Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Long Nguyen-Vu"'
Autor:
Long Nguyen-Vu, Jonghoon Lee
Publikováno v:
IEEE Access, Vol 12, Pp 148653-148665 (2024)
Sound Source Localization (SSL) is a key task in audio signal processing, focusing on estimating the position of sound sources relative to a reference point, typically a microphone array. In this paper, we introduce a novel dataset named SoS, specifi
Externí odkaz:
https://doaj.org/article/1e3694c6c23a4dcf99f0d81202c77d9a
Publikováno v:
IEEE Access, Vol 11, Pp 94563-94574 (2023)
Advances in speech synthesis have exposed the vulnerability of spoofing countermeasure (CM) systems. Adversarial attacks exacerbate this problem, mainly due to the reliance of most CM models on deep neural networks. While research on adversarial atta
Externí odkaz:
https://doaj.org/article/5bce239f339341229ae00dece6f51ffd
Publikováno v:
IEEE Access, Vol 8, Pp 199638-199645 (2020)
Recently, intelligent Android malware avoids being analyzed using anti-emulator, anti-debugging, and rooting detection. Existing emulators have problems to be easily detected by malware that check with hardware or sensor information. This paper propo
Externí odkaz:
https://doaj.org/article/18a35cd74a9243ad86ad6b9bbe8335b8
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 12 (2016)
In this article, we introduce a practical scheme that dynamically secures and outsources data on demand as well as propose a corresponding architecture to securely process data in database service provider. We also adopt the application of bring your
Externí odkaz:
https://doaj.org/article/803d5f44f7e84617a644792b8fea0ae6
Publikováno v:
ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
Autor:
Long Nguyen Vu, Souhwan Jung
Publikováno v:
IEEE Access, Vol 9, Pp 39680-39694 (2021)
The availability of big data and affordable hardware have enabled the applications of deep learning on different tasks. With respect to security, several attempts have been made to transfer deep learning’s application from the domain of image recog
Autor:
Souhwan Jung, Long Nguyen-Vu
Publikováno v:
Journal of Computational Science. 64:101839
Publikováno v:
Research Briefs on Information and Communication Technology Evolution. 5:102-110
Malicious applications, especially in mobile devices, constitute a serious threats to user data. Dueto the openness, Android have become the most popular smart phone operating system in mobilemarket. Although fast and straightforward, Static analysis
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 27:5-14
Publikováno v:
Security and Communication Networks, Vol 2017 (2017)
We present an arms race between rooting detection and rooting evasion. We investigate different methods to detect rooted device at both Java and native level and evaluate the counterattack from major hooking tools. To this end, an extensive study of