Tran Khanh Dang
Orcid: 0000-0002-7282-3589Affiliations:
- Van Lang University (VLU), Ho Chi Minh City, Vietnam
- HCMC University of Industry and Trade (HUIT), Ho Chi Minh City, Vietnam (former)
- HCMC University of Technology, VNUHCM, Ho Chi Minh City, Vietnam (former)
According to our database1,
Tran Khanh Dang
authored at least 158 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
SN Comput. Sci., June, 2024
A Pragmatic Privacy-Preserving Deep Learning Framework Satisfying Differential Privacy.
SN Comput. Sci., January, 2024
Int. J. Web Inf. Syst., 2024
Proceedings of the 18th International Conference on Ubiquitous Information Management and Communication, 2024
Proceedings of the 18th International Conference on Advanced Computing and Analytics, 2024
2023
SN Comput. Sci., November, 2023
VNLES: A Reasoning-enable Legal Expert System using Ontology Modeling-based Method: A Case Study of Vietnam Criminal Code.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023
An Enhanced Incentive Mechanism for Crowdsourced Federated Learning Based on Contract Theory and Shapley Value.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023
2022
A Deeper Analysis of the Hierarchical Clustering and Set Unionability-Based Data Union Method.
SN Comput. Sci., 2022
A Hybrid Approach Using Decision Tree and Multiple Linear Regression for Predicting Students' Performance Based on Learning Progress and Behavior.
SN Comput. Sci., 2022
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022
pPATE: A Pragmatic Private Aggregation of Teacher Ensembles Framework by Sparse Vector Technique Based Differential Privacy, Paillier Cryptosystem and Human-in-the-loop.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2022
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2022
Implement the Data Conversion System by Using α-Lightweight Coreset for Validation Process.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2022
Secure Recommender System based on Neural Collaborative Filtering and Federated Learning.
Proceedings of the 2022 International Conference on Advanced Computing and Analytics (ACOMPA), 2022
2021
SN Comput. Sci., 2021
Pervasive Mob. Comput., 2021
An effective and elastic blockchain-based provenance preserving solution for the open data.
Int. J. Web Inf. Syst., 2021
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021
On Using Cryptographic Technologies in Privacy Protection of Online Conferencing Systems.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2021
Proceedings of the Future Data and Security Engineering - 8th International Conference, 2021
A Hybrid Approach Using Decision Tree and Multiple Linear Regression for Predicting Students' Performance.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2021
Proceedings of the Future Data and Security Engineering - 8th International Conference, 2021
Comprehensive Analysis of Privacy in Black-Box and White-Box Inference Attacks Against Generative Adversarial Network.
Proceedings of the Future Data and Security Engineering - 8th International Conference, 2021
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2021
Open<sup>K</sup>: An Elastic Data Cleansing System with A Clustering-based Data Anomaly Detection Approach.
Proceedings of the 15th International Conference on Advanced Computing and Applications, 2021
Implementation and Evaluation of PartyCrasher<sup>BLE</sup>: An Energy-Efficient and Privacy-Preserving Authentication Protocol for BLE Devices.
Proceedings of the 15th International Conference on Advanced Computing and Applications, 2021
2020
A Lightweight Indexing Approach for Efficient Batch Similarity Processing with MapReduce.
SN Comput. Sci., 2020
A Comparative Study of the Some Methods Used in Constructing Coresets for Clustering Large Datasets.
SN Comput. Sci., 2020
SN Comput. Sci., 2020
Interaction and Visualization Design for User Privacy Interface on Online Social Networks.
SN Comput. Sci., 2020
CoRR, 2020
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2020
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2020
A Pragmatic Blockchain Based Solution for Managing Provenance and Characteristics in the Open Data Context.
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020
Investigating Local Differential Privacy and Generative Adversarial Network in Collecting Data.
Proceedings of the International Conference on Advanced Computing and Applications, 2020
Proceedings of the International Conference on Advanced Computing and Applications, 2020
2019
A Parallel Incremental Frequent Itemsets Mining IFIN+: Improvement and Extensive Evaluation.
Trans. Large Scale Data Knowl. Centered Syst., 2019
The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach.
Secur. Commun. Networks, 2019
On verifying the authenticity of e-commercial crawling data by a semi-crosschecking method.
Int. J. Web Inf. Syst., 2019
Flow aggregation for SDN-based delay-insensitive traffic control in mobile core networks.
IET Commun., 2019
Privacy preserving biometric-based remote authentication with secure processing unit on untrusted server.
IET Biom., 2019
Secure Biometric-based Remote Authentication Protocol using Chebyshev Polynomials and Fuzzy Extractor.
CoRR, 2019
A New Biometric Template Protection Using Random Orthonormal Projection and Fuzzy Commitment.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019
Proceedings of the Future Data and Security Engineering - 6th International Conference, 2019
Resource-Constrained IoT Authentication Protocol: An ECC-Based Hybrid Scheme for Device-to-Server and Device-to-Device Communications.
Proceedings of the Future Data and Security Engineering - 6th International Conference, 2019
Proceedings of the Future Data and Security Engineering - 6th International Conference, 2019
Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains.
Proceedings of the Future Data and Security Engineering - 6th International Conference, 2019
Visualizing Access Logs of a Scientific Digital Library Effectively as Multiple Time Series Using Modified Horizon Graphs.
Proceedings of the 2019 International Conference on Advanced Computing and Applications, 2019
Proceedings of the 2019 International Conference on Advanced Computing and Applications, 2019
2018
A hybrid template protection approach using secure sketch and ANN for strong biometric key generation with revocability guarantee.
Int. Arab J. Inf. Technol., 2018
A Light-Weight Tightening Authentication Scheme for the Objects' Encounters in the Meetings.
Proceedings of the Future Data and Security Engineering - 5th International Conference, 2018
Proceedings of the Future Data and Security Engineering - 5th International Conference, 2018
Proceedings of the Future Data and Security Engineering - 5th International Conference, 2018
An effective flow aggregation for SDN-based background and foreground traffic control.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
Proceedings of the 2018 International Conference on Advanced Computing and Applications, 2018
2017
Trans. Large Scale Data Knowl. Centered Syst., 2017
Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol.
Trans. Large Scale Data Knowl. Centered Syst., 2017
Using JSON to Specify Privacy Preserving-Enabled Attribute-Based Access Control Policies.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017
Proceedings of the Database and Expert Systems Applications, 2017
Proceedings of the Database and Expert Systems Applications, 2017
2016
Trans. Large Scale Data Knowl. Centered Syst., 2016
Inf. Process. Lett., 2016
Cancellable fuzzy vault with periodic transformation for biometric template protection.
IET Biom., 2016
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
A Cross-Checking Based Method for Fraudulent Detection on E-Commercial Crawling Data.
Proceedings of the 2016 International Conference on Advanced Computing and Applications, 2016
Rew-XAC: An Approach to Rewriting Request for Elastic ABAC Enforcement with Dynamic Policies.
Proceedings of the 2016 International Conference on Advanced Computing and Applications, 2016
2015
Polibits, 2015
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation.
Proceedings of the Information and Communication Technology, 2015
Proceedings of the Future Data and Security Engineering - Second International Conference, 2015
KUR-Algorithm: From Position to Trajectory Privacy Protection in Location-Based Applications.
Proceedings of the Database and Expert Systems Applications, 2015
Proceedings of the 2015 International Conference on Advanced Computing and Applications, 2015
Extending Web Application IDS Interface: Visualizing Intrusions in Geographic and Web Space.
Proceedings of the 2015 International Conference on Advanced Computing and Applications, 2015
2014
Protecting Biometric Features by Periodic Function-Based Transformation and Fuzzy Vault.
Trans. Large Scale Data Knowl. Centered Syst., 2014
Trans. Large Scale Data Knowl. Centered Syst., 2014
A Path-Consistency based Algorithm for Anomaly Detection of Spatial Constraints in GeoXACML Policies.
J. Mobile Multimedia, 2014
Towards a flexible framework to support a generalized extension of XACML for spatio-temporal RBAC model with reasoning ability.
Int. J. Web Inf. Syst., 2014
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
B<sup>dHCO</sup>-tree: integrating location privacy protection algorithms for frequent updates of moving objects.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the Data Management in Cloud, Grid and P2P Systems, 2014
Proceedings of the Future Data and Security Engineering - First International Conference, 2014
An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014
2013
Int. J. Web Inf. Syst., 2013
Int. J. Web Inf. Syst., 2013
Int. J. Pervasive Comput. Commun., 2013
Int. J. Intell. Inf. Database Syst., 2013
Enhanced security in internet voting protocol using blind signature and dynamic ballots.
Electron. Commer. Res., 2013
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Towards a Flexible Framework to Support a Generalized Extension of XACML for Spatio-temporal RBAC Model with Reasoning Ability.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013
Proceedings of the 24th International Workshop on Database and Expert Systems Applications, 2013
Proceedings of the 24th International Workshop on Database and Expert Systems Applications, 2013
2012
Semantic B<sup>ob</sup>-tree: a new obfuscation technique for location privacy protection.
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012
Enhanced security in internet voting protocol using blind signatures and dynamic ballots.
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
X-STROWL: A generalized extension of XACML for context-aware spatio-temporal RBAC model with OWL.
Proceedings of the Seventh International Conference on Digital Information Management, 2012
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012
A Novel Trajectory Privacy-Preserving Future Time Index Structure in Moving Object Databases.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012
2011
OST-Tree: An Access Method for Obfuscating Spatio-Temporal Data in Location Based Services.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
User Privacy Protection from Trajectory Perspective in Location-Based Applications.
Proceedings of the Interdisciplinarity in Complex Systems, 2011
Proceedings of the Database and Expert Systems Applications, 2011
B<sup>ob</sup>-Tree: An Efficient B<sup> + </sup>-Tree Based Index Structure for Geographic-Aware Obfuscation.
Proceedings of the Intelligent Information and Database Systems, 2011
2010
Proceedings of the Advances in Intelligent Information and Database Systems, 2010
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
Memorizing Algorithm: Protecting User Privacy using Historical Information of Location-Based Services.
Int. J. Mob. Comput. Multim. Commun., 2010
eM<sup>2</sup>: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010
Two Novel Adaptive Symbolic Representations for Similarity Search in Time Series Databases.
Proceedings of the Advances in Web Technologies and Applications, 2010
HOT <i>a</i>SAX: A Novel Adaptive Symbolic Representation for Time Series Discords Discovery.
Proceedings of the Intelligent Information and Database Systems, 2010
2009
Polibits, 2009
Proceedings of the MoMM'2009, 2009
BiB<sup>+</sup>-tree: an efficient multiversion access method for bitemporal databases.
Proceedings of the iiWAS'2009, 2009
Detecting, Monitoring and Preventing Database Security Breaches in a Housing-Based Outsourcing Model.
Proceedings of the Modeling, 2009
Proceedings of the Database Technologies: Concepts, 2009
2008
An Extended Video Database Model for Supporting Finer-Grained Multi-Policy and Multi-Level Access Controls.
Polibits, 2008
A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases.
J. Softw., 2008
Inf. Resour. Manag. J., 2008
2007
Solving approximate similarity queries.
Comput. Syst. Sci. Eng., 2007
An Extended Payment Model with Fair Non-Repudiation Protocols for M-Commerce.
Proceedings of the MoMM'2007, 2007
An Extensible Framework for Database Security Assessment and Visualization.
Proceedings of the iiWAS'2007, 2007
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
The SH-Tree: A Novel and Flexible Super Hybrid Index Structure for Similarity Search on Multidimensional Data.
Int. J. Comput. Sci. Appl., 2006
A practical solution to supporting oblivious basic operations on dynamic outsourced search trees.
Comput. Syst. Sci. Eng., 2006
Proceedings of the Modeling, 2006
2005
Oblivious Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers.
Int. J. Comput. Sci. Appl., 2005
Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers.
Proceedings of the Trust Management, Third International Conference, 2005
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
2004
Extreme Security Protocols for Outsourcing Database Services.
Proceedings of the iiWAS'2004, 2004
2003
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003
2002
A General and Efficient Approach for Solving Nearest Neighbor Problem in the Vague Query System.
Proceedings of the Advances in Web-Age Information Management, 2002
An Efficient Incremental Lower Bound Approach for Solving Approximate Nearest-Neighbor Problem of Complex Vague Queries.
Proceedings of the Flexible Query Answering Systems, 5th International Conference, 2002
ISA - An Incremental Hyper-sphere Approach for Efficiently Solving Complex Vague Queries.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002
2001
Proceedings of the Database and Expert Systems Applications, 12th International Conference, 2001