine Learning, 2018
2017
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test.
ACM Trans. Design Autom. Electr. Syst., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise.
Cryptogr., 2017
Proceedings of the Euromicro Conference on Digital System Design, 2017
2016
IACR Cryptol. ePrint Arch., 2016
An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function.
IACR Cryptol. ePrint Arch., 2016
2015
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015
Tutorial T7: Physically Unclonable Function: A Promising Security Primitive for Internet of Things.
Proceedings of the 28th International Conference on VLSI Design, 2015
Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
2014
Proceedings of the 18th International Symposium on VLSI Design and Test, 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010