default search action
Tran Hoang Hai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Binh Minh Nguyen, Thieu Nguyen, Quoc-Hien Vu, Tran Huy Hung, Tran Hoang Hai, Huynh Thi Thanh Binh, Van-Dang Tran:
Dholes Hunting - A Multi-Local Search Algorithm Using Gradient Approximation and Its Application for Blockchain Consensus Problem. IEEE Access 12: 93333-93349 (2024) - [j9]Dinh-Minh Vu, Thi Ha La, Nguyen Gia Bach, Eui-Nam Huh, Hoang-Hai Tran:
Enhancing network attack detection across infrastructures: An automatic labeling method and deep learning model with an attention mechanism. IET Commun. 18(17): 1107-1125 (2024) - 2023
- [j8]Tran Hoang Hai, Vu Van Thieu, Tran Thai Duong, Hong Hoa Nguyen, Eui-Nam Huh:
A Proposed New Endpoint Detection and Response With Image-Based Malware Detection System. IEEE Access 11: 122859-122875 (2023) - [c13]Le Nguyet, Tran Hoang Hai:
Evaluation of Deep CNN-BiLSTM Model on Diverse Datasets. ACOMPA 2023: 13-18 - [c12]Hoang-Hai Tran, Thi Ha La, Vu Van Thieu, Vu Dinh Minh:
Deep Inductive Transfer Learning Approach for Network Attacks Detection. ACOMPA 2023: 64-69 - [c11]Do Bao Son, Hiep Khac Vo, Ta Huu Binh, Tran Hoang Hai, Binh Minh Nguyen, Huynh Thi Thanh Binh:
Reinforcement-Learning-Based Deadline Constrained Task Offloading Schema for Energy Saving in Vehicular Edge Computing System. IJCNN 2023: 1-8 - 2022
- [j7]Vu Van Thieu, Nguyen The Anh, Tran Hoang Hai:
A Variational Information Bottleneck Method for Network Intrusion Detection. J. Commun. 17(11): 933-940 (2022) - [j6]Tran Trong Khanh, Tran Hoang Hai, Md. Delowar Hossain, Eui-Nam Huh:
Fuzzy-Assisted Mobile Edge Orchestrator and SARSA Learning for Flexible Offloading in Heterogeneous IoT Environment. Sensors 22(13): 4727 (2022) - 2021
- [j5]Nguyen Gia Bach, Le Huy Hoang, Tran Hoang Hai:
Improvement of K-nearest Neighbors (KNN) Algorithm for Network Intrusion Detection Using Shannon-Entropy. J. Commun. 16(8): 347-354 (2021) - [c10]Nguyen The Anh, Le Huy Hoang, Vu Dinh Minh, Tran Hoang Hai:
BKIDset - A New Intrusion Detection Dataset To Mitigate The Class Imbalance Problem. ACOMP 2021: 106-111 - 2020
- [c9]Tran Trong Khanh, Tran Hoang Hai, Vandung Nguyen, Tri D. T. Nguyen, Ngo Thien Thu, Eui-Nam Huh:
The Practice of Cloud-based Navigation System for Indoor Robot. IMCOM 2020: 1-4
2010 – 2019
- 2017
- [c8]Tran Hoang Hai, Phuong Nguyen:
A Pricing Model for Sharing Cloudlets in Mobile Cloud Computing. ACOMP 2017: 149-153 - 2014
- [j4]Olivier Marcé, Hoang-Hai Tran, Bruno Tuffin:
Double-sided auctions applied to vertical handover for mobility management in wireless networks. J. Netw. Syst. Manag. 22(4): 658-681 (2014) - [c7]Lan Anh Trinh, Nguyen Duc Thang, Hoang-Hai Tran, Tran Cong Hung:
Human extraction from a sequence of depth images using segmentation and foreground detection. SoICT 2014: 178-185 - 2013
- [c6]Nguyen Duc Thang, Nguyen Huynh Minh Tam, Tran Le Giang, Vo Nhut Tuan, Lan Anh Trinh, Hoang-Hai Tran, Vo Van Toi:
State-space modeling based on principal component analysis and oxygenated-deoxygenated correlation to improve near-infrared spectroscopy signals. SoICT 2013: 181-188 - 2012
- [j3]Hoang-Hai Tran, Bruno Tuffin:
Combinatorial double-sided auctions for network bandwidth allocation: a budget-balanced and decentralized approach. Ann. des Télécommunications 67(5-6): 227-240 (2012) - 2011
- [j2]Hoang-Hai Tran, Bruno Tuffin:
Inter-domain pricing: challenges and possible approaches. Int. J. Netw. Manag. 21(3): 223-246 (2011) - 2010
- [j1]Tran Hoang Hai, Eui-nam Huh, Minho Jo:
A lightweight intrusion detection framework for wireless sensor networks. Wirel. Commun. Mob. Comput. 10(4): 559-572 (2010)
2000 – 2009
- 2009
- [c5]Ngo Trong Canh, Phan Tran Ho Truc, Tran Hoang Hai, Le Xuan Hung, Young-Koo Lee, Sungyoung Lee:
Enhanced Group-Based Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge. CCNC 2009: 1-5 - 2008
- [c4]Tran Hoang Hai, Eui-Nam Huh:
Minimizing the Intrusion Detection Modules in Wireless Sensor Networks. ICCSA Workshops 2008: 184-189 - [c3]Tran Hoang Hai, Eui-nam Huh:
Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge. NCA 2008: 325-331 - 2007
- [c2]Tran Hoang Hai, Eui-nam Huh:
Optimal Selection and Activation of Intrusion Detection Agents for Wireless Sensor Networks. FGCN (1) 2007: 350-355 - [c1]Tran Hoang Hai, Faraz Idris Khan, Eui-nam Huh:
Hybrid Intrusion Detection System for Wireless Sensor Networks. ICCSA (2) 2007: 383-396
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint