default search action
Thanh Ha Le
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Le Thanh Ha:
Impacts of digital business on global value chain participation in European countries. AI Soc. 39(3): 1039-1064 (2024) - 2023
- [j17]Le Thanh Ha:
Digital Business and Economic Complexity. J. Comput. Inf. Syst. 63(1): 162-175 (2023) - [j16]Thi Duyen Ngo, Viet Cuong Ta, Ma Thi Chau, Hoa Minh Nguyen, Hung Xuan Nguyen, Ha Thanh Le:
Quality Assessment Criteria and Methods for 3D Digital Replica of Historical Printing Woodblocks. ACM Journal on Computing and Cultural Heritage 16(3): 43:1-43:16 (2023) - [c40]Trong Tuan Dao, Cong Thuong Le, Thi Duyen Ngo, Thanh Ha Le:
Detection and Recognition of Sino-Nom Characters on Woodblock-Printed Images. KSE 2023: 1-6 - [c39]Nam Le Viet, Viet Cuong Ta, Thi Duyen Ngo, An Nguyen Thai, Seung-Won Jung, Thanh Ha Le:
3D Depth Map Inpainting for Vietnamese Historical Printing Woodblocks: A Gated Convolution Approach. KSE 2023: 1-6 - [c38]Duc Duy Le, Thi Kieu Chinh Nguyen, Thanh Ha Le, Thi Cam Huong Nguyen, Thi Duyen Ngo:
An eye tracking - based system for capturing visual strategies in reading of children with dyslexia. SoICT 2023: 856-862 - 2022
- [j15]Nhung Hong Thi Nguyen, Stuart W. Perry, Don Bone, Ha Thanh Le, Min Xu, Thuy Thi Nguyen:
Combination of Images and Point Clouds in a Generative Adversarial Network for Upsampling Crack Point Clouds. IEEE Access 10: 67198-67209 (2022) - [j14]Ha Thanh Le, Lwin Khin Shar, Domenico Bianculli, Lionel Claude Briand, Cu Duy Nguyen:
Automated reverse engineering of role-based access control policies of web applications. J. Syst. Softw. 184: 111109 (2022) - [j13]Ngoc Thang Nguyen, Van-Thanh Phan, Van Ðat Nguyen, Thanh Ha Le, Thao Vy Pham:
Forecasting the Coffee Consumption Demand in Vietnam Based on Grey Forecasting Model. Vietnam. J. Comput. Sci. 9(3): 245-259 (2022) - 2021
- [j12]Nhung Hong Thi Nguyen, Stuart W. Perry, Don Bone, Ha Thanh Le, Thuy Thi Nguyen:
Two-stage convolutional neural network for road crack detection and segmentation. Expert Syst. Appl. 186: 115718 (2021) - 2020
- [j11]Tung Thanh Pham, Xiem HoangVan, Nghia Trung Nguyen, Dinh Trieu Duong, Le Thanh Ha:
End-to-End Image Patch Quality Assessment for Image/Video With Compression Artifacts. IEEE Access 8: 215157-215172 (2020) - [j10]Hoang-Anh T. Nguyen, Thanh Ha Le, The Duy Bui:
A deep wavelet sparse autoencoder method for online and automatic electrooculographical artifact removal. Neural Comput. Appl. 32(24): 18255-18270 (2020) - [c37]Van Dat Nguyen, Van-Thanh Phan, Ngoc Thang Nguyen, Doan Nhan Dao, Le Thanh Ha:
Studying on the Accuracy Improvement of GM (1, 1) Model. ICCCI (CCIS Volume) 2020: 110-121 - [c36]Tung Pham Thanh, Ma Thi Chau, Tuan Nguyen Manh, Linh Le Dinh, Le Thanh Ha:
Compression Artifacts Image Patch database for Perceptual Quality Assessment. KSE 2020: 55-60 - [c35]Tuan Dung Pham, Viet Cuong Ta, Thi Thanh Thuy Pham, Thanh Ha Le:
Reducing Blocking Artifacts in CNN-Based Image Steganography by Additional Loss Functions. KSE 2020: 61-66
2010 – 2019
- 2019
- [c34]Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent, Thanh-Ha Le:
Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis. SPRO@CCS 2019: 3-14 - [c33]Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Thanh-Ha Le, Julien Bringer:
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks. DSD 2019: 214-221 - [c32]Thanh-Ha Le, Philippe Gilberton, Ngoc Q. K. Duong:
Discriminate Natural versus Loudspeaker Emitted Speech. ICASSP 2019: 501-505 - [c31]Tung-Long Vuong, Do Van Nguyen, Tai-Long Nguyen, Cong-Minh Bui, Hai-Dang Kieu, Viet-Cuong Ta, Quoc-Long Tran, Thanh Ha Le:
Sharing Experience in Multitask Reinforcement Learning. IJCAI 2019: 3642-3648 - [c30]Tai-Long Nguyen, Do-Van Nguyen, Thanh-Ha Le:
Reinforcement Learning Based Navigation with Semantic Knowledge of Indoor Environments. KSE 2019: 1-7 - [c29]Hung The Nguyen, Tung Nguyen, Do-Van Nguyen, Thanh-Ha Le:
A Hierarchical Deep Deterministic Policy Gradients for Swarm Navigation. KSE 2019: 1-7 - [c28]Tung Pham Thanh, Salem Benferhat, Ma Thi Chau, Truong-Thanh Ma, Karim Tabia, Le Thanh Ha:
On the Detection of Video's Ethnic Vietnamese Thai Dance Movements. SITIS 2019: 355-362 - [i7]Thanh-Ha Le, Philippe Gilberton, Ngoc Q. K. Duong:
Discriminate natural versus loudspeaker emitted speech. CoRR abs/1901.11291 (2019) - [i6]Ramtine Tofighi-Shirazi, Irina Asavoae, Philippe Elbaz-Vincent, Thanh Ha Le:
Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis. CoRR abs/1909.01640 (2019) - [i5]Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Julien Bringer, Thanh-Ha Le:
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks. IACR Cryptol. ePrint Arch. 2019: 4 (2019) - 2018
- [j9]Tung Long Vuong, Minh Le Dinh, Xiem HoangVan, Dinh Trieu Duong, Tien Huu Vu, Thanh Ha Le:
View synthesis method for 3D video coding based on temporal and inter view correlation. IET Image Process. 12(11): 2111-2118 (2018) - [j8]Srivatsa Prativadibhayankaram, Huynh Van Luong, Thanh Ha Le, André Kaup:
Compressive Online Video Background-Foreground Separation Using Multiple Prior Information and Optical Flow. J. Imaging 4(7): 90 (2018) - [c27]Ramtine Tofighi-Shirazi, Maria Christofi, Philippe Elbaz-Vincent, Thanh Ha Le:
DoSE: Deobfuscation based on Semantic Equivalence. SSPREW@ACSAC 2018: 1:1-1:12 - [c26]Van-Viet Doan, Duy-Hung Nguyen, Quoc-Long Tran, Do Van Nguyen, Thanh Ha Le:
Real-Time Image Semantic Segmentation Networks with Residual Depth-Wise Separable Blocks. SCIS&ISIS 2018: 174-179 - [c25]Do Van Nguyen, Tung-Long Vuong, Hai-Dang Kieu, Linh Pham, Thanh Ha Le:
Vision Memory for Target Object Navigation Using Deep Reinforcement Learning: An Empirical Study. SMC 2018: 3267-3273 - [c24]Nhung Thi Hong Nguyen, Thanh Ha Le, Stuart W. Perry, Thuy Thi Nguyen:
Pavement Crack Detection using Convolutional Neural Network. SoICT 2018: 251-256 - 2017
- [j7]Thanh-Ha Le, Seung-Won Jung, Chee Sun Won:
A new depth image quality metric using a pair of color and depth images. Multim. Tools Appl. 76(9): 11285-11303 (2017) - [c23]Ma Thi Chai, Karim Tabia, Sylvain Lagrue, Le Thanh Ha, The Duy Bui, Thuy Nguyen-Thanh:
Annotating Movement Phrases in Vietnamese Folk Dance Videos. IEA/AIE (2) 2017: 3-11 - [c22]Hoa Minh Nguyen, Tung Long Vuong, Dinh Nam Nguyen, Do Van Nguyen, Thanh Ha Le, Thuy Thi Nguyen:
Moving Object Detection in Compressed Domain for High Resolution Videos. SoICT 2017: 364-369 - [c21]Srivatsa Prativadibhayankaram, Huynh Van Luong, Thanh Ha Le, André Kaup:
Compressive Online Robust Principal Component Analysis with Optical Flow for Video Foreground-Background Separation. SoICT 2017: 385-392 - [i4]Srivatsa Prativadibhayankaram, Huynh Van Luong, Thanh-Ha Le, André Kaup:
Compressive Online Robust Principal Component Analysis with Optical Flow for Video Foreground-Background Separation. CoRR abs/1710.09160 (2017) - 2016
- [c20]Louis Dureuil, Guillaume Petiot, Marie-Laure Potet, Thanh-Ha Le, Aude Crohen, Philippe de Choudens:
FISSC: A Fault Injection and Simulation Secure Collection. SAFECOMP 2016: 3-11 - [c19]Viet Anh Nguyen, Thanh Ha Le, Thuy Thi Nguyen:
Single camera based fall detection using motion and human shape features. SoICT 2016: 339-344 - 2015
- [c18]Lionel Rivière, Julien Bringer, Thanh-Ha Le, Hervé Chabanne:
A novel simulation approach for fault injection resistance evaluation on smart cards. ICST Workshops 2015: 1-8 - 2014
- [j6]Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, Jean-Luc Danger:
Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage. IEICE Trans. Electron. 97-C(4): 272-279 (2014) - [c17]Maxime Puys, Lionel Rivière, Julien Bringer, Thanh-Ha Le:
High-Level Simulation for Multiple Fault Injection Evaluation. DPM/SETOP/QASA 2014: 293-308 - [c16]Maël Berthier, Julien Bringer, Hervé Chabanne, Thanh-Ha Le, Lionel Rivière, Victor Servant:
Idea: Embedded Fault Injection Simulator on Smartcard. ESSoS 2014: 222-229 - [c15]Lionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Hervé Chabanne, Maxime Puys:
Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks. FPS 2014: 92-111 - [c14]Vu Thi Hong Nhan, Thanh Ha Le, Yang Koo Lee:
Forecasting moving object position based on temporal patterns. IPIN 2014: 733-740 - [c13]Laurent Chusseau, Rachid Omarouayache, Jérémy Raoult, Sylvie Jarrix, Philippe Maurine, Karim Tobich, Alexandre Boyer, Bertrand Vrignon, John Shepherd, Thanh-Ha Le, Maël Berthier, Lionel Rivière, Bruno Robisson, Anne-Lise Ribotta:
Electromagnetic analysis, deciphering and reverse engineering of integrated circuits (E-MATA HARI). VLSI-SoC 2014: 1-6 - 2013
- [c12]Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama:
Exploring the Relations between Fault Sensitivity and Power Consumption. COSADE 2013: 137-153 - [c11]Thi Nhat Thanh Nguyen, Viet Cuong Ta, Thanh Ha Le, Simone Mantovani:
Particulate Matter Concentration Estimation from Satellite Aerosol and Meteorological Parameters: Data-Driven Approaches. KSE (1) 2013: 351-362 - [c10]Tien Dung Nguyen, Huu Hiep Hai Nguyen, Thanh Ha Le:
Trademark image retrieval based on scale, rotation, translation invariant features. RIVF 2013: 282-285 - [i3]Guido Bertoni, Joan Daemen, Nicolas Debande, Thanh-Ha Le, Michaël Peeters, Gilles Van Assche:
Power Analysis of Hardware Implementations Protected with Secret Sharing. IACR Cryptol. ePrint Arch. 2013: 67 (2013) - 2012
- [j5]Julien Bringer, Hervé Chabanne, Thanh-Ha Le:
Protecting AES against side-channel analysis using wire-tap codes. J. Cryptogr. Eng. 2(2): 129-141 (2012) - [c9]Guido Bertoni, Joan Daemen, Nicolas Debande, Thanh-Ha Le, Michaël Peeters, Gilles Van Assche:
Power analysis of hardware implementations protected with secret sharing. MICRO Workshops 2012: 9-16 - [i2]Nicolas Debande, Maël Berthier, Yves Bocktaels, Thanh-Ha Le:
Profiled Model Based Power Simulator for Side Channel Evaluation. IACR Cryptol. ePrint Arch. 2012: 703 (2012) - 2011
- [j4]Seung-Won Jung, Le Thanh Ha, Sung-Jea Ko:
A New Histogram Modification Based Reversible Data Hiding Algorithm Considering the Human Visual System. IEEE Signal Process. Lett. 18(2): 95-98 (2011) - [c8]Le Thanh Ha, Seung-Won Jung, The Duy Bui, Dinh Trieu Duong, Sung-Jea Ko:
Motion Vector Refinement Algorithm for the High Definition Video Coding. FGIT-CA/CES3 2011: 357-363 - [c7]Duy Khuong Nguyen, The Duy Bui, Thanh Ha Le:
Blur Estimation for Barcode Recognition in Out-of-Focus Images. PReMI 2011: 116-121 - [c6]Nicolas Debande, Youssef Souissi, Maxime Nassar, Sylvain Guilley, Thanh-Ha Le, Jean-Luc Danger:
"Re-synchronization by moments": An efficient solution to align Side-Channel traces. WIFS 2011: 1-6 - 2010
- [c5]Thanh-Ha Le, Maël Berthier:
Mutual Information Analysis under the View of Higher-Order Statistics. IWSEC 2010: 285-300
2000 – 2009
- 2009
- [j3]Le Thanh Ha, Chun-Su Park, Seung-Won Jung, Sung-Jea Ko:
An Improved Method to CABAC in the H.264/AVC Video Compression Standard. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(12): 3355-3360 (2009) - 2008
- [c4]Thanh-Ha Le, Cécile Canovas, Jessy Clédière:
An overview of side channel analysis attacks. AsiaCCS 2008: 33-43 - 2007
- [j2]Min-Cheol Hwang, Le Thanh Ha, Nam-Hyeong Kim, Chun-Su Park, Sung-Jea Ko:
Person identification system for future digital tv with intelligence. IEEE Trans. Consumer Electron. 53(1): 218-226 (2007) - [j1]Thanh-Ha Le, Jessy Clédière, Christine Servière, Jean-Louis Lacoume:
Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant. IEEE Trans. Inf. Forensics Secur. 2(4): 710-720 (2007) - [c3]Thanh-Ha Le, Jessy Clédière, Christine Servière, Jean-Louis Lacoume:
Efficient Solution for Misalignment of Signal in Side Channel Analysis. ICASSP (2) 2007: 257-260 - [i1]Thanh-Ha Le, Quoc-Thinh Nguyen-Vuong, Cécile Canovas, Jessy Clédière:
Novel Approaches for Improving the Power Consumption Models in Correlation Analysis. IACR Cryptol. ePrint Arch. 2007: 306 (2007) - 2006
- [c2]Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume:
A Proposition for Correlation Power Analysis Enhancement. CHES 2006: 174-186 - [c1]Dinh Trieu Duong, Hye-Soo Kim, Le Thanh Ha, Jae-Yun Jeong, Sung-Jea Ko:
Adaptive GOP Bit Allocation to Provide Seamless Video Streaming in Vertical Handoff. PSIVT 2006: 791-801
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint