Hien Thi Thu Truong

ORCID: 0000-0002-5743-6943
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Access Control and Trust
  • Advanced Authentication Protocols Security
  • Blockchain Technology Applications and Security
  • Network Security and Intrusion Detection
  • Peer-to-Peer Network Technologies
  • Adversarial Robustness in Machine Learning
  • IoT and Edge/Fog Computing
  • Cryospheric studies and observations
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Security in Wireless Sensor Networks
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • RFID technology advancements
  • Medical Imaging Techniques and Applications
  • Service-Oriented Architecture and Web Services
  • Spam and Phishing Detection
  • Anomaly Detection Techniques and Applications
  • Distributed systems and fault tolerance
  • Biometric Identification and Security
  • Advanced X-ray and CT Imaging
  • Data Quality and Management
  • Cloud Data Security Solutions

Elisa (Finland)
2022

NEC (Japan)
2022

University of Helsinki
2013-2020

Sharp Laboratories of Europe (United Kingdom)
2018-2019

Epworth Hospital
2019

Université de Lorraine
2012

Institut national de recherche en informatique et en automatique
2011-2012

Laboratoire Lorrain de Recherche en Informatique et ses Applications
2012

The Internet of Things (IoT) bears unprecedented security and scalability challenges due to the magnitude data produced exchanged by IoT devices platforms. Some those are currently being addressed coupling applications with blockchains. However, current blockchain-backed systems simply use blockchain store access control policies, thereby underutilizing power technology. In this paper, we propose a new framework named Sash that couples platforms provides number advantages compared state art....

10.1109/blockchain.2019.00031 article EN 2019-07-01

Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user verifier (terminal) without any interaction. Currently deployed ZIA solutions are predominantly based on the terminal detecting proximity of user's personal device, or security token, by running an authentication protocol over short-range wireless communication channel. Unfortunately, this simple approach is highly vulnerable low-cost and practical relay attacks which completely offset usability benefits ZIA....

10.1109/percom.2014.6813957 article EN 2014-03-01

There is little information from independent sources in the public domain about mobile malware infection rates. The only previous estimate (0.0009%) [11], was based on indirect measurements obtained domain-name resolution traces. In this paper, we present first study of rates and associated risk factors using data collected directly over 55,000 Android devices. We find that devices estimated two datasets (0.28% 0.26%), though small, are significantly higher than estimate. Based hypothesis...

10.1145/2566486.2568046 preprint EN 2014-04-07

Due to the rapid development of Internet Things (IoT) and consequently, availability more IoT data sources, mechanisms for searching integrating sources become essential leverage all relevant improving processes services. This paper presents search framework IoTCrawler. The IoTCrawler is not only another framework, it a system systems which connects existing solutions offer interoperability overcome fragmentation. In addition its domain-independent design, features layered approach, offering...

10.3390/s21051559 article EN cc-by Sensors 2021-02-24

Contextual proximity detection (or, co-presence detection) is a promising approach to defend against relay attacks in many mobile authentication systems. We present systematic assessment of the presence context-manipulating attacker. First, we show that it feasible manipulate, consistently control and stabilize readings different acoustic physical environment sensors (and even multiple simultaneously) using low-cost, off-the-shelf equipment. Second, based on these capabilities, an attacker...

10.1109/tmc.2018.2839604 article EN IEEE Transactions on Mobile Computing 2018-05-22

The Internet of Things (IoT) offers an incredible innovation potential for developing smarter applications and services. However, today we see solutions in the development vertical services reflecting what used to be early days Web, leading fragmentation intra-nets Things. To achieve open IoT ecosystem systems platforms, several key enablers are needed effective, adaptive scalable mechanisms exploring discovering resources their data/capabilities. This paper discusses our work EU H2020...

10.1109/giots.2018.8534528 article EN 2018-06-01

The increase in the interconnection of physical devices and emergence 5 G paradigm foster generation distribution massive amounts data. complexity associated with management these data requires a suitable access control approach that empowers citizens to how their are shared, so potential privacy issues can be mitigated. While well-known models widely used web cloud scenarios, IoT ecosystem needs address requirements lightness, decentralization, scalability generated by huge number...

10.1155/2022/1828747 article EN Security and Communication Networks 2022-06-02

Mobile malware is on the rise as global number of smartphone users grows exponentially. Traditional detection and scanning tools only detect when devices are actually infected. In previous work, we saw that presence applications occur often with known can indicate not infection status but also potential risk infection. this paper, present Doctor - a prognosis application based crowd sourced data. includes server component an easy-to-use Android client application. visualizes health device...

10.1109/icdcsw.2014.36 article EN 2014-06-01

Copresence verification based on context can improve usability and strengthen security of many authentication access control systems. By sensing comparing their surroundings, two or more devices tell whether they are copresent use this information to make decisions. To the best our knowledge, all context-based copresence mechanisms date susceptible context-manipulation attacks. In such attacks, a distributed adversary replicates same at (different) locations victim devices, induces them...

10.1109/percom.2019.8767404 article EN 2019-03-01

In order to overcome the disadvantages of a central authority, tendency is move towards peer-to-peer collaboration where control over data given users who can decide with whom they want share their private data. this it very difficult ensure that after shared other peers, these peers will not misbehave and violate privacy. paper, we propose mechanism addresses issue privacy violation by auditing logs. our approach, trust values between are adjusted according previous activities on Users...

10.1109/ispdc.2011.38 article EN 2011-07-01

In the push-pull-clone collaborative editing model widely used in distributed version control systems users replicate shared data, modify it and redistribute modified versions of this data without need a central authority. However, no usage restriction mechanism is proposed to c

10.4108/icst.collaboratecom.2011.247184 article EN 2011-01-01

Within last years multi-synchronous collaborative editing systems became widely used. Multi-synchronous collaboration maintains multiple, simultaneous streams of activity which continually diverge and synchronized. These are represented by means logs operations, i.e. user modifications. A malicious might tamper his log operations. At the moment synchronization with other streams, tampered generate wrong results. In this paper, we propose a solution relying on hash-chain based authenticators...

10.1145/2389176.2389197 preprint EN 2012-10-27

In multi-synchronous collaboration users replicate shared data, modify it and redistribute modified versions of this data without the need a central authority. However, in model, no usage restriction mechanism was proposed to control what can do with after has been released them. paper, we extend model contracts that express restrictions are checked posteriori by when they receive data. We propose merging algorithm deals not only changes on but also contracts. A log auditing protocol is used...

10.1142/s0218843012410031 article EN International Journal of Cooperative Information Systems 2012-09-01

Deep Learning has been shown to be particularly vulnerable adversarial samples. To combat strategies, numerous defensive techniques have proposed. Among these, a promising approach is use randomness in order make the classification process unpredictable and presumably harder for adversary control. In this paper, we study effectiveness of randomized defenses against end, categorize existing state-of-the-art strategies into three attacker models increasing strength, namely blackbox, graybox,...

10.1145/3320269.3384751 article EN 2020-10-05
Coming Soon ...