Thang N. Dinh

Orcid: 0000-0003-4847-8356

According to our database1, Thang N. Dinh authored at least 85 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Detection of Microsleep Events With a Behind-the-Ear Wearable System.
IEEE Trans. Mob. Comput., 2023

Maximizing Key Distribution Capability: An Application in Quantum Cryptography.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023

Benchmarking Chain Strength: An Optimal Approach for Quantum Annealing.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023

Towards Fidelity-Optimal Qubit Mapping on NISQ Computers.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023

Quantum Annealing Approach for Selective Traveling Salesman Problem.
Proceedings of the IEEE International Conference on Communications, 2023

2022
FastHare: Fast Hamiltonian Reduction for Large-scale Quantum Annealing.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2022

SaPHyRa: A Learning Theory Approach to Ranking Nodes in Large Networks.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

Blockchain-based Secure Client Selection in Federated Learning.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

2021
eBP: an ear-worn device for frequent and comfortable blood pressure monitoring.
Commun. ACM, 2021

2020
Smartphone-Based SpO<sub>2</sub> Measurement by Exploiting Wavelengths Separation and Chromophore Compensation.
ACM Trans. Sens. Networks, 2020

Blocking Self-Avoiding Walks Stops Cyber-Epidemics: A Scalable GPU-Based Approach.
IEEE Trans. Knowl. Data Eng., 2020

Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model.
IEEE Trans. Emerg. Top. Comput., 2020

Painometry: wearable and objective quantification system for acute postoperative pain.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

WAKE: a behind-the-ear wearable system for microsleep detection.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

2019
TipTop: (Almost) Exact Solutions for Influence Maximization in Billion-Scale Networks.
IEEE/ACM Trans. Netw., 2019

eBP: Frequent and Comfortable Blood Pressure Monitoring from Inside Human's Ears.
GetMobile Mob. Comput. Commun., 2019

Approximate k-Cover in Hypergraphs: Efficient Algorithms, and Applications.
CoRR, 2019

eBP: A Wearable System For Frequent and Comfortable Blood Pressure Monitoring From User's Ear.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Hop-Based Sketch for Large-Scale Influence Analysis.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

2018
AI and Blockchain: A Disruptive Integration.
Computer, 2018

CapBand: Battery-free Successive Capacitance Sensing Wristband for Hand Gesture Recognition.
Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, SenSys 2018, 2018

TYTH-Typing On Your Teeth: Tongue-Teeth Localization for Human-Computer Interface.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

Adaptive Crawling with Multiple Bots: A Matroid Intersection Approach.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Revisiting of 'Revisiting the Stop-and-Stare Algorithms for Influence Maximization'.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

2017
A Billion-Scale Approximation Algorithm for Maximizing Benefit in Viral Marketing.
IEEE/ACM Trans. Netw., 2017

Social Influence Spectrum at Scale: Near-Optimal Solutions for Multiple Budgets at Once.
ACM Trans. Inf. Syst., 2017

Vulnerability of clustering under node failure in complex networks.
Soc. Netw. Anal. Min., 2017

Outward Influence and Cascade Size Estimation in Billion-scale Networks.
Proc. ACM Meas. Anal. Comput. Syst., 2017

Transitivity Demolition and the Falls of Social Networks.
CoRR, 2017

Towards Optimal Strategy for Adaptive Probing in Incomplete Networks.
CoRR, 2017

Transitivity Demolition and the Fall of Social Networks.
IEEE Access, 2017

ParkSense: Automatic Parking Positioning by Leveraging In-Vehicle Magnetic Field Variation.
IEEE Access, 2017

PhO2: Smartphone based Blood Oxygen Level Measurement Systems using Near-IR and RED Wave-guided Light.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Photometry based Blood Oxygen Estimation through Smartphone Cameras.
Proceedings of the 9th ACM Workshop on Wireless of the Students, 2017

Why approximate when you can get the exact? Optimal targeted viral marketing at scale.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Importance Sketching of Influence Dynamics in Billion-Scale Networks.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

2016
Optimal packet scan against malicious attacks in smart grids.
Theor. Comput. Sci., 2016

Optimal topology of gene-regulatory networks: role of the average shortest path.
EAI Endorsed Trans. Self Adapt. Syst., 2016

Privacy Issues in Light of Reconnaissance Attacks with Incomplete Information.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Stop-and-Stare: Optimal Sampling Algorithms for Viral Marketing in Billion-scale Networks.
Proceedings of the 2016 International Conference on Management of Data, 2016

In-ear Biosignal Recording System: A Wearable For Automatic Whole-night Sleep Staging.
Proceedings of the 2016 Workshop on Wearable Systems and Applications, 2016

Cost-aware Targeted Viral Marketing in billion-scale networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Targeted cyber-attacks: Unveiling target reconnaissance strategy via Social Networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Multiple Infection Sources Identification with Provable Guarantees.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

2015
Network Under Joint Node and Link Attacks: Vulnerability Assessment Methods and Analysis.
IEEE/ACM Trans. Netw., 2015

A near-optimal adaptive algorithm for maximizing modularity in dynamic scale-free networks.
J. Comb. Optim., 2015

Toward Optimal Community Detection: From Trees to General Weighted Networks.
Internet Math., 2015

Unveiling the structure of multi-attributed networks via joint non-negative matrix factorization.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Community detection in multiplex social networks.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Assessing attack vulnerability in networks with uncertainty.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Enhancing Twitter spam accounts discovery using cross-account pattern mining.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Network Clustering via Maximizing Modularity: Approximation Algorithms and Theoretical Limits.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Breaking Bad: Finding Triangle-Breaking Points in Large Networks.
Proceedings of the Computational Social Networks - 4th International Conference, 2015

Social Influence Spectrum with Guarantees: Computing More in Less Time.
Proceedings of the Computational Social Networks - 4th International Conference, 2015

2014
Cost-Effective Viral Marketing for Time-Critical Campaigns in Large-Scale Social Networks.
IEEE/ACM Trans. Netw., 2014

A method to detect communities with stability in social networks.
Soc. Netw. Anal. Min., 2014

Preface.
J. Comb. Optim., 2014

Staying safe and visible via message sharing in online social networks.
J. Comb. Optim., 2014

Bound and exact methods for assessing link vulnerability in complex networks.
J. Comb. Optim., 2014

On the approximability of positive influence dominating set in social networks.
J. Comb. Optim., 2014

Structural Vulnerability Analysis of Overlapping Communities in Complex Networks.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

Optimal Inspection Points for Malicious Attack Detection in Smart Grids.
Proceedings of the Computing and Combinatorics - 20th International Conference, 2014

Optimal Containment of Misinformation in Social Media: A Scenario-Based Approach.
Proceedings of the Combinatorial Optimization and Applications, 2014

2013
On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling.
IEEE Trans. Mob. Comput., 2013

Community Detection in Scale-Free Networks: Approximation Algorithms for Maximizing Modularity.
IEEE J. Sel. Areas Commun., 2013

An adaptive approximation algorithm for community detection in dynamic scale-free networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Least Cost Influence in Multiplex Social Networks: Model Representation and Analysis.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

Maximizing the Spread of Positive Influence in Online Social Networks.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

2012
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation.
IEEE/ACM Trans. Netw., 2012

Adaptive algorithms for detecting critical links and nodes in dynamic networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

An efficient spectral bound for link vulnerability assessment in large-scale networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Cheap, easy, and massively effective viral marketing in social networks: truth or fiction?
Proceedings of the 23rd ACM Conference on Hypertext and Social Media, 2012

Interest-matching information propagation in multiple online social networks.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

The walls have ears: optimize sharing for visibility and privacy in online social networks.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Finding Community Structure with Performance Guarantees in Complex Networks
CoRR, 2011

Overlapping Community Structures and Their Detection on Social Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Finding Community Structure with Performance Guarantees in Scale-Free Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Overlapping communities in dynamic networks: their detection and mobile applications.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

Precise structural vulnerability assessment via mathematical programming.
Proceedings of the MILCOM 2011, 2011

Adaptive algorithms for detecting community structure in dynamic social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
On Approximation of New Optimization Methods for Assessing Network Vulnerability.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Finding Dynamic Modules of Biological Regulatory Networks.
Proceedings of the 10th IEEE International Conference on Bioinformatics and Bioengineering, 2010

2009
On Approximation Algorithms for Interference-Aware Broadcast Scheduling in 2D and 3D Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

Towards social-aware routing in dynamic communication networks.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009


  Loading...