2025
"Secure task offloading and optimization for UAV-assisted NOMA-MEC system with friendly jamming", Physical Communication, 2025, 102707, ISSN 1874-4907
"Automated Framework for Active Directory Security and Compliance through Continuous Monitoring and Attack Path Validation," 2025 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT & NCON), Nan, Thailand, 2025, pp. 287-292, doi: 10.1109/ECTIDAMTNCON64748.2025.10962057.
Secrecy Offloading Analysis of NOMA-based UAV-aided MEC in IoT Networks with Imperfect CSI and SIC. EAI Endorsed Scal Inf Syst [Internet]. 2024 Jul. 23 [cited 2025 Apr. 17];12(1). Available from: https://publications.eai.eu/index.php/sis/article/view/4664
Performance Analysis of an UAV-Assisted, Intelligence of Things: The Third International Conference on Intelligence of Things (ICIT 2024), Da Nang, Vietnam, September 12-14, 2024, Proceedings, Volume 1, Springer Nature.
"Enhancing Cybersecurity Awareness Among Users and Employees: A Practical Approach," 2025 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT & NCON), Nan, Thailand, 2025, pp. 617-622, doi: 10.1109/ECTIDAMTNCON64748.2025.10962024.
"Secure Computation Offloading Analysis for WPT-enabled UAV-assisted MEC Incorporating NOMA with Friendly Jammer in IoT Networks ". Telecommun Syst 88, 98 (2025). https://doi.org/10.1007/s11235-025-01331-w
Energy Outage Analysis for NOMA-Based UAV-MEC with Imperfect CSI and SIC in IoT Network. Computational Intelligence in Engineering Science. ICCIES 2025. Communications in Computer and Information Science, vol 2584. Springer, Cham. https://doi.org/10.1007/978-3-031-98161-6_23
2024
Secrecy Offloading Analysis of NOMA-based UAV-aided MEC in IoT Networks with Imperfect CSI and SIC. EAI Endorsed Transactions on Scalable Information Systems, 11. https://doi.org/10.4108/eetsis.4664
UAV-aided uplink NOMA based on MEC in IoT networks: Secrecy offloading and Optimization. In: Tran, K.P., Li, S., Heuchenne, C., Truong, T.H. (eds) The Seventh International Conference on Safety and Security with IoT. SaSeIoT 2023. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-53028-9_8.
"Detecting Fileless Malware on Windows with ATT&CK: A Practical Approach," 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET, Sydney, Australia, 2024, pp. 1-6, doi: 10.1109/ICECET61485.2024.10698218.
" 2024 28th International Computer Science and Engineering Conference (ICSEC), Khon Kaen, Thailand, 2024, pp. 1-6, doi: 10.1109/ICSEC62781.2024.10770707.
"Secrecy Offloading Analysis of UAV-assisted NOMA-MEC Incorporating WPT in IoT Networks," 2024 28th International Computer Science and Engineering Conference (ICSEC), Khon Kaen, Thailand, 2024, pp. 1-6, doi: 10.1109/ICSEC62781.2024.10770735.
"Deception-Based Proactive Defense Against Ransomware in VMWare ESXI Systems," 2024 Asian Conference on Communication and Networks (ASIANComNet), Bangkok, Thailand, 2024, pp. 1-6, doi: 10.1109/ASIANComNet63184.2024.10811049.
"Performance Analysis of UAV Relay NOMA-MEC in IoT Network: Offloading and Optimization," 2024 Asian Conference on Communication and Networks (ASIANComNet), Bangkok, Thailand, 2024, pp. 1-6, doi: 10.1109/ASIANComNet63184.2024.10811057.
"Offloading Performance for UAV-Aided NOMA-MEC with WPT-Enabled for IoT Networks," 2024 Asian Conference on Communication and Networks (ASIANComNet), Bangkok, Thailand, 2024, pp. 1-6, doi: 10.1109/ASIANComNet63184.2024.10811021.
Secrecy Offloading Analysis for UAV-Assisted NOMA-MEC in IoT Networks with Imperfect CSI. In: Dao, NN., Pham, QD., Cho, S., Nguyen, N.T. (eds) Intelligence of Things: Technologies and Applications. ICIT 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 230. Springer, Cham. https://doi.org/10.1007/978-3-031-75596-5_32
Performance Analysis of an UAV-Assisted NOMA-Based on MEC in IoT Network with Wireless Power Transfer. In: Dao, NN., Pham, QD., Cho, S., Nguyen, N.T. (eds) Intelligence of Things: Technologies and Applications. ICIT 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 229. Springer, Cham. https://doi.org/10.1007/978-3-031-75593-4_3
2023
"RelaHash: Deep Hashing with Relative Position," in IEEE Access, doi: 10.1109/ACCESS.2023.3259104.
"Some Metaheuristics for Tourist Trip Design Problem," 2023 IEEE Symposium on Industrial Electronics & Applications (ISIEA), Kuala Lumpur, Malaysia, 2023, pp. 1-10, doi: 10.1109/ISIEA58478.2023.10212154.
"Teaching Assignment Based on NASH Equilibrium and Genetic Algorithm," 2023 IEEE Symposium on Industrial Electronics & Applications (ISIEA), Kuala Lumpur, Malaysia, 2023, pp. 1-7, doi: 10.1109/ISIEA58478.2023.10212338.
"An University Student Dropout Detector Based on Academic Data," 2023 IEEE Symposium on Industrial Electronics & Applications (ISIEA), Kuala Lumpur, Malaysia, 2023, pp. 1-8, doi: 10.1109/ISIEA58478.2023.10212223.
"Educational Data Mining: A Systematic Review on the Applications of Classical Methods and Deep Learning Until 2022," 2023 IEEE Symposium on Industrial Electronics & Applications (ISIEA), Kuala Lumpur, Malaysia, 2023, pp. 1-15, doi: 10.1109/ISIEA58478.2023.10212273.
2022
Some metaheuristic algorithms for solving multiple cross-functional team selection problems. PeerJ Computer Science 8:e1063 https://doi.org/10.7717/peerj-cs.1063
"Metaheuristic Algorithms Based on Compromise Programming for the Multi-Objective Urban Shipment Problem" Entropy 24, no. 3: 388. https://doi.org/10.3390/e24030388
"Experimental and Computational Approaches for the Classification and Correlation of Temperament (Mizaj) and Uterine Dystemperament (Su’-I-Mizaj Al-Rahim) in Abnormal Vaginal Discharge (Sayalan Al-Rahim) Based on Clinical Analysis Using Support Vector Machine", Complexity, vol. 2022, Article ID 5718501, 16 pages, 2022. https://doi.org/10.1155/2022/5718501
Different Approaches of Evolutionary Algorithms to Multiple Objective RCPSP. In 2022 7th International Conference on Big Data and Computing (ICBDC 2022), May 27-29, 2022, Shenzhen, China. ACM, New York, NY, USA, 14 Pages. https://doi.org/10.1145/3545801.3545810
A Deep Learning Based Application for Recognition and Preventing Sensitive Image. In Proceedings of the 10th International Conference on Computer and Communications Management (ICCCM '22). Association for Computing Machinery, New York, NY, USA, 102–108. https://doi.org/10.1145/3556223.3556239
2021
Introduction to A Compromise Programming-Based Method for Complex Scheduling and Planning Problems. In 2021 4th International Conference on Information Management and Management Science (IMMS 2021). Association for Computing Machinery, New York, NY, USA, 265–272. DOI:https://doi.org/10.1145/3485190.3485231
The Effectiveness of Reference Point Selection Methods for Compromise Programming in Multi-Criteria Learning Path Search Algorithm. In 2021 4th International Conference on Information Management and Management Science (IMMS 2021). Association for Computing Machinery, New York, NY, USA, 296–302. DOI:https://doi.org/10.1145/3485190.3485236
A Compromise Programming to Task Assignment Problem in Software Development Project. CMC-Computers, Materials & Continua, 69(3), 3429–3444.
Genetic Algorithm for Solving Multi-Objective Optimization in Examination Timetabling Problem. International Journal Of Emerging Technologies In Learning (IJET), 16(11), pp. 4-24. doi:http://dx.doi.org/10.3991/ijet.v16i11.21017
Secure and dynamic access control for the Internet of Things (IoT) based traffic system. PeerJ Computer Science 7:e471 https://doi.org/10.7717/peerj-cs.471.
"Meta-Heuristic Algorithms for Learning Path Recommender at MOOC," in IEEE Access, vol. 9, pp. 59093-59107, 2021, doi: 10.1109/ACCESS.2021.3072222.
"Features to Text: A Comprehensive Survey of Deep Learning on Semantic Segmentation and Image Captioning", Complexity, vol. 2021, Article ID 5538927, 19 pages, 2021. https://doi.org/10.1155/2021/5538927
"Transfer Learning and Semisupervised Adversarial Detection and Classification of COVID-19 in CT Images", Complexity, vol. 2021, Article ID 6680455, 11 pages, 2021. https://doi.org/10.1155/2021/6680455
"A Compromise Programming for Multi-Objective Task Assignment Problem" Computers 10, no. 2: 15. https://doi.org/10.3390/computers10020015
FU Covid-19 AI Agent built on Attention algorithm using a combination of Transformer, ALBERT model, and RASA framework. In 2021 10th International Conference on Software and Computer Applications (ICSCA 2021). Association for Computing Machinery, New York, NY, USA, 22–31. DOI:https://doi.org/10.1145/3457784.3457788
Vietnamese sign language detection using Mediapipe. In 2021 10th International Conference on Software and Computer Applications (ICSCA 2021). Association for Computing Machinery, New York, NY, USA, 162–165. DOI:https://doi.org/10.1145/3457784.3457810
A Deep Learning-Based Implementation for Self-Driving Car. In 2021 10th International Conference on Software and Computer Applications (ICSCA 2021). Association for Computing Machinery, New York, NY, USA, 279–287. DOI:https://doi.org/10.1145/3457784.3457827
A Genetic Algorithm for Multi-Objective Optimization in Complex Course Timetabling. In 2021 10th International Conference on Software and Computer Applications (ICSCA 2021). Association for Computing Machinery, New York, NY, USA, 229–237. DOI:https://doi.org/10.1145/3457784.3457821
2020
Mixed-dependency models for multi-resident activity recognition in smart homes. Multimed Tools Appl (2020). https://doi.org/10.1007/s11042-020-09093-0.
"Edges of Interpolating Tetrahedron Based Encryption Algorithm for 3D Printing Model," Journal of Advances in Information Technology, Vol. 11, No. 2, pp. 84-90, May 2020. doi: 10.12720/jait.11.2.84-90
Some Algorithms to Solve a Bi-Objectives Problem for Team Selection. Appl. Sci. 2020, 10, 2700.
Implementing CCTV-Based Attendance Taking Support System Using Deep Face Recognition: A Case Study at FPT Polytechnic College. Symmetry 2020, 12, 307.
"A Hybrid Access Control Model with Dynamic COI for Secure Localization of Satellite and IoT based Vehicles," in IEEE Access. doi: 10.1109/ACCESS.2020.2969715
An Empirical Research on the Effectiveness of Different LSTM Architectures on Vietnamese Stock Market. In 2020 International Conference on Control, Robotics and Intelligent System (CCRIS 2020), October 27-29, 2020, Xiamen, China. ACM, New York, NY, USA, https://doi.org/10.1145/3437802.3437827
An Analysis of the Effectiveness of Emergency Distance Learning under COVID-19. In 2020 International Conference on Control, Robotics and Intelligent System (CCRIS 2020), October 27-29, 2020, Xiamen, China. ACM, New York, NY, USA, https://doi.org/10.1145/3437802.3437826
Deep Learning in Semantic Segmentation of Rust in Images. In Proceedings of the 2020 9th International Conference on Software and Computer Applications (ICSCA 2020). Association for Computing Machinery, New York, NY, USA, 129–132. DOI:https://doi.org/10.1145/3384544.3384606
2019
Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution. Appl. Sci. 2019, 9, 4889.
"On multi-resident activity recognition in ambient smart-homes" Artif Intell Rev (2019). https://doi.org/10.1007/s10462-019-09783-8.
A Computer-Vision Based Application for Student Behavior Monitoring in Classroom. Applied Sciences. 2019; 9(22):4729.
Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model. Symmetry. 2019; 11(5):669.
Probabilistic approaches for music similarity using restricted Boltzmann machines . Neural Comput & Applic (2019). https://doi.org/10.1007/s00521-019-04106-y
"Negative Authorization by Implementing Negative Attributes in Attribute-Based Access Control Model for Internet of Medical Things," 2019 15th International Conference on Semantics, Knowledge and Grids (SKG), Guangzhou, China, 2019, pp. 167-174.
DC Programming and DCA for Power Minimization Problem in Multi-User Beamforming Networks. In Proceedings of the 2019 8th International Conference on Software and Computer Applications (ICSCA '19). ACM, New York, NY, USA, 564-568. DOI: https://doi.org/10.1145/3316615.3316665.
DCA-Based Algorithm for Cross-Functional Team Selection. In Proceedings of the 2019 8th International Conference on Software and Computer Applications (ICSCA '19). ACM, New York, NY, USA, 125-129. DOI: https://doi.org/10.1145/3316615.3316645.
DC programming and DCA for Secure Guarantee with Null Space Beamforming in Two-Way Relay Networks. In Proceedings of the 2019 8th International Conference on Software and Computer Applications (ICSCA '19). ACM, New York, NY, USA, 529-532. DOI: https://doi.org/10.1145/3316615.3316687.
Combination of Facial Recognition and Interaction with Academic Portal in Automatic Attendance System. In Proceedings of the 2019 8th International Conference on Software and Computer Applications (ICSCA '19). ACM, New York, NY, USA, 299-305. DOI: https://doi.org/10.1145/3316615.3316638.
Survey of Hyperledger Blockchain Frameworks: Case Study in FPT University's Cryptocurrency Wallets. In Proceedings of the 2019 8th International Conference on Software and Computer Applications (ICSCA '19). ACM, New York, NY, USA, 472-480. DOI: https://doi.org/10.1145/3316615.3316671.
2018
Learning Sparse Representation from Multiple-source Data for Relative Similarity in Music. In Proceedings of the 2018 International Conference on Computational Intelligence and Intelligent Systems (CIIS 2018). ACM, New York, NY, USA, 1-4. DOI: https://doi.org/10.1145/3293475.3293483.
"An Adjustable Window-Based FIR Filter and Its Application in Audio Signal De-Noising," 2018 3rd International Conference on Robotics and Automation Engineering (ICRAE), Guangzhou, China, 2018, pp. 248-252. doi: 10.1109/ICRAE.2018.8586723.
A decision support tool for cross-functional team selection: case study in ACM-ICPC team selection. In Proceedings of the 2018 International Conference on Information Management & Management Science (IMMS '18). ACM, New York, NY, USA, 133-138. DOI: https://doi.org/10.1145/3277139.3277149.
An analyze on effectiveness of candlestick reversal patterns for Vietnamese stock market. In Proceedings of the 2018 International Conference on Information Management & Management Science (IMMS '18). ACM, New York, NY, USA, 89-93. DOI: https://doi.org/10.1145/3277139.3277161.
Improving Recurrent Neural Networks with Predictive Propagation for Sequence Labelling. In: Cheng L., Leung A., Ozawa S. (eds) Neural Information Processing. ICONIP 2018. Lecture Notes in Computer Science, vol 11301. Springer, Cham.
2017
Combination of Dimensionality Reduction and User Clustering for Collaborative-Filtering. In Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (CSAI 2017). ACM, New York, NY, USA, 125-130. DOI: https://doi.org/10.1145/3168390.3168405.
The Analyzes of Network-on-Chip Architectures Based on NOXIM Simulator. In: Akagi M., Nguyen TT., Vu DT., Phung TN., Huynh VN. (eds) Advances in Information and Communication Technology. ICTA 2016. Advances in Intelligent Systems and Computing, vol 538. Springer, Cham.