default search action
Uyen Trang Nguyen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Shahram Ghahremani, Uyen Trang Nguyen:
Comprehensive evaluation of privacy policies using the contextual integrity framework. Secur. Priv. 7(4) (2024) - [c47]Arghya Kundu, Uyen Trang Nguyen:
Automated Fact Checking Using A Knowledge Graph-based Model. ICAIIC 2024: 709-716 - 2023
- [j24]Shahram Ghahremani, Amir Jalaly Bidgoly, Uyen Trang Nguyen, David K. Y. Yau:
A Novel Semi-Supervised Adversarially Learned Meta-Classifier for Detecting Neural Trojan Attacks. IEEE Access 11: 138303-138315 (2023) - [j23]Feng Wei, Uyen Trang Nguyen:
Twitter Bot Detection Using Neural Networks and Linguistic Embeddings. IEEE Open J. Comput. Soc. 4: 218-230 (2023) - [c46]Arghya Kundu, Uyen Trang Nguyen:
PyTPU: Migration of Python Code for Heterogenous Acceleration with Automated Test Generation. BCD 2023: 208-215 - [c45]Arghya Kundu, Uyen Trang Nguyen:
A Large-scale Non-standard English Database and Transformer-based Translation System. TrustCom 2023: 2472-2479 - 2022
- [j22]Feng Wei, Uyen Trang Nguyen:
An Attention-Based Neural Network Using Human Semantic Knowledge and Its Application to Clickbait Detection. IEEE Open J. Comput. Soc. 3: 217-232 (2022) - [c44]Jia Ying Ou, Uyen Trang Nguyen, Tayzoon Ismail:
COVMIS: A Dataset for Research on COVID-19 Misinformation. DSIT 2022: 1-11 - [c43]Seyed Saeed Khodaparast, Xiao Lu, Ping Wang, Uyen Trang Nguyen:
Deep Reinforcement Learning Based Data Collection in IoT Networks. WCNC 2022: 818-823 - [i9]Reza Soltani, Uyen Trang Nguyen, Aijun An:
Data Capsule: A Self-Contained Data Model as an Access Policy Enforcement Strategy. CoRR abs/2202.07844 (2022) - 2021
- [j21]Reza Soltani, Uyen Trang Nguyen, Aijun An:
A Survey of Self-Sovereign Identity Ecosystem. Secur. Commun. Networks 2021: 8873429:1-8873429:26 (2021) - [j20]Hazem Ibrahim, Hina Tabassum, Uyen Trang Nguyen:
Exact Coverage Analysis of Intelligent Reflecting Surfaces With Nakagami-M Channels. IEEE Trans. Veh. Technol. 70(1): 1072-1076 (2021) - [c42]Reza Soltani, Uyen Trang Nguyen, Aijun An:
Data Capsule: A Self-Contained Data Model as an Access Policy Enforcement Strategy. BRAINS 2021: 93-96 - [i8]Hazem Ibrahim, Hina Tabassum, Uyen Trang Nguyen:
Exact Coverage Analysis of Intelligent Reflecting Surfaces with Nakagami-{m} Channels. CoRR abs/2101.00740 (2021) - [i7]Reza Soltani, Uyen Trang Nguyen, Aijun An:
A Survey of Self-Sovereign Identity Ecosystem. CoRR abs/2111.02003 (2021) - 2020
- [j19]Hazem Ibrahim, Hina Tabassum, Uyen Trang Nguyen:
The Meta Distributions of the SIR/SNR and Data Rate in Coexisting Sub-6GHz and Millimeter-Wave Cellular Networks. IEEE Open J. Commun. Soc. 1: 1213-1229 (2020) - [c41]Feng Wei, Uyen Trang Nguyen:
Stock Trend Prediction using Financial Market News and BERT. KDIR 2020: 325-332 - [c40]Mohammad Reza Faghani, Uyen Trang Nguyen:
Unmasking Magnet, a Novel Malware on Facebook. ISNCC 2020: 1-4 - [c39]Reza Soltani, Uyen Trang Nguyen, Aijun An:
Decentralized and Privacy-Preserving Key Management Model. ISNCC 2020: 1-7 - [c38]Feng Wei, Uyen Trang Nguyen:
A Lightweight Deep Neural Model for SMS Spam Detection. ISNCC 2020: 1-6 - [c37]Feng Wei, Uyen Trang Nguyen:
A Neural Attentive Model Using Human Semantic Knowledge for Clickbait Detection. ISPA/BDCloud/SocialCom/SustainCom 2020: 770-776 - [i6]Feng Wei, Uyen Trang Nguyen:
Twitter Bot Detection Using Bidirectional Long Short-term Memory Neural Networks and Word Embeddings. CoRR abs/2002.01336 (2020)
2010 – 2019
- 2019
- [j18]Mohammad Reza Faghani, Uyen Trang Nguyen:
Mobile botnets meet social networks: design and analysis of a new type of botnet. Int. J. Inf. Sec. 18(4): 423-449 (2019) - [j17]Hazem Ibrahim, Wei Bao, Uyen Trang Nguyen:
Data Rate Utility Analysis for Uplink Two-Hop Internet of Things Networks. IEEE Internet Things J. 6(2): 3601-3619 (2019) - [c36]Reza Soltani, Uyen Trang Nguyen, Aijun An:
Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets. DASC/PiCom/DataCom/CyberSciTech 2019: 320-325 - [c35]Feng Wei, Uyen Trang Nguyen, Hui Jiang:
Dual-FOFE-net Neural Models for Entity Linking with PageRank. ICANN (Workshop) 2019: 635-645 - [c34]Hazem Ibrahim, Hina Tabassum, Uyen Trang Nguyen:
Meta Distribution of SIR in Dual-Hop Internet-of-Things (IoT) Networks. ICC 2019: 1-7 - [c33]Feng Wei, Uyen Trang Nguyen:
Twitter Bot Detection Using Bidirectional Long Short-Term Memory Neural Networks and Word Embeddings. TPS-ISA 2019: 101-109 - [i5]Hazem Ibrahim, Hina Tabassum, Uyen Trang Nguyen:
The Meta Distributions of the SIR/SNR and Data Rate in Coexisting Sub-6GHz and Millimeter-wave Cellular Networks. CoRR abs/1905.12002 (2019) - [i4]Feng Wei, Uyen Trang Nguyen, Hui Jiang:
Dual-FOFE-net Neural Models for Entity Linking with PageRank. CoRR abs/1907.12697 (2019) - 2018
- [j16]Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Atsuko Miyaji, Uyen Trang Nguyen:
SupAUTH: A new approach to supply chain authentication for the IoT. Comput. Intell. 34(2): 582-602 (2018) - [c32]Reza Soltani, Uyen Trang Nguyen, Aijun An:
A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger. iThings/GreenCom/CPSCom/SmartData 2018: 1129-1136 - [c31]Junlin Chen, Uyen Trang Nguyen:
A Robust Protocol for Circumventing Censoring Firewalls. iThings/GreenCom/CPSCom/SmartData 2018: 1798-1805 - [i3]Diem Truong, Duc-Thuan Vo, Uyen Trang Nguyen:
Vietnamese Open Information Extraction. CoRR abs/1801.07804 (2018) - 2017
- [c30]Diem Truong, Duc-Thuan Vo, Uyen Trang Nguyen:
Vietnamese Open Information Extraction. SoICT 2017: 135-142 - [i2]Mohammad Reza Faghani, Uyen Trang Nguyen:
Modeling the Propagation of Trojan Malware in Online Social Networks. CoRR abs/1708.00969 (2017) - 2016
- [j15]Hazem Ibrahim, Hesham ElSawy, Uyen Trang Nguyen, Mohamed-Slim Alouini:
Mobility-Aware Modeling and Analysis of Dense Cellular Networks With C -Plane/ U -Plane Split Architecture. IEEE Trans. Commun. 64(11): 4879-4894 (2016) - [c29]Alireza Moghaddam, Uyen Trang Nguyen:
Evaluation of channel switching overhead for multicast communications in wireless mesh networks. UEMCON 2016: 1-7 - [c28]Reza Soltani, Uyen Trang Nguyen, Yang Yang, Mohammad Reza Faghani, Alaa Yagoub, Aijun An:
A new algorithm for money laundering detection based on structural similarity. UEMCON 2016: 1-7 - [i1]Hazem Ibrahim, Hesham ElSawy, Uyen Trang Nguyen, Mohamed-Slim Alouini:
Mobility-Aware Modeling and Analysis of Dense Cellular Networks with C-plane/U-plane Split Architecture. CoRR abs/1607.06439 (2016) - 2015
- [j14]Seungmin Rho, J. Wenny Rahayu, Uyen Trang Nguyen:
Advanced Issues on Topic Detection, Tracking, and Trend Analysis for Social Multimedia. Adv. Multim. 2015: 709646:1-709646:2 (2015) - [j13]Neil Y. Yen, Uyen Trang Nguyen, Jong Hyuk Park:
Mining Social Media for Knowledge Discovery. Comput. J. 58(9): 1859-1860 (2015) - [j12]Seungmin Rho, J. Wenny Rahayu, Uyen Trang Nguyen:
Intelligent video surveillance in crowded scenes. Inf. Fusion 24: 1-2 (2015) - [j11]Seungmin Rho, J. Wenny Rahayu, Uyen Trang Nguyen:
New technologies and research trends for smartphone sensing in intelligent multimedia systems. Multim. Syst. 21(1): 1-3 (2015) - [j10]Farzana Yasmeen, Uyen Trang Nguyen, Md. Nurul Huda, Shigeki Yamada, Cristian Borcea:
A Message Transfer Framework for Enhanced Reliability in Delay-Tolerant Networks. Netw. Protoc. Algorithms 7(3): 52-88 (2015) - [c27]Y. Yang, Natalija Vlajic, Uyen Trang Nguyen:
Web bots that mimic human browsing behavior on previously unvisited web-sites: Feasibility study and security implications. CNS 2015: 757-758 - [c26]Yang Yang, Natalija Vlajic, Uyen Trang Nguyen:
Next Generation of Impersonator Bots: Mimicking Human Browsing on Previously Unvisited Sites. CSCloud 2015: 356-361 - [c25]Farzana Yasmeen, Md. Nurul Huda, Uyen Trang Nguyen, Shigeki Yamada, Cristian Borcea:
A framework for extending contact opportunities in Delay-and Disruption-Tolerant Networks. ICC Workshops 2015: 1551-1556 - [c24]Hazem Ibrahim, Hesham ElSawy, Uyen Trang Nguyen, Mohamed-Slim Alouini:
Modeling virtualized downlink cellular networks with ultra-dense small cells. ICC 2015: 5360-5366 - 2014
- [j9]Jongsung Kim, Han-Chieh Chao, Uyen Trang Nguyen:
Recent advanced applications and services for intelligent ubiquitous environments. Electron. Commer. Res. 14(3): 217-221 (2014) - [j8]Changhoon Lee, J. Wenny Rahayu, Uyen Trang Nguyen:
Knowledge management technologies for semantic multimedia services. Multim. Tools Appl. 71(1): 195-198 (2014) - [c23]Mohammad Reza Faghani, Uyen Trang Nguyen:
A study of clickjacking worm propagation in online social networks. IRI 2014: 68-73 - 2013
- [j7]Celia Li, Uyen Trang Nguyen, Hoang Lan Nguyen, Md. Nurul Huda:
Efficient authentication for fast handover in wireless mesh networks. Comput. Secur. 37: 124-142 (2013) - [j6]Seungmin Rho, J. Wenny Rahayu, Uyen Trang Nguyen:
Introduction to the special issue on advances in the convergence of multimedia, communications, and social web technology. New Rev. Hypermedia Multim. 19(3-4): 213-216 (2013) - [j5]Mohammad Reza Faghani, Uyen Trang Nguyen:
A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks. IEEE Trans. Inf. Forensics Secur. 8(11): 1815-1826 (2013) - [p1]Mohammad Reza Faghani, Uyen Trang Nguyen:
A Study of Malware Propagation via Online Social Networking. Mining Social Networks and Security Informatics 2013: 243-265 - 2012
- [c22]Mohammad Reza Faghani, Uyen Trang Nguyen:
Socellbot: A new botnet design to infect smartphones via online social networking. CCECE 2012: 1-5 - [c21]Hoang Lan Nguyen, Uyen Trang Nguyen:
A study of different types of attacks in mobile ad hoc networks. CCECE 2012: 1-6 - [c20]Hoang Lan Nguyen, Uyen Trang Nguyen:
Performance evaluation of network-coded multicast in multi-channel multi-radio wireless mesh networks. ICC 2012: 664-670 - [c19]Celia Li, Uyen Trang Nguyen:
Efficient Group Key Management in Wireless LANs. MUSIC 2012: 101-108 - [c18]Yi Zheng, Uyen Trang Nguyen, Hoang Lan Nguyen:
Data Overhead Impact of Multipath Routing for Multicast in Wireless Mesh Networks. MUSIC 2012: 154-157 - [c17]Inna Kofman, Uyen Trang Nguyen, Hoang Lan Nguyen:
A Node Control Model for the Charging and Accounting Problem in MANETs. MUSIC 2012: 188-194 - [c16]Hoang Lan Nguyen, Uyen Trang Nguyen:
Performance modeling of multicast with network coding in multi-channel multi-radio wireless mesh networks. WOWMOM 2012: 1-9 - [c15]Natalija Vlajic, Maria Angel Marquez Andrade, Uyen Trang Nguyen:
The Role of DNS TTL Values in Potential DDoS Attacks: What Do the Major Banks Know About It? ANT/MobiWIS 2012: 466-473 - 2011
- [c14]Mohammad Reza Faghani, Uyen Trang Nguyen:
Incident-driven routing in wireless sensor networks, a cross-layer approach. CollaborateCom 2011: 402-406 - [c13]Hoang Lan Nguyen, Uyen Trang Nguyen:
Algorithms for bandwidth efficient multicast routing in multi-channel multi-radio wireless mesh networks. WCNC 2011: 1107-1112 - [c12]Celia Li, Uyen Trang Nguyen:
Fast authentication for mobility support in wireless mesh networks. WCNC 2011: 1185-1190 - 2010
- [c11]Celia Li, Uyen Trang Nguyen:
Fast authentication for mobile clients in wireless mesh networks. CCECE 2010: 1-8 - [c10]Hoang Lan Nguyen, Uyen Trang Nguyen:
High-Performance Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks. GLOBECOM 2010: 1-6
2000 – 2009
- 2009
- [j4]Hoang Lan Nguyen, Uyen Trang Nguyen:
Channel assignment for multicast in multi-channel multi-radio wireless mesh networks. Wirel. Commun. Mob. Comput. 9(4): 557-571 (2009) - [c9]Hoang Lan Nguyen, Uyen Trang Nguyen:
Bandwidth efficient multicast routing in multi-channel multi-radio wireless mesh networks. ICUMT 2009: 1-8 - 2008
- [j3]Hoang Lan Nguyen, Uyen Trang Nguyen:
A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks 6(1): 32-46 (2008) - [j2]Uyen Trang Nguyen:
On multicast routing in wireless mesh networks. Comput. Commun. 31(7): 1385-1399 (2008) - 2007
- [j1]Uyen Trang Nguyen, Jin Xu:
Multicast Routing in Wireless Mesh Networks: Minimum Cost Trees or Shortest Path Trees? IEEE Commun. Mag. 45(11): 72-77 (2007) - [c8]Celia Li, Uyen Trang Nguyen:
Group key management in wireless mesh networks. QSHINE 2007: 40 - 2006
- [c7]Xing Xiong, Uyen Trang Nguyen, Hoang Lan Nguyen:
Preemptive Multicast Routing in Mobile Ad-hoc Networks. ICN/ICONS/MCL 2006: 68 - [c6]Hoang Lan Nguyen, Uyen Trang Nguyen:
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks. ICN/ICONS/MCL 2006: 149 - [c5]Uyen Trang Nguyen, Amir Asif, Xing Xiong:
Multirate-aware Multicast Routing in MANETs. MASS 2006: 554-557 - [c4]Amir Asif, Uyen Trang Nguyen, Guohua Xu:
Scalable Video Multicast over MANETs. MMSP 2006: 403-408 - 2005
- [c3]Amir Asif, Uyen Trang Nguyen, Guohua Xu, Bin Song:
Streaming video with bandwidth adaptation and error concealment for lowbit rate live wireless applications. ICASSP (2) 2005: 313-316 - [c2]Uyen Trang Nguyen, Xing Xiong:
Rate-adaptive multicast in mobile ad-hoc networks. WiMob (3) 2005: 352-360 - 2004
- [c1]Uyen Trang Nguyen:
Evaluation of flow control algorithms for ABR multipoint services. ISCC 2004: 1077-1084 - 2003
- [b1]Uyen Trang Nguyen:
Congestion control for multipoing communications in ATM networks. University of Toronto, Canada, 2003
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 00:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint