VINH-THONG TA

VINH-THONG TA

    Accepting PhD Students

    PhD projects

    Automated verification of data protection and privacy principles and requirements.
    Blockchain based collaborative intrusion detection systems.
    GDPR and blockchain
    Secure vehicular communications.
    Security of vehicle cloud computing.
    Adversarial machine learning and computer vision.
    Verified artificial intelligence.

    20142025

    Research activity per year

    Filter
    Conference proceeding (ISBN)

    Search results

    • 2024

      Credit Card Fraud Detection Using Deep Neural Network With Shapley Additive Explanations

      Faith Onyeoma, C., RAFIQ, H., Jeremiah, D., TA, V.-T. & USMAN, M., 21 Oct 2024, (Accepted/In press) Proceedings of 21st International Conference on Frontiers of Information Technology (FIT'24). IEEE, p. 1-6

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

      Open Access
      File
      94 Downloads (Pure)
    • Image-Based Android Malware Detection Using Deep Learning

      Udeze, S., RAFIQ, H., Jeremiah, D., TA, V.-T. & USMAN, M., 17 Oct 2024, (Accepted/In press) 16th International Conference on Global Security, Safety & Sustainability, ICGS3-24. Springer, p. 1-13

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

    • 2018

      Securing Road Traffic Congestion Detection by Incorporating V2I Communications

      Ta, V. T., Dvir, A. & Arie, Y., 28 Aug 2018, 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018. Institute of Electrical and Electronics Engineers Inc., 8449746. (19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

      3 Citations (Scopus)
    • 2016

      Formal accountability for biometric surveillance: A case study

      Ta, V. T., Butin, D. & Métayer, D. L., 10 Mar 2016, Privacy Technologies and Policy - 3rd Annual Privacy Forum, APF 2015, Revised Selected Papers. Le Metayer, D., Berendt, B., Engel, T., Ikonomou, D. & Schiffner, S. (eds.). Springer Verlag, p. 21-37 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9484).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

    • 2015

      Privacy by design: On the conformance between protocols and architectures

      Ta, V. T. & Antignac, T., 2015, Foundations and Practice of Security - 7th International Symposium, FPS 2014, Revised Selected Papers. Garcia-Alfaro, J., Cuppens, F., Heywood, N. Z. & Fong, P. W. L. (eds.). Springer Verlag, p. 65-81 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8930).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

      5 Citations (Scopus)
    • 2014

      Formal security verification of transport protocols for wireless sensor networks

      Ta, V. T., Dvir, A. & Buttyán, L., 2014, Advanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014. Nguyen, N. T., An Le Thi, H. & Van Do, T. (eds.). Springer Verlag, p. 389-403 15 p. (Advances in Intelligent Systems and Computing; vol. 282).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

    Your message has successfully been sent.
    Your message was not sent due to an error.