Publications

Journal Papers

  1. H. Felouat, H. H. Nguyen, T.-N. Le, J. Yamagishi, and I. Echizen, “eKYC-DF: A Large-Scale Deepfake Dataset for Developing and Evaluating eKYC Systems,” IEEE Access (2024), 12, 30876-30892.
  2. K.-D. Nguyen, H. H. Nguyen, T.-N. Le, J. Yamagishi, and I. Echizen, “Analysis of Fine-Grained Counting Methods for Masked Face Counting: A Comparative Study,” IEEE Access (2024), 12, 27426-27443.
  3. C. C. Chang, H. H. Nguyen, J. Yamagishi, and I. Echizen. “Cyber Vaccine for Deepfake Immunity,” IEEE Access (2023), 105027-105039.
  4. Y. Ji, T.-N. Le, H. H. Nguyen, and I. Echizen, “Purifying Adversarial Images Using Adversarial Autoencoder with Conditional Normalizing Flows,” IEEE Open Journal of Signal Processing (2023), 267-274.
  5. H. H. Nguyen, S. Marcel, J. Yamagishi, and I. Echizen, “Master Face Attacks on Face Recognition Systems,” IEEE Transactions on Biometrics, Behavior, and Identity Science (2022), 398-411.
  6. H. H. Nguyen, M. Kuribayashi, J. Yamagishi, and I. Echizen, “Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images,” IEICE Transactions on Information and Systems (2022), 65-77. [Excellent paper award]
  7. T.-L. Do, M.-K. Tran, H. H. Nguyen, M.-T. Tran, “Potential Attacks of DeepFake on eKYC Systems and Remedy for eKYC with DeepFake Detection Using Two-Stream Network of Facial Appearance and Motion Features,” SN Computer Science (2022), 3(6), 464 .
  8. N. Babaguchi, I. Echizen, J. Yamagishi, N. Nitta, Y. Nakashima, K. Nakamura, K. Kono, F. Fang, S. Myojin, Z. Kuang, H. H. Nguyen, N. T. Tieu, “Preventing Fake Information Generation Against Media Clone Attacks,” IEICE Transactions on Information and Systems (2021), 2-11. [IEICE-ISS Excellent Paper Award]
  9. I. Echizen, N. Babaguchi, J. Yamagishi, N. Nitta, Y. Nakashima, K. Nakamura, K. Kono, F. Fang, S. Myojin, Z. Kuang, H. H. Nguyen, N. T. Tieu, “Generation and detection of Media Clones,” IEICE Transactions on Information and Systems (2021), 12-23. [IEICE-ISS Excellent Paper Award]
  10. N.-D. Tieu, H. H. Nguyen, H.-Q. Nguyen-Son, J. Yamagishi, and I. Echizen, “Spatio-temporal generative adversarial network for gait anonymization,” Journal of Information Security and Applications (2019), 307-319.

Conference Papers

  1. A. P. MaungMaung, H. H. Nguyen, H. Kiya, and I. Echizen. “Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation,” International Conference on Image Processing (ICIP), 2024.
  2. L. Strack, F. Waseda, H. H. Nguyen, Y. Zheng, and I. Echizen. “Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection,” International Conference on Image Processing (ICIP), 2024.
  3. F. B. Baldassini, H. H. Nguyen, C. C. Chang, and I. Echizen, “Cross-Attention Watermarking of Large Language Models,” International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2024, 4625-4629.
  4. F. Shalabi, H. Felouat, H. H. Nguyen, and I. Echizen, “Leveraging Chat-Based Large Vision-Language Models for Multimodal Out-of-Context Detection,” International Conference on Advanced Information Networking and Applications (AINA), 2024, 86-98.
  5. Z. Dou, Y. Guo, H. H. Nguyen, C. C. Chang, and I. Echizen, “Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis,” International Conference on Advanced Information Networking and Applications (AINA), 2024, 266-277.
  6. E. Bao, C. C. Chang, H. H. Nguyen, and I. Echizen, “From Deconstruction to Reconstruction: A Plug-in Module for Diffusion-Based Purification of Adversarial Examples,” International Workshops on Digital-forensics and Watermarking (IWDW), 2023, 48-62.
  7. T. Ouyang, H.-Q. Nguyen-Son, H. H. Nguyen*, I. Echizen, Y. Seo, “Quality Assurance of A GPT-based Sentiment Analysis System: Adversarial Review Data Generation and Detection,” Asia-Pacific Software Engineering Conference (APSEC), 2023, 450-457.
  8. F. Shalabi*, H. H. Nguyen*, H. Felouat, C. C. Chang, and I. Echizen, “Image-Text Out-Of-Context Detection Using Synthetic Multimodal Misinformation,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) 2023, 605-612.
  9. M. Niu, Z. Li, Y. Zhan, H. H. Nguyen, I. Echizen, and Y. Zheng, “Physics-Based Adversarial Attack on Near-Infrared Human Detector for Nighttime Surveillance Camera Systems,” ACM Multimedia (MM) 2023, 8799-8807.
  10. H. H. Nguyen, J. Yamagishi, and I. Echizen, “How Close are Other Computer Vision Tasks to Deepfake Detection?” International Joint Conference on Biometrics (IJCB) 2023, 229-238.
  11. H. H. Nguyen, T.-N. Le, J. Yamagishi, and I. Echizen, “Analysis of Master Vein Attacks on Finger Vein Recognition Systems,” Winter Conference on Applications of Computer Vision (WACV) 2023, 1900-1908.
  12. F. Waseda, S. Nishikawa, T.-N. Le, H. H. Nguyen, and I. Echizen, “Closer Look at the Transferability of Adversarial Examples: How They Fool Different Models Differently,” Winter Conference on Applications of Computer Vision (WACV) 2023, 1360-1368.
  13. Y. Sun, Z. Zhang, I. Echizen, H. H. Nguyen, C. Qiu, and S. Lu, “Face Forgery Detection Based on Facial Region Displacement Trajectory Series,” Winter Conference on Applications of Computer Vision Workshop (WACV-W) 2023, 633-642.
  14. T.-N. Le*, T. Gu*, H. H. Nguyen*, and I. Echizen, “Rethinking Adversarial Examples for Location Privacy Protection,” International Workshop on Information Forensics and Security (WIFS) 2022, 1-6.
  15. T.-N. Le, H. H. Nguyen, J. Yamagishi, and I. Echizen, “OpenForensics: Large-Scale Challenging Dataset for Multi-Face Forgery Detection and Segmentation In-The-Wild,” International Conference on Computer Vision (ICCV) 2021, 10117-10127.
  16. M. Treu*, T.-N. Le*, H. H. Nguyen*, J. Yamagishi, and I. Echizen, “Fashion-Guided Adversarial Attack on Person Segmentation,” Conference on Computer Vision and Pattern Recognition Workshop (CVPR-W) 2021, 943-952.
  17. K.-D. Nguyen, T.-N. Le, H. H. Nguyen, J. Yamagishi, and I. Echizen, “Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio,” Workshop on Face and Gesture Analysis for COVID-19 2021, 1-8.
  18. Y. Yamasaki, M. Kuribayashi, N. Funabiki, H. H. Nguyen, I. Echizen, “Feature Extraction Based on Denoising AutoEncoder for Classification of Adversarial Examples,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) 2021, 1815-1820.
  19. T.-L. Do, M.-K. Tran, H. H. Nguyen, M.-T. Tran, “Potential Threat of Face Swapping to eKYC with Face Registration and Augmented Solution with DeepFake Detection,” International Conference on Future Data and Security Engineering (FDSE) 2021, 293-307.
  20. R. Huang, F. Fang, H. H. Nguyen, J. Yamagishi, and I. Echizen, “A Method for Identifying Origin of Digital Images Using a Convolution Neural Network,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) 2020, 1293-1299.
  21. A. Higashi, M. Kuribayashi, N. Funabiki, H. H. Nguyen, and I. Echizen, “Detection of Adversarial Examples Based on Sensitivities to Noise Removal Filter,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) 2020, 1386-1391.
  22. S. Gupta, H. H. Nguyen, J. Yamagishi, and I. Echizen, “Viable Threat on News Reading: Generating Biased News Using Natural Language Models”, NLP+CSS workshop at Empirical Methods in Natural Language Processing (EMNLP) 2020, 55-65.
  23. R. Huang, F. Fang, H. H. Nguyen, J. Yamagishi, and I. Echizen, “Security of Facial Forensics Models Against Adversarial Attacks,” International Conference on Image Processing (ICIP) 2020, 2236-2240.
  24. D. I. Adelani, H. Mai, F. Fang, H. H. Nguyen, J. Yamagishi, and I. Echizen, “Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-based Detection,” International Conference on Advanced Information Networking and Applications (AINA) 2020, 1341-1354.
  25. H. H. Nguyen, J. Yamagishi, I. Echizen, and S. Marcel, “Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems,” International Joint Conference on Biometrics (IJCB) 2020, 1-10.
  26. H. H. Nguyen, F. Fang, J. Yamagishi, and I. Echizen, “Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos,” International Conference on Biometrics: Theory, Applications and Systems (BTAS) 2019, 1-8. [BTAS/IJCB 5-Year Highest Impact Award]
  27. H. H. Nguyen, J. Yamagishi, and I. Echizen, “Capsule-Forensics: Using Capsule Networks to Detect Forged Images and Videos,” International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2019, 2307-2311.
  28. N.-D. Tieu, H. H. Nguyen, F. Fang, J. Yamagishi, and I. Echizen, “An RGB Gait Anonymization Model for Low Quality Silhouette,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) 2019, 1686-1693.
  29. H.-Q. Nguyen-Son, H. H. Nguyen, N.-D. Tieu, J. Yamagishi, and I. Echizen, “Identifying Computer-Translated Paragraphs using Coherence Features,” Pacific Asia Conference on Language, Information and Computation (PACLIC) 2018, 486-494.
  30. H. H. Nguyen, T. N.-D. Tieu, H.-Q. Nguyen-Son, V. Nozick, J. Yamagishi, and I. Echizen, “Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images,” International Conference on Availability, Reliability and Security (ARES) 2018, 1-10.
  31. H. H. Nguyen, T. N.-D. Tieu, H.-Q. Nguyen-Son, J. Yamagishi, and I. Echizen, “Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector,” International Conference on Multimedia and Expo (ICME) 2018, 1-6.
  32. T. N.-D. Tieu, H. H. Nguyen, H. Nguyen-Son, J. Yamagishi, and I. Echizen, “An Approach for Gait Anonymization using Deep Learning,” International Workshop on Information Forensics and Security (WIFS) 2017, 1-6. [Best Paper Award]
  33. H.-Q. Nguyen-Son, N.-D. Tieu, H. H. Nguyen, J. Yamagishi, and I. Echizen, “Identifying computer-generated text using statistical analysis,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) 2017, 1504-1511.
  34. H. H. Nguyen, H. Nguyen-Son, and I. Echizen, “Discriminating between computer-generated facial images and natural ones using smoothness property and local entropy,” International Workshop on Digital Watermarking (IWDW) 2015, 39-50.
  35. H. Nguyen, H. H. Nguyen, T. Hoang, D. Choi, and T. D. Nguyen, “A Generalized Authentication Scheme for Mobile Phones Using Gait Signals”, International Conference on E-Business and Telecommunications 2015, 386-407.
  36. 東亮憲, 栗林稔, 舩曵信生, Nguyen Hong Huy, 越前功 “JPEG圧縮による画像分類器の識別結果の変動解析に基づく敵対的事例の検知法,” コンピュータセキュリティシンポジウム (CSS2019), 2019. [PWS2019学生論文賞受賞]

Book Chapters

  1. H. H. Nguyen, J. Yamagishi, and I. Echizen, “Capsule-Forensics Networks for Deepfake Detection,” Handbook of Digital Face Manipulation and Detection – From DeepFakes to Morphing Attacks (2022), 275-301.
  2. R. Tolosana, C. Rathgeb, R. Vera-Rodriguez, C. Busch, L, Verdoliva, S. Lyu, H. H. Nguyen, J. Yamagishi, I. Echizen, P. Rot et al. “Future Trends in Digital Face Manipulation and Detection.” Handbook of Digital Face Manipulation and Detection – From DeepFakes to Morphing Attacks (2022), 463-482.
  3. T.-N. Le, H. H. Nguyen, J. Yamagishi, and I. Echizen, “Robust Deepfake on Unrestricted Media: Generation and Detection,” Frontiers in Fake Media Generation and Detection (2022), 81-107.
  4. 越前功, 馬場口登, 笹原和俊, Trung-Nghia Le, Huy H. Nguyen, 山岸順一, Canasai Kruengkrai, 中島悠太, 李良知, 王博文, 宮崎邦洋, 小林正啓, “インフォデミック時代のAIとサイバーセキュリティ”, 映像情報メディア学会誌76(4) (2022), 10-15. [Telecom Interdisciplinary Research Award]

Others

  1. 東亮憲, 栗林稔, 舩曵信生, Nguyen Hong Huy, 越前功, “複数のフィルタ強度によるCNN画像分類器の応答特性を用いた敵対的事例の検出法,” 信学技報, EMM 3月, 2021. [2020年度 第6回EMM研究会 優秀学生発表賞]