Son Thanh Nguyen

According to our database1, Son Thanh Nguyen authored at least 17 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Agile robotic inspection of steel structures: A bicycle-like approach with multisensor integration.
J. Field Robotics, March, 2024

2022
A Robust and Reliable Climbing Robot for Steel Structure Inspection.
Proceedings of the IEEE/SICE International Symposium on System Integration, 2022

Design of A High Strength Multi-Steering Climbing Robot for Steel Bridge Inspection.
Proceedings of the IEEE/SICE International Symposium on System Integration, 2022

Multi-directional Bicycle Robot for Bridge Inspection with Steel Defect Detection System.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2022

An Agile Bicycle-like Robot for Complex Steel Structure Inspection.
Proceedings of the 2022 International Conference on Robotics and Automation, 2022

2021
A Climbing Robot for Steel Bridge Inspection.
J. Intell. Robotic Syst., 2021

Multi-directional Bicycle Robot for Steel Structure Inspection.
CoRR, 2021

2020
A Practical Climbing Robot for Steel Bridge Inspection.
Proceedings of the 2020 IEEE International Conference on Robotics and Automation, 2020

2019
Development of a Steel Bridge Climbing Robot.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019

2018
Design and Development of a Flexible Steel Surface Climbing Inspection Robot.
CoRR, 2018

2014
A secure many-to-many routing protocol for wireless sensor and actuator networks.
Secur. Commun. Networks, 2014

2013
Beyond lightning: A survey on security challenges in cloud computing.
Comput. Electr. Eng., 2013

2011
Integer Factorization Using Hadoop.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2009
A shadow zone aware routing protocol for acoustic underwater sensor networks.
IEEE Commun. Lett., 2009

Secure many to many routing for wireless sensor and actuator networks.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

2007
Electronic Payment Scheme Using Identity-Based Cryptography.
Proceedings of the Public Key Infrastructure, 2007

ZigBee Security Using Identity-Based Cryptography.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007


  Loading...