default search action
James H. Nguyen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c18]James H. Nguyen, Weixian Liao, Wei Yu:
Towards Secure Communications in Heterogeneous Internet of Things. ICNC 2023: 426-430 - 2020
- [j10]Hengshuo Liang, Weichao Gao, James H. Nguyen, Mont F. Orpilla, Wei Yu:
Internet of Things Data Collection Using Unmanned Aerial Vehicles in Infrastructure Free Environments. IEEE Access 8: 3932-3944 (2020) - [j9]James H. Nguyen, Wei Yu:
Towards to Inter-domain Network Operations for Dynamic Networks with Software Defined Networking (SDN). EAI Endorsed Trans. Wirel. Spectr. 4(13): e1 (2020) - [j8]Jin Zhang, Yalong Wu, James H. Nguyen, Wei Yu, Chao Lu, Daniel T. Ku:
On Performance Improvement of Centroid Topology Optimization Schemes in LTE Networks. EAI Endorsed Trans. Wirel. Spectr. 4(13): e3 (2020) - [j7]Weichao Gao, James H. Nguyen, Yalong Wu, William G. Hatcher, Wei Yu:
Routing in Large-scale Dynamic Networks: A Bloom Filter-based Dual-layer Scheme. ACM Trans. Internet Techn. 20(4): 38:1-38:24 (2020)
2010 – 2019
- 2019
- [j6]Jarrett Booz, Josh McGiff, William G. Hatcher, Wei Yu, James H. Nguyen, Chao Lu:
Towards Deep Learning-Based Approach for Detecting Android Malware. Int. J. Softw. Innov. 7(4): 1-24 (2019) - [c17]Fan Liang, William Grant Hatcher, Guobin Xu, James H. Nguyen, Weixian Liao, Wei Yu:
Towards Online Deep Learning-Based Energy Forecasting. ICCCN 2019: 1-9 - [c16]Josh McGiff, William G. Hatcher, James H. Nguyen, Wei Yu, Erik Blasch, Chao Lu:
Towards Multimodal Learning for Android Malware Detection. ICNC 2019: 432-436 - [c15]James H. Nguyen, Yalong Wu, Jin Zhang, Wei Yu, Chao Lu:
Real-Time Data Transport Scheduling for Edge/Cloud-Based Internet of Things. ICNC 2019: 642-646 - 2018
- [j5]Wei Yu, Hansong Xu, James H. Nguyen, Erik Blasch, Amirshahram Hematian, Weichao Gao:
Survey of Public Safety Communications: User-Side and Network-Side Solutions and Future Directions. IEEE Access 6: 70397-70425 (2018) - [j4]Zhijiang Chen, Sixiao Wei, Wei Yu, James H. Nguyen, William G. Hatcher:
A cloud/edge computing streaming system for network traffic monitoring and threat detection. Int. J. Secur. Networks 13(3): 169-186 (2018) - [c14]James H. Nguyen, Wei Yu, Daniel T. Ku:
Reliable Transport for Mobile Ad Hoc Networks with Constrained Application Protocol (CoAP) over Negative-Acknowledgment Oriented Reliable Multicast (NORM). ICNC 2018: 361-366 - [c13]Fan Liang, James H. Nguyen, Weichao Gao, William G. Hatcher, Wei Yu:
Towards UAV Assisted Multi-Path Data Streaming in Mobile Ad-Hoc Networks. ICNC 2018: 599-603 - [c12]James H. Nguyen, Wei Yu:
An SDN-Based Approach to Support Dynamic Operations of Multi-Domain Heterogeneous MANETs. SNPD 2018: 21-26 - [c11]Jarrett Booz, Josh McGiff, William G. Hatcher, Wei Yu, James H. Nguyen, Chao Lu:
Tuning Deep Learning Performance for Android Malware Detection. SNPD 2018: 140-145 - 2017
- [j3]Yalong Wu, Wei Yu, Fang Yuan, Jin Zhang, Chao Lu, James H. Nguyen, Daniel T. Ku:
A Cross-Domain Optimization Scheme for MANET Communications in Heterogeneous Networks. EAI Endorsed Trans. Wirel. Spectr. 3(12): e3 (2017) - [j2]Weichao Gao, James H. Nguyen, Wei Yu, Chao Lu, Daniel T. Ku, William G. Hatcher:
Toward Emulation-Based Performance Assessment of Constrained Application Protocol in Dynamic Networks. IEEE Internet Things J. 4(5): 1597-1610 (2017) - [c10]Weichao Gao, James H. Nguyen, Yalong Wu, William G. Hatcher, Wei Yu:
A Bloom Filter-Based Dual-Layer Routing Scheme in Large-Scale Mobile Networks. ICCCN 2017: 1-9 - [c9]Prateek Kumar Singh, Koushik Kar, James H. Nguyen, Daniel T. Ku:
Mass Configuration with Confirmation in Tactical Networks. DIVANet@MSWiM 2017: 99-106 - [c8]Amirshahram Hematian, James H. Nguyen, Chao Lu, Wei Yu, Daniel T. Ku:
Software Defined Radio Testbed Setup and Experimentation. RACS 2017: 172-177 - [c7]James H. Nguyen, Yalong Wu, Weichao Gao, Wei Yu, Chao Lu, Daniel T. Ku:
On Optimal Relay Nodes Position and Selection for Multi-Path Data Streaming. WCNC 2017: 1-6 - 2016
- [j1]Zhijiang Chen, Guobin Xu, Vivek Mahalingam, Linqiang Ge, James H. Nguyen, Wei Yu, Chao Lu:
A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures. Big Data Res. 3: 10-23 (2016) - [c6]Prateek K. Singh, James H. Nguyen, Santosh K. Gupta, Koushik Kar, Daniel T. Ku:
High performance mass configuration protocols for MANETs using efficient broadcasting. IPCCC 2016: 1-10 - [c5]Weichao Gao, James H. Nguyen, Wei Yu, Chao Lu, Daniel T. Ku:
Assessing Performance of Constrained Application Protocol (CoAP) in MANET Using Emulation. RACS 2016: 103-108 - [c4]Zhijiang Chen, Hanlin Zhang, William G. Hatcher, James H. Nguyen, Wei Yu:
A streaming-based network monitoring and threat detection system. SERA 2016: 31-37 - 2015
- [c3]Peter Katlic, Koushik Kar, James Morris, James H. Nguyen, Robert G. Cole:
Design and evaluation of a mass configuration protocol (MCONF) for tactical MANETs. MILCOM 2015: 1361-1366 - 2012
- [c2]Chih Hao Ku, James H. Nguyen, Gondy Leroy:
TASC - Crime report visualization for investigative analysis: A case study. IRI 2012: 466-473 - [c1]Alexander Poylisher, Yitzchak M. Gottlieb, Constantin Serban, Keith Whittaker, James H. Nguyen, Chris Scilla, John Lee, Florin Sultan, Ritu Chadha, Cho-Yu Jason Chiang:
Building an operation support system for a fast reconfigurable network experimentation testbed. MILCOM 2012: 1-6
Coauthor Index
aka: William G. Hatcher
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint