Publications

Publications by categories in reversed chronological order.

2025

  1. Boosting Black-Box Transferability
    Mai Bui, Thien-Phuc Doan, Kihun Hong, and 1 more author
    In , 2025
  2. Defending Speaker Verification Against Deepfake: A Multi-Step Approach
    Thien-Phuc Doan, Hung Dinh-Xuan, Inho Kim, and 3 more authors
    In , 2025
    Citations: 1
  3. IASC 2025
    VIB-based Real Pre-emphasis Audio Deepfake Source Tracing
    Thien-Phuc Doan, Kihun Hong, and Souhwan Jung
    In Interspeech 2025, 2025
  4. Synthetic voice detection method based on biological sound, recording medium and apparatus for performing the same
    Souhwan Jung, HONG Kihun, and Thien-Phuc Doan
    In , 2025
  5. Inference-Time Noise Addition for Improving Adversarial Robustness of Audio Deepfake Detection System
    Inho Kim, Thien-Phuc Doan, Sanghyun Hong, and 1 more author
    In , 2025
  6. DeePen: Penetration Testing for Audio Deepfake Detection
    Nicolas Müller, Piotr Kawa, Adriana Stan, and 5 more authors
    In , 2025
    Citations: 1
  7. Towards Secure Containerized Applications with Seccomp Profile Refinement
    Linh Nguyen-Thuy, Long Nguyen-Vu, Thien-Phuc Doan, and 2 more authors
    In 2025 IEEE 30th Pacific Rim International Symposium on Dependable Computing (PRDC), 2025
  8. An Imperceptible Adversarial Watermarking to Prevent Voice Cloning
    Seoyoung Park, Thien-Phuc Doan, and Souhwan Jung
    In Proc. SPSC 2025, 2025

2024

  1. Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking
    Mai Bui, Thien-Phuc Doan, Kihun Hong, and 1 more author
    In , 2024
    Citations: 2
  2. Towards real-time audio deepfake detection in resource-limited environments
    Hung Dinh-Xuan, Thien-Phuc Doan, Sungkyu Han, and 2 more authors
    In , 2024
    Citations: 1
  3. CCS’ 24
    Trident of Poseidon: A Generalized Approach for Detecting Deepfake Voices
    Thien-Phuc Doan, Hung Dinh-Xuan, Taewon Ryu, and 4 more authors
    In Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS ’24), 2024
  4. IASC 2024
    Balance, Multiple Augmentation, and Re-synthesis: A Triad Training Strategy for Enhanced Audio Deepfake Detection
    Thien-Phuc Doan, Long Nguyen-Vu, Kihun Hong, and 1 more author
    In Interspeech 2024, 2024
  5. Ebpf-based hot patch engine device for protecting kernel vulnerabilities, system and method including the same
    Souhwan Jung, Thien-Phuc Doan, and Songi Gwak
    In , 2024
  6. Detecting Audio Deepfakes Through Emotional Fingerprinting
    Long Nguyen-Vu, Yowon Lee, Thien-Phuc Doan, and 2 more authors
    In , 2024
  7. Method for sharing profile in container environment, and recording medium and apparatus for performing the same
    JUNG Soohwan, and CHAU Ngoc-Tu
    In , 2024

2023

  1. BTS-E: Audio Deepfake Detection Using Breathing-Talking-Silence Encoder
    Thien-Phuc Doan, Long Nguyen-Vu, Souhwan Jung, and 1 more author
    In ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2023
  2. WDC
    GAN Discriminator based Audio Deepfake Detection
    Thien Phuc Doan, Kihun Hong, and Souhwan Jung
    In Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023
  3. CSSE
    The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android.
    Thien-Phuc Doan, Ngoc-Tu Chau, Jungsoo Park, and 1 more author
    Computer Systems Science & Engineering, 2023
  4. IASC
    Container Instrumentation and Enforcement System for Runtime Security of Kubernetes Platform with eBPF.
    Songi Gwak, Thien-Phuc Doan, and Souhwan Jung
    Intelligent Automation & Soft Computing, 2023
  5. DYNAMIC SECURITY POLICY ENFORCEMENT METHOD FOR CONTAINER SYSTEM, RECORDING MEDIUM AND SYSTEM FOR PERFORMING THE SAME
    Souhwan Jung, Thien-phuc Doan, and Songi Gwak
    Nov 2023
    US Patent App. 18/135,593
  6. On the Defense of Spoofing Countermeasures against Adversarial Attacks
    Long Nguyen-Vu, Thien-Phuc Doan, Mai Bui, and 2 more authors
    IEEE Access, Nov 2023
  7. Design method for sharing profile in container environment, and recording medium and apparatus for performing the same
    JUNG Soohwan, CHAU Ngoc-Tu, Thien-Phuc Doan, and 1 more author
    Jan 2023
    US Patent App. 17/877,073
  8. Method of analyzing container system call configuration error, and recording medium and apparatus for performing the same
    JUNG Soohwan, Thien-Phuc Doan, and Songi Gwak
    Jan 2023
    US Patent App. 17/877,148
  9. Resource monitoring device and method using hardware abstraction layer
    JUNG Soohwan, Thien-Phuc Doan, and Hyunseok Shim
    Jun 2023
    US Patent App. 17/925,553

2022

  1. CMC
    DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning.
    Thien-Phuc Doan, and Souhwan Jung
    Computers, Materials & Continua, Jun 2022
  2. CSA
    Random Forest in Federated Learning Setting
    Thien-Phuc Doan, Bong Jun Choi, Kihun Hong, and 2 more authors
    In International Conference on Computer Science and its Applications and the International Conference on Ubiquitous Information Technologies and Applications, Jun 2022
  3. Docker image vulnerability inspection device and method for performing docker file analysis
    Souhwan Jung, Thien-Phuc Doan, and Songi Gwak
    Apr 2022
    US Patent App. 17/382,771

2021

  1. AppPACK: A Packaging Model for Single-Purpose Lightweight Virtualization Environment
    Ngoc-Tu Chau, Jaehyeon Yoon, Thien-Phuc Doan, and 1 more author
    IEEE Access, Apr 2021

2020

  1. MIS
    HAL-Based Resource Manipulation Monitoring on AOSP
    Thien-Phuc Doan, Jungsoo Park, and Souhwan Jung
    Mobile Information Systems, Apr 2020

2019

  1. RBICTE
    An Empirical Study on Android malware behavior signature extraction
    Thien-Phuc Doan, Long Nguyen-Vu, Huy-Hoang Nguyen, and 2 more authors
    Research Briefs on Information and Communication Technology Evolution, Apr 2019
  2. KIISC
    API Grouping Based Flow Analysis and Frequency Analysis Technique for Android Malware Classification
    Hyunseok Shim, Jungsoo Park, Thien-Phuc Doan, and 1 more author
    Journal of the Korea Institute of Information Security & Cryptology, Apr 2019

  1. DAVS: Dockerfile Analysis for Vulnerable Scanning
    Thien-Phuc Doan, and Souhwan Jung
    In , Apr
  2. Threat models on Google SafetyNet for Android application protection in real world
    Thien-Phuc Doan, and Souhwan Jung
    In , Apr