• Home
  • Khuong Nguyen-An
Khuong Nguyen-An

Khuong Nguyen-An
University of Technology (HCMUT) VNU-HCM · Faculty of Computer Science and Engineering

PhD

About

29
Publications
15,123
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
101
Citations
Introduction
Lecturer and Researcher at Faculty of Computer Science and Engineering, University of Technology (HCMUT), VNU-HCM, HCMC, Vietnam.
Education
November 2004 - October 2008
University of Groningen
Field of study
  • Mathematics

Publications

Publications (29)
Article
Full-text available
From the end of 2019, one of the most serious and largest spread pandemics occurred in Wuhan (China) named Coronavirus (COVID-19). As reported by the World Health Organization, there are currently more than 100 million infectious cases with an average mortality rate of about five percent all over the world. To avoid serious consequences on people’s...
Chapter
Full-text available
Cyber security have always been a major concern for internet applications and the demand for website protection is on the rise. Web Application Firewalls (WAFs) services are commonly used, as they are convenient as plug-and-play services and provide protection against multiple type of attacks. However, they have high false positive rates. Their rul...
Preprint
Full-text available
From the end of 2019, one of the most serious and largest spread pandemics occurred in Wuhan (China) named Coronavirus (COVID-19). As reported by the World Health Organization, there are currently more than 100 million infectious cases with an average mortality rate of about five percent all over the world. To avoid serious consequences on people’s...
Chapter
Full-text available
Web Application Firewall (WAF) is a security technology that helps mitigate and prevent common attacks in web applications. Designed as a barrier between the web server and the user (possibly an attacker), the WAF analyzes, detects, and early warns of possible attacks. However, the current techniques for detecting web application attacks are still...
Chapter
Predicting stock prices is a challenging task due to the highly stochastic nature of the financial market. Among many proposed quantitative approaches to tackle this problem, machine learning, in recent years, has become one of the most promising methods. However, machine learning is still new to a large part of Vietnamese investors community. This...
Chapter
Full-text available
Blockchain has gradually been popularized by its transparency, fairness, and democracy. This technology has opened the door to the development of Ethereum, a blockchain platform with smart contracts that can hold and automatically transfer tokens. Like a legacy computer program, smart contracts are vulnerable to security bugs. In recent years, many...
Chapter
Full-text available
Smart cities bring together technology, governments, and society to enable a smart economy, smart mobility, a smart environment, smart people, smart living, and smart governance. However, they come with many technological challenges due to the lack of an efficient and secure mechanism for open data. The gap between a government and its citizens of...
Conference Paper
Full-text available
Generating public randomness has been significantly demanding and also challenging, especially after the introduction of the Blockchain Technology. Lotteries, smart contracts, and random audits are examples where the reliability of the randomness source is a vital factor. We demonstrate a system of random number generation service for generating fa...
Conference Paper
Full-text available
Generating a secure source of publicly-verifiable randomness could be the single most fundamental technical challenge on a distributed network, especially in the blockchain context. Many current proposals face serious problems of scalability and security issues. We present a protocol which can be implemented on a blockchain that ensures unpredictab...
Conference Paper
Full-text available
With the rise of Internet of Things, end-users expect to obtain data from well-connected smart devices and stations through data services being provisioned in distributed architectures. Such services could be aggregated in a number of smart ways to provide the end-users and third-party applications with sophisticated data (e.g., weather data couple...
Conference Paper
Full-text available
Table detection is a crucial step in many document analysis applications as tables are used for presenting essential information to the reader in a structured manner. It is still a challenging problem due to the variety of table structures and the complexity of document layout. This paper present a hybrid method consisting of three fundamental step...
Conference Paper
We propose a new proof-of-work protocol called Flexible Proof-of-Work to generate an unpredictable set of numbers. This is the first component of a general framework for a decentralized random number generator that we are formalizing. The algorithm ensures experimentally that the result is feasible and unpredictable. More- over we demonstrate that...
Article
Business services arguably play a central role in service-based information systems as they would fill in the gap between the technicality of Service-Oriented Architecture and the business aspects captured in Enterprise Architecture. Business services have distinctive features that are not typically observed in Web services, e.g. significant portio...
Conference Paper
Business services arguably play a central role in service-based information systems as they fill in the gap between the technicality of Service-Oriented Architecture and the business aspects captured in Enterprise Architecture. Business services have distinctive features that are not typically observed in Web services, e.g. significant portions of...
Article
Full-text available
The notions of equivalence and strict equivalence for order one differential equations are introduced. The more explicit notion of strict equivalence is applied to examples and questions concerning autonomous equations and equations having the Painleve property. The order one equation determines an algebraic curve. If this curve has genus zero or o...
Article
Full-text available
The theme of this paper is to ‘solve’ an absolutely irreducible differential module explicitly in terms of modules of lower dimension and finite extensions of the differential field K. Representations of semisimple Lie algebras and differential Galois theory are the main tools. The results extend the classical work of G. Fano.
Article
The aim of this paper is to investigate the possibility of solving a linear differential equation of degree n by means of differential equations of degree less than or equal to a fixed d, 1≤dn. This paper recovers and extends work of G. Fano, M. F. Singer and E. Compoint. Representations of algebraic Lie algebras are the main tool.
Article
Full-text available
The theme of this paper is to `solve' an absolutely irreducible differential module explicitly in terms of modules of lower dimension and finite extensions of the differential field $K$. Representations of semi-simple Lie algebras and differential Galois theory are the main tools. The results extend the classical work of G. Fano.
Article
Full-text available
In this note we classify, up to conjugation, all algebraic subgroups of GL2(ℂ).

Network

Cited By

Projects

Projects (5)
Project
Our protocol together with GINAR system is an R&D project aiming at providing a decentralized solution to random number generation by leveraging the blockchain technology along with long-lasting cryptographic primitives including homomorphic encryption, verifiable random functions. The system decentralizes the process of generating random numbers by combining each party's favored value to obtain the final random numbers. Our novel idea is to force each party to encrypt his contribution before making it public. With the help of homomorphic encryption, all encrypted contribution can be combined without performing any decryption. The solution has achieved the properties of unpredictability, tamper-resistance, and public-verifiability. In addition, it only offers a linear overall complexity with respect to the number of parties on the network, which permits great scalability.