Uyen Trang Nguyen

Orcid: 0000-0002-4860-3551

According to our database1, Uyen Trang Nguyen authored at least 74 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Comprehensive evaluation of privacy policies using the contextual integrity framework.
Secur. Priv., 2024

Automated Fact Checking Using A Knowledge Graph-based Model.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication , 2024

2023
Twitter Bot Detection Using Neural Networks and Linguistic Embeddings.
IEEE Open J. Comput. Soc., 2023

A Novel Semi-Supervised Adversarially Learned Meta-Classifier for Detecting Neural Trojan Attacks.
IEEE Access, 2023

A Large-scale Non-standard English Database and Transformer-based Translation System.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

PyTPU: Migration of Python Code for Heterogenous Acceleration with Automated Test Generation.
Proceedings of the 8th IEEE/ACIS International Conference on Big Data, 2023

2022
An Attention-Based Neural Network Using Human Semantic Knowledge and Its Application to Clickbait Detection.
IEEE Open J. Comput. Soc., 2022

Deep Reinforcement Learning Based Data Collection in IoT Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

COVMIS: A Dataset for Research on COVID-19 Misinformation.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022

2021
Exact Coverage Analysis of Intelligent Reflecting Surfaces With Nakagami-M Channels.
IEEE Trans. Veh. Technol., 2021

A Survey of Self-Sovereign Identity Ecosystem.
Secur. Commun. Networks, 2021

Data Capsule: A Self-Contained Data Model as an Access Policy Enforcement Strategy.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021

2020
The Meta Distributions of the SIR/SNR and Data Rate in Coexisting Sub-6GHz and Millimeter-Wave Cellular Networks.
IEEE Open J. Commun. Soc., 2020

A Neural Attentive Model Using Human Semantic Knowledge for Clickbait Detection.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

A Lightweight Deep Neural Model for SMS Spam Detection.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Decentralized and Privacy-Preserving Key Management Model.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Unmasking Magnet, a Novel Malware on Facebook.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Stock Trend Prediction using Financial Market News and BERT.
Proceedings of the 12th International Joint Conference on Knowledge Discovery, 2020

2019
Data Rate Utility Analysis for Uplink Two-Hop Internet of Things Networks.
IEEE Internet Things J., 2019

Mobile botnets meet social networks: design and analysis of a new type of botnet.
Int. J. Inf. Sec., 2019

Twitter Bot Detection Using Bidirectional Long Short-Term Memory Neural Networks and Word Embeddings.
Proceedings of the First IEEE International Conference on Trust, 2019

Meta Distribution of SIR in Dual-Hop Internet-of-Things (IoT) Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Dual-FOFE-net Neural Models for Entity Linking with PageRank.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019 - 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17-19, 2019, Proceedings, 2019

Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
SupAUTH: A new approach to supply chain authentication for the IoT.
Comput. Intell., 2018

A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A Robust Protocol for Circumventing Censoring Firewalls.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2017
Modeling the Propagation of Trojan Malware in Online Social Networks.
CoRR, 2017

Vietnamese Open Information Extraction.
Proceedings of the Eighth International Symposium on Information and Communication Technology, 2017

2016
Mobility-Aware Modeling and Analysis of Dense Cellular Networks With C -Plane/ U -Plane Split Architecture.
IEEE Trans. Commun., 2016

A new algorithm for money laundering detection based on structural similarity.
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016

Evaluation of channel switching overhead for multicast communications in wireless mesh networks.
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016

2015
A Message Transfer Framework for Enhanced Reliability in Delay-Tolerant Networks.
Netw. Protoc. Algorithms, 2015

New technologies and research trends for smartphone sensing in intelligent multimedia systems.
Multim. Syst., 2015

Intelligent video surveillance in crowded scenes.
Inf. Fusion, 2015

Mining Social Media for Knowledge Discovery.
Comput. J., 2015

Advanced Issues on Topic Detection, Tracking, and Trend Analysis for Social Multimedia.
Adv. Multim., 2015

A framework for extending contact opportunities in Delay-and Disruption-Tolerant Networks.
Proceedings of the IEEE International Conference on Communication, 2015

Modeling virtualized downlink cellular networks with ultra-dense small cells.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Next Generation of Impersonator Bots: Mimicking Human Browsing on Previously Unvisited Sites.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Web bots that mimic human browsing behavior on previously unvisited web-sites: Feasibility study and security implications.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Knowledge management technologies for semantic multimedia services.
Multim. Tools Appl., 2014

Recent advanced applications and services for intelligent ubiquitous environments.
Electron. Commer. Res., 2014

A study of clickjacking worm propagation in online social networks.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

2013
A Study of Malware Propagation via Online Social Networking.
Proceedings of the Mining Social Networks and Security Informatics, 2013

A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks.
IEEE Trans. Inf. Forensics Secur., 2013

Introduction to the special issue on advances in the convergence of multimedia, communications, and social web technology.
New Rev. Hypermedia Multim., 2013

Efficient authentication for fast handover in wireless mesh networks.
Comput. Secur., 2013

2012
The Role of DNS TTL Values in Potential DDoS Attacks: What Do the Major Banks Know About It?
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Performance modeling of multicast with network coding in multi-channel multi-radio wireless mesh networks.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Data Overhead Impact of Multipath Routing for Multicast in Wireless Mesh Networks.
Proceedings of the Third FTRA International Conference on Mobile, 2012

Efficient Group Key Management in Wireless LANs.
Proceedings of the Third FTRA International Conference on Mobile, 2012

A Node Control Model for the Charging and Accounting Problem in MANETs.
Proceedings of the Third FTRA International Conference on Mobile, 2012

Performance evaluation of network-coded multicast in multi-channel multi-radio wireless mesh networks.
Proceedings of IEEE International Conference on Communications, 2012

A study of different types of attacks in mobile ad hoc networks.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

Socellbot: A new botnet design to infect smartphones via online social networking.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

2011
Algorithms for bandwidth efficient multicast routing in multi-channel multi-radio wireless mesh networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Fast authentication for mobility support in wireless mesh networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Incident-driven routing in wireless sensor networks, a cross-layer approach.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

2010
High-Performance Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2010

Fast authentication for mobile clients in wireless mesh networks.
Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering, 2010

2009
Channel assignment for multicast in multi-channel multi-radio wireless mesh networks.
Wirel. Commun. Mob. Comput., 2009

Bandwidth efficient multicast routing in multi-channel multi-radio wireless mesh networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

2008
On multicast routing in wireless mesh networks.
Comput. Commun., 2008

A study of different types of attacks on multicast in mobile ad hoc networks.
Ad Hoc Networks, 2008

2007
Multicast Routing in Wireless Mesh Networks: Minimum Cost Trees or Shortest Path Trees?
IEEE Commun. Mag., 2007

Group key management in wireless mesh networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

2006
Scalable Video Multicast over MANETs.
Proceedings of the IEEE 8th Workshop on Multimedia Signal Processing, 2006

Multirate-aware Multicast Routing in MANETs.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Preemptive Multicast Routing in Mobile Ad-hoc Networks.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

2005
Rate-adaptive multicast in mobile ad-hoc networks.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Streaming video with bandwidth adaptation and error concealment for lowbit rate live wireless applications.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

2004
Evaluation of flow control algorithms for ABR multipoint services.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

2003
Congestion control for multipoing communications in ATM networks.
PhD thesis, 2003


  Loading...