Le Xuan Hung
Orcid: 0000-0002-1957-8529
According to our database1,
Le Xuan Hung
authored at least 52 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Graphs Comb., August, 2023
Outage Probability and Throughput of Mobile Multiantenna UAV-Assisted FD-NOMA Relay System With Imperfect CSI.
IEEE Syst. J., March, 2023
Testing reliability and validity of the Vietnamese version of the eHealth literacy scale (eHEALS) among medical students in Vietnam.
Int. J. Medical Informatics, 2023
2022
Exploiting Multiple RISs and Direct Link for Performance Enhancement of Wireless Systems With Hardware Impairments.
IEEE Trans. Commun., 2022
Discret. Math., 2022
2021
On the Capacity of Full-Duplex AF/DF Relay System with Energy Harvesting for Vehicle-to-Vehicle Communications.
Wirel. Commun. Mob. Comput., 2021
2015
Identifying Effective Approaches for Dissemination of Clinical Evidence - Correlation Analyses on Promotional Activities and Usage of a Guideline-Driven Interactive Case Simulation Tool in a Statewide HIV-HCV-STD Clinical Education Program.
Proceedings of the MEDINFO 2015: eHealth-enabled Health, 2015
Proceedings of the Medical Data Privacy Handbook, 2015
2014
Evaluation of an Enhanced Role-Based Access Control model to manage information access in collaborative processes for a statewide clinical education program.
J. Biomed. Informatics, 2014
2013
Ad Hoc Networks, 2013
Assessing the Usage of a Guideline-Driven Interactive Case Simulation Tool for Insomnia Screening and Treatment in an HIV Clinical Education Program.
Proceedings of the MEDINFO 2013, 2013
Correlations between Promotional Activities and Usage of a Guideline-Driven Interactive Case Simulation Tool.
Proceedings of the AMIA 2013, 2013
2012
J. Commun., 2012
An enhancement of the Role-Based Access Control model to facilitate information access management in context of team collaboration and workflow.
J. Biomed. Informatics, 2012
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
Development of Guideline-Driven Mobile Applications for Clinical Education and Decision Support with Customization to Individual Patient Cases.
Proceedings of the AMIA 2012, 2012
2011
An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare.
J. Networks, 2011
Appl. Intell., 2011
2010
Inf. Sci., 2010
IEEE Commun. Lett., 2010
Ratio-based Finite Horizon Scheduling in Wireless Ad hoc Networks.
Proceedings of the 2010 International Conference on Wireless Networks, 2010
Public key cryptography-based security scheme for wireless sensor networks in healthcare.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
2009
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography.
J. Commun. Networks, 2009
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks.
IEICE Trans. Commun., 2009
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Enhanced Group-Based Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the 2008 IEEE International Performance, 2008
2007
Proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), 2007
A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments.
Proceedings of the IEEE International Conference on Pervasive Services, 2007
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007
Embedded Processor Security.
Proceedings of the 2007 International Conference on Security & Management, 2007
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
2006
Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2006), 2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the 14th IEEE International Conference on Networks, 2006
2005
Proceedings of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2005), 2005
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005
Proceedings of the 9th European Conference on Speech Communication and Technology, 2005
Proceedings of the Intelligence in Communication Systems, 2005
Proceedings of the Networking, 2005
2004
Discuss. Math. Graph Theory, 2004