no code implementations • 26 Nov 2024 • Hong-Hanh Nguyen-Le, Van-Tuan Tran, Dinh-Thuc Nguyen, Nhien-An Le-Khac
In recent years, deepfakes (DFs) have been utilized for malicious purposes, such as individual impersonation, misinformation spreading, and artists' style imitation, raising questions about ethical and security concerns.
no code implementations • 11 Sep 2024 • Hong-Hanh Nguyen-Le, Van-Tuan Tran, Dinh-Thuc Nguyen, Nhien-An Le-Khac
The advancements in generative AI have enabled the improvement of audio synthesis models, including text-to-speech and voice conversion.
no code implementations • 25 Apr 2024 • Duc-Anh Nguyen, Nhien-An Le-Khac
Human Activity Recognition (HAR) is a well-studied field with research dating back to the 1980s.
no code implementations • 1 Dec 2023 • Duc-Anh Nguyen, Cuong Pham, Nhien-An Le-Khac
Various types of sensors can be used for Human Activity Recognition (HAR), and each of them has different strengths and weaknesses.
Ranked #1 on Human Activity Recognition on PAMAP2 (Accuracy metric)
no code implementations • 20 Oct 2023 • Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac
We leverage a triad of deep learning models designed to distill essential representations from transaction sequencing, subgraph connectivity, and narrative generation to significantly streamline the analyst's investigative process.
no code implementations • 4 Oct 2023 • Tharindu Lakshan Yasarathna, Lojenaa Navanesan, Simon Barque, Assanka Sayakkara, Nhien-An Le-Khac
We present an approach to collect the EM-SCA datasets and demonstrate the feasibility of using transfer learning to obtain more meaningful and reliable results from EM-SCA in IoT forensics of crossed-IoT devices.
no code implementations • 29 Sep 2022 • Quoc Hung Ngo, Tahar Kechadi, Nhien-An Le-Khac
We built an Agriculture Computing Ontology (AgriComO) to explain the knowledge mined in agriculture.
no code implementations • 15 Jul 2022 • Quoc Hung Ngo, Tahar Kechadi, Nhien-An Le-Khac
The challenge now is how to exploit all this large amount of knowledge that is previously known for efficient decision-making processes.
no code implementations • 21 Mar 2021 • Vuong M. Ngo, Sven Helmer, Nhien-An Le-Khac, M-Tahar Kechadi
For instance, digital archives for textiles offer keyword search, which is fairly well understood, and arrange their content following a certain taxonomy, but search functionality at the level of thread structure is still missing.
no code implementations • 2 Dec 2020 • Xiaoyu Du, Chris Hargreaves, John Sheppard, Felix Anda, Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon
Multi-year digital forensic backlogs have become commonplace in law enforcement agencies throughout the globe.
no code implementations • 2 Dec 2020 • Felix Anda, Brett A. Becker, David Lillis, Nhien-An Le-Khac, Mark Scanlon
Swift response to the detection of endangered minors is an ongoing concern for law enforcement.
no code implementations • 20 Nov 2020 • Quoc Hung Ngo, Tahar Kechadi, Nhien-An Le-Khac
This knowledge and know-how information are collected from various sources, hence the question is how to organise this knowledge so that it can be efficiently exploited.
no code implementations • 3 Dec 2019 • Quoc Hung Ngo, Nhien-An Le-Khac, Tahar Kechadi
In precision agriculture (PA), soil sampling and testing operation is prior to planting any new crop.
no code implementations • 23 Oct 2019 • Nhien-An Le-Khac, Lamine M. Aouad, M-Tahar Kechadi
The integrating and cooperating of these two steps need an effective knowledge management, concretely an efficient map of knowledge in order to take the advantage of mined knowledge to guide mining the data.
no code implementations • 2 Jul 2019 • Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon
Achieving high performance for facial age estimation with subjects in the borderline between adulthood and non-adulthood has always been a challenge.
no code implementations • 29 May 2019 • Vuong M. Ngo, Nhien-An Le-Khac, M-Tahar Kechadi
We also evaluate the performance of our data warehouse.
no code implementations • 16 May 2019 • Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac
Our approach is to build a neural network model utilizing Adversarial Autoencoder (AAE-$\alpha$) in order to detect the activity of an attacker who leverages off-the-shelf tools and system applications.
no code implementations • 18 Mar 2019 • Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon
EM side-channel analysis is a technique where unintentional electromagnetic emissions are used for eavesdropping on the operations and data handling of computing devices.
Cryptography and Security General Literature
no code implementations • 21 Feb 2019 • Lamine M. Aouad, Nhien-An Le-Khac, Tahar M. Kechadi
In this article, we focus on distributed Apriori-based frequent itemsets mining.
no code implementations • 22 Jul 2018 • Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac
To date, there is little research on the digital traces in modern radio communication equipment.
Cryptography and Security Computers and Society
no code implementations • 1 Feb 2018 • Malika Bendechache, Nhien-An Le-Khac, M-Tahar Kechadi
In this paper, we present a new approach of distributed clustering for spatial datasets, based on an innovative and efficient aggregation technique.
no code implementations • 31 Jan 2018 • Nga Nguyen Thi, Van Loi Cao, Nhien-An Le-Khac
Instead of considering each time-step separately, the observation of prediction errors from a certain number of time-steps is now proposed as a new idea for detecting collective anomalies.
no code implementations • 11 Apr 2017 • Van Loi Cao, Nhien-An Le-Khac, Miguel Nicolau, Michael ONeill, James McDermott
We examine two fitness functions from previous studies and develop two new fitness functions to evolve GP classifier with superior accuracy on the minority class and overall.
no code implementations • 11 Apr 2017 • V-H Cao, K-X Chu, Nhien-An Le-Khac, M-T. Kechadi, Debra F. Laefer, Linh Truong-Hong
In this paper, we present a comparative study of software libraries and algorithms to optimise the processing of LiDAR data.
no code implementations • 11 Apr 2017 • Nhien-An Le-Khac, M-Tahar Kechadi, Bo Wu, C. Chen
Remote sensing research focusing on feature selection has long attracted the attention of the remote sensing community because feature selection is a prerequisite for image processing and various applications.
no code implementations • 11 Apr 2017 • Malika Bendechache, Nhien-An Le-Khac, M-Tahar Kechadi
However, their application to very large spatial datasets presents numerous challenges such as high-dimensionality data, heterogeneity, and high complexity of some algorithms.
no code implementations • 28 Mar 2017 • Loic Bontemps, Van Loi Cao, James McDermott, Nhien-An Le-Khac
Most of the cur- rent research on anomaly detection is based on the learning of normally and anomaly behaviors.
no code implementations • 9 Sep 2016 • Fan Cai, Nhien-An Le-Khac, M-T. Kechadi
Nowadays, financial data analysis is becoming increasingly important in the business market.