publications

publications by categories in reversed chronological order. generated by jekyll-scholar.

2024

  1. IASC 2024
    Balance, Multiple Augmentation, and Re-synthesis: A Triad Training Strategy for Enhanced Audio Deepfake Detection
    Thien-Phuc Doan, Long Nguyen-Vu, Kihun Hong, and 1 more author
    In Interspeech 2024, 2024
  2. CCS’ 24
    Trident of Poseidon: A Generalized Approach for Detecting Deepfake Voices
    Thien-Phuc Doan, Hung Dinh-Xuan, Taewon Ryu, and 4 more authors
    In Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS ’24), 2024

2023

  1. Method of analyzing container system call configuration error, and recording medium and apparatus for performing the same
    JUNG Soohwan, Thien-Phuc Doan, and Songi Gwak
    Jan 2023
    US Patent App. 17/877,148
  2. Design method for sharing profile in container environment, and recording medium and apparatus for performing the same
    JUNG Soohwan, CHAU Ngoc-Tu, Thien-Phuc Doan, and 1 more author
    Jan 2023
    US Patent App. 17/877,073
  3. BTS-E: Audio Deepfake Detection Using Breathing-Talking-Silence Encoder
    Thien-Phuc Doan, Long Nguyen-Vu, Souhwan Jung, and 1 more author
    In ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Jan 2023
  4. CSSE
    The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android.
    Thien-Phuc Doan, Ngoc-Tu Chau, Jungsoo Park, and 1 more author
    Computer Systems Science & Engineering, Jan 2023
  5. Resource monitoring device and method using hardware abstraction layer
    JUNG Soohwan, Thien-Phuc Doan, and Hyunseok Shim
    Jun 2023
    US Patent App. 17/925,553
  6. IASC
    Container Instrumentation and Enforcement System for Runtime Security of Kubernetes Platform with eBPF.
    Songi Gwak, Thien-Phuc Doan, and Souhwan Jung
    Intelligent Automation & Soft Computing, Jun 2023
  7. On the Defense of Spoofing Countermeasures against Adversarial Attacks
    Long Nguyen-Vu, Thien-Phuc Doan, Mai Bui, and 2 more authors
    IEEE Access, Jun 2023
  8. WDC
    GAN Discriminator based Audio Deepfake Detection
    Thien Phuc Doan, Kihun Hong, and Souhwan Jung
    In Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, Jun 2023
  9. DYNAMIC SECURITY POLICY ENFORCEMENT METHOD FOR CONTAINER SYSTEM, RECORDING MEDIUM AND SYSTEM FOR PERFORMING THE SAME
    Souhwan Jung, Thien-phuc Doan, and Songi Gwak
    Nov 2023
    US Patent App. 18/135,593

2022

  1. Docker image vulnerability inspection device and method for performing docker file analysis
    Souhwan Jung, Thien-Phuc Doan, and Songi Gwak
    Apr 2022
    US Patent App. 17/382,771
  2. CMC
    DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning.
    Thien-Phuc Doan, and Souhwan Jung
    Computers, Materials & Continua, Apr 2022
  3. CSA
    Random Forest in Federated Learning Setting
    Thien-Phuc Doan, Bong Jun Choi, Kihun Hong, and 2 more authors
    In International Conference on Computer Science and its Applications and the International Conference on Ubiquitous Information Technologies and Applications, Apr 2022

2021

  1. AppPACK: A Packaging Model for Single-Purpose Lightweight Virtualization Environment
    Ngoc-Tu Chau, Jaehyeon Yoon, Thien-Phuc Doan, and 1 more author
    IEEE Access, Apr 2021

2020

  1. MIS
    HAL-Based Resource Manipulation Monitoring on AOSP
    Thien-Phuc Doan, Jungsoo Park, and Souhwan Jung
    Mobile Information Systems, Apr 2020

2019

  1. KIISC
    API Grouping Based Flow Analysis and Frequency Analysis Technique for Android Malware Classification
    Hyunseok Shim, Jungsoo Park, Thien-Phuc Doan, and 1 more author
    Journal of the Korea Institute of Information Security & Cryptology, Apr 2019
  2. RBICTE
    An Empirical Study on Android malware behavior signature extraction
    Thien-Phuc Doan, Long Nguyen-Vu, Huy-Hoang Nguyen, and 2 more authors
    Research Briefs on Information and Communication Technology Evolution, Apr 2019