Zobrazeno 1 - 10
of 40
pro vyhledávání: '"Trung, Nguyen Linh"'
Autor:
Son, Do Hai, Manh, Bui Duc, Khoa, Tran Viet, Trung, Nguyen Linh, Hoang, Dinh Thai, Minh, Hoang Trong, Alem, Yibeltal, Minh, Le Quang
Blockchain-based supply chain (BSC) systems have tremendously been developed recently and can play an important role in our society in the future. In this study, we develop an anomaly detection model for BSC systems. Our proposed model can detect cyb
Externí odkaz:
http://arxiv.org/abs/2407.15603
Autor:
Khoa, Tran Viet, Son, Do Hai, Hoang, Dinh Thai, Trung, Nguyen Linh, Quynh, Tran Thi Thuy, Nguyen, Diep N., Ha, Nguyen Viet, Dutkiewicz, Eryk
With the ever-increasing popularity of blockchain applications, securing blockchain networks plays a critical role in these cyber systems. In this paper, we first study cyberattacks (e.g., flooding of transactions, brute pass) in blockchain networks
Externí odkaz:
http://arxiv.org/abs/2407.04011
Autor:
Tuan, Bui Minh, Nguyen, Diep N., Trung, Nguyen Linh, Nguyen, Van-Dinh, Van Huynh, Nguyen, Hoang, Dinh Thai, Krunz, Marwan, Dutkiewicz, Eryk
Wireless communications are particularly vulnerable to eavesdropping attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state information (CSI), e.g., for frien
Externí odkaz:
http://arxiv.org/abs/2312.07011
Minimizing training overhead in channel estimation is a crucial challenge in wireless communication systems. This paper presents an extension of the traditional blind algorithm, called "Mutually referenced equalizers" (MRE), specifically designed for
Externí odkaz:
http://arxiv.org/abs/2311.00325
Autor:
Khoa, Tran Viet, Son, Do Hai, Nguyen, Chi-Hieu, Hoang, Dinh Thai, Nguyen, Diep N., Quynh, Tran Thi Thuy, Hoang, Trong-Minh, Ha, Nguyen Viet, Dutkiewicz, Eryk, Alsheikh, Abu, Trung, Nguyen Linh
With the escalating prevalence of malicious activities exploiting vulnerabilities in blockchain systems, there is an urgent requirement for robust attack detection mechanisms. To address this challenge, this paper presents a novel collaborative learn
Externí odkaz:
http://arxiv.org/abs/2308.15804
Autor:
Son, Do Hai, Quynh, Tran Thi Thuy, Khoa, Tran Viet, Hoang, Dinh Thai, Trung, Nguyen Linh, Ha, Nguyen Viet, Niyato, Dusit, Diep, Nguyen N., Dutkiewicz, Eryk
A smart grid is an important application in Industry 4.0 with a lot of new technologies and equipment working together. Hence, sensitive data stored in the smart grid is vulnerable to malicious modification and theft. This paper proposes a framework
Externí odkaz:
http://arxiv.org/abs/2203.14633
Autor:
Khoa, Tran Viet, Son, Do Hai, Hoang, Dinh Thai, Trung, Nguyen Linh, Quynh, Tran Thi Thuy, Nguyen, Diep N., Ha, Nguyen Viet, Dutkiewicz, Eryk
Publikováno v:
IEEE Transactions on Systems, Man, and Cybernetics: Systems (2024)
This article aims to study intrusion attacks and then develop a novel cyberattack detection framework to detect cyberattacks at the network layer (e.g., Brute Password and Flooding of Transactions) of blockchain networks. Specifically, we first desig
Externí odkaz:
http://arxiv.org/abs/2203.11076
Autor:
Khoa, Tran Viet, Hoang, Dinh Thai, Trung, Nguyen Linh, Nguyen, Cong T., Quynh, Tran Thi Thuy, Nguyen, Diep N., Ha, Nguyen Viet, Dutkiewicz, Eryk
Federated Learning (FL) has recently become an effective approach for cyberattack detection systems, especially in Internet-of-Things (IoT) networks. By distributing the learning process across IoT gateways, FL can improve learning efficiency, reduce
Externí odkaz:
http://arxiv.org/abs/2112.00988
Publikováno v:
In Patterns 9 June 2023 4(6)
Autor:
Luu, Manh Ha, Mai, Hong Son, Pham, Xuan Loc, Le, Quoc Anh, Le, Quoc Khanh, Walsum, Theo van, Le, Ngoc Ha, Franklin, Daniel, Le, Vu Ha, Moelker, Adriaan, Chu, Duc Trinh, Trung, Nguyen Linh
Publikováno v:
In Computer Methods and Programs in Biomedicine May 2023 233