Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Minh-Triet Tran is active.

Publication


Featured researches published by Minh-Triet Tran.


advanced information networking and applications | 2012

Improvement of the More Efficient and Secure ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC

Toan-Thinh Truong; Minh-Triet Tran; Anh Duc Duong

Mobile devices (e.g., PDA, mobile phone, and notebook PC) become necessary for a convenient and modern life. Users can use them to access many applications, for example online shopping, mobile pay TV, internet banking, which have been deployed on internet or wireless networks easily. Therefore, secure communications in such wireless environments are more and more important because they protect transactions between users and servers from illegal adversaries. Especially, users are people vulnerable to attacks and there are many authentication schemes proposed to guarantee them. Recently, Islam and Biswas have proposed a more efficient and secure ID-based scheme for mobile devices on ECC to enhance security for authentication. They claimed that their scheme truly is more secure than previous ones and it can resist various attacks. However, it is not true because their scheme is vulnerable to known session-specific temporary information attack, and denial of service resulting from leaking servers database. In this paper, we present an improvement to their scheme in order to isolate such problems.


international conference on computational science and its applications | 2013

Robust Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment

Toan-Thinh Truong; Minh-Triet Tran; Anh Duc Duong

Dynamic ID based authentication scheme is more and more important in wireless environments such as GSM, CDPD, 3G and 4G. One of important properties of such authentication scheme is anonymity. It must be guaranteed to defend the privacy of mobile users against outside attacks, and the scheme of Cheng-Chi Lee, Tsung-Hung Lin and Rui-Xiang Chang satisfies that requirement. However, another important property that should be considered is impersonation. The scheme must have capability to resist this kind of attack to protect legal users from illegal adversaries. In this paper, we demonstrate that Lee et al.’s scheme is still vulnerable to masquerade attack and session key attack with stolen smart card. Then we present an improvement of their scheme in order to isolate such problems.


symposium on information and communication technology | 2013

Online model-driven IDE to design GUIs for cross-platform mobile applications

Chi-Kien Diep; Quynh-Nhu Tran; Minh-Triet Tran

The wide variation in features and capabilities of mobile devices lead to difficulties in the development of the same application on different platforms. Therefore we propose an online model-driven integrated development environment to provide developers with a platform-independent GUI design for mobile applications. Our proposed system transforms an abstract platform-independent GUI into a platform-dependent GUI on a target platform. The generated project is entirely in the form with which an experienced developer on the platform is already familiar. Furthermore, as the generated application is not a web-based one, it can access naturally native features of a platform. The proposed flexible architecture enable the capability to handle and update different abstract UI and non-UI controls needed to design GUIs for mobile applications. Experimental results with volunteers show that our proposed solution can save up to 25--51% time to create GUIs of an application to three different platforms of Android, iOS and Windows Phone.


pacific rim symposium on image and video technology | 2015

Deep Convolutional Neural Network in Deformable Part Models for Face Detection

Dinh-Luan Nguyen; Vinh-Tiep Nguyen; Minh-Triet Tran; Atsuo Yoshitaka

Deformable Part Models and Convolutional Neural Network are state-of-the-art approaches in object detection. While Deformable Part Models makes use of the general structure between parts and root models, Convolutional Neural Network uses all information of input to create meaningful features. These two types of characteristics are necessary for face detection. Inspired by this observation, first, we propose an extension of DPM by adaptively integrating CNN for face detection called DeepFace DPM and propose a new combined model for face representation. Second, a new way of calculating non-maximum suppression is also introduced to boost up detection accuracy. We use Face Detection Data Set and Benchmark to evaluate the merit of our method. Experimental results show that our method surpasses the highest result of existing methods for face detection on the standard dataset with 87.06i??% in true positive rate at 1000 number false positive images. Our method sheds a light in face detection which is commonly regarded as a saturated area.


international conference on control, automation, robotics and vision | 2012

Realtime arbitrary-shaped template matching process

Dai-Duong Truong; Vinh-Tiep Nguyen; Anh Duc Duong; Chau-Sang Nguyen Ngoc; Minh-Triet Tran

Template matching is one of the significant methods used in most computer vision applications. However, one disadvantage of existing template matching methods is that a template must be a rectangular image. Several solutions can be used to overcome this problem, such as feature-based, edge-based, etc., but most of them do not meet the requirements of practical applications because of their slow speed or low accuracy. In this paper, the authors propose a process for matching a template with an arbitrary shape using the idea of coarse-fine and refining interesting regions. Variety of measures can be used to provide different levels of performance for each practical situation. Experiments show that the process performs an impressive performance in average. Using the same measures, the proposed process works 5 times faster than the FFT template matching method (implemented in OpenCV), while achieving the similar accuracy. Moreover, most parts of the proposed process can be executed in parallel on multi-core CPUs or GPUs.


availability, reliability and security | 2012

Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure

Hoang-Quoc Nguyen-Son; Quoc-Binh Nguyen; Minh-Triet Tran; Dinh-Thuc Nguyen; Hiroshi Yoshiura; Isao Echizen

One approach to overcoming the problem of too much information about a user being disclosed on social networking services (by the user or by the users friends) through natural language texts (blogs, comments, status updates, etc.) is to anonymize the texts. However, determining which information is sensitive and should thus be anonymized is a challenging problem. Sensitive information is any information about a user that could be used to identify the user. We have developed an algorithm that anonymizes sensitive information in text to be posted by generalization. Synonyms for the anonymized information are used as fingerprints for detecting a discloser of the information. The fingerprints are quantified using the modified discernability metric to enable an appropriate level of anonymity to be used for each group of the users friends. The fingerprints cannot be converted into another one to incorrectly identify a person who has revealed sensitive information. Use of the algorithm to control the disclosure of information on Facebook demonstrated that it works well not only in social networking but also in other areas (health, religion, politics, military, etc.) that store sensitive information.


Information Systems Frontiers | 2014

Enhanced Dynamic Authentication Scheme (EDAS)

Toan-Thinh Truong; Minh-Triet Tran; Anh Duc Duong

With non-stop growth in network environments, communication security is necessary. A strong protocol guarantees that users and service providers are secure against many kinds of attacks, such as impersonation and replay attack. Sood et al. proposed an authentication scheme based on dynamic identity to prevent transactions from being intercepted by malicious users. Although they claimed that their scheme has advantages over previous schemes with the same approach, we prove that their scheme is vulnerable to impersonation attack and stolen verification attack, and can be affected by clock synchronization. Therefore we propose a novel authentication scheme to enhance security and overcome limitations existing in Sood’s scheme. Our security analysis shows that our proposed method can efficiently resist known types of attacks. Experimental results also show that the method can be implemented and processed in real-time thus applicable for not only regular computers but also mobile devices.


international conference on information and communication technology | 2013

Modified efficient and secure dynamic ID-Based user authentication scheme

Toan-Thinh Truong; Minh-Triet Tran; Anh Duc Duong

Communication is necessary operations in wireless environments. Therefore, we must have a secure remote authentication to defend transactions against illegitimate adversaries in such risky channel. Smart card is one of methods that many schemes used due to its convenience. Recently, Khurram Khan has proposed an enhancement scheme using smart card to recover some pitfalls in Wang et al.s scheme. They claimed that their scheme remedy those security flaws. Nevertheless, we point out that Khan et al.s scheme cannot protect users anonymity. Besides, it does not achieve secret key forward secrecy and cannot resist denial of service attack due to values stored in servers database. Consequently, we present an improvement to their scheme to isolate such problems.


international conference on human computer interaction | 2013

Multimodal smart interactive presentation system

Hoang-An Le; Khoi-Nguyen C. Mac; Truong-An Pham; Vinh-Tiep Nguyen; Minh-Triet Tran

The authors propose a system that allows presenters to control presentations in a natural way by their body gestures and vocal commands. Thus a presentation no longer follows strictly a rigid sequential structure but can be delivered in various flexible and content adapted scenarios. Our proposed system fuses three interaction modules: gesture recognition with Kinect 3D skeletal data, key concepts detection by context analysis from natural speech, and small-scaled hand gesture recognition with haptic data from smart phone sensors. Each module can process in realtime with the accuracy of 95.0%, 91.2%, and 90.1% respectively. The system uses events generated from the three modules to trigger pre-defined scenarios in a presentation to enhance the exciting experience for audiences.


symposium on information and communication technology | 2012

Augmented media for traditional magazines

Vinh-Tiep Nguyen; Minh-Triet Tran; Trung-Nghia Le; Quoc-Minh Bui; Anh Duc Duong

Reading traditional newspapers or magazines is a common way to get latest information about events or new products. However these printed materials only provide readers with static information. Readers may want to know more detail information about some product in an article or to watch video clips related to an event mentioned in a news right at the moment when they read that article or news. The authors propose a system with mobile devices that can provide extra information and multimedia for readers by applying augmented reality to traditional magazines. A user can enjoy extra rich multimedia information on a product or news on his/her mobile device just by looking at an article in a traditional magazine through his/her mobile device. The system detects which article in which page of a magazine that is being displayed in a mobile device and provides a reader with related information and multimedia objects. The important feature of our proposed system is using lightweight filter to efficiently filter out candidate covers or articles that do not visually match an image captured by a mobile device. The experiment shows that our proposed system achieves the average accuracy of more than 90% and can process in the real-time manner.

Collaboration


Dive into the Minh-Triet Tran's collaboration.

Top Co-Authors

Avatar

Isao Echizen

National Institute of Informatics

View shared research outputs
Top Co-Authors

Avatar

Toan-Thinh Truong

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Hoang-Quoc Nguyen-Son

Graduate University for Advanced Studies

View shared research outputs
Top Co-Authors

Avatar

Hiroshi Yoshiura

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar

Duy-Dinh Le

National Institute of Informatics

View shared research outputs
Top Co-Authors

Avatar

Thanh Duc Ngo

Graduate University for Advanced Studies

View shared research outputs
Top Co-Authors

Avatar

Bo Li

Texas State University

View shared research outputs
Top Co-Authors

Avatar

Yijuan Lu

Texas State University

View shared research outputs
Top Co-Authors

Avatar

Nam Do-Hoang Le

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Noboru Sonehara

National Institute of Informatics

View shared research outputs
Researchain Logo
Decentralizing Knowledge