Le Xuan Hung

Orcid: 0000-0002-1957-8529

According to our database1, Le Xuan Hung authored at least 52 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Vertex-Disjoint Cycles of Different Lengths in Local Tournaments.
Graphs Comb., August, 2023

Outage Probability and Throughput of Mobile Multiantenna UAV-Assisted FD-NOMA Relay System With Imperfect CSI.
IEEE Syst. J., March, 2023

Testing reliability and validity of the Vietnamese version of the eHealth literacy scale (eHEALS) among medical students in Vietnam.
Int. J. Medical Informatics, 2023

2022
Exploiting Multiple RISs and Direct Link for Performance Enhancement of Wireless Systems With Hardware Impairments.
IEEE Trans. Commun., 2022

Vertex-disjoint cycles of different lengths in multipartite tournaments.
Discret. Math., 2022

2021
On the Capacity of Full-Duplex AF/DF Relay System with Energy Harvesting for Vehicle-to-Vehicle Communications.
Wirel. Commun. Mob. Comput., 2021

2015
Identifying Effective Approaches for Dissemination of Clinical Evidence - Correlation Analyses on Promotional Activities and Usage of a Guideline-Driven Interactive Case Simulation Tool in a Statewide HIV-HCV-STD Clinical Education Program.
Proceedings of the MEDINFO 2015: eHealth-enabled Health, 2015

Managing Access Control in Collaborative Processes for Healthcare Applications.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
Evaluation of an Enhanced Role-Based Access Control model to manage information access in collaborative processes for a statewide clinical education program.
J. Biomed. Informatics, 2014

2013
Polarization-based cooperative directional MAC protocol for ad hoc networks.
Ad Hoc Networks, 2013

Assessing the Usage of a Guideline-Driven Interactive Case Simulation Tool for Insomnia Screening and Treatment in an HIV Clinical Education Program.
Proceedings of the MEDINFO 2013, 2013

Correlations between Promotional Activities and Usage of a Guideline-Driven Interactive Case Simulation Tool.
Proceedings of the AMIA 2013, 2013

2012
Distributed Adaptive Scheduling for Finite Horizon in Wireless Ad hoc Networks.
J. Commun., 2012

An enhancement of the Role-Based Access Control model to facilitate information access management in context of team collaboration and workflow.
J. Biomed. Informatics, 2012

Neuroimage Data Sets: Rethinking Privacy Policies.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Development of Guideline-Driven Mobile Applications for Clinical Education and Decision Support with Customization to Individual Patient Cases.
Proceedings of the AMIA 2012, 2012

2011
Towards Smart Homes Using Low Level Sensory Data.
Sensors, 2011

An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare.
J. Networks, 2011

Semi-Markov conditional random fields for accelerometer-based activity recognition.
Appl. Intell., 2011

2010
Activity-oriented access control to ubiquitous hospital information and services.
Inf. Sci., 2010

ADMAC with Integrated Destination Discovery for Ad Hoc Networks.
IEEE Commun. Lett., 2010

Ratio-based Finite Horizon Scheduling in Wireless Ad hoc Networks.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

Public key cryptography-based security scheme for wireless sensor networks in healthcare.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

Secured WSN-integrated cloud computing for u-Life Care.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Performance Evaluation of Quick-Start in Low Latency Networks.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography.
J. Commun. Networks, 2009

SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks.
IEICE Trans. Commun., 2009

Visualizations of human activities in sensor-enabled ubiquitous environments.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Activity-Oriented Access Control for Ubiquitous Environments.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Enhanced Group-Based Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Image-Feature Based Human Identification Protocols on Limited Display Devices.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Activity-based Security Scheme for Ubiquitous Environments.
Proceedings of the 2008 IEEE International Performance, 2008

2007
Activity-based Access Control Model to Hospital Information.
Proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), 2007

A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

Enforcing Access Control Using Risk Assessment.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007


TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Security for Ubiquitous Computing: Problems and Proposed Solutionl.
Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2006), 2006

A Trust Model for Uncertain Interactions in Ubiquitous Environments.
Proceedings of the Intelligence and Security Informatics, 2006

A Trust-Based Security Architecture for Ubiquitous Computing Systems.
Proceedings of the Intelligence and Security Informatics, 2006

A Flexible and Scalable Access Control for Ubiquitous Computing Environments.
Proceedings of the Intelligence and Security Informatics, 2006

An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks.
Proceedings of the Intelligence and Security Informatics, 2006

A Home Firewall Solution for Securing Smart Spaces.
Proceedings of the Intelligence and Security Informatics, 2006

A Trust Model with Dynamic Decision Making for Ubiquitous Environments.
Proceedings of the 14th IEEE International Conference on Networks, 2006

2005
On the Burkard-Hammer condition for hamiltonian split graphs.
Discret. Math., 2005

Minimum-Energy Data Dissemination in Coordination-Based Sensor Networks.
Proceedings of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2005), 2005

A Trust Model for Ubiquitous Systems based on Vectors of Trust Values.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

Influence of F0 on Vietnamese syllable perception.
Proceedings of the INTERSPEECH 2005, 2005

A Key-Exchanging Scheme for Distributed Sensor Networks.
Proceedings of the Intelligence in Communication Systems, 2005

Two Energy-Efficient Routing Algorithms for Wireless Sensor Networks.
Proceedings of the Networking, 2005

2004
Hamilton cycles in split graphs with large minimum degree.
Discuss. Math. Graph Theory, 2004


  Loading...