Thanh Ha Le

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Impacts of digital business on global value chain participation in European countries.
AI Soc., June, 2024

2023
Quality Assessment Criteria and Methods for 3D Digital Replica of Historical Printing Woodblocks.
ACM Journal on Computing and Cultural Heritage, September, 2023

Digital Business and Economic Complexity.
J. Comput. Inf. Syst., January, 2023

An eye tracking - based system for capturing visual strategies in reading of children with dyslexia.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023

3D Depth Map Inpainting for Vietnamese Historical Printing Woodblocks: A Gated Convolution Approach.
Proceedings of the 15th International Conference on Knowledge and Systems Engineering, 2023

Detection and Recognition of Sino-Nom Characters on Woodblock-Printed Images.
Proceedings of the 15th International Conference on Knowledge and Systems Engineering, 2023

2022
Forecasting the Coffee Consumption Demand in Vietnam Based on Grey Forecasting Model.
Vietnam. J. Comput. Sci., 2022

Automated reverse engineering of role-based access control policies of web applications.
J. Syst. Softw., 2022

Combination of Images and Point Clouds in a Generative Adversarial Network for Upsampling Crack Point Clouds.
IEEE Access, 2022

2021
Two-stage convolutional neural network for road crack detection and segmentation.
Expert Syst. Appl., 2021

2020
A deep wavelet sparse autoencoder method for online and automatic electrooculographical artifact removal.
Neural Comput. Appl., 2020

End-to-End Image Patch Quality Assessment for Image/Video With Compression Artifacts.
IEEE Access, 2020

Compression Artifacts Image Patch database for Perceptual Quality Assessment.
Proceedings of the 12th International Conference on Knowledge and Systems Engineering, 2020

Reducing Blocking Artifacts in CNN-Based Image Steganography by Additional Loss Functions.
Proceedings of the 12th International Conference on Knowledge and Systems Engineering, 2020

Studying on the Accuracy Improvement of GM (1, 1) Model.
Proceedings of the Advances in Computational Collective Intelligence, 2020

2019
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks.
IACR Cryptol. ePrint Arch., 2019

On the Detection of Video's Ethnic Vietnamese Thai Dance Movements.
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019

A Hierarchical Deep Deterministic Policy Gradients for Swarm Navigation.
Proceedings of the 11th International Conference on Knowledge and Systems Engineering, 2019

Reinforcement Learning Based Navigation with Semantic Knowledge of Indoor Environments.
Proceedings of the 11th International Conference on Knowledge and Systems Engineering, 2019

Sharing Experience in Multitask Reinforcement Learning.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Discriminate Natural versus Loudspeaker Emitted Speech.
Proceedings of the IEEE International Conference on Acoustics, 2019

Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis.
Proceedings of the 3rd ACM Workshop on Software Protection, 2019

2018
Compressive Online Video Background-Foreground Separation Using Multiple Prior Information and Optical Flow.
J. Imaging, 2018

View synthesis method for 3D video coding based on temporal and inter view correlation.
IET Image Process., 2018

Pavement Crack Detection using Convolutional Neural Network.
Proceedings of the Ninth International Symposium on Information and Communication Technology, 2018

Vision Memory for Target Object Navigation Using Deep Reinforcement Learning: An Empirical Study.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Real-Time Image Semantic Segmentation Networks with Residual Depth-Wise Separable Blocks.
Proceedings of the 2018 Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) and 19th International Symposium on Advanced Intelligent Systems (ISIS), 2018

DoSE: Deobfuscation based on Semantic Equivalence.
Proceedings of the 8th Software Security, 2018

2017
A new depth image quality metric using a pair of color and depth images.
Multim. Tools Appl., 2017

Compressive Online Robust Principal Component Analysis with Optical Flow for Video Foreground-Background Separation.
Proceedings of the Eighth International Symposium on Information and Communication Technology, 2017

Moving Object Detection in Compressed Domain for High Resolution Videos.
Proceedings of the Eighth International Symposium on Information and Communication Technology, 2017

Annotating Movement Phrases in Vietnamese Folk Dance Videos.
Proceedings of the Advances in Artificial Intelligence: From Theory to Practice, 2017

2016
Single camera based fall detection using motion and human shape features.
Proceedings of the Seventh Symposium on Information and Communication Technology, 2016

FISSC: A Fault Injection and Simulation Secure Collection.
Proceedings of the Computer Safety, Reliability, and Security, 2016

2015
A novel simulation approach for fault injection resistance evaluation on smart cards.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

2014
Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage.
IEICE Trans. Electron., 2014

Electromagnetic analysis, deciphering and reverse engineering of integrated circuits (E-MATA HARI).
Proceedings of the 22nd International Conference on Very Large Scale Integration, 2014

Forecasting moving object position based on temporal patterns.
Proceedings of the 2014 International Conference on Indoor Positioning and Indoor Navigation, 2014

Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Idea: Embedded Fault Injection Simulator on Smartcard.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

High-Level Simulation for Multiple Fault Injection Evaluation.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

2013
Power Analysis of Hardware Implementations Protected with Secret Sharing.
IACR Cryptol. ePrint Arch., 2013

Trademark image retrieval based on scale, rotation, translation invariant features.
Proceedings of the 2013 IEEE RIVF International Conference on Computing and Communication Technologies, 2013

Particulate Matter Concentration Estimation from Satellite Aerosol and Meteorological Parameters: Data-Driven Approaches.
Proceedings of the Knowledge and Systems Engineering, 2013

Exploring the Relations between Fault Sensitivity and Power Consumption.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Protecting AES against side-channel analysis using wire-tap codes.
J. Cryptogr. Eng., 2012

Profiled Model Based Power Simulator for Side Channel Evaluation.
IACR Cryptol. ePrint Arch., 2012

2011
A New Histogram Modification Based Reversible Data Hiding Algorithm Considering the Human Visual System.
IEEE Signal Process. Lett., 2011

"Re-synchronization by moments": An efficient solution to align Side-Channel traces.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Blur Estimation for Barcode Recognition in Out-of-Focus Images.
Proceedings of the Pattern Recognition and Machine Intelligence, 2011

Motion Vector Refinement Algorithm for the High Definition Video Coding.
Proceedings of the Control and Automation, and Energy System Engineering, 2011

2010
Mutual Information Analysis under the View of Higher-Order Statistics.
Proceedings of the Advances in Information and Computer Security, 2010

2009
An Improved Method to CABAC in the H.264/AVC Video Compression Standard.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

2008
An overview of side channel analysis attacks.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant.
IEEE Trans. Inf. Forensics Secur., 2007

Person identification system for future digital tv with intelligence.
IEEE Trans. Consumer Electron., 2007

Novel Approaches for Improving the Power Consumption Models in Correlation Analysis.
IACR Cryptol. ePrint Arch., 2007

Efficient Solution for Misalignment of Signal in Side Channel Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
Adaptive GOP Bit Allocation to Provide Seamless Video Streaming in Vertical Handoff.
Proceedings of the Advances in Image and Video Technology, First Pacific Rim Symposium, 2006

A Proposition for Correlation Power Analysis Enhancement.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006


  Loading...