School Of Computing Science - Our Staff - Nguyen Truong

  • Skip to main content

The University of Glasgow uses cookies for analytics. Find out more about our Privacy policy. privacy settings accept

We use cookies

Necessary cookies

Necessary cookies enable core functionality. The website cannot function properly without these cookies, and can only be disabled by changing your browser preferences.

Analytics cookies

Analytical cookies help us improve our website. We use Google Analytics. All data is anonymised.

Switch analytics ON OFF

Clarity

Clarity helps us to understand our users’ behaviour by visually representing their clicks, taps and scrolling. All data is anonymised.

Switch clarity ON OFF

Privacy policy

close

    • Our staff
    • Nguyen Truong
  • Dr Sebastian Stein
  • Mr Ethan Kelly
  • Study
  • Research
  • Explore
  • Connect
School of Computing Science
  • Our staff
  • Nguyen Truong
  • Dr Sebastian Stein
  • Mr Ethan Kelly
Dr Nguyen Truong
  • Lecturer in Cybersecurity (School of Computing Science)

email: Nguyen.Truong@glasgow.ac.uk

Room SAWB 221C, Sir Alwyn Williams Building, 18 Lilybank Gardens, Glasgow, G12 8RZ

Import to contacts

ORCID iDhttps://orcid.org/0000-0001-9359-524X

Biography

Nguyen B. Truong is a lecturer (Assistant Professor) at the School of Computing Science, the University of Glasgow, UK. Previously, he was a Research Associate at Data Science Institute, Imperial College London, UK from 2018-2022.

He received his PhD, MSc, and BSc degrees from Liverpool John Moores University, UK, Pohang University of Science and Technology, Korea, and Hanoi University of Science and Technology, Vietnam in 2018, 2013, and 2008, respectively. He was a Software Engineer at DASAN Networks, a leading company in Networking Products and Services in South Korea from 2012-2015.

Research interests

My research interests include, but are not limited to, Data Privacy, Security, and Trust, Personal Data Management, Distributed Systems, Blockchain and recently, Privacy in Federated Learning.

My full publication list can be found at Google Scholar

  • Privacy
  • Security
  • Trust
  • Personal Data Management
  • Distributed Systems
  • Blockchain
  • Federated Learning

Further information can be found on my personal webpage

Publications

List by: Type | Date

Jump to: 2024 | 2023Number of items: 5.

2024

Jamwal, S., Cano, J. , Lee, G. M., Tran, N. H. and Truong, N. (2024) A survey on Ethereum pseudonymity: Techniques, challenges, and future directions. Journal of Network and Computer Applications, 232, 104019. (doi: 10.1016/j.jnca.2024.104019)

Naila, N., Chak, A., Michala, L. , Ansari, S. and Truong, N. (2024) Modelling GDPR-compliance Based on Defeasible Logic Reasoning: Insights from Time Complexity Perspective. In: 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2024), Sanya, China, 17-21 Dec 2024, (Accepted for Publication)

Daly, A., Lee, G. M. and Truong, N. B. (2024) A Blockchain-Based Data Sharing Scheme Using Attribute-Based Encryption and Fungible Tokens. In: 2024 IEEE Global Communications Conference: Communication & Information Systems Security (GLOBECOM 2024), Cape Town, South Africa, 08-12 Dec 2024, (Accepted for Publication)

Azam, N., Michala, A. L. , Ansari, S. and Truong, N. B. (2024) Modelling Technique for GDPR-compliance: Toward a Comprehensive Solution. In: 2023 IEEE Global Communications Conference (Globecom 2023), Kuala Lumpur, Malaysia, 4-8 Dec 2023, pp. 3300-3305. ISBN 9798350310900 (doi: 10.1109/GLOBECOM54140.2023.10437389)

2023

Azam, N., Michala, L. , Ansari, S. and Truong, N. (2023) Data privacy threat modelling for autonomous systems: a survey from the GDPR’s perspective. IEEE Transactions on Big Data, 9(2), pp. 388-414. (doi: 10.1109/TBDATA.2022.3227336)

This list was generated on Wed Dec 25 04:27:26 2024 GMT. Jump to: Articles | Conference ProceedingsNumber of items: 5.

Articles

Jamwal, S., Cano, J. , Lee, G. M., Tran, N. H. and Truong, N. (2024) A survey on Ethereum pseudonymity: Techniques, challenges, and future directions. Journal of Network and Computer Applications, 232, 104019. (doi: 10.1016/j.jnca.2024.104019)

Azam, N., Michala, L. , Ansari, S. and Truong, N. (2023) Data privacy threat modelling for autonomous systems: a survey from the GDPR’s perspective. IEEE Transactions on Big Data, 9(2), pp. 388-414. (doi: 10.1109/TBDATA.2022.3227336)

Conference Proceedings

Naila, N., Chak, A., Michala, L. , Ansari, S. and Truong, N. (2024) Modelling GDPR-compliance Based on Defeasible Logic Reasoning: Insights from Time Complexity Perspective. In: 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2024), Sanya, China, 17-21 Dec 2024, (Accepted for Publication)

Daly, A., Lee, G. M. and Truong, N. B. (2024) A Blockchain-Based Data Sharing Scheme Using Attribute-Based Encryption and Fungible Tokens. In: 2024 IEEE Global Communications Conference: Communication & Information Systems Security (GLOBECOM 2024), Cape Town, South Africa, 08-12 Dec 2024, (Accepted for Publication)

Azam, N., Michala, A. L. , Ansari, S. and Truong, N. B. (2024) Modelling Technique for GDPR-compliance: Toward a Comprehensive Solution. In: 2023 IEEE Global Communications Conference (Globecom 2023), Kuala Lumpur, Malaysia, 4-8 Dec 2023, pp. 3300-3305. ISBN 9798350310900 (doi: 10.1109/GLOBECOM54140.2023.10437389)

This list was generated on Wed Dec 25 04:27:26 2024 GMT.

Supervision

  • Babalola, Omodolapo Victor Robust Privacy-Preserving Federated Learning for securing IoT
  • Naila, * Threat Modelling Technique for GDPR Compliance Based on Logical Reasoning

Teaching

I'm currently teaching the following courses:

  • COMPSCI5079 Cryptography and Secure Development 2022-2023
  • COMPSCI4062 Cyber Security Fundamentals H, COMPSCI5063 Cyber Security Fundamentals M - 2021-22
  • COMPSCI5110 - Emerging Topics in Cyber Security - 2021-22

Additional information

Below is a list of selected publications:

Selected Journal Papers

[1] Truong, Nguyen B., Gyu Myoung Lee, Kai Sun, Florian Guitton, and Yike Guo. “A Blockchain-based Trust Systemfor Decentralised Applications: When trustless needs trust”. In: Elsevier Future Generation Computer Systems (FGCS)124 (2021), pp. 68–79. [2] Truong, Nguyen B., Kai Sun, Siyao Wang, Florian Guitton, and Yike Guo. “Privacy Preservation in FederatedLearning: An insightful survey from the GDPR Perspective”. In: Elsevier Computers & Security (COSE) 110 (2021),p. 102402. issn: 0167-4048. doi: https://doi.org/10.1016/j.cose.2021.102402. url: https://www.sciencedirect.com/science/article/pii/S0167404821002261. [3] Truong, Nguyen B., G. M. Lee, T. Um, and M. Mackay. “Trust Evaluation Mechanism for User Recruitment inMobile Crowd-Sensing in the Internet of Things”. In: IEEE Transactions on Information Forensics and Security 14.10(Mar. 2019), pp. 2705–2719. doi: 10.1109/TIFS.2019.2903659. [4] Truong, Nguyen B., K. Sun, G. M. Lee, and Y. Guo. “GDPR-Compliant Personal Data Management: A Blockchain-based Solution”. In: IEEE Transactions on Information Forensics and Security (Oct. 2019), pp. 1–16. doi: 10.1109/TIFS.2019.2948287. [5] Truong, Nguyen B., Hyunwoo Lee, Bob Askwith, and Gyu Myoung Lee. “Toward a trust evaluation mechanism inthe social internet of things”. In: Sensors 17.6 (2017), p. 1346. url: https://www.mdpi.com/1424-8220/17/6/1346. Selected Conference Papers [1] Truong, Nguyen B., Kai Sun, and Yike Guo. “Blockchain-based Personal Data Management: From Fiction to So-lution”. In: IEEE International Symposium on Network Computing and Applications (NCA). IEEE. 2019, pp. 204–211. [2] Hamza Baqa, Truong, Nguyen B., Noel Crespi, Gyu Myoung Lee, and Franck Le Gall. “Quality of Information asan indicator of Trust in the Internet of Things”. In: IEEE International Conference On Trust, Security And PrivacyIn Computing And Communications (TrustCom). IEEE. 2018, pp. 204–211. [3] Truong, Nguyen B., Tai-Won Um, Bo Zhou, and Gyu Myoung Lee. “Strengthening the blockchain-based internet ofvalue with trust”. In: IEEE International Conference on Communications (ICC). IEEE. 2018, pp. 1–7. [4] Truong, Nguyen B., Tai-Won Um, Bo Zhou, and Gyu Myoung Lee. “From personal experience to global reputationfor trust evaluation in the social internet of things”. In: IEEE Global Communications Conference (GLOBECOM).IEEE. 2017, pp. 1–7. [5] Upul Jayasinghe, Truong, Nguyen B., Gyu Myoung Lee, and Tai-Won Um. “Rpr: A trust computation modelfor social internet of things”. In: IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and TrustedComputing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and SmartWorld Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). IEEE. 2016, pp. 930–937. [6] Truong, Nguyen B., Quyet H Cao, Tai-Won Um, and Gyu Myoung Lee. “Leverage a trust service platform for datausage control in smart city”. In: IEEE Global Communications Conference (GLOBECOM). IEEE. 2016, pp. 1–7. [7] Truong, Nguyen B., Tai-won Um, and Gyu Myoung Lee. “A reputation and knowledge based trust service platformfor trustworthy social internet of things”. In: Innovations in clouds, internet and networks (ICIN). IFIP/IEEE. 2016. [8] Truong, Nguyen B., Gyu Myoung Lee, and Yacine Ghamri-Doudane. “Software defined networking-based vehicularAdhoc Network with Fog Computing”. In: IFIP/IEEE International Symposium on Integrated Network Management(IM). IEEE. 2015, pp. 1202–1207. [9] Truong, Nguyen B., Young-Joo Suh, and Chansu Yu. “Latency analysis in gnu radio/usrp-based software radioplatforms”. In: IEEE Military Communications Conference (MILCOM). IEEE. 2013, pp. 305–310. [10] Huynh Thi Thanh Binh and Truong, Nguyen B. “New particle swarm optimization algorithm for solving degreeconstrained minimum spanning tree problem”. In: Pacific Rim International Conference on Artificial Intelligence (PRI-CAI). Springer. 2008, pp. 1077–1085.

List of Selected Publications

Selected Journal Papers

[1] Truong, Nguyen B., Gyu Myoung Lee, Kai Sun, Florian Guitton, and Yike Guo. “A Blockchain-based Trust Systemfor Decentralised Applications: When trustless needs trust”. In: Elsevier Future Generation Computer Systems (FGCS)124 (2021), pp. 68–79. [2] Truong, Nguyen B., Kai Sun, Siyao Wang, Florian Guitton, and Yike Guo. “Privacy Preservation in FederatedLearning: An insightful survey from the GDPR Perspective”. In: Elsevier Computers & Security (COSE) 110 (2021),p. 102402. issn: 0167-4048. doi: https://doi.org/10.1016/j.cose.2021.102402. url: https://www.sciencedirect.com/science/article/pii/S0167404821002261. [3] Truong, Nguyen B., G. M. Lee, T. Um, and M. Mackay. “Trust Evaluation Mechanism for User Recruitment inMobile Crowd-Sensing in the Internet of Things”. In: IEEE Transactions on Information Forensics and Security 14.10(Mar. 2019), pp. 2705–2719. doi: 10.1109/TIFS.2019.2903659. [4] Truong, Nguyen B., K. Sun, G. M. Lee, and Y. Guo. “GDPR-Compliant Personal Data Management: A Blockchain-based Solution”. In: IEEE Transactions on Information Forensics and Security (Oct. 2019), pp. 1–16. doi: 10.1109/TIFS.2019.2948287. [5] Truong, Nguyen B., Hyunwoo Lee, Bob Askwith, and Gyu Myoung Lee. “Toward a trust evaluation mechanism inthe social internet of things”. In: Sensors 17.6 (2017), p. 1346. url: https://www.mdpi.com/1424-8220/17/6/1346.

Selected Conference Papers

[1] Truong, Nguyen B., Kai Sun, and Yike Guo. “Blockchain-based Personal Data Management: From Fiction to So-lution”. In: IEEE International Symposium on Network Computing and Applications (NCA). IEEE. 2019, pp. 204–211. [2] Hamza Baqa, Truong, Nguyen B., Noel Crespi, Gyu Myoung Lee, and Franck Le Gall. “Quality of Information asan indicator of Trust in the Internet of Things”. In: IEEE International Conference On Trust, Security And PrivacyIn Computing And Communications (TrustCom). IEEE. 2018, pp. 204–211. [3] Truong, Nguyen B., Tai-Won Um, Bo Zhou, and Gyu Myoung Lee. “Strengthening the blockchain-based internet ofvalue with trust”. In: IEEE International Conference on Communications (ICC). IEEE. 2018, pp. 1–7. [4] Truong, Nguyen B., Tai-Won Um, Bo Zhou, and Gyu Myoung Lee. “From personal experience to global reputationfor trust evaluation in the social internet of things”. In: IEEE Global Communications Conference (GLOBECOM).IEEE. 2017, pp. 1–7. [5] Upul Jayasinghe, Truong, Nguyen B., Gyu Myoung Lee, and Tai-Won Um. “Rpr: A trust computation modelfor social internet of things”. In: IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and TrustedComputing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and SmartWorld Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). IEEE. 2016, pp. 930–937. [6] Truong, Nguyen B., Quyet H Cao, Tai-Won Um, and Gyu Myoung Lee. “Leverage a trust service platform for datausage control in smart city”. In: IEEE Global Communications Conference (GLOBECOM). IEEE. 2016, pp. 1–7. [7] Truong, Nguyen B., Tai-won Um, and Gyu Myoung Lee. “A reputation and knowledge based trust service platformfor trustworthy social internet of things”. In: Innovations in clouds, internet and networks (ICIN). IFIP/IEEE. 2016. [8] Truong, Nguyen B., Gyu Myoung Lee, and Yacine Ghamri-Doudane. “Software defined networking-based vehicularAdhoc Network with Fog Computing”. In: IFIP/IEEE International Symposium on Integrated Network Management(IM). IEEE. 2015, pp. 1202–1207. [9] Truong, Nguyen B., Young-Joo Suh, and Chansu Yu. “Latency analysis in gnu radio/usrp-based software radioplatforms”. In: IEEE Military Communications Conference (MILCOM). IEEE. 2013, pp. 305–310. [10] Huynh Thi Thanh Binh and Truong, Nguyen B. “New particle swarm optimization algorithm for solving degreeconstrained minimum spanning tree problem”. In: Pacific Rim International Conference on Artificial Intelligence (PRI-CAI). Springer. 2008, pp. 1077–1085.

Từ khóa » Trường Dxt