VINH-THONG TA

    Accepting PhD Students

    PhD projects

    Automated verification of data protection and privacy principles and requirements. Blockchain based collaborative intrusion detection systems. GDPR and blockchain Secure vehicular communications. Security of vehicle cloud computing. Adversarial machine learning and computer vision. Verified artificial intelligence.

    20142020

    Research activity per year

    If you made any changes in Pure these will be visible here soon.

    Personal profile

    Biography

    Vinh Thong Ta received the MSc degree in 2008 in computer science/IT security from the Budapest University of Technology and Economics (BUTE).

    He earned the PhD degree in 2014 in IT security from the Budapest University of Technology and Economics (BUTE), in the Laboratory of Cryptography and System Security (CrySyS Lab), under the supervision of Dr. Levente Buttyán.

    From February 2014 to January 2015 he worked as postdoctoral researcher at Institut National de Recherche en Informatique et en Automatique (INRIA), in the group PRIVATICS with Dr. Daniel Le Métayer. At INRIA he investigated possible solutions for privacy by design and accountability problems.

    Between 2015-2021, he worked at University of Central Lancashire (UCLan) where he held a lecturer (until 2020) and senior lecturer positions, as well as co-founded and was a member of the Laboratory of Security and Forensic Research (SAFeR). He was leader for the cyber security BSc (Hons) and apprenticeship degrees at UCLan main campus.

    He joined the Department of Computer Science at Edge Hill University in 2021, where he is currently senior lecturer in cyber security and leader for the security related programmes.

    His teaching and research interests include Network Security, Cryptography, IT Security Management, Malware Analysis, Penetration Testing, Computer Forensic, Game Theory and Machine Learning in Security.

    He is member of the British Computer Society (BCS) and Fellow of Higher Education Academy (FHEA).

    Expertise related to UN Sustainable Devlopment Goals

    In 2015, UN member states agreed to 17 global Sustainable Development Goals (SDGs) to end poverty, protect the planet and ensure prosperity for all. This person’s work contributes towards the following SDG(s):

    • SDG 9 - Industry, Innovation, and Infrastructure
    • SDG 11 - Sustainable Cities and Communities

    Education/Academic qualification

    Security , PhD, Budapest University of Technology and Economics

    Award Date: 31 Jan 2014

    Security, MSc, Budapest University of Technology and Economics

    Award Date: 30 Jun 2008

    Keywords

    • L Education
    • Q Science
    • T Technology

    Fingerprint

    Dive into the research topics where VINH-THONG TA is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
    • 1 Similar Profiles

    Network

    Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
    • A secure road traffic congestion detection and notification concept based on V2I communications

      TA, VINH-THONG., Oct 2020, In: Vehicular Communications. 25, 100283, j.vehcom.2020.100283.

      Research output: Contribution to journalArticlepeer-review

      Open Access
      File
      4 Citations (Scopus)
    • Securing Road Traffic Congestion Detection by Incorporating V2I Communications

      Ta, V. T., Dvir, A. & Arie, Y., 28 Aug 2018, 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018. Institute of Electrical and Electronics Engineers Inc., 8449746. (19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

      2 Citations (Scopus)
    • Formal accountability for biometric surveillance: A case study

      Ta, V. T., Butin, D. & Métayer, D. L., 10 Mar 2016, Privacy Technologies and Policy - 3rd Annual Privacy Forum, APF 2015, Revised Selected Papers. Le Metayer, D., Berendt, B., Engel, T., Ikonomou, D. & Schiffner, S. (eds.). Springer Verlag, p. 21-37 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9484).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

    • Privacy by design: On the conformance between protocols and architectures

      Ta, V. T. & Antignac, T., 2015, Foundations and Practice of Security - 7th International Symposium, FPS 2014, Revised Selected Papers. Garcia-Alfaro, J., Cuppens, F., Heywood, N. Z. & Fong, P. W. L. (eds.). Springer Verlag, p. 65-81 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8930).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

      5 Citations (Scopus)
    • Formal security verification of transport protocols for wireless sensor networks

      Ta, V. T., Dvir, A. & Buttyán, L., 2014, Advanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014. Nguyen, N. T., An Le Thi, H. & Van Do, T. (eds.). Springer Verlag, p. 389-403 15 p. (Advances in Intelligent Systems and Computing; vol. 282).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review