default search action
Hai Thanh Nguyen 0001
Person information
- affiliation: Telenor Research, Trondheim
- affiliation: Gjøvik University College, Norwegian Information Security Laboratory
Other persons with the same name
- Hai Thanh Nguyen (aka: Thanh Hai Nguyen, Nguyen Thanh Hai, Thanh-Hai Nguyen) — disambiguation page
- Hai Thanh Nguyen 0002 — Dongguk University Seoul, Department of Electronic Engineering
- Hai Thanh Nguyen 0003 (aka: Thanh Hai Nguyen 0001, Nguyen Thanh Hai 0001, Thanh-Hai Nguyen 0001) — Can Tho University, College of Information and Communication Technology, Vietnam (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c17]Ilias Kalamaras, Ioannis Xygonakis, Konstantinos Glykos, Sigmund Akselsen, Arne Munch-Ellingsen, Hai Thanh Nguyen, Andreas Jacobsen Lepperod, Kerstin Bach, Konstantinos Votis, Dimitrios Tzovaras:
Visual analytics for exploring air quality data in an AI-enhanced IoT environment. MEDES 2019: 103-110 - [c16]Andreas Jacobsen Lepperød, Hai Thanh Nguyen, Sigmund Akselsen, Leendert Wienhofen, Pinar Öztürk, Weiqing Zhang:
Air Quality Monitor and Forecast in Norway Using NB-IoT and Machine Learning. SmartCity360° 2019: 56-67 - [p1]Heri Ramampiaro, Helge Langseth, Thomas Almenningen, Herman Schistad, Martin Havig, Hai Thanh Nguyen:
New Ideas in Ranking for Personalized Fashion Recommender Systems. Business and Consumer Analytics: New Ideas 2019: 933-961 - 2018
- [j5]Huihuai Qiu, Yun Liu, Guibing Guo, Zhu Sun, Jie Zhang, Hai Thanh Nguyen:
BPRH: Bayesian personalized ranking for heterogeneous implicit feedback. Inf. Sci. 453: 80-98 (2018) - 2017
- [j4]Kristoffer Jensen, Hai Thanh Nguyen, Thanh Van Do, André Årnes:
A big data analytics approach to combat telecommunication vulnerabilities. Clust. Comput. 20(3): 2363-2374 (2017) - 2016
- [c15]Kristoffer Jensen, Thanh Van Do, Hai Thanh Nguyen, André Årnes:
Better Protection of SS7 Networks with Machine Learning. ICITCS 2016: 1-7 - [c14]Simen Steig, André Årnes, Thanh Van Do, Hai Thanh Nguyen:
A Network Based IMSI Catcher Detection. ICITCS 2016: 1-6 - [c13]Hui-Huai Qiu, Guibing Guo, Jie Zhang, Zhu Sun, Hai Thanh Nguyen, Yun Liu:
TBPR: Trinity Preference based Bayesian Personalized Ranking for Multivariate Implicit Feedback. UMAP 2016: 305-306 - 2015
- [j3]Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Álvarez, Katrin Franke:
Combining expert knowledge with automatic feature extraction for reliable web attack detection. Secur. Commun. Networks 8(16): 2750-2767 (2015) - [c12]Øyvind H. Myklatun, Thorstein K. Thorrud, Hai Thanh Nguyen, Helge Langseth, Anders Kofod-Petersen:
Probability-based Approach for Predicting E-commerce Consumer Behaviour Using Sparse Session Data. RecSys Challenge 2015: 5:1-5:4 - [c11]Thanh Van Do, Hai Thanh Nguyen, Nikolov Momchil, Van Thuan Do:
Detecting IMSI-Catcher Using Soft Computing. SCDS 2015: 129-140 - 2014
- [c10]Sergio Pastrana, Carmen Torrano-Gimenez, Hai Thanh Nguyen, Agustín Orfila:
Anomalous Web Payload Detection: Evaluating the Resilience of 1-Grams Based Classifiers. IDC 2014: 195-200 - [c9]Hai Thanh Nguyen, Anders Kofod-Petersen:
Using Multi-armed Bandit to Solve Cold-Start Problems in Recommender Systems at Telco. MIKE 2014: 21-30 - [c8]Hai Thanh Nguyen, Thomas Almenningen, Martin Havig, Herman Schistad, Anders Kofod-Petersen, Helge Langseth, Heri Ramampiaro:
Learning to Rank for Personalised Fashion Recommender Systems via Implicit Feedback. MIKE 2014: 51-61 - [i1]Hai Thanh Nguyen, Jérémie Mary, Philippe Preux:
Cold-start Problems in Recommendation Systems via Contextual-bandit Algorithms. CoRR abs/1405.7544 (2014) - 2013
- [j2]Hai Thanh Nguyen, Carmen Torrano-Gimenez, Gonzalo Álvarez, Katrin Franke, Slobodan Petrovic:
Enhancing the effectiveness of Web Application Firewalls by generic feature selection. Log. J. IGPL 21(4): 560-570 (2013) - 2012
- [b1]Hai Thanh Nguyen:
Reliable Machine Learning Algorithms for Intrusion Detection Systems: Machine Learning for Information Security and Digital Forensics. Norwegian University of Science and Technology, Trondheim, Norway, 2012 - [c7]Hai Thanh Nguyen, Katrin Franke:
Adaptive Intrusion Detection System via online machine learning. HIS 2012: 271-277 - [c6]Peter Ekstrand Berg, Katrin Franke, Hai Thanh Nguyen:
Generic feature selection measure for botnet malware detection. ISDA 2012: 711-717 - [c5]Hai Thanh Nguyen, Katrin Franke:
A General Lp-norm Support Vector Machine via Mixed 0-1 Programming. MLDM 2012: 40-49 - 2011
- [j1]Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic:
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. Int. J. Mob. Comput. Multim. Commun. 3(1): 21-34 (2011) - [c4]Hai Thanh Nguyen, Carmen Torrano-Gimenez, Gonzalo Álvarez, Slobodan Petrovic, Katrin Franke:
Application of the Generic Feature Selection Measure in Detection of Web Attacks. CISIS 2011: 25-32 - [c3]Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic:
A new ensemble-feature-selection framework for intrusion detection. ISDA 2011: 213-218 - 2010
- [c2]Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic:
Towards a Generic Feature-Selection Measure for Intrusion Detection. ICPR 2010: 1529-1532 - [c1]Hai Thanh Nguyen, Slobodan Petrovic, Katrin Franke:
A Comparison of Feature-Selection Methods for Intrusion Detection. MMM-ACNS 2010: 242-255
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint