Thien Duc Nguyen
Title
Cited by
Cited by
Year
DÏoT: A Federated Self-learning Anomaly Detection System for IoT
TD Nguyen, S Marchal, M Miettinen, N Asokan, AR Sadeghi
The 39th IEEE International Conference on Distributed Computing Systems …, 2018
111*2018
Context-based zero-interaction pairing and key evolution for advanced personal devices
M Miettinen, N Asokan, TD Nguyen, AR Sadeghi, M Sobhani
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
972014
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
AR Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and ...
The 39th IEEE International Conference on Distributed Computing Systems …, 2019
702019
Audi: Toward autonomous iot device-type identification using periodic communication
S Marchal, M Miettinen, TD Nguyen, AR Sadeghi, N Asokan
IEEE Journal on Selected Areas in Communications 37 (6), 1402-1412, 2019
292019
Revisiting context-based authentication in IoT
M Miettinen, TD Nguyen, AR Sadeghi, N Asokan
Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018
192018
Revisiting context-based authentication in IoT
M Miettinen, TD Nguyen, N Asokan, AR Sadeghi
55th ACM/ESDA/IEEE Design Automation Conference (DAC 2018 ), 32, 2018
192018
I know where you are: Proofs of presence resilient to malicious provers
M Miettinen, N Asokan, F Koushanfar, TD Nguyen, J Rios, AR Sadeghi, ...
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
182015
Mind the gap: Security & privacy risks of contact tracing apps
L Baumgärtner, A Dmitrienko, B Freisleben, A Gruler, J Höchst, ...
arXiv preprint arXiv:2006.05914, 2020
162020
Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, and Christian Uhl
L Baumgärtner, A Dmitrienko, B Freisleben, A Gruler, J Höchst, ...
Mind the gap: Security & privacy risks of contact tracing apps, 2020
72020
POSTER: friend or foe? context authentication for trust domain separation in iot environments
M Miettinen, J Huang, TD Nguyen, N Asokan, AR Sadeghi
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
72016
OmniShare: Encrypted Cloud Storage for the Multi-Device Era
A Paverd, S Tamrakar, HL Nguyen, PK Pendyala, TD Nguyen, E Stobert, ...
IEEE Internet Computing (IC ), 2015
6*2015
Poisoning attacks on federated learning-based IoT intrusion detection system
TD Nguyen, P Rieger, M Miettinen, AR Sadeghi
NDSS Workshop on Decentralized IoT Systems and Security, 2020
52020
Proximity verification based on acoustic room impulse response
HTT Truong, J Toivonen, TD Nguyen, S Tarkoma, N Asokan
arXiv preprint arXiv:1803.07211, 2018
52018
DoubleEcho: Mitigating context-manipulation attacks in copresence verification
HTT Truong, J Toivonen, TD Nguyen, C Soriente, S Tarkoma, N Asokan
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
42019
Omnishare: Encrypted cloud storage for the multi-device era
A Paverd, S Tamrakar, HL Nguyen, P Pendyala, TD Nguyen, E Stobert, ...
IEEE Internet Computing 22 (4), 27-36, 2018
42018
Market-driven code provisioning to mobile secure hardware
A Dmitrienko, S Heuser, TD Nguyen, M da Silva Ramos, A Rein, ...
International Conference on Financial Cryptography and Data Security, 387-404, 2015
42015
FLGUARD: Secure and Private Federated Learning
TD Nguyen, P Rieger, H Yalame, H Möllering, H Fereidooni, S Marchal, ...
arXiv preprint arXiv:2101.02281, 2021
2021
Long Live Randomization: On Privacy-preserving Contact Tracing in Pandemic
TD Nguyen, M Miettinen, AR Sadeghi
Proceedings of the 7th ACM Workshop on Moving Target Defense, 1-9, 2020
2020
Contact Tracing by Giant Data Collectors: Opening Pandora’s Box of Threats to Privacy, Sovereignty and National Security
A Boutet, C Castelluccia, M Cunche, A Dmitrienko, V Iovino, M Miettinen, ...
2020
DoubleEcho
HT Thu Truong, J Toivonen, TD Nguyen, C Soriente, S Tarkoma, ...
IEEE International Conference on Pervasive Computing and Communications, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20