Công bố khoa học
Danh sách công bố khoa học của giảng viên và nghiên cứu viên khoa An toàn Thông tin
2026
8 công bốA systematic survey of LLM-based text-to-SQL: methodologies, security vulnerabilities, and future challenges
Text-to-Structured Query Language (SQL) systems, which allow users to query databases using natural language, have advanced significantly with the rise of Large Language Models (LLMs). While this prog…
A Business Process-Centric Approach for LLM-Driven Functional Test Generation
Validating end-to-end business processes requires strict adherence to state logic, particularly for long-horizon workflows involving complex multi-role interactions. While Large Language Models (LLMs)…
Windows Malware Loader Behaviour Analysis Based on API Calls with LLM and Ontology
The use of digital infrastructures has increased cyber risks, with malware loaders becoming key routes for discreet payload distribution and proliferation. The growth of obfuscation techniques makes c…
Enhanced Offloading Using RSMA-Assisted BackCom in UAV-MEC Networks
This paper proposes a framework that simultaneously integrates unmanned aerial vehicle (UAV) mobility, backscatter communication (BackCom), and rate-splitting multiple access (RSMA) to enhance task of…
Backscatter Communication and NOMA in UAV-Assisted MEC IoT Networks
This study presents a framework that integrates backscatter communication (BC) and nonorthogonal multiple access (NOMA) to enhance the efficacy of unmanned aerial vehicle (UAV)-assisted mobile-edge co…
Performance Analysis of Rate-Splitting Multiple Access for Enhanced Computation Offloading in UAV-Enabled MEC Within IoT Networks.
Sixth-generation (6G) wireless systems are envisioned to support unprecedented data connectivity demands, thereby necessitating the advent of communication techniques for efficient spectrum utilizatio…
Performance Analysis of Backscatter Communication Under Energy Outage for MEC-Aided UAV-Enabled NOMA in IoT Networks
On the Performance and Optimization of Energy-Efficient Secrecy Computation Offloading for Multiantenna UAV-Enabled NOMA-MEC With Aerial Friendly Jamming
This research investigates the secrecy performance and energy efficiency of a dual-unmanned aerial vehicle (UAV) computation offloading system that leverages uplink non-orthogonal multiple access (NOM…
2025
7 công bốSecrecy Offloading Analysis of NOMA-based UAV-aided MEC in IoT Networks with Imperfect CSI and SIC
Nonorthogonal multiple access (NOMA) increases spectrum efficacy by permitting multiple devices to share link resources. It can be used to provide convenient offloading computing services for edge dev…
Energy Outage Analysis for NOMA-Based UAV-MEC with Imperfect CSI and SIC in IoT Network
This research explores a framework integrating unmanned aerial vehicle (UAV) with mobile-edge computing (MEC) to address the computational constraints of edge IoT device (EID). By deploying a UAV as a…
Secrecy Offloading Analysis of NOMA-based UAV-aided MEC in IoT Networks with Imperfect CSI and SIC
Nonorthogonal multiple access (NOMA) increases spectrum efficacy by permitting multiple devices to share link resources. It can be used to provide convenient offloading computing services for edge dev…
Secrecy Offloading of UAV-Assisted MEC Cooperative Hybrid NOMA-TDMA Framework with Friendly Jammer in IoT Network
The surging demand for Internet of Things applications requires efficient resource allocation and security robustness to safeguard sensitive data from eavesdropping threats. Hence, this article invest…
Automated Framework for Active Directory Security and Compliance through Continuous Monitoring and Attack Path Validation
As cyber threats get more sophisticated and the attack surface expands, Active Directory (AD) has become a prominent target for attackers. Compromising AD can result in major security breaches and reg…
Secure task offloading and optimization for UAV-assisted NOMA-MEC system with friendly jamming
This paper studies security task offloading for dual unmanned aerial vehicle (UAV)-assisted mobile-edge computing (MEC) in Internet of Things (IoT) systems, in which one UAV is used to aid ground edge…
Secure Computation Offloading Analysis for WPT-enabled UAV-assisted MEC Incorporating NOMA with Friendly Jammer in IoT Networks
This article investigates the efficacy of the secure computation offloading within an Internet of Things (IoT) network that employs wireless power transfer (WPT) -enabled unmanned aerial vehicle (UAV)…