Cuong Pham‐Quoc

ORCID: 0000-0003-2917-1244
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Embedded Systems Design Techniques
  • Parallel Computing and Optimization Techniques
  • Network Security and Intrusion Detection
  • Interconnection Networks and Systems
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Network Packet Processing and Optimization
  • CCD and CMOS Imaging Sensors
  • Software-Defined Networks and 5G
  • Cryptography and Residue Arithmetic
  • Neural Networks and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Genomics and Phylogenetic Studies
  • Advanced Neural Network Applications
  • Cryptographic Implementations and Security
  • Air Quality Monitoring and Forecasting
  • Cryptography and Data Security
  • Chaos-based Image/Signal Encryption
  • Robotics and Automated Systems
  • VLSI and FPGA Design Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Low-power high-performance VLSI design
  • DNA and Biological Computing
  • Advanced Memory and Neural Computing
  • Image Enhancement Techniques

Ho Chi Minh City University of Technology
2011-2024

Vietnam National University Ho Chi Minh City
2016-2024

University of Electro-Communications
2020-2021

Delft University of Technology
2012-2015

This paper proposes an architecture to develop machine learning/deep learning models for anomaly network intrusion detection systems on reconfigurable computing platforms. We build two validate the framework: Anomaly Detection Autoencoder (ADA) and Artificial Neural Classification (ANC) in NetFPGA-sume platform. Three published data sets NSL-KDD, UNSW-NB15, CIC-IDS2017 are used test deployed models’ throughput, latency, accuracy. Experimental results with NetFPGA-SUME show that ADA model...

10.3390/electronics12030668 article EN Electronics 2023-01-29

This study proposes a heterogeneous hardware-based framework for network intrusion detection using lightweight artificial neural models. With the increase in volume of exchanged data, IoT networks’ security has become crucial issue. Anomaly-based systems (IDS) machine learning have recently gained increased popularity due to their generation’s ability detect unseen attacks. However, deployment anomaly-based AI-assisted IDS devices is computationally expensive. A high-performance and...

10.3390/fi15010009 article EN cc-by Future Internet 2022-12-26

Summary Over the last decades, Bioinformatics has been being in its honeymoon phase with more and new algorithms as well their improvements proposed. In Bioinformatics, sequence alignment step is considered an integral part that directly contributes to DNA, RNA, or protein identifications. Despite undeniable enhancements from provided computing architectures recent years, it still far state already achieved ideal performance. this work, we focus on one of most perfect justifiable steps a...

10.1002/cpe.5328 article EN Concurrency and Computation Practice and Experience 2019-05-07

In cryptography, elliptic curve cryptography (ECC) is considered an efficient and secure method to implement digital signature algorithms (DSAs). ECC plays essential role in many security applications, such as transport layer (TLS), internet protocol (IPsec), wireless sensor networks (WSNs). The proposed designs of hardware implementation only focus on a single variant use resources. These proposals cannot be used for resource-constrained applications or the devices that need provide...

10.3390/cryptography6020025 article EN cc-by Cryptography 2022-05-10

The communication infrastructure is one of the important components a multicore system along with computing cores and memories. A good interconnect design plays key role in improving performance such systems. In this paper, we introduce hybrid using both standard bus our area-efficient delay-optimized network on chip for heterogeneous systems, especially hardware accelerator An adaptive data communication-based mapping reconfigurable accelerators proposed to obtain low overhead latency...

10.7873/date.2013.178 article EN Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015 2013-01-01

High-level synthesis (HLS) is an automated design process that deals with the generation of behavioral hardware descriptions from high-level algorithmic specifications. The main benefit this approach ever-increasing system-on-chip (SoC) complexity and ever-shorter time-to-market can still be both manageable achievable. This advantage, coupled increasing number available heterogeneous platforms loosely couple general-purpose processors Field Programmable Gate Array-based co-processors, led to...

10.1109/euc.2014.28 article EN 2014-08-01

This paper proposes an FPGA-based multicore architecture to integrate multiple DDoS defense mechanisms for protection. The allows cooperating mitigation techniques classify incoming network packets. proposed consists of two separate partitions static and dynamic. partition includes packet pre-processing post-processing modules while the filtering are implemented within dynamic partition. These can be by either hardware custom computing cores or general purpose soft processors both. In all...

10.1145/3039902.3039906 article EN ACM SIGARCH Computer Architecture News 2017-01-11

With the rising data evolution, demand for secured communications over networks is immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill requirements of modern network applications. Many proposals published year different variants ECC satisfied some issues. Nevertheless, applications such as Internet-of-Thing (IoT) and Software-Defined Networking (SDN) put on various aspects can only be solved by algorithms. Looking at this point view, efficient architecture...

10.1109/access.2023.3236406 article EN cc-by IEEE Access 2023-01-01

The smart environmental management system proposed in this work offers a new approach to monitoring by utilizing data from IoT stations and MODIS satellite imagery. is designed be deployed vast regions, such as the Mekong Delta, with low building operating costs, making it cost-effective solution for monitoring. leverages telemetry collected combination MOD09GA, MOD11A1, MCD19A2 daily image products develop computational models that calculate values land surface temperature (LST), 2.5 10...

10.3390/fi15070245 article EN cc-by Future Internet 2023-07-18

In recent years, Internet of Thing (IoT) applications with video processing deployed on edge computing platforms have been widely exploited for many areas, such as surveillance, object monitoring, or checkin/check-out systems.While H.264 format is used most modern cameras due to its efficiency, the power usually needs be higher process videos in acceptable intervals.This paper proposes an approach based high-level synthesis technique accelerate encoding by Field Programmable Gate Array...

10.12720/jait.15.1.59-65 article EN Journal of Advances in Information Technology 2024-01-01

Asynchronous circuits are more and predominant because their advantages in comparison with synchronous circuits. While asynchronous can be implemented custom VLSI, fabricated-time is too long to allow rapid prototyping. Meanwhile, FPGA devices dominant implementation media for digital Unfortunately, they do not support of the lack circuit elements such as Muller gates, etc. This paper proposes a new efficient technique build hazard-free gates on Xilinx FPGA. Timing and/or area constraints...

10.1109/delta.2010.40 article EN 2010-01-01

In this paper, we present an overview of interconnect solutions for hardware accelerator systems. A number are presented: bus-based, DMA, crossbar, NoC, as well combinations these. The paper proposes analytical models to predict the performance these and implements them in practice. jpeg decoder application is implemented our case study different scenarios using presented solutions. We profile extract input data model. Measurement results show that NoC solution combined with a bus-based...

10.1109/ahs.2013.6604245 article EN 2013-06-01

FPGA device is a dominant implementation medium for digital circuits. Unfortunately, they do not support asynchronous circuits because of the lack circuit elements such as Muller gates, etc. In this paper, new efficient approaches are proposed to prototype or mixed synchronous/ on look-up table-based (LUT) rapidly. The developed techniques based building which play an important role in hazard-free predefined libraries HDL and EDIF format. Timing and/or area constraints place&route tool...

10.1109/atc.2009.5349341 article EN International Conference on Advanced Technologies for Communications 2009-10-01

The development of machine learning has made a revolution in various applications such as object detection, image/video recognition, and semantic segmentation. Neural networks, class learning, play crucial role this process because their remarkable improvement over traditional algorithms. However, neural networks are now going deeper cost significant amount computation operations. Therefore they usually work ineffectively edge devices that have limited resources low performance. In paper, we...

10.21553/rev-jec.286 article EN REV Journal on Electronics and Communications 2022-05-16

10.12720/jait.14.3.479-487 article EN Journal of Advances in Information Technology 2023-01-01

With the very fast improvements in technology, amount of data DNA alignment is exponential growth. Although there are more and new algorithms proposed last decade to increase mapping performance, it still takes up many days for aligning whole human genome even with large clusters. In this work, we focus on one most time-consuming steps state-of-the-art algorithm, seed extension BWA-MEM algorithm. We propose an FPGA-based IP core phase algorithm so that FPGA can be used accelerate overall...

10.1109/acomp.2018.00009 article EN 2018-11-01

Multicore processing, especially heterogeneous multicore, is being increasingly used for data intensive processing in embedded systems. An important challenge multicore is, efficiently, to get the computing core that needs it. In order have an efficient interconnect design architectures, a detailed profiling of communication patterns necessary. this work, we propose heuristic-based approach application-specific custom using quantitative information. The ultimate goal automatically, most...

10.1109/reconfig.2012.6416720 article EN 2012-12-01

As one of the main types Distributed Denial Service (DDoS) attacks, SYN flood attacks have caused serious issues for servers when legitimate clients may be denied connections. There is an essential demand a sufficient approach to mitigate attacks. In this paper, we introduce efficient high-throughput and low-latency defender architecture, carefully designed with pipeline model. A mathematical model also introduced architecture estimating protection throughput latency. The first prototype...

10.1155/2018/9562801 article EN Security and Communication Networks 2018-12-24

SHA-256 is a well-known algorithm widely used in many security applications. The provides sufficient level of safety and can be performed efficiently by FPGA devices due to its high parallelism level. This paper presents high-throughput, low hardware resources usage, power-efficiency architecture the targeting FPGA-based embedded platforms. computing core takes advantage specific achieve performance. We implement with description languages so that technology-independent. Therefore, suitable...

10.1109/atc52653.2021.9598264 article EN 2021-10-14
Coming Soon ...