default search action
Nguyen Quang Uy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz:
Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems. IEEE Internet Things J. 11(8): 14789-14803 (2024) - [c37]Phai Vu Dinh, Dinh Thai Hoang, Nguyen Quang Uy, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz:
Multiple-Input Auto-Encoder for IoT Intrusion Detection Systems with Heterogeneous Data. ICC 2024: 2707-2712 - [i3]Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz:
Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection. CoRR abs/2403.15509 (2024) - [i2]Phai Vu Dinh, Diep N. Nguyen, Dinh Thai Hoang, Quang Uy Nguyen, Eryk Dutkiewicz, Son Pham Bao:
Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems. CoRR abs/2403.15511 (2024) - 2023
- [j8]Ly Vu, Quang Uy Nguyen, Diep N. Nguyen, Dinh Thai Hoang, Eryk Dutkiewicz:
Deep Generative Learning Models for Cloud Intrusion Detection Systems. IEEE Trans. Cybern. 53(1): 565-577 (2023) - [p1]Ly Vu, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz:
A Novel Transfer Learning Model for Intrusion Detection Systems in IoT Networks. Emerging Trends in Cybersecurity Applications 2023: 45-65 - [i1]Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz:
Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems. CoRR abs/2312.02490 (2023) - 2022
- [j7]Ly Vu, Van Loi Cao, Quang Uy Nguyen, Diep N. Nguyen, Dinh Thai Hoang, Eryk Dutkiewicz:
Learning Latent Representation for IoT Anomaly Detection. IEEE Trans. Cybern. 52(5): 3769-3782 (2022) - [c36]Phai Vu Dinh, Diep N. Nguyen, Dinh Thai Hoang, Nguyen Quang Uy, Son Pham Bao, Eryk Dutkiewicz:
Balanced Twin Auto-Encoder for IoT Intrusion Detection. GLOBECOM 2022: 3387-3392 - [c35]Trong Binh Hoang, Ly Vu, Quang Uy Nguyen:
A Data Sampling and Two-Stage Convolution Neural Network for IoT Devices Identification. RIVF 2022: 458-463 - [c34]Anh Le, Quang Uy Nguyen, Ngoc Tran Nguyen, Hai-Hong Phan, Thi Huong Chu:
An integration of Pseudo Anomalies and Memory Augmented Autoencoder for Video Anomaly Detection. SoICT 2022: 262-269 - [c33]Phai Vu Dinh, Nguyen Quang Uy, Diep N. Nguyen, Dinh Thai Hoang, Son Pham Bao, Eryk Dutkiewicz:
Twin Variational Auto-Encoder for Representation Learning in IoT Intrusion Detection. WCNC 2022: 848-853 - 2021
- [c32]Thi Huong Chu, Quang Uy Nguyen:
Network Anomaly Detection Using Genetic Programming with Semantic Approximation Techniques. RIVF 2021: 1-6 - 2020
- [j6]Ly Vu, Quang Uy Nguyen, Diep N. Nguyen, Dinh Thai Hoang, Eryk Dutkiewicz:
Deep Transfer Learning for IoT Attack Detection. IEEE Access 8: 107335-107344 (2020) - [j5]Quang Uy Nguyen, Thi Huong Chu:
Semantic approximation for reducing code bloat in Genetic Programming. Swarm Evol. Comput. 58: 100729 (2020)
2010 – 2019
- 2019
- [c31]Ly Vu, Van Loi Cao, Quang Uy Nguyen, Diep N. Nguyen, Dinh Thai Hoang, Eryk Dutkiewicz:
Learning Latent Distribution for Distinguishing Network Traffic in Intrusion Detection System. ICC 2019: 1-6 - [c30]Cong Thanh Bui, Van Loi Cao, Minh Hoang, Quang Uy Nguyen:
A Clustering-based Shrink AutoEncoder for Detecting Anomalies in Intrusion Detection Systems. KSE 2019: 1-5 - 2018
- [j4]Thi Huong Chu, Quang Uy Nguyen, Michael O'Neill:
Semantic tournament selection for genetic programming based on statistical analysis of error vectors. Inf. Sci. 436-437: 352-366 (2018) - [c29]Thi Huong Chu, Quang Uy Nguyen, Van Loi Cao:
Semantics Based Substituting Technique for Reducing Code Bloat in Genetic Programming. SoICT 2018: 77-83 - 2017
- [c28]Huy Van Nguyen, Trung Thanh Nguyen, Quang Uy Nguyen:
Sequential ensemble method for unsupervised anomaly detection. KSE 2017: 71-76 - [c27]Ly Vu, Cong Thanh Bui, Quang Uy Nguyen:
A Deep Learning Based Method for Handling Imbalanced Problem in Network Traffic Classification. SoICT 2017: 333-339 - 2016
- [j3]Quang Uy Nguyen, Tuan Anh Pham, Xuan Hoai Nguyen, James McDermott:
Subtree semantic geometric crossover for genetic programming. Genet. Program. Evolvable Mach. 17(1): 25-53 (2016) - [c26]Thi Huong Chu, Quang Uy Nguyen, Michael O'Neill:
Tournament Selection Based on Statistical Test in Genetic Programming. PPSN 2016: 303-312 - [c25]Ly Vu, Dong Van Tra, Quang Uy Nguyen:
Learning from imbalanced data for encrypted traffic identification problem. SoICT 2016: 147-152 - 2015
- [c24]Thi Thu Huong Dinh, Thi Huong Chu, Quang Uy Nguyen:
Transfer learning in Genetic Programming. CEC 2015: 1145-1151 - [c23]Thi Huong Chu, Quang Uy Nguyen:
A new implementation to speed up Genetic Programming. RIVF 2015: 35-40 - [c22]Trung Thanh Nguyen, Anh Tuan Nguyen, Tuan Anh Ha Nguyen, Ly Thi Vu, Quang Uy Nguyen, Long Dao Hai:
Unsupervised Anomaly Detection in Online Game. SoICT 2015: 4-10 - 2014
- [c21]Thi Anh Le, Thi Huong Chu, Quang Uy Nguyen, Xuan Hoai Nguyen:
Malware detection using genetic programming. CISDA 2014: 1-6 - [c20]Truong Son Pham, Quang Uy Nguyen, Xuan Hoai Nguyen:
Generating artificial attack data for intrusion detection using machine learning. SoICT 2014: 286-291 - 2013
- [j2]Nguyen Quang Uy, Nguyen Xuan Hoai, Michael O'Neill, Robert I. McKay, Dao Ngoc Phong:
On the roles of semantic locality of crossover in genetic programming. Inf. Sci. 235: 195-213 (2013) - [c19]Pham Tuan Anh, Quang Uy Nguyen, Xuan Hoai Nguyen, Michael O'Neill:
Examining the Diversity Property of Semantic Similarity Based Crossover. EuroGP 2013: 265-276 - [c18]Quang Uy Nguyen, Truong Cong Doan, Xuan Hoai Nguyen, Michael O'Neill:
Guiding function set selection in genetic programming based on fitness landscape analysis. GECCO (Companion) 2013: 149-150 - [c17]Pham Tuan Anh, Quang Uy Nguyen, Xuan Hoai Nguyen:
Phishing Attacks Detection Using Genetic Programming. KSE (2) 2013: 185-195 - [c16]Dao Ngoc Phong, Nguyen Quang Uy, Nguyen Xuan Hoai, Nguyen Thanh Thuy:
Semantic based crossovers in Tree-Adjoining Grammar Guided Genetic Programming. RIVF 2013: 141-146 - 2012
- [c15]Dao Ngoc Phong, Nguyen Quang Uy, Nguyen Xuan Hoai, Robert I. McKay:
Evolving approximations for the Gaussian Q-function by Genetic Programming with semantic based crossover. IEEE Congress on Evolutionary Computation 2012: 1-6 - [c14]Quang Uy Nguyen, Xuan Hoai Nguyen, Michael O'Neill, Alexandros Agapitos:
An Investigation of Fitness Sharing with Semantic and Syntactic Distance Metrics. EuroGP 2012: 109-120 - [c13]Dao Ngoc Phong, Nguyen Xuan Hoai, Robert Ian (Bob) McKay, Constantin Siriteanu, Nguyen Quang Uy, Namyong Park:
Evolving the best known approximation to the Q function. GECCO 2012: 807-814 - [c12]Nguyen Quang Uy, Pham Tuan Anh, Truong Cong Doan, Nguyen Xuan Hoai:
A Study on the Use of Genetic Programming for Automatic Text Summarization. KSE 2012: 93-98 - [c11]Nguyen Thi Hien, Xuan Hoai Nguyen, Bob McKay, Quang Uy Nguyen:
Where Should We Stop? An Investigation on Early Stopping for GP Learning. SEAL 2012: 391-399 - 2011
- [j1]Nguyen Quang Uy, Nguyen Xuan Hoai, Michael O'Neill, Robert I. McKay, Edgar Galván López:
Semantically-based crossover in genetic programming: application to real-valued symbolic regression. Genet. Program. Evolvable Mach. 12(2): 91-119 (2011) - [c10]Quang Uy Nguyen, Xuan Hoai Nguyen, Michael O'Neill:
Examining the landscape of semantic similarity based mutation. GECCO 2011: 1363-1370 - [c9]Nguyen Quang Uy, Eoin Murphy, Michael O'Neill, Nguyen Xuan Hoai:
Semantic-Based Subtree Crossover Applied to Dynamic Problems. KSE 2011: 78-84 - 2010
- [c8]Nguyen Quang Uy, Bob McKay, Michael O'Neill, Nguyen Xuan Hoai:
Self-adapting semantic sensitivities for Semantic Similarity based Crossover. IEEE Congress on Evolutionary Computation 2010: 1-7 - [c7]Nguyen Quang Uy, Nguyen Thi Hien, Nguyen Xuan Hoai, Michael O'Neill:
Improving the Generalisation Ability of Genetic Programming with Semantic Similarity based Crossover. EuroGP 2010: 184-195 - [c6]Nguyen Quang Uy, Nguyen Xuan Hoai, Michael O'Neill, Bob McKay:
Semantics based crossover for boolean problems. GECCO 2010: 869-876 - [c5]Nguyen Quang Uy, Nguyen Xuan Hoai, Michael O'Neill, Bob McKay:
The Role of Syntactic and Semantic Locality of Crossover in Genetic Programming. PPSN (2) 2010: 533-542
2000 – 2009
- 2009
- [c4]Nguyen Quang Uy, Michael O'Neill, Nguyen Xuan Hoai, Bob McKay, Edgar Galván López:
Semantic Similarity Based Crossover in GP: The Case for Real-Valued Function Regression. Artificial Evolution 2009: 170-181 - [c3]Nguyen Quang Uy, Nguyen Xuan Hoai, Michael O'Neill:
Semantic Aware Crossover for Genetic Programming: The Case for Real-Valued Function Regression. EuroGP 2009: 292-302 - 2007
- [c2]Nguyen Quang Uy, Nguyen Xuan Hoai, Robert I. McKay, Pham Minh Tuan:
Initialising PSO with randomised low-discrepancy sequences: the comparative results. IEEE Congress on Evolutionary Computation 2007: 1985-1992 - [c1]Xuan Hoai Nguyen, Quang Uy Nguyen, Robert I. McKay:
PSO with randomized low-discrepancy sequences. GECCO 2007: 173
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint