Search Results - "Phai, Vu Dinh"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    A Deep Learning Approach to Network Intrusion Detection by Shone, Nathan, Ngoc, Tran Nguyen, Phai, Vu Dinh, Shi, Qi

    “…Network intrusion detection systems (NIDSs) play a crucial role in defending computer networks. However, there are concerns regarding the feasibility and…”
    Get full text
    Journal Article
  2. 2

    Genetic Programming for storm surge forecasting by Hien, Nguyen Thi, Tran, Cao Truong, Nguyen, Xuan Hoai, Kim, Sooyoul, Phai, Vu Dinh, Thuy, Nguyen Ba, Van Manh, Ngo

    Published in Ocean engineering (01-11-2020)
    “…Storm surge is a genuine common fiasco coming from the ocean. Therefore, an exact forecast of surges is a vital assignment to dodge property misfortunes and to…”
    Get full text
    Journal Article
  3. 3

    Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems by Dinh, Phai Vu, Nguyen, Quang Uy, Hoang, Dinh Thai, Nguyen, Diep N., Bao, Son Pham, Dutkiewicz, Eryk

    Published in IEEE internet of things journal (15-04-2024)
    “…Intrusion detection systems (IDSs) play a critical role in protecting billions of IoT devices from malicious attacks. However, the IDSs for IoT devices face…”
    Get full text
    Journal Article
  4. 4

    Twin Variational Auto-Encoder for Representation Learning in IoT Intrusion Detection by Dinh, Phai Vu, Quang Uy, Nguyen, Nguyen, Diep N., Thai Hoang, Dinh, Bao, Son Pham, Dutkiewicz, Eryk

    “…Intrusion detection systems (IDSs) play a pivotal role in defending IoT systems. However, developing a robust and efficient IDS is challenging due to the rapid…”
    Get full text
    Conference Proceeding
  5. 5

    Balanced Twin Auto-Encoder for IoT Intrusion Detection by Dinh, Phai Vu, Nguyen, Diep N., Hoang, Dinh Thai, Uy, Nguyen Quang, Bao, Son Pham, Dutkiewicz, Eryk

    “…Intrusion detection systems (IDSs) provide an ef-fective solution for protecting loT systems. However, due to the massive number of loT devices (in billions)…”
    Get full text
    Conference Proceeding
  6. 6

    Behaviour-aware Malware Classification: Dynamic Feature Selection by Dinh, Phai Vu, Shone, Nathan, Dung, Phan Huy, Shi, Qi, Hung, Nguyen Viet, Nguyen Ngoc, Tran

    “…Despite the continued advancements in security research, malware persists as being a major threat in this digital age. Malware detection is a primary defence…”
    Get full text
    Conference Proceeding
  7. 7

    Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network by Hung, Nguyen Viet, Ngoc Dung, Pham, Ngoc, Tran Nguyen, Dinh Phai, Vu, Shi, Qi

    “…In recent years, malware has grown constantly in both quantity and complexity. Traditional malware detection methods such as string search, hash code…”
    Get full text
    Conference Proceeding
  8. 8

    Deep learning combined with de-noising data for network intrusion detection by Phai Vu Dinh, Tran Nguyen Ngoc, Shone, Nathan, MacDermott, Aine, Qi Shi

    “…Anomaly-based Network Intrusion Detection Systems (NIDSs) are a common security defense for modern networks. The success of their operation depends upon vast…”
    Get full text
    Conference Proceeding
  9. 9

    An empirical study of anomaly detection in online games by Phai Vu Dinh, Thanh Nguyen Nguyen, Quang Uy Nguyen

    “…In data mining, anomaly detection aims to identify the data samples that do not conform to an expected behavior. Anomaly detection has successfully been…”
    Get full text
    Conference Proceeding
  10. 10

    Multiple-Input Auto-Encoder for IoT Intrusion Detection Systems with Heterogeneous Data by Dinh, Phai Vu, Hoang, Dinh Thai, Uy, Nguyen Quang, Nguyen, Diep N., Bao, Son Pham, Dutkiewicz, Eryk

    “…Machine learning is a core component of many Intrusion Detection Systems (IDS) for IoT networks. However, developing a robust machine-learning model for IDSs…”
    Get full text
    Conference Proceeding
  11. 11

    Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems by Dinh, Phai Vu, Nguyen, Diep N, Hoang, Dinh Thai, Nguyen, Quang Uy, Dutkiewicz, Eryk, Bao, Son Pham

    Published 21-03-2024
    “…While intrusion detection systems (IDSs) benefit from the diversity and generalization of IoT data features, the data diversity (e.g., the heterogeneity and…”
    Get full text
    Journal Article
  12. 12

    Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection by Dinh, Phai Vu, Nguyen, Quang Uy, Dinh, Thai Hoang, Nguyen, Diep N, Pham, Bao Son, Dutkiewicz, Eryk

    Published 21-03-2024
    “…Representation Learning (RL) plays a pivotal role in the success of many problems including cyberattack detection. Most of the RL methods for cyberattack…”
    Get full text
    Journal Article
  13. 13

    Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems by Dinh, Phai Vu, Nguyen, Quang Uy, Hoang, Dinh Thai, Nguyen, Diep N, Bao, Son Pham, Dutkiewicz, Eryk

    Published 04-12-2023
    “…Intrusion detection systems (IDSs) play a critical role in protecting billions of IoT devices from malicious attacks. However, the IDSs for IoT devices face…”
    Get full text
    Journal Article