Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ten simple rules for designing and running a computing minor for bio/chem students., , , , , , , , , and . PLoS Comput. Biol., (2022)Autoencoder based Friendly Jamming., , , and . WCNC, page 1-6. IEEE, (2020)LoRa-MAB: Toward an Intelligent Resource Allocation Approach for LoRaWAN., , , , and . GLOBECOM, page 1-6. IEEE, (2019)Extra-sensing game for malicious primary user emulator attack in cognitive radio network., , , and . EuCNC, page 306-310. IEEE, (2015)Named Entity Recognition for Vietnamese Spoken Texts and Its Application in Smart Mobile Voice Interaction., , , , , and . ACIIDS (1), volume 9621 of Lecture Notes in Computer Science, page 170-180. Springer, (2016)Specialized text classification: an approach to classifying Open Banking transactions., , and . CSIT, page 1-4. IEEE, (2023)Logovit: Local-Global Vision Transformer for Object Re-Identification., , , , , , , , and . ICASSP, page 1-5. IEEE, (2023)Spoofing attack and surveillance game in geo-location database driven spectrum sharing., , and . IET Commun., 13 (1): 74-84 (2019)Mitigating Primary Emulation Attacks in Multi-Channel Cognitive Radio Networks: A Surveillance Game., , , , and . GLOBECOM, page 1-6. IEEE, (2016)Energy Saving Solution for Air Conditioning Systems., , and . FDSE, volume 11814 of Lecture Notes in Computer Science, page 618-628. Springer, (2019)