


default search action
11th SoICT 2022: Hanoi, Vietnam
- The 11th International Symposium on Information and Communication Technology, SoICT 2022, Hanoi, Vietnam, December 1-3, 2022. ACM 2022, ISBN 978-1-4503-9725-4
Track 1: AI Foundation and Big Data
- An Vo
, Tan Ngoc Pham
, Van Bich Nguyen
, Ngoc Hoang Luong
:
Training-Free Multi-Objective and Many-Objective Evolutionary Neural Architecture Search with Synaptic Flow. 1-8 - Luat Le Ba
, Bach Do Viet, Hoang Ha Minh, Giang Pham Hoang:
Optimizing energy generation in short-term hydro unit commitment using efficiency points. 9-14 - Hidetaro Tanaka
, Tomoaki Tanaka
, Ryosuke Higashi
, Tsutomu Sekibe
, Shuichi Takada
, Hironori Nakajo
:
Implementation of a RISC-V SMT Core in an AI processor. 15-22 - Yusuke Kimura
, Takahiro Komamizu
, Kenji Hatano
:
Multi-task Learning-based Text Classification with Subword-Phrase Extraction. 23-30 - The Duy Phan
, Tran Duc Luong
, Nguyen Hoang Quoc An
, Quyen Nguyen Huu
, Nghi Hoang Khoa
, Van-Hau Pham
:
Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware Detectors. 31-38 - Thai Bao Tran
, Ngoc Hoang Luong
:
Benchmarking Gradient Estimation Mechanisms in Evolution Strategies for Solving Black-Box Optimization Functions and Reinforcement Learning Problems. 39-46 - Anh Son Ta
, Ngoc Bach Pham
:
Solving resource forecasting in WiFi Network by NeuralProphet. 47-51 - Kenji Fukumoto
, Risa Takeuchi
, Akiyo Nadamoto
:
Method for Evaluating Quality of Automatically Generated Product Descriptions. 52-58 - Asad Masood Khattak
, Adil Khan
:
Cross-Location Activity Recognition using Adversarial Learning. 59-65 - Khoa Nguyen
, Nghia Vu
, Dung Nguyen
, Khoat Than
:
Random Generative Adversarial Networks. 66-73 - Taehoon Kim
, Yijun Duan
, Kyoung-Sook Kim
:
A Shape of Geo-tagged Media Bias in COVID-19 Related Twitter. 74-81 - Anton Agafonov
, Andrew Ponomarev
:
An Experiment on Localization of Ontology Concepts in Deep Convolutional Neural Networks. 82-87 - Futo Yamamoto
, Tadahiko Kumamoto
, Yu Suzuki
, Akiyo Nadamoto
:
Methods of Calculating Usefulness Ratings of Behavioral Facilitation Tweets in Disaster Situations. 88-95 - Linh Trinh
, Bach Ha
:
An incorporation of deep temporal convolutional networks with hidden markov models post-processing for sensor-based human activity recognition. 96-102 - Thu Hang Phung
, Duc Long Nguyen
, Viet Hung Vu
, Thanh Trung Huynh
, Thanh Hung Nguyen
, Phi Le Nguyen
:
Unsupervised Air Quality Interpolation with Attentive Graph Neural Network. 103-110 - Kazuhiro Ito
, Taichi Murayama
, Shuntaro Yada
, Shoko Wakamiya
, Eiji Aramaki
:
Identifying A Target Scope of Complaints on Social Media. 111-118 - Van Duc Khuat
, Tuan Anh Tran
, Minh Tuan Nguyen
, Hai-Chau Le
:
A Study on Machine Learning Based Gene Selection for Pediatric Sepsis Classification. 119-125 - Nguyen Thi My Binh
, Dao Hoang Long
, Nguyen Ngoc
, Huynh Thi Thanh Binh
, Nguyen Khanh Phuong
:
Investigate Evolutionary Strategies for Black-box Attacks to Deepfake Forensic Systems. 126-133
Track 2: Network Communication and Security
- Nguyen Bac Trinh
, The Duy Phan
, Van-Hau Pham
:
Leveraging Deep Learning Image Classifiers for Visual Similarity-based Phishing Website Detection. 134-141 - Do Thi Thu Hien
, The Duy Phan
, Hao Le Anh
, Lan Nguyen Duy
, Nghi Hoang Khoa
, Van-Hau Pham
:
A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation. 142-149 - Nam-Thang Hoang
, Cong-Son Duong
, Tran-Le-Tuan Nguyen
, Van Tong
, Hai Anh Tran
:
Knowledge-defined Heterogeneous Network: Use-case of QoS-based Server and Route Selection in Large-scale Network. 150-157 - Khanh Nguyen Quoc
, Tung Bui
, Dong Le
, Duc Tran
, Toan Nguyen
, Huu Trung Nguyen Nguyen
:
Detecting DGA Botnet based on Malware Behavior Analysis. 158-164 - Thi-Huong-Giang Vu
, Trung-Hieu Hoang
, Manh-Tuan Nguyen
:
Assessing web security risks using dynamic Bayesian network. 165-172 - Tu Nguyen
, Tri Do
, Khanh Le
, Seungkyu Go
, Sunghyun Na
, Dukyun Kim
, Duc Tran
:
An LSTM-based Approach for Predicting Resource Utilization in Cloud Computing. 173-179 - Thi-Mien Nguyen
, Linh T. Nguyen
, Khac-Tuan Nguyen
, Hai-Chau Le
:
Performance Analysis of Short-Packet Communications in Multi-RIS-based Uplink Systems. 180-185 - Thanh Nguyen Tien
, Khanh-Van Nguyen
:
Decision graph for timely delivery of multi-AGVs in healthcare environment. 186-192 - Minh Hai Vu
, Giang T. T. Nguyen
, Hai Dang Tran
, Thanh Trung Nguyen
, Phan-Thuan Do
, Phi Le Nguyen
, Kien Nguyen
:
An Empirical Study of MPQUIC Schedulers in Mobile Wireless Networks. 193-200 - Papa Bara Diakhate
, Tran-Tuan Chu
, Mohamed Aymen Labiod
, Brice Augustin
, Hai Anh Tran
, Abdelhamid Mellouk
:
Experimental Evaluation of Multiple Multipath Schedulers over Various Urban Mobile Environments. 201-207 - Hoang V. Vo
, Duong H. Nguyen
, Tuyen T. Nguyen
, Hoa Ngoc Nguyen
, Duan V. Nguyen
:
Leveraging AI-Driven Realtime Intrusion Detection by Using WGAN and XGBoost. 208-215
Track 3: Image and Natural Language Processing
- Cong-Phuoc Phan
, Jung-Hsien Chiang
:
COVID-19 Deep Clustering: An Ontology construction clustering method with dynamic medical labeling. 216-222 - Minh-Hieu Huynh
, Bao Bui-Xuan
, Minh-Triet Tran
:
Sports Visual Data Analysis with Deep Vision. 223-230 - Anh Duc Nguyen
, Dat Trong Nguyen
, Hanh Phuong Du
, Hai Nam Dao Ngoc
, Hoa Ngoc Nguyen
:
EnsFace: An Ensemble Method of Deep Convolutional Neural Networks with Novel Effective Loss Functions for Face Recognition. 231-238 - Quang-Tien Pham
, Duc-Anh Nguyen
, Tien-Thanh Nguyen
, Thanh Nam Nguyen
, Duy-Tung Nguyen
, Dinh-Tan Pham
, Thanh-Hai Tran
, Thi-Lan Le
, Hai Vu
:
A study on skeleton-based action recognition and its application to physical exercise recognition. 239-246 - Nhu Khoa Nguyen
, Emanuela Boros
, Gaël Lejeune
, Antoine Doucet
, Thierry Delahaut
:
Utilizing Keywords Evolution in Context for Emerging Trend Detection in Scientific Publications. 247-253 - Hai Vu
, Cong Nguyen Xuan
, Minh Nghia Le
, Duc Anh Nguyen
, Viet Hang Dao
:
A robust and high-performance neural network for classifying landmarks in upper gastrointestinal endoscopy images. 254-261 - Anh Le
, Quang Uy Nguyen
, Ngoc Tran Nguyen
, Hai-Hong Phan
, Thi Huong Chu
:
An integration of Pseudo Anomalies and Memory Augmented Autoencoder for Video Anomaly Detection. 262-269 - Quang Tien Duong
, Duc Huy Nguyen
, Bao Thang Ta
, Nhat Minh Le
, Van Hai Do
:
Improving Self-supervised Audio Representation based on Contrastive Learning with Conformer Encoder. 270-275 - Hanh Pham Van
, Huong Le Thanh
:
Improving Khmer-Vietnamese Machine Translation with Data Augmentation methods. 276-282 - Namal Rathnayake
, Tuan Linh Dang
, Yukinobu Hoshino
:
Designing and Implementation of Novel Ensemble model based on ANFIS and Gradient Boosting methods for Hand Gestures Classification. 283-289 - Huu Hiep Nguyen
, Ngoc Dung Nguyen
, Khac-Hoai Nam Bui
:
Intent Detection and Slot Filling with Low Resource and Domain. 290-294 - Anna Scius-Bertrand
, Andreas Fischer
, Marc Bui
:
Retrieving Keywords in Historical Vietnamese Stele Images Without Human Annotations. 295-301 - Tri Le
, Nham Huynh-Duc
, Chung Thai Nguyen
, Minh-Triet Tran
:
Motion Embedded Image: A combination of spatial and temporal features for action recognition. 302-308 - Tuan Linh Dang
, Sy Dat Tran
, Thuy Ha Hoang
, Trong Nghia Nguyen
, Tuan Minh Vu
:
Prototype of a parking system with path recommendation. 309-316 - Thuong Nguyen Canh
, Trinh Van Chien
, Quyet Bui Van
:
Error Resilient Deep Compressive Sensing. 317-321 - Sang Dinh Viet
, Quang Do Duy
:
Incremental Boundary Refinement using Self Axial Reverse Attention and Uncertainty-aware Gate for Colon Polyp Segmentation. 322-328 - Cong Tran
, Khanh Nguyen Trong
, Cuong Pham
, Dat Tran-Anh
, Tien Nguyen-Thi-Tan
:
Improving text recognition by combining visual and linguistic features of text. 329-335
Track 4: Software Engineering and Digital Technology Trends
- Nhat-Hoa Tran
:
Model Checking Techniques Enable Schedulability Analysis of Real-Time Systems. 336-343 - Duc Minh Le
, Anh Phuong Nguyen
, Linh Quang Tran
, Hong Thi Le
, Hai Van-Anh Tong
:
Generating Multi-platform Single Page Applications: A Hierarchical Domain-Driven Design Approach. 344-351 - Anh T. V. Nguyen
, Mizuhito Ogawa
:
Automatic Stub Generation for Dynamic Symbolic Execution of ARM binary. 352-359 - Anh Ho
, Nguyen Nhat Hai
, Bui Thi Mai Anh
:
Combining Deep Learning and Kernel PCA for Software Defect Prediction. 360-367 - Binh Nguyen Thanh, Minh Nguyen N. H., Hanh Le Thi My, Binh Nguyen Thanh:
ml-Codesmell: A code smell prediction dataset for machine learning approaches. 368-374 - Thi-Thu-Trang Do
, Thai-Bao Mai-Hoang
, Van-Quyet Nguyen
, Quyet-Thang Huynh
:
Query-based Performance Comparison of Graph Database and Relational Database. 375-381 - Thi-Huong-Giang Vu
, Thi-Hong-Anh Nguyen
:
An improved NSGA-II based-on project scheduling principles for workforce scheduling optimization in warehouse. 382-389 - Van-Quyet Nguyen
, Van-Hau Nguyen
, Minh-Quy Nguyen
, Quyet-Thang Huynh
, Kyungbaek Kim
:
Big Data Knowledge Acquisition Platform for Smart Farming. 390-397 - Le Danh Tai
, Nguyen Van Thanh
, Ta Minh Thanh
:
Blockmarking: Hybrid model of blockchain and watermarking technique for copyright protection. 398-404 - Viet-Bang Pham
, Tuan-Dat Trinh
:
Analysis Model for Decentralized Lending Protocols. 405-412 - Bui Quoc Trung
, Tran Van Tri
, Bui Thi Mai Anh
:
Empirical Analysis of Filter Feature Selection Criteria on Financial Datasets. 413-419 - Ba-Lam Do
, Hoang-Nam Dinh
, Van-Thanh Nguyen
, Manh-Hung Tran
, Thanh-Long Le
, Viet-Thang Nghiem
:
B4E: A System for Creating and Validating Digital Credentials using Remote Signing and Blockchain. 420-426 - Thanh-Chung Dao
, Duc Pham
, Tien-Thao Nguyen
, Ba-Lam Do
, Binh Minh Nguyen
:
V-Endpoint: Decentralized Endpoint for Blockchain Applications Based on Spark and Byzantine Consensus. 427-434 - Luyen Ngan Van
, Anh Hoang Tuan
, Duy Phan The
, Tan-Khoa Vo
, Van-Hau Pham
:
A Privacy-Preserving Approach For Building Learning Models in Smart Healthcare using Blockchain and Federated Learning. 435-441 - Phuong N. H. Pham, Quy T. N. Co, Anh N. Su, Phuong T. Pham, Canh V. Pham, Václav Snásel:
k-Submodular Cover Problem: Application and Algorithms. 442-449

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
