Tran Hoang Hai

Orcid: 0000-0002-7671-4451

According to our database1, Tran Hoang Hai authored at least 23 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhancing network attack detection across infrastructures: An automatic labeling method and deep learning model with an attention mechanism.
IET Commun., October, 2024

Dholes Hunting - A Multi-Local Search Algorithm Using Gradient Approximation and Its Application for Blockchain Consensus Problem.
IEEE Access, 2024

2023
A Proposed New Endpoint Detection and Response With Image-Based Malware Detection System.
IEEE Access, 2023

Reinforcement-Learning-Based Deadline Constrained Task Offloading Schema for Energy Saving in Vehicular Edge Computing System.
Proceedings of the International Joint Conference on Neural Networks, 2023

Deep Inductive Transfer Learning Approach for Network Attacks Detection.
Proceedings of the International Conference on Advanced Computing and Analytics, 2023

Evaluation of Deep CNN-BiLSTM Model on Diverse Datasets.
Proceedings of the International Conference on Advanced Computing and Analytics, 2023

2022
Fuzzy-Assisted Mobile Edge Orchestrator and SARSA Learning for Flexible Offloading in Heterogeneous IoT Environment.
Sensors, 2022

A Variational Information Bottleneck Method for Network Intrusion Detection.
J. Commun., 2022

2021
Improvement of K-nearest Neighbors (KNN) Algorithm for Network Intrusion Detection Using Shannon-Entropy.
J. Commun., 2021

BKIDset - A New Intrusion Detection Dataset To Mitigate The Class Imbalance Problem.
Proceedings of the 15th International Conference on Advanced Computing and Applications, 2021

2020
The Practice of Cloud-based Navigation System for Indoor Robot.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

2017
A Pricing Model for Sharing Cloudlets in Mobile Cloud Computing.
Proceedings of the International Conference on Advanced Computing and Applications, 2017

2014
Double-sided auctions applied to vertical handover for mobility management in wireless networks.
J. Netw. Syst. Manag., 2014

Human extraction from a sequence of depth images using segmentation and foreground detection.
Proceedings of the Fifth Symposium on Information and Communication Technology, 2014

2013
State-space modeling based on principal component analysis and oxygenated-deoxygenated correlation to improve near-infrared spectroscopy signals.
Proceedings of the 4th International Symposium on Information and Communication Technology, 2013

2012
Combinatorial double-sided auctions for network bandwidth allocation: a budget-balanced and decentralized approach.
Ann. des Télécommunications, 2012

2011
Inter-domain pricing: challenges and possible approaches.
Int. J. Netw. Manag., 2011

2010
A lightweight intrusion detection framework for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2010

2009
Enhanced Group-Based Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge.
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008

Minimizing the Intrusion Detection Modules in Wireless Sensor Networks.
Proceedings of the Selected Papers of the Sixth International Conference on Computational Sciences and Its Applications, 2008

2007
Hybrid Intrusion Detection System for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

Optimal Selection and Activation of Intrusion Detection Agents for Wireless Sensor Networks.
Proceedings of the Future Generation Communication and Networking, 2007


  Loading...