default search action
Nguyen Viet Hung
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Tran Ky Vi, Nguyen Dang Quang Huy, Tran Chi Quy, Bui Duc Tinh, Le Minh Thu, Doan Quang Tri, Marek Trippenbach, Nguyen Viet Hung:
A hybrid variational method for beam propagation and interaction in a graded-index nonlinear waveguide. Commun. Nonlinear Sci. Numer. Simul. 137: 108124 (2024) - 2023
- [j5]Nguyen Viet Hung, Trinh Dac Chien, Nam Pham Ngoc, Thu Huong Truong:
Flexible HTTP-based Video Adaptive Streaming for good QoE during sudden bandwidth drops. EAI Endorsed Trans. Ind. Networks Intell. Syst. 10(2): 3 (2023) - 2022
- [j4]Duc V. Nguyen, Nguyen Viet Hung, Nguyen Tien Phong, Truong Thu Huong, Truong Cong Thang:
Scalable Multicast for Live 360-Degree Video Streaming Over Mobile Networks. IEEE Access 10: 38802-38812 (2022) - [c8]Duc V. Nguyen, Nguyen Viet Hung, Truong Thu Huong, Truong Cong Thang:
A Cross-Layer Framework for Multi-user 360-degree Video Streaming over Cellular Networks. ICCE 2022: 1-3 - 2021
- [c7]Andrei Tchernykh, Mikhail G. Babenko, Bernardo Pulido-Gaytan, Egor M. Shiryaev, Elena Golimblevskaia, Arutyun Avetisyan, Nguyen Viet Hung, Jorge M. Cortés-Mendoza:
Cryptographic Primitives Optimization Based on the Concepts of the Residue Number System and Finite Ring Neural Network. OLA 2021: 241-253 - 2020
- [c6]Nguyen Minh Tu, Nguyen Viet Hung, Phan Viet Anh, Cao Van Loi, Nathan Shone:
Detecting Malware Based on Dynamic Analysis Techniques Using Deep Graph Learning. FDSE 2020: 357-378 - [c5]Mikhail G. Babenko, Andrei Tchernykh, Elena Golimblevskaia, Nguyen Viet Hung, Vijay Chaurasiya:
Computationally secure threshold secret sharing scheme with minimal redundancy. ICCS-DE 2020: 23-32
2010 – 2019
- 2019
- [c4]Nguyen Viet Hung, Pham Ngoc Dung, Nguyen Ngoc Tran, Vu Dinh Phai, Qi Shi:
Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network. KSE 2019: 1-5 - [c3]Vu Dinh Phai, Nathan Shone, Phan Huy Dung, Qi Shi, Nguyen Viet Hung, Nguyen Ngoc Tran:
Behaviour-aware Malware Classification: Dynamic Feature Selection. KSE 2019: 1-5 - 2018
- [j3]Krzysztof B. Zegadlo, Nguyen Viet Hung, Aleksandr Ramaniuk, Marek Trippenbach, Boris A. Malomed:
Symmetry Breakings in Dual-Core Systems with Double-Spot Localization of Nonlinearity. Symmetry 10(5): 156 (2018) - [j2]Aleksandr Ramaniuk, Nguyen Viet Hung, Michael Giersig, Krzysztof Kempa, Vladimir V. Konotop, Marek Trippenbach:
Vortex Creation without Stirring in Coupled Ring Resonators with Gain and Loss. Symmetry 10(6): 195 (2018) - 2013
- [j1]Nguyen Khac Minh, Giang Thanh Long, Nguyen Viet Hung:
Efficiency and Super-Efficiency of Commercial banks in Vietnam: Performances and Determinants. Asia Pac. J. Oper. Res. 30(1) (2013)
2000 – 2009
- 2009
- [c2]Nguyen Viet Hung:
Facial Feature Extraction Based on Wavelet Transform. AICI 2009: 330-339 - 2008
- [c1]Pham Xuan Khanh, Nguyen Viet Hung, Pham Tuan Anh:
Design a fuzzy controller based on AVR® MCU and its implementation in controlling DC motor. ICARCV 2008: 1645-1649
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 01:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint