Van-Hau Pham
Orcid: 0000-0003-3147-3356
According to our database1,
Van-Hau Pham
authored at least 77 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection.
Int. J. Inf. Sec., December, 2024
Vietnam. J. Comput. Sci., May, 2024
Fed-Evolver: An automated evolving approach for federated Intrusion Detection System using adversarial autoencoder in SDN-enabled networks.
Internet Things, 2024
Raiju: Reinforcement learning-guided post-exploitation for automating security assessment of network systems.
Comput. Networks, 2024
A Coverage-Guided Fuzzing Method for Automatic Software Vulnerability Detection Using Reinforcement Learning-Enabled Multi-Level Input Mutation.
IEEE Access, 2024
A Study on Adversarial Sample Resistance and Defense Mechanism for Multimodal Learning-Based Phishing Website Detection.
IEEE Access, 2024
Towards Transparent Spam Detection: Sentinel Call - A Distributed Ledger Solution for Call Filtering.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2024
An empirical study on the impact of graph representations for code vulnerability detection using graph learning.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2024
A multimodal Windows malware detection method based on hybrid analysis and graph representations.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2024
2023
FedChain-Hunter: A reliable and privacy-preserving aggregation for federated threat hunting framework in SDN-based IIoT.
Internet Things, December, 2023
Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks.
J. Inf. Secur. Appl., May, 2023
XGV-BERT: Leveraging Contextualized Language Model and Graph Neural Network for Efficient Software Vulnerability Detection.
CoRR, 2023
On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors.
CoRR, 2023
Fed-LSAE: Thwarting Poisoning Attacks against Federated Cyber Threat Detection System via Autoencoder-based Latent Space Inspection.
CoRR, 2023
XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN.
CoRR, 2023
VulnSense: Efficient Vulnerability Detection in Ethereum Smart Contracts by Multimodal Learning with Graph Neural Network and Language Model.
CoRR, 2023
Shark-Eyes: A multimodal fusion framework for multi-view-based phishing website detection.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
DoppelSearch: A Novel Approach to Content-Based Video Retrieval for AI Challenge HCMC 2023.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
Binary Representation Embedding and Deep Learning For Binary Code Similarity Detection in Software Security Domain.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
BlazeSearch: A multimomal semantic search engine for retrieving in-video information for AI Challenge HCMC 2023.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
WebGuardRL: An Innovative Reinforcement Learning-based Approach for Advanced Web Attack Detection.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
DeFL-BC: Empowering Reliable Cyberattack Detection through Decentralized Federated Learning and Poisoning Attack Defense.
Proceedings of the International Conference on Computing and Communication Technologies, 2023
On the effectiveness of transferability of adversarial Android malware samples against learning-based detectors.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2023
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2023
XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph.
Proceedings of the Information Security Practice and Experience, 2023
FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems Using Autoencoder-Based Latent Space Representations.
Proceedings of the Information Security Practice and Experience, 2023
A Consensus Protocol for Incentivizing Contribution from Decentralized Community for Machine Learning-based Scamming Website Detection.
Proceedings of the International Conference on System Science and Engineering, 2023
Uncovering the Resilience of Binarized Spiking Neural Networks under Adversarial Attacks.
Proceedings of the 12th International Conference on Control, 2023
A Multimodal Deep Learning Approach for Efficient Vulnerability Detection in Smart Contracts.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023
2022
B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain.
J. Inf. Secur. Appl., 2022
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2022
A Privacy-Preserving Approach For Building Learning Models in Smart Healthcare using Blockchain and Federated Learning.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022
Leveraging Deep Learning Image Classifiers for Visual Similarity-based Phishing Website Detection.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022
A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022
Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware Detectors.
Proceedings of the 11th International Symposium on Information and Communication Technology, 2022
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
Adversarial AutoEncoder and Generative Adversarial Networks for Semi-Supervised Learning Intrusion Detection System.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
Cyber Threat Intelligence for Proactive Defense against Adversary in SDN-assisted IIoTs context.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
Leveraging Deep Reinforcement Learning for Automating Penetration Testing in Reconnaissance and Exploitation Phase.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
DA-GAN: Domain Adaptation for Generative Adversarial Networks-assisted Cyber Threat Detection.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
A Blockchain-based approach and Attribute-based Encryption for Healthcare Record Data Exchange.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
A Method for Flexible Definition and Automatic Implementation of Laboratory Environment in Online Training Platforms.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022
Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement Learning.
Proceedings of the Information Security Practice and Experience, 2022
Federated Learning-Based Cyber Threat Hunting for APT Attack Detection in SDN-Enabled Networks.
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022
Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN.
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022
2021
DIGFuPAS: Deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks.
Comput. Secur., 2021
A Deep Transfer Learning Approach for Flow-Based Intrusion Detection in SDN-Enabled Network.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021
Strengthening IDS against Evasion Attacks with GAN-based Adversarial Samples in SDN-enabled network.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2021
Empirical Study on Reconnaissance Attacks in SDN-aware Network for Evaluating Cyber Deception.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2021
Federated Learning-Based Intrusion Detection in the Context of IIoT Networks: Poisoning Attack and Defense.
Proceedings of the Network and System Security - 15th International Conference, 2021
A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System.
Proceedings of the Network and System Security - 15th International Conference, 2021
Proceedings of the ICMLSC '21: 2021 The 5th International Conference on Machine Learning and Soft Computing, 2021
2020
A survey on Blockchain-based applications for reforming data protection, privacy and security.
CoRR, 2020
Forensic analysis of TikTok application to seek digital artifacts on Android smartphone.
Proceedings of the 2020 RIVF International Conference on Computing and Communication Technologies, 2020
2019
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis.
Clust. Comput., 2019
Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique.
Clust. Comput., 2019
A Security-Enhanced Monitoring System for Northbound Interface in SDN using Blockchain.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019
Proceedings of the 19th International Symposium on Communications and Information Technologies, 2019
Toward a Trust-Based Authentication Framework of Northbound Interface in Software Defined Networking.
Proceedings of the Industrial Networks and Intelligent Systems, 2019
Aloba: A Mechanism of Adaptive Load Balancing and Failure Recovery in Distributed SDN Controllers.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019
Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019
Proposing Automatic Dataset Generation System to Support Android Sensitive Data Leakage Detection Systems.
Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, 2019
2018
A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation.
Proceedings of the Ninth International Symposium on Information and Communication Technology, 2018
2017
Sensitive Data Leakage Detection in Pre-Installed Applications of Custom Android Firmware.
Proceedings of the 18th IEEE International Conference on Mobile Data Management, 2017
Proceedings of the Information Science and Applications 2017, 2017
Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic Analysis.
Proceedings of the Information Science and Applications 2017, 2017
2013
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013
2011
Future Gener. Comput. Syst., 2011
2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
2008
Int. J. Crit. Infrastructures, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006