VINH-THONG TA

VINH-THONG TA

    Accepting PhD Students

    PhD projects

    Automated verification of data protection and privacy principles and requirements.
    Blockchain based collaborative intrusion detection systems.
    GDPR and blockchain
    Secure vehicular communications.
    Security of vehicle cloud computing.
    Adversarial machine learning and computer vision.
    Verified artificial intelligence.

    20142022

    Research activity per year

    If you made any changes in Pure these will be visible here soon.
    Filter
    Conference proceeding (ISBN)

    Search results

    • 2018

      Securing Road Traffic Congestion Detection by Incorporating V2I Communications

      Ta, V. T., Dvir, A. & Arie, Y., 28 Aug 2018, 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018. Institute of Electrical and Electronics Engineers Inc., 8449746. (19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

      2 Citations (Scopus)
    • 2016

      Formal accountability for biometric surveillance: A case study

      Ta, V. T., Butin, D. & Métayer, D. L., 10 Mar 2016, Privacy Technologies and Policy - 3rd Annual Privacy Forum, APF 2015, Revised Selected Papers. Le Metayer, D., Berendt, B., Engel, T., Ikonomou, D. & Schiffner, S. (eds.). Springer Verlag, p. 21-37 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9484).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

    • 2015

      Privacy by design: On the conformance between protocols and architectures

      Ta, V. T. & Antignac, T., 2015, Foundations and Practice of Security - 7th International Symposium, FPS 2014, Revised Selected Papers. Garcia-Alfaro, J., Cuppens, F., Heywood, N. Z. & Fong, P. W. L. (eds.). Springer Verlag, p. 65-81 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8930).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

      5 Citations (Scopus)
    • 2014

      Formal security verification of transport protocols for wireless sensor networks

      Ta, V. T., Dvir, A. & Buttyán, L., 2014, Advanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014. Nguyen, N. T., An Le Thi, H. & Van Do, T. (eds.). Springer Verlag, p. 389-403 15 p. (Advances in Intelligent Systems and Computing; vol. 282).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

    Your message has successfully been sent.
    Your message was not sent due to an error.