default search action
Phuong Ha Nguyen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Phuong Ha Nguyen:
Proactive DP: A Multiple Target Optimization Framework for DP-SGD. ICML 2024 - [c22]Qinyi Chen, Phuong Ha Nguyen, Djordje Gligorijevic:
Optimization-Based Budget Pacing in eBay Sponsored Search. WWW (Companion Volume) 2024: 328-337 - 2023
- [c21]Phuong Ha Nguyen, Djordje Gligorijevic, Arnab Borah, Gajanan Adalinge, Abraham Bagherjeiran:
Practical Budget Pacing Algorithms and Simulation Test Bed for eBay Marketplace Sponsored Search. AdKDD@KDD 2023 - [i30]Marten van Dijk, Phuong Ha Nguyen:
Considerations on the Theory of Training Models with Differential Privacy. CoRR abs/2303.04676 (2023) - [i29]Toan N. Nguyen, Phuong Ha Nguyen, Lam M. Nguyen, Marten van Dijk:
Batch Clipping and Adaptive Layerwise Clipping for Differential Private Stochastic Gradient Descent. CoRR abs/2307.11939 (2023) - [i28]Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin:
Breaking XOR Arbiter PUFs without Reliability Information. CoRR abs/2312.01256 (2023) - 2022
- [j11]Kaleel Mahmood, Phuong Ha Nguyen, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk:
Besting the Black-Box: Barrier Zones for Adversarial Example Defense. IEEE Access 10: 1451-1474 (2022) - [j10]Lam M. Nguyen, Marten van Dijk, Dzung T. Phan, Phuong Ha Nguyen, Tsui-Wei Weng, Jayant R. Kalagnanam:
Finite-sum smooth optimization with SARAH. Comput. Optim. Appl. 82(3): 561-593 (2022) - [i27]Deniz Gurevin, Chenglu Jin, Phuong Ha Nguyen, Omer Khan, Marten van Dijk:
Secure Remote Attestation with Strong Key Insulation Guarantees. CoRR abs/2201.01834 (2022) - [i26]Marten van Dijk, Phuong Ha Nguyen, Toan N. Nguyen, Lam M. Nguyen:
Generalizing DP-SGD with Shuffling and Batching Clipping. CoRR abs/2212.05796 (2022) - 2021
- [j9]Lam M. Nguyen, Quoc Tran-Dinh, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk:
A Unified Convergence Analysis for Shuffling-Type Gradient Methods. J. Mach. Learn. Res. 22: 207:1-207:44 (2021) - [c20]Nhuong V. Nguyen, Toan N. Nguyen, Phuong Ha Nguyen, Quoc Tran-Dinh, Lam M. Nguyen, Marten van Dijk:
Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes. AISTATS 2021: 1207-1215 - [i25]Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Phuong Ha Nguyen:
Differential Private Hogwild! over Distributed Local Data Sets. CoRR abs/2102.09030 (2021) - [i24]Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen:
Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak. IACR Cryptol. ePrint Arch. 2021: 602 (2021) - [i23]Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen:
Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure. IACR Cryptol. ePrint Arch. 2021: 925 (2021) - 2020
- [j8]Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 97-120 (2020) - [c19]Nhan H. Pham, Lam M. Nguyen, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk, Quoc Tran-Dinh:
A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning. AISTATS 2020: 374-385 - [i22]Lam M. Nguyen, Quoc Tran-Dinh, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk:
A Unified Convergence Analysis for Shuffling-Type Gradient Methods. CoRR abs/2002.08246 (2020) - [i21]Nhan H. Pham, Lam M. Nguyen, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk, Quoc Tran-Dinh:
A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning. CoRR abs/2003.00430 (2020) - [i20]Kaleel Mahmood, Deniz Gurevin, Marten van Dijk, Phuong Ha Nguyen:
Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples. CoRR abs/2006.10876 (2020) - [i19]Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Quoc Tran-Dinh, Phuong Ha Nguyen:
Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise. CoRR abs/2007.09208 (2020) - [i18]Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Quoc Tran-Dinh, Phuong Ha Nguyen:
Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes. CoRR abs/2010.14763 (2020)
2010 – 2019
- 2019
- [j7]Lam M. Nguyen, Phuong Ha Nguyen, Peter Richtárik, Katya Scheinberg, Martin Takác, Marten van Dijk:
New Convergence Aspects of Stochastic Gradient Algorithms. J. Mach. Learn. Res. 20: 176:1-176:49 (2019) - [j6]Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk:
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(4): 243-290 (2019) - [c18]Marten van Dijk, Lam M. Nguyen, Phuong Ha Nguyen, Dzung T. Phan:
Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD. ICML 2019: 6392-6400 - [c17]Phuong Ha Nguyen, Lam M. Nguyen, Marten van Dijk:
Tight Dimension Independent Lower Bound on the Expected Convergence Rate for Diminishing Step Sizes in SGD. NeurIPS 2019: 3660-3669 - [i17]Lam M. Nguyen, Marten van Dijk, Dzung T. Phan, Phuong Ha Nguyen, Tsui-Wei Weng, Jayant R. Kalagnanam:
Optimal Finite-Sum Smooth Non-Convex Optimization with SARAH. CoRR abs/1901.07648 (2019) - [i16]Phuong Ha Nguyen, Kaleel Mahmood, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk:
BUZz: BUffer Zones for defending adversarial examples in image classification. CoRR abs/1910.02785 (2019) - [i15]Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Cryptol. ePrint Arch. 2019: 1473 (2019) - 2018
- [j5]Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen:
A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security. IEEE Trans. Computers 67(3): 403-417 (2018) - [c16]Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr:
Weak-Unforgeable Tags for Secure Supply Chain Management. Financial Cryptography 2018: 80-98 - [c15]Lam M. Nguyen, Phuong Ha Nguyen, Marten van Dijk, Peter Richtárik, Katya Scheinberg, Martin Takác:
SGD and Hogwild! Convergence Without the Bounded Gradients Assumption. ICML 2018: 3747-3755 - [i14]Lam M. Nguyen, Phuong Ha Nguyen, Marten van Dijk, Peter Richtárik, Katya Scheinberg, Martin Takác:
SGD and Hogwild! Convergence Without the Bounded Gradients Assumption. CoRR abs/1802.03801 (2018) - [i13]Marten van Dijk, Lam M. Nguyen, Phuong Ha Nguyen, Dzung T. Phan:
Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD. CoRR abs/1810.04100 (2018) - [i12]Phuong Ha Nguyen, Lam M. Nguyen, Marten van Dijk:
Tight Dimension Independent Lower Bound on Optimal Expected Convergence Rate for Diminishing Step Sizes in SGD. CoRR abs/1810.04723 (2018) - [i11]Lam M. Nguyen, Phuong Ha Nguyen, Peter Richtárik, Katya Scheinberg, Martin Takác, Marten van Dijk:
New Convergence Aspects of Stochastic Gradient Algorithms. CoRR abs/1811.12403 (2018) - [i10]Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk:
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks. IACR Cryptol. ePrint Arch. 2018: 350 (2018) - 2017
- [j4]Chenglu Jin, Charles Herder, Ling Ren, Phuong Ha Nguyen, Benjamin Fuller, Srinivas Devadas, Marten van Dijk:
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise. Cryptogr. 1(3): 23 (2017) - [j3]Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test. ACM Trans. Design Autom. Electr. Syst. 22(2): 20:1-20:28 (2017) - [c14]Durga Prasad Sahoo, Phuong Ha Nguyen, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Side Channel Evaluation of PUF-Based Pseudorandom Permutation. DSD 2017: 237-243 - [i9]Raihan Sayeed Khan, Nadim Kanan, Chenglu Jin, Jake Scoggin, Nafisa Noor, Sadid Muneer, Faruk Dirisaglik, Phuong Ha Nguyen, Helena Silva, Marten van Dijk, Ali Gokirmak:
Intrinsically Reliable and Lightweight Physical Obfuscated Keys. CoRR abs/1703.07427 (2017) - [i8]Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test. IACR Cryptol. ePrint Arch. 2017: 459 (2017) - [i7]Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Marten van Dijk:
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks. IACR Cryptol. ePrint Arch. 2017: 572 (2017) - [i6]Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr:
Weak-Unforgeable Tags for Secure Supply Chain Management. IACR Cryptol. ePrint Arch. 2017: 1221 (2017) - 2016
- [i5]Durga Prasad Sahoo, Phuong Ha Nguyen, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants. IACR Cryptol. ePrint Arch. 2016: 57 (2016) - [i4]Phuong Ha Nguyen, Durga Prasad Sahoo:
An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function. IACR Cryptol. ePrint Arch. 2016: 428 (2016) - [i3]Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen:
A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security. IACR Cryptol. ePrint Arch. 2016: 1031 (2016) - 2015
- [j2]Durga Prasad Sahoo, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(8): 1334-1343 (2015) - [c13]Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen, Debdeep Mukhopadhyay:
A Biased Fault Attack on the Time Redundancy Countermeasure for AES. COSADE 2015: 189-203 - [c12]Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. DATE 2015: 641-646 - [c11]Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen, Durga Prasad Sahoo:
Tutorial T7: Physically Unclonable Function: A Promising Security Primitive for Internet of Things. VLSID 2015: 14-15 - 2014
- [c10]Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Marc Stöttinger:
Minimizing S-Boxes in Hardware by Utilizing Linear Transformations. AFRICACRYPT 2014: 235-250 - [c9]Phuong Ha Nguyen, Durga Prasad Sahoo:
Lightweight and Secure PUFs: A Survey (Invited Paper). SPACE 2014: 1-13 - [c8]Phuong Ha Nguyen, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Cryptanalysis of Composite PUFs (Extended abstract-invited talk). VDAT 2014: 1-2 - 2013
- [j1]Chester Rebeiro, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Axel Poschmann:
Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks. IEEE Trans. Inf. Forensics Secur. 8(8): 1274-1279 (2013) - [c7]Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang:
On 3-Share Threshold Implementations for 4-Bit S-boxes. COSADE 2013: 99-113 - [c6]Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann:
Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes. ICISC 2013: 91-108 - 2012
- [c5]Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling:
Differential Attacks against Stream Cipher ZUC. ASIACRYPT 2012: 262-277 - [c4]Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay, Huaxiong Wang:
Improved Differential Cache Attacks on SMS4. Inscrypt 2012: 29-45 - [i2]Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang:
On 3-share Threshold Implementations for 4-bit S-boxes. IACR Cryptol. ePrint Arch. 2012: 509 (2012) - [i1]Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann:
Enabling 3-share Threshold Implementations for any 4-bit S-box. IACR Cryptol. ePrint Arch. 2012: 510 (2012) - 2011
- [c3]Phuong Ha Nguyen, Hongjun Wu, Huaxiong Wang:
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis. ACISP 2011: 61-74 - [c2]Phuong Ha Nguyen, Matthew J. B. Robshaw, Huaxiong Wang:
On Related-Key Attacks and KASUMI: The Case of A5/3. INDOCRYPT 2011: 146-159 - 2010
- [c1]Phuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling:
On Multidimensional Linear Cryptanalysis. ACISP 2010: 37-52
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint