Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thang Hoang is active.

Publication


Featured researches published by Thang Hoang.


Journal of Information Processing Systems | 2013

Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer

Thang Hoang; Thuc Dinh Nguyen; Chuyen Luong; Son Do; Deokjai Choi

Mobile authentication/identification has grown into a priority issue nowadays because of its existing outdated mechanisms, such as PINs or passwords. In this paper, we introduce gait recognition by using a mobile accelerometer as not only effective but also as an implicit identification model. Unlike previous works, the gait recognition only performs well with a particular mobile specification (e.g., a fixed sampling rate). Our work focuses on constructing a unique adaptive mechanism that could be independently deployed with the specification of mobile devices. To do this, the impact of the sampling rate on the preprocessing steps, such as noise elimination, data segmentation, and feature extraction, is examined in depth. Moreover, the degrees of agreement between the gait features that were extracted from two different mobiles, including both the Average Error Rate (AER) and Intra-class Correlation Coefficients (ICC), are assessed to evaluate the possibility of constructing a device-independent mechanism. We achieved the classification accuracy approximately for both devices, which showed that it is feasible and reliable to construct adaptive cross-device gait recognition on a mobile phone.


The Scientific World Journal | 2014

Secure and Privacy Enhanced Gait Authentication on Smart Phone

Thang Hoang; Deokjai Choi

Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits.


information security conference | 2013

A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error

Thang Hoang; Deokjai Choi; Viet Vo; Anh Nguyen; Thuc Dinh Nguyen

In this paper, we propose a novel gait authentication mechanism by mining sensor resources on mobile phone. Unlike previous works, both built-in accelerometer and magnetometer are used to handle mobile installation issues, including but not limited to disorientation, and misplacement errors. The authentication performance is improved by executing deep examination at pre-processing steps. A novel and effective segmentation algorithm is also provided to segment signal into separate gait cycles with perfect accuracy. Subsequently, features are then extracted on both time and frequency domains. We aim to construct a lightweight but high reliable model; hence feature subsets selection algorithms are applied to optimize the dimension of the feature vectors as well as the processing time of classification tasks. Afterward, the optimal feature vector is classified using SVM with RBF kernel. Since there is no public dataset in this field to evaluate fairly the effectiveness of our mechanism, a realistic dataset containing the influence of mobile installation errors and footgear is also constructed with the participation of 38 volunteers (28 males, 10 females). We achieved the accuracy approximately 94.93% under identification mode, the FMR, FNMR of 0%, 3.89% and processing time of less than 4 seconds under authentication mode.


annual computer security applications conference | 2016

Practical and secure dynamic searchable encryption via oblivious access on distributed data structure

Thang Hoang; Attila A. Yavuz; Jorge Guajardo

Dynamic Searchable Symmetric Encryption (DSSE) allows a client to perform keyword searches over encrypted files via an encrypted data structure. Despite its merits, DSSE leaks search and update patterns when the client accesses the encrypted data structure. These leakages may create severe privacy problems as already shown, for example, in recent statistical attacks on DSSE. While Oblivious Random Access Memory (ORAM) can hide such access patterns, it incurs significant communication overhead and, therefore, it is not yet fully practical for cloud computing systems. Hence, there is a critical need to develop private access schemes over the encrypted data structure that can seal the leakages of DSSE while achieving practical search/update operations. In this paper, we propose a new oblivious access scheme over the encrypted data structure for searchable encryption purposes, that we call Distributed Oblivious Data structure DSSE (DOD-DSSE). The main idea is to create a distributed encrypted incidence matrix on two non-colluding servers such that no arbitrary queries on these servers can be linked to each other. This strategy prevents not only recent statistical attacks on the encrypted data structure but also other potential threats exploiting query linkability. Our security analysis proves that DOD-DSSE ensures the unlink-ability of queries and, therefore, offers much higher security than traditional DSSE. At the same time, our performance evaluation demonstrates that DOD-DSSE is two orders of magnitude faster than ORAM-based techniques (e.g., Path ORAM), since it only incurs a small-constant number of communication overhead. That is, we deployed DOD-DSSE on geographically distributed Amazon EC2 servers, and showed that, a search/update operation on a very large dataset only takes around one second with DOD-DSSE, while it takes 3 to 13 minutes with Path ORAM-based methods.


international conference on security and cryptography | 2015

On the instability of sensor orientation in gait verification on mobile phone

Thang Hoang; Deokjai Choi; Thuc Dinh Nguyen

Authentication schemes using tokens or biometric modalities have been proposed to ameliorate the security strength on mobile devices. However, the existing approaches are obtrusive since the user is required to perform explicit gestures in order to be authenticated. While the gait signal captured by inertial sensors is understood to be a reliable profile for effective implicit authentication, recent studies have been conducted in ideal conditions and might therefore be inapplicable in the real mobile context. Particularly, the acquiring sensor is always fixed to a specific position and orientation. This paper mainly focuses on addressing the instability of sensors orientation which mostly happens in the reality. A flexible solution taking advantages of available sensors on mobile devices which can help to handle this problem is presented. Moreover, a novel gait recognition method utilizes statistical analysis and supervised learning to adapt itself to the instability of the biometric gait under various circumstances is also proposed. By adopting PCA+SVM to construct the gait model, the proposed method outperformed other state-of-the-art studies, with an equal error rate of 2.45% and accuracy rate of 99.14% in terms of the verification and identification aspects being achieved, respectively.


international conference on ubiquitous and future networks | 2013

A mobility prediction algorithm for the seamless handoff

Chuyen Luong; Son Do; Thang Hoang; Deokjai Choi

In recent years, many applications based on movement prediction have appeared very strongly. One of those is in the smooth handover process and resource reservation to improve Quality of Service (QoS). For effective productivity of these processes, time factor is very important. It needs exact information such as when and how long the user will go to a next location. Active Lezi algorithm and order-2 Markov model algorithm were appreciated in accuracy implementation, but the time factors were not significantly considered. In this paper, we propose a novel location prediction method constructed from a list of time and location history. A tree based on Lezi family of data compression is constructed and then, combined with Hidden Markov Model (HMM) for movement prediction driven by a sequence of time series. From our experiment, we used a part of dataset come from Dartmouth including information of 281 users. We achieved an accuracy rate of 85.52% location prediction. Moreover, the length of tree and the lost information were both reduced significantly.


computer and communications security | 2017

S 3 ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing

Thang Hoang; Ceyhun D. Ozkaptan; Attila A. Yavuz; Jorge Guajardo; Tam Nguyen

Oblivious Random Access Machine (ORAM) enables a client to access her data without leaking her access patterns. Existing client-efficient ORAMs either achieve O(log N) client-server communication blowup without heavy computation, or O(1) blowup but with expensive homomorphic encryptions. It has been shown that O(log N) bandwidth blowup might not be practical for certain applications, while schemes with O(1) communication blowup incur even more delay due to costly homomorphic operations. In this paper, we propose a new distributed ORAM scheme referred to as Shamir Secret Sharing ORAM (S3ORAM), which achieves O(1) client-server bandwidth blowup and O(1) blocks of client storage without relying on costly partial homomorphic encryptions. S3ORAM harnesses Shamir Secret Sharing, tree-based ORAM structure and a secure multi-party multiplication protocol to eliminate costly homomorphic operations and, therefore, achieves O(1) client-server bandwidth blowup with a high computational efficiency. We conducted comprehensive experiments to assess the performance of S3ORAM and its counterparts on actual cloud environments, and showed that S3ORAM achieves three orders of magnitude lower end-to-end delay compared to alternatives with O(1) client communication blowup (Onion-ORAM), while it is one order of magnitude faster than Path-ORAM for a network with a moderate bandwidth quality. We have released the implementation of S3ORAM for further improvement and adaptation.


Archive | 2013

Routing Approach in IPv6 Ubiquitous Internet-Based Home Automation Network

Ardiansyah Musa Efendi; Oh Seung Kyo; Ali Fahmi Perwira Negara; Thang Hoang; Deokjai Choi

Internet-based home automation system allows home owners to monitor and control connected devices in the home using any Internet enabled device. The home’s low power and low data rate, control and monitoring needs are catered for using 6LoWPAN. The home’s high data rate needs are met by the Wi-Fi standard. IPv6 routing is implemented to facilitate interconnection between heterogeneous 6LoWPAN, Wi-Fi, outside IPv6 networks. There are two types of routing which need to be considered: routing inside a 6LoWPAN, routing between a 6LoWPAN and another IP home automation network. In this paper we analyze and discuss the available routing solutions proposed to support interconnection and unique requirement over IPv6 ubiquitous Internet-based home automation network. For Wi-Fi and connection to outside IPv6 home automation network, it can use the existing routing protocols because of long-standing and well-established. For 6LoWPAN, unique routing requirements of home automation networks is challenging, especially in 6LoWPAN networks with low-power and lossy radio links and battery-powered nodes. Important requirements include energy consumption, memory uses, mobility, scalability, and so forth. Briefly, not all routing requirements of home automation applications met by the available routing protocol, although the vast majority can fulfill.


IFIP Annual Conference on Data and Applications Security and Privacy | 2018

Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems.

Thang Hoang; Attila A. Yavuz; F. Betül Durak; Jorge Guajardo

Dynamic Searchable Symmetric Encryption (DSSE) allows search/update operations over encrypted data via an encrypted index. However, DSSE has been shown to be vulnerable to statistical inference attacks, which can extract a significant amount of information from access patterns on encrypted index and files. While generic Oblivious Random Access Machine (ORAM) can hide access patterns, it has been shown to be extremely costly to be directly used in DSSE setting.


international conference on information security | 2017

Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysis

Lam Tran; Thang Hoang; Thuc Dinh Nguyen; Deokjai Choi

Gait has been considered as an efficient biometric trait for user authentication. Although there are some studies that address the task of securing gait templates/models in gait-based authentication systems, they do not take into account the low discriminability and high variation of gait data which significantly affects the security and practicality of the proposed systems. In this paper, we focus on addressing the aforementioned deficiencies in inertial-sensor based gait cryptosystem. Specifically, we leverage Linear Discrimination Analysis to enhance the discrimination of gait templates, and Gray code quantization to extract high discriminative and stable binary template. The experimental results on 38 different users showed that our proposed method significantly improve the performance and security of the gait cryptosystem. In particular, we achieved the False Acceptant Rate of \(6\times 10^{-5} \%\) (i.e., 1 fail in 16983 trials) and False Rejection Rate of \(9.2 \%\) with 148-bit security.

Collaboration


Dive into the Thang Hoang's collaboration.

Top Co-Authors

Avatar

Deokjai Choi

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thuc Dinh Nguyen

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Chuyen Luong

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar

Son Do

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Viet Vo

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge