Follow
Toan Nguyen
Toan Nguyen
Salesforce
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
A note on Prandtl boundary layers
Y Guo, T Nguyen
Communications on pure and applied mathematics 64 (10), 1416-1438, 2011
1742011
Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication
H Siadati, T Nguyen, P Gupta, J Markus, M Nasir
Security, Privacy and User Interaction, 5-22, 2020
1172020
Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication
H Siadati, T Nguyen, P Gupta, M Jakobsson, N Memon
Computers & Security 65, 14-28, 2017
1172017
DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices
T Van Nguyen, N Sae-Bae, N Memon
Computers & Security 66, 115-128, 2017
852017
Illusionpin: Shoulder-surfing resistant authentication using hybrid images
A Papadopoulos, T Nguyen, E Durmus, N Memon
IEEE Transactions on Information Forensics and Security 12 (12), 2875-2889, 2017
512017
A Deep Learning Model with Hierarchical LSTMs and Supervised Attention for Anti-Phishing
M Nguyen, T Nguyen, T Nguyen
Proceedings of the 1st Anti-Phishing Shared Pilot at 4th ACM International …, 2018
432018
Tap-based User Authentication for Smartwatches
T Nguyen, N Memon
Computer & Security, 2018
412018
Kid on the phone! Toward automatic detection of children on mobile devices
T Nguyen, A Roy, N Memon
Computers & Security 84, 334-348, 2019
392019
Smartwatches Locking Methods: A Comparative Study.
T Nguyen, ND Memon
SOUPS, 2017
372017
Finger-drawn PIN Authentication On Touch Devices
T Nguyen, N Sae-Bae, N Memon
Image Processing (ICIP), 2014 IEEE International Conference on, 5002-5006, 2014
28*2014
Spectral stability of noncharacteristic boundary layers of isentropic Navier–Stokes equations, to appear
N Costanzino, J Humpherys, T Nguyen, K Zumbrun
Arch. Rat. Mechanics and Anal, 0
11
Verification Code Forwarding Attack
H Siadati, T Nguyen, N Memon
9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9 …, 2015
10*2015
Uniform in time lower bound for solutions to a quantum Boltzmann equation of bosons at low temperatures
T Nguyen, MB Tran
submitted, 0
7
X-platform phishing: Abusing trust for targeted attacks short paper
H Siadati, T Nguyen, N Memon
Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017
52017
Detecting DGA Botnet based on Malware Behavior Analysis
K Nguyen Quoc, T Bui, D Le, D Tran, T Nguyen, HT Nguyen Nguyen
SoICT 2022: The 11th International Symposium on Information and …, 2022
32022
Crossing linguistic horizons: Finetuning and comprehensive evaluation of vietnamese large language models
ST Truong, DQ Nguyen, T Nguyen, DD Le, NN Truong, T Quan, S Koyejo
arXiv preprint arXiv:2403.02715, 2024
22024
Comparing network security specifications for a network to implement a network security policy for the network
T Nguyen
US Patent 11,405,426, 2022
22022
Comparing network security specifications across equivalent networks
T Nguyen
US Patent App. 16/675,678, 2021
22021
User Identification and Authentication on Emerging Interfaces
T Van Nguyen
New York University Tandon School of Engineering, 2018
22018
Hệ phần mềm nhận dạng vân tay tự động
NTH Lan, NN Kỷ, NTH Thuỷ, NV Toàn
Tạp chí Công nghệ thông tin và Truyền thông, 45-52, 2011
12011
The system can't perform the operation now. Try again later.
Articles 1–20