Van-Linh Nguyen

Van-Linh Nguyen
National Chung Cheng University · Department of Computer Science and Information Engineering

PhD

About

59
Publications
16,782
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,094
Citations
Introduction
Van-Linh Nguyen received a Ph.D. degree in computer science and information engineering at National Chung Cheng University (CCU), Taiwan, 2019. His research interests include low-power networks, the Internet of Things, edge computing, and next-generation network security.
Education
June 2014 - July 2014
Tokyo Institute of Technology
Field of study
  • Advance Technology Exchange Program in ASEAN – JAPAN

Publications

Publications (59)
Article
Semantic communications (SEMCOM) is a novel communication model that exploits neural networks or deep learning techniques to convey the semantics of the data and contextual reasoning, instead of transmitting full raw bits as in the conventional transmission models. SEMCOM is anticipated to significantly increase the effectiveness of cognitive commu...
Preprint
Full-text available
Many nations are promoting the green transition in the energy sector to attain neutral carbon emissions by 2050. Smart Grid 2.0 (SG2) is expected to explore data-driven analytics and enhance communication technologies to improve the efficiency and sustainability of distributed renewable energy systems. These features are beyond smart metering and e...
Article
Network intrusion detection systems (NIDS) are vital for identifying security attacks and predicting early invasion attempts, which is essential for protecting the Internet. Recently, Deep learning (DL) has made significant achievements in enhancing intrusion detection accuracy. Nevertheless, the practical implementation of high-complexity DL model...
Article
Abstract The advent of sixth-generation (6G) networks is expected to start a new era in mobile networks, characterized by unprecedented high demands on dense connectivity, ultra-reliability, low latency, and high throughput. Artificial intelligence (AI) is at the forefront of this progress, optimizing and enabling intelligence for essential 6G func...
Article
In this article, we consider a multiagent unmanned aerial vehicle (UAV)-aided system employing mobile edge computing (MEC) servers to satisfy the requirement of ultrareliable low latency communications (URLLCs) in intelligent autonomous transport applications. Our MEC architecture aims to guarantee quality-of-service (QoS) by investigating task off...
Article
Guaranteeing stable connectivity for emergency communications in rural and remote areas (e.g., to transfer highquality video for remote surgery) has been challenging for any cellular network generation. With many initiatives proposed to expand the network coverage in 6G, emergency communications are supposed to be enhanced significantly. For exampl...
Article
The accuracy and timeliness tradeoff prevents Digital Twins (DTs) from realizing their full potential. High accuracy is crucial for decision-making, and timeliness is equally essential for responsiveness. Therefore, this tradeoff in DT communication must be addressed to achieve DT synchronization. Previous studies identified the issue but considere...
Article
Artificial intelligence (AI) is projected to be a critical part of open radio access networks (O-RAN) to enable intelligence for connectivity management in smart vehicle-to-everything (V2X) networks and vehicle road cooperation systems. However, the openness and dependence of AI models on massive volumes of data render them subject to serious secur...
Article
Many nations are promoting the green transition in the energy sector to attain neutral carbon emissions by 2050. SG2 is expected to explore data-driven analytics and enhance communication technologies to improve the efficiency and sustainability of distributed renewable energy systems. These features are beyond smart metering and electric surplus d...
Preprint
Full-text available
p>High-accuracy radio positioning and sensing technologies are crucial for many applications, including tracking hospital patients and identifying victims during emergency calls. However, these techniques present serious privacy concerns since malicious actors might use them to track users' activities and habits without their consent. This paper pr...
Preprint
Full-text available
p>High-accuracy radio positioning and sensing technologies are crucial for many applications, including tracking hospital patients and identifying victims during emergency calls. However, these techniques present serious privacy concerns since malicious actors might use them to track users' activities and habits without their consent. This paper pr...
Preprint
Full-text available
p>Directional antenna technologies are crucial to enhance high-speed data transmission in emerging wireless communications such as mmWave. These technologies can enable high-accuracy radio positioning by exploiting spatial-temporal signal processing in wideband beamforming space. However, the radio positioning technique potentially poses surveillan...
Preprint
Full-text available
p>Directional antenna technologies are crucial to enhance high-speed data transmission in emerging wireless communications such as mmWave. These technologies can enable high-accuracy radio positioning by exploiting spatial-temporal signal processing in wideband beamforming space. However, the radio positioning technique potentially poses surveillan...
Article
This letter presents a novel method to enable beam steering optimization for secure communications and resilience against radio tracking in an intelligent reflecting surfaces-enabled multiple-input multiple-output dual-functional radar and communications system. The approach involves optimizing beam steering by solving two convex sub-problems: i) m...
Article
High-accuracy radio positioning and sensing technologies are crucial for many applications, including tracking hospital patients and identifying victims during emergency calls. However, these techniques present serious privacy concerns since malicious actors might use them to track users' activities and habits without their consent. This paper prov...
Preprint
Full-text available
Twenty-two years after the advent of the first-generation vehicular network, i.e., dedicated short-range communications (DSRC) standard/IEEE 802.11p, the vehicular technology market has become very competitive with a new player, Cellular Vehicle-to-Everything (C-V2X). Currently, C-V2X technology likely dominates the race because of the big advantag...
Article
Full-text available
Resolving traffic congestion caused by sudden events (e.g., an accident, lane closed due to construction) on the freeway has always been a problem that is challenging to address perfectly. The congestion resolution can take hours if the congestion is severe, and the vehicles must voluntarily line up to exit the congestion spots. Most state-of-the-a...
Article
This work compares the performance of different combinations of data sources for intrusion detection in depth. To learn and distinguish between normal and malicious behavior, we use machine learning algorithms and train three typical models on three kinds of datasets: system logs, packet flows and host statistics. Unlike other studies, our study ca...
Article
Full-text available
A centralized public-key infrastructure (PKI) has revealed disadvantages to enterprise applications, as a result of a single point of failure and risks of misbehaving certificate authorities. This work presents a taxonomy of blockchain-based decentralized PKI schemes along with the prospective technologies for developing a robust PKI for Vehicle-to...
Article
Full-text available
As a result of the explosion of security attacks and the complexity of modern networks, machine learning (ML) has recently become the favored approach for intrusion detection systems (IDS). However, the ML approach usually faces three challenges: massive attack variants, imbalanced data issues, and appropriate data segmentation. Improper handling o...
Article
Full-text available
Channel congestion has been an open challenge for vehicular networks due to the limited resource of communication channels. Explosion of channel access requests from a massive number of transmitter vehicles can exhaust bandwidth and then degrade transmission quality. The rapid drop of messages (because of the high bit error rate in the transmission...
Article
Twenty-two years after the advent of the firstgeneration vehicular network, i.e., dedicated short-range communications (DSRC) standard/IEEE 802.11p, the vehicular technology market has become very competitive with a new player, Cellular Vehicle-to-Everything (C-V2X). Currently, C-V2X technology likely dominates the race because of the big advantage...
Conference Paper
Full-text available
Vehicle platooning is a promising technology to bring up significant benefits of improved fuel economy and fewer traffic collisions. However, many security attacks such as beacon message falsification have been exposed, creating grave concerns about maintaining a vehicle platoon stably. This work introduces a robust positioning-based verification s...
Conference Paper
Full-text available
In the next decades, the popularity of Internet of Vehicles (IoV) technologies and autonomous driving promises to fundamentally change the way of handling the traffic flow on the streets. Traffic separation can be entirely carried out from a remote traffic control center without the police. This work introduces a sequential coordination algorithm,...
Article
Full-text available
Dispatching emergency vehicles (EVs) to fatal accidents or fires as fast as possible is vital to save lives; however, minimizing an EV's travel time to the rescue spot is still an open challenge. This work presents a path planning and traffic clear-out scheduling scheme to lessen the EV's travel time in the vision of the Internet of Vehicles (IoV)....
Article
Full-text available
Intrusion detection is one of the most common approaches for addressing security attacks in modern networks. However, given the increasing diversity of attack behaviors, efficient detection becomes more challenging. Machine learning (ML) has recently dominated as one of the most promising techniques to improve detection accuracy for intrusion detec...
Article
Full-text available
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues...
Preprint
Full-text available
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues...
Article
Full-text available
Vehicle-to-Everything (V2X) communication technologies and High-definition (HD) maps are essential to improve the safety of vehicles in areas with limited visibility. V2X- enabled vehicles use periodic beacon messages to update each other on their moving state (position, velocity, heading). However, due to the limited resources of V2X wireless chan...
Article
Next-generation advanced driver-assistance systems (ADAS) and cooperative adaptive cruise control (CACC) for advanced/autonomous driving are expected to increasingly use wireless connectivity such as V2V and V2I to improve the coverage, particularly in the locations where a vehicle's camera or radar is ineffective. However, using shared sensing dat...
Article
Full-text available
Various attacks have emerged as the major threats to the success of a connected world like the Internet of Things (IoT), in which billions of devices interact with each other to facilitate human life. By exploiting the vulnerabilities of cheap and insecure devices such as IP cameras, an attacker can create hundreds of thousands of zombie devices an...
Article
Full-text available
Vehicle-to-Everything (V2X) communications are vital for autonomous vehicles to share sensing data about the surrounding environment, particularly in non-line-of-sight (NLOS) areas where the camera and radar systems often perform poorly. However, an insider adversary such as a compromised vehicle can disseminate false sensing data that even a signa...
Article
Full-text available
Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify malicious traffic. However, these state-of-the-art systems also face tremendous challenges to satisfy...
Article
In vehicle-to-everything (V2X) communications, collecting sensing data from nearby entities is common and essential. However, this approach also raises grave concerns about the truthfulness of data reported by the senders, particularly the unreliable stakeholders. For example, a compromised vehicle may deliberately disseminate its false location to...
Article
According to Internet Live Stat, the total number of online websites has already soared over 1.9 billion and is steadily increasing. ¹ The most popular content management systems (CMS) installed on such websites are PHP-based frameworks such as Wordpress and Joomla, which account for (as of December 2018) 59% and 6% of market share. 2,3 A large num...
Article
Full-text available
Low Power Wireless (LPW) networks have recently been emerging as key candidates to offer affordable connectivity for the constrained devices in the Internet of Things (IoT). However, they also raise major security concerns due to the inherent security vulnerabilities of built-in communication protocols. By exploiting these flaws, an adversary can a...
Preprint
Full-text available
Over the past decades, the web is always one of the most popular targets of hackers. Today, along with the popular usage of open sources such as Wordpress and Joomla, the explosion of the vulnerabilities in such frameworks causes the websites using them to face numerous security threats. Unfortunately, many clients and small companies may not be aw...
Conference Paper
The programmable data plane model of softwaredefined networks (SDN) continues to gain adoption and support in many enterprise entities such as Google and Barefoot. This leading trend promises to enable flexible mechanisms for handling traffic on SDN switches. In the early stage of its development, few already-in-market proposals exploit the innovat...
Article
Distributed denial of service is one of the most critical threats to the availability of Internet services. A botnet with only 0.01 percent of the 50 billion connected devices in the Internet of Things is sufficient to launch a massive DDoS flooding attack that could exhaust resources and interrupt any target. However, the mobility of user equipmen...
Conference Paper
Software-defined networking (SDN) separates the control plane from underlying devices, and allows it to control the data plane from a global view. While SDN brings conveniences to management, it also introduces new security threats. Knowing reactive rules, attackers can launch denial-of-service (DoS) attacks by sending numerous rule-matched packets...

Questions

Question (1)
Question
Dear researchers
I am starting researching deeply about DDOS and detection algorithm as well as preventing technique. Detect and Prevent DDOS both for Streaming Media Application and Web-based Service. What should read latest science paper about this field? 
I read this 
1.Edhud Doron , WDA: A Web farm Distributed Denial Of Service attack attenuator
2.Huizhong Sun, Huizhong Sun ; Chao, H.J. ; Wing Cheong Lau, Wing Cheong Lau ,ALPi: A DDoS Defense System for High-Speed Networks, Ayres, P.E. ;
3. Chen Lei, Chen Lei ; Ye Dejian, Ye Dejian, DoS and DDoS Attack's Possibility Verification on Streaming Media Application , 2008 International Symposium on Information Science and Engineering, Dec. 2008, Vol.2, pp.63-67

Network

Cited By