default search action
Van Nguyen 0002
Person information
- affiliation: Monash University, Faculty of Information Technology, Clayton, Australia
Other persons with the same name
- Van Nguyen — disambiguation page
- Van Nguyen 0001 — New Mexico State University, Computer Science Departmen, Las Cruces, NM, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2021
- [b1]Van Nguyen:
Deep Learning for Software Security. Monash University, Australia, 2021
Journal Articles
- 2024
- [j4]Michael Fu, Chakkrit Tantithamthavorn, Trung Le, Yuki Kume, Van Nguyen, Dinh Q. Phung, John C. Grundy:
AIBugHunter: A Practical tool for predicting, classifying and repairing software vulnerabilities. Empir. Softw. Eng. 29(1): 4 (2024) - [j3]Michael Fu, Van Nguyen, Chakkrit Tantithamthavorn, Dinh Phung, Trung Le:
Vision Transformer Inspired Automated Vulnerability Repair. ACM Trans. Softw. Eng. Methodol. 33(3): 78:1-78:29 (2024) - [j2]Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, John C. Grundy, Dinh Q. Phung:
Deep Domain Adaptation With Max-Margin Principle for Cross-Project Imbalanced Software Vulnerability Detection. ACM Trans. Softw. Eng. Methodol. 33(6): 162 (2024) - 2023
- [j1]Michael Fu, Van Nguyen, Chakkrit Kla Tantithamthavorn, Trung Le, Dinh Q. Phung:
VulExplainer: A Transformer-Based Hierarchical Distillation for Explaining Vulnerability Types. IEEE Trans. Software Eng. 49(10): 4550-4565 (2023)
Conference and Workshop Papers
- 2024
- [c23]Fatemeh Shiri, Farhad Moghimifar, Reza Haffari, Yuan-Fang Li, Van Nguyen, John Yoo:
Decompose, Enrich, and Extract! Schema-aware Event Extraction using LLMs. FUSION 2024: 1-8 - [c22]Quan Hong Nguyen, Tingmin Wu, Van Nguyen, Xingliang Yuan, Jason Xue, Carsten Rudolph:
Utilizing Large Language Models with Human Feedback Integration for Generating Dedicated Warning for Phishing Emails. SecTL@AsiaCCS 2024: 35-46 - 2023
- [c21]Michael Fu, Chakkrit Kla Tantithamthavorn, Van Nguyen, Trung Le:
ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We? APSEC 2023: 632-636 - [c20]Michael Kenneth McDonald, Lance M. Kaplan, Van Nguyen:
Bounded Subjective Opinions. FUSION 2023: 1-8 - [c19]Farhad Moghimifar, Fatemeh Shiri, Reza Haffari, Yuan-Fang Li, Van Nguyen:
Few-shot Domain-Adaptative Visually-fused Event Detection from Text. FUSION 2023: 1-8 - [c18]Vy Vo, Van Nguyen, Trung Le, Quan Hung Tran, Gholamreza Haffari, Seyit Camtepe, Dinh Phung:
An Additive Instance-Wise Approach to Multi-class Model Interpretation. ICLR 2023 - [c17]Farhad Moghimifar, Fatemeh Shiri, Van Nguyen, Yuan-Fang Li, Gholamreza Haffari:
Theia: Weakly Supervised Multimodal Event Extraction from Incomplete Data. IJCNLP (2) 2023: 139-145 - [c16]Vy Vo, Trung Le, Van Nguyen, He Zhao, Edwin V. Bonilla, Gholamreza Haffari, Dinh Q. Phung:
Feature-based Learning for Diverse and Privacy-Preserving Counterfactual Explanations. KDD 2023: 2211-2222 - 2022
- [c15]Fatemeh Shiri, Terry Yue Zhuo, Zhuang Li, Shirui Pan, Weiqing Wang, Reza Haffari, Yuan-Fang Li, Van Nguyen:
Paraphrasing Techniques for Maritime QA system. FUSION 2022: 1-8 - [c14]Van-Anh Nguyen, Dai Quoc Nguyen, Van Nguyen, Trung Le, Quan Hung Tran, Dinh Phung:
ReGVD: Revisiting Graph Neural Networks for Vulnerability Detection. ICSE-Companion 2022: 178-182 - [c13]Michael Fu, Chakkrit Tantithamthavorn, Trung Le, Van Nguyen, Dinh Q. Phung:
VulRepair: a T5-based automated software vulnerability repair. ESEC/SIGSOFT FSE 2022: 935-947 - [c12]Tuan Nguyen, Van Nguyen, Trung Le, He Zhao, Quan Hung Tran, Dinh Q. Phung:
Cycle class consistency with distributional optimal transport and knowledge distillation for unsupervised domain adaptation. UAI 2022: 1519-1529 - 2021
- [c11]Fatemeh Shiri, Teresa Wang, Shirui Pan, Xiaojun Chang, Yuan-Fang Li, Reza Haffari, Van Nguyen, Shuang Yu:
Toward the Automated Construction of Probabilistic Knowledge Graphs for the Maritime Domain. FUSION 2021: 1-8 - [c10]Van Nguyen, Trung Le, Olivier Y. de Vel, Paul Montague, John Grundy, Dinh Phung:
Information-theoretic Source Code Vulnerability Highlighting. IJCNN 2021: 1-8 - 2020
- [c9]Van Nguyen, Trung Le, Tue Le, Khanh Nguyen, Olivier Y. de Vel, Paul Montague, Dinh Phung:
Code Pointer Network for Binary Function Scope Identification. IJCNN 2020: 1-7 - [c8]Van Nguyen, Trung Le, Olivier Y. de Vel, Paul Montague, John C. Grundy, Dinh Phung:
Dual-Component Deep Domain Adaptation: A New Approach for Cross Project Software Vulnerability Detection. PAKDD (1) 2020: 699-711 - [c7]Van Nguyen, Trung Le, Tue Le, Khanh Nguyen, Olivier Y. de Vel, Paul Montague, John C. Grundy, Dinh Phung:
Code Action Network for Binary Function Scope Identification. PAKDD (1) 2020: 712-725 - 2019
- [c6]Van Nguyen, Trung Le, Tue Le, Khanh Nguyen, Olivier Y. DeVel, Paul Montague, Lizhen Qu, Dinh Q. Phung:
Deep Domain Adaptation for Vulnerable Code Function Identification. IJCNN 2019: 1-8 - 2018
- [c5]Hung Nguyen, Van Nguyen, Thin Nguyen, Mark E. Larsen, Bridianne O'Dea, Duc Thanh Nguyen, Trung Le, Dinh Q. Phung, Svetha Venkatesh, Helen Christensen:
Jointly Predicting Affective and Mental Health Scores Using Deep Neural Networks of Visual Cues on the Web. WISE (2) 2018: 100-110 - 2016
- [c4]Anh Le, Trung Le, Khanh Nguyen, Van Nguyen, Thai Hoang Le, Dat Tran:
Fast Kernel-based method for anomaly detection. IJCNN 2016: 3211-3217 - 2015
- [c3]Phuong Duong, Van Nguyen, Mi Dinh, Trung Le, Dat Tran, Wanli Ma:
Graph-based semi-supervised Support Vector Data Description for novelty detection. IJCNN 2015: 1-6 - 2014
- [c2]Van Nguyen, Trung Le, Thien Pham, Mi Dinh, Thai Hoang Le:
Kernel-based semi-supervised learning for novelty detection. IJCNN 2014: 4129-4136 - 2013
- [c1]Trung Le, Dat Tran, Van Nguyen, Wanli Ma:
Maximal margin learning vector quantisation. IJCNN 2013: 1-6
Informal and Other Publications
- 2024
- [i17]Tuan Nguyen, Van Nguyen, Trung Le, He Zhao, Quan Hung Tran, Dinh Q. Phung:
A Class-aware Optimal Transport Approach with Higher-Order Moment Matching for Unsupervised Domain Adaptation. CoRR abs/2401.15952 (2024) - [i16]Van Nguyen, Tingmin Wu, Xingliang Yuan, Marthie Grobler, Surya Nepal, Carsten Rudolph:
A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection. CoRR abs/2402.17092 (2024) - [i15]Van Nguyen, Xingliang Yuan, Tingmin Wu, Surya Nepal, Marthie Grobler, Carsten Rudolph:
Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone? CoRR abs/2404.05964 (2024) - [i14]Fatemeh Shiri, Van Nguyen, Farhad Moghimifar, John Yoo, Gholamreza Haffari, Yuan-Fang Li:
Decompose, Enrich, and Extract! Schema-aware Event Extraction using LLMs. CoRR abs/2406.01045 (2024) - [i13]Van Nguyen, Surya Nepal, Tingmin Wu, Xingliang Yuan, Carsten Rudolph:
SAFE: Advancing Large Language Models in Leveraging Semantic and Syntactic Relationships for Software Vulnerability Detection. CoRR abs/2409.00882 (2024) - 2023
- [i12]Fatemeh Shiri, Teresa Wang, Shirui Pan, Xiaojun Chang, Yuan-Fang Li, Reza Haffari, Van Nguyen, Shuang Yu:
Toward the Automated Construction of Probabilistic Knowledge Graphs for the Maritime Domain. CoRR abs/2305.02471 (2023) - [i11]Fatemeh Shiri, Farhad Moghimifar, Van Nguyen, Reza Haffari, Yuan-Fang Li:
Few-shot Domain-Adaptive Visually-fused Event Detection from Text. CoRR abs/2305.03517 (2023) - [i10]Michael Fu, Chakkrit Tantithamthavorn, Trung Le, Yuki Kume, Van Nguyen, Dinh Phung, John C. Grundy:
AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities. CoRR abs/2305.16615 (2023) - [i9]Michael Fu, Trung Le, Van Nguyen, Chakkrit Tantithamthavorn, Dinh Q. Phung:
Learning to Quantize Vulnerability Patterns and Match to Locate Statement-Level Vulnerabilities. CoRR abs/2306.06109 (2023) - [i8]Michael Fu, Chakkrit Tantithamthavorn, Van Nguyen, Trung Le:
ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We? CoRR abs/2310.09810 (2023) - 2022
- [i7]Fatemeh Shiri, Terry Yue Zhuo, Zhuang Li, Van Nguyen, Shirui Pan, Weiqing Wang, Reza Haffari, Yuan-Fang Li:
Paraphrasing Techniques for Maritime QA system. CoRR abs/2203.10854 (2022) - [i6]Vy Vo, Van Nguyen, Trung Le, Quan Hung Tran, Gholamreza Haffari, Seyit Camtepe, Dinh Q. Phung:
An Additive Instance-Wise Approach to Multi-class Model Interpretation. CoRR abs/2207.03113 (2022) - [i5]Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, John C. Grundy, Hung Nguyen, Dinh Q. Phung:
Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle. CoRR abs/2209.10406 (2022) - [i4]Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, John C. Grundy, Hung Nguyen, Seyit Camtepe, Paul Quirk, Dinh Q. Phung:
An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability. CoRR abs/2209.10414 (2022) - [i3]Vy Vo, Trung Le, Van Nguyen, He Zhao, Edwin V. Bonilla, Gholamreza Haffari, Dinh Q. Phung:
Learning to Counter: Stochastic Feature-based Learning for Diverse Counterfactual Explanations. CoRR abs/2209.13446 (2022) - 2021
- [i2]Van-Anh Nguyen, Dai Quoc Nguyen, Van Nguyen, Trung Le, Quan Hung Tran, Dinh Q. Phung:
ReGVD: Revisiting Graph Neural Networks for Vulnerability Detection. CoRR abs/2110.07317 (2021) - 2016
- [i1]Trung Le, Khanh Nguyen, Van Nguyen, Vu Nguyen, Dinh Q. Phung:
Scalable Support Vector Machine for Semi-supervised Learning. CoRR abs/1606.06793 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint