default search action
Nhan Nguyen-Thanh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Duc-Tuyen Ta, Nhan Nguyen-Thanh, Duy H. N. Nguyen, Van-Tam Nguyen:
A game-theoretical paradigm for collaborative and distributed power control in wireless networks. Ann. des Télécommunications 79(1-2): 1-14 (2024) - 2021
- [j15]Duc Thang Ha, Lila Boukhatem, Megumi Kaneko, Nhan Nguyen-Thanh:
Joint beamforming and user association with reduced CSI signaling in mobile environments: A Deep Q-learning approach. Comput. Networks 197: 108291 (2021)
2010 – 2019
- 2019
- [j14]Duc Thang Ha, Lila Boukhatem, Megumi Kaneko, Nhan Nguyen-Thanh, Steven Martin:
Adaptive beamforming and user association in heterogeneous cloud radio access networks: A mobility-aware performance-cost trade-off. Comput. Networks 160: 130-143 (2019) - [j13]Nhan Nguyen-Thanh, Duc-Tuyen Ta, Van-Tam Nguyen:
Spoofing attack and surveillance game in geo-location database driven spectrum sharing. IET Commun. 13(1): 74-84 (2019) - [i2]Nhan Nguyen-Thanh, Dana Marinca, Kinda Khawam, David Rohde, Flavian Vasile, Elena Simona Lohan, Steven Martin, Dominique Quadri:
Recommendation System-based Upper Confidence Bound for Online Advertising. CoRR abs/1909.04190 (2019) - 2018
- [j12]Duc-Tuyen Ta, Nhan Nguyen-Thanh, Patrick Maillé, Van-Tam Nguyen:
Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks. IEEE Trans. Cogn. Commun. Netw. 4(3): 582-596 (2018) - [c12]Nhan Nguyen-Thanh, Dana Marinca, Kinda Khawam, Steven Martin, Lila Boukhatem:
Multimedia Content Popularity: Learning and Recommending a Prediction Method. GLOBECOM 2018: 1-7 - 2016
- [c11]Duc-Tuyen Ta, Nhan Nguyen-Thanh, Patrick Maillé, Philippe Ciblat, Van-Tam Nguyen:
Mitigating Primary Emulation Attacks in Multi-Channel Cognitive Radio Networks: A Surveillance Game. GLOBECOM 2016: 1-6 - [i1]Duc-Tuyen Ta, Nhan Nguyen-Thanh, Patrick Maillé, Philippe Ciblat, Van-Tam Nguyen:
Mitigating selfish primary user emulation attacks in multi-channel cognitive radio networks: A surveillance game. CoRR abs/1604.03324 (2016) - 2015
- [j11]Nhan Nguyen-Thanh, Philippe Ciblat, Anh T. Pham, Van-Tam Nguyen:
Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 14(9): 4981-4993 (2015) - [j10]Nhan Nguyen-Thanh, Philippe Ciblat, Sina Maleki, Van-Tam Nguyen:
How Many Bits Should Be Reported In Quantized Cooperative Spectrum Sensing? IEEE Wirel. Commun. Lett. 4(5): 465-468 (2015) - [c10]Ta Duc-Tuyen, Nhan Nguyen-Thanh, Philippe Ciblat, Van-Tam Nguyen:
Extra-sensing game for malicious primary user emulator attack in cognitive radio network. EuCNC 2015: 306-310 - [c9]Nhan Nguyen-Thanh, Philippe Ciblat, Van-Tam Nguyen:
An energy minimization algorithm for cooperative spectrum sensing. ISWCS 2015: 501-505 - 2014
- [j9]Nhan Nguyen-Thanh, Anh T. Pham, Van-Tam Nguyen:
Medium Access Control Design for Cognitive Radio Networks: A Survey. IEICE Trans. Commun. 97-B(2): 359-374 (2014) - [c8]Nhan Nguyen-Thanh, Philippe Ciblat, Anh T. Pham, Van-Tam Nguyen:
Attack and surveillance strategies for selfish primary user emulator in cognitive radio network. GlobalSIP 2014: 1199-1203 - 2013
- [j8]Nhan Nguyen-Thanh, Insoo Koo:
A cluster-based selective cooperative spectrum sensing scheme in cognitive radio. EURASIP J. Wirel. Commun. Netw. 2013: 176 (2013) - [c7]Nhan Nguyen-Thanh, Tuan D. Pham, Kazuhisa Ichikawa:
Segmentation of mitochondria in intracellular space. CIBCB 2013: 218-221 - 2012
- [j7]Nhan Nguyen-Thanh, Insoo Koo:
Application of maximum-distance generalised quantiser for cooperative spectrum sensing in cognitive radio. IET Commun. 6(1): 39-45 (2012) - [j6]Nguyen-Thanh Nhan, Thuc Kieu-Xuan, Insoo Koo:
Comments and Corrections Comments on "Spectrum Sensing in Cognitive Radio Using Goodness-of-Fit Testing". IEEE Trans. Wirel. Commun. 11(10): 3409-3411 (2012) - [c6]Tuan D. Pham, Dzung Vo, Nhan Nguyen-Thanh, Truong Cong Thang, Kazuhisa Ichikawa:
How Complex Is Cancer Intracellular Signaling Space in FIB-SEM Images? EMS 2012: 139-142 - [c5]Tuan D. Pham, Nhan Nguyen-Thanh, Truong Cong Thang, Kazuhisa Ichikawa:
Chaotic Behavior in Intracellular Space: An Implication for Modeling and Simulation of Cancer. EMS 2012: 143-147 - 2011
- [j5]Nguyen-Thanh Nhan, Insoo Koo:
Log-likelihood Ratio Optimal Quantizer for Cooperative Spectrum Sensing in Cognitive Radio. IEEE Commun. Lett. 15(3): 317-319 (2011) - [j4]Nhan Nguyen-Thanh, Insoo Koo:
Evidence-Theory-Based Cooperative Spectrum Sensing With Efficient Quantization Method in Cognitive Radio. IEEE Trans. Veh. Technol. 60(1): 185-195 (2011) - 2010
- [j3]Nguyen-Thanh Nhan, Insoo Koo:
An Efficient Ordered Sequential Cooperative Spectrum Sensing Scheme Based on Evidence Theory in Cognitive Radio. IEICE Trans. Commun. 93-B(12): 3248-3257 (2010) - [c4]Nguyen-Thanh Nhan, Insoo Koo:
A Sequential Cooperative Spectrum Sensing Scheme Based on Dempster Shafer Theory of Evidence. ICIC (3) 2010: 343-350
2000 – 2009
- 2009
- [j2]Nguyen-Thanh Nhan, Insoo Koo:
An enhanced cooperative spectrum sensing scheme based on evidence theory and reliability source evaluation in cognitive radio context. IEEE Commun. Lett. 13(7): 492-494 (2009) - [j1]Nguyen-Thanh Nhan, Insoo Koo:
A Robust Secure Cooperative Spectrum Sensing Scheme Based on Evidence Theory and Robust Statistics in Cognitive Radio. IEICE Trans. Commun. 92-B(12): 3644-3652 (2009) - [c3]Nguyen-Thanh Nhan, Thuc Kieu-Xuan, Insoo Koo:
Cooperative Spectrum Sensing Using Enhanced Dempster-Shafer Theory of Evidence in Cognitive Radio. ICIC (2) 2009: 688-697 - [c2]Nguyen-Thanh Nhan, Insoo Koo:
A Secure Distributed Spectrum Sensing Scheme in Cognitive Radio. ICIC (2) 2009: 698-707 - 2003
- [c1]Nhan Nguyen-Thanh, Truong Cong Thang, Beet Nara Bae, Yong Man Ro:
Video abstraction generation supervised by user preference. Image Processing: Algorithms and Systems 2003: 248-257
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint