


default search action
6th FDSE 2019: Nha Trang City, Vietnam
- Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui:

Future Data and Security Engineering - 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27-29, 2019, Proceedings. Lecture Notes in Computer Science 11814, Springer 2019, ISBN 978-3-030-35652-1
Invited Keynotes
- Vitalian A. Danciu:

Individual Privacy Supporting Organisational Security. 3-14 - Shaima Trabelsi, Mohamed Taha Bennani

, Sadok Ben Yahia
:
A New Test Suite Reduction Approach Based on Hypergraph Minimal Transversal Mining. 15-30
Advanced Studies in Machine Learning
- Tibor Kovács

, Andrea Ko
:
Machine Learning Based Monitoring of the Pneumatic Actuators' Behavior Through Signal Processing Using Real-World Data Set. 33-44 - Nguyen Le Hoang, Tran Khanh Dang

, Le Hong Trang
:
A Comparative Study of the Use of Coresets for Clustering Large Datasets. 45-55 - Thi Ngoc Tu Luong

, Jong-Myon Kim:
Leakage Classification Based on Improved Kullback-Leibler Separation in Water Pipelines. 56-67 - Thanh-Trung Nguyen, Quang Nguyen, Ngo Thanh Hung:

Mining Incrementally Closed Itemsets over Data Stream with the Technique of Batch-Update. 68-84 - Thuong Le-Tien, Phuc Nguyen, Thien Luong-Hoai, Minh Nguyen-Binh, Tuan Vu-Minh, Hoang Pham-Thai, Duc Nguyen-Huynh:

A Combination Solution for Sleep Apnea and Heart Rate Detection Based on Accelerometer Tracking. 85-103 - An Cong Tran

, Duong Lu Dien, Hiep Xuan Huynh, Nguyen Huu Van Long, Nghi C. Tran:
A Model for Real-Time Traffic Signs Recognition Based on the YOLO Algorithm - A Case Study Using Vietnamese Traffic Signs. 104-116 - Thanh Hai Nguyen

, Nguyen Thai-Nghe:
Disease Prediction Using Metagenomic Data Visualizations Based on Manifold Learning and Convolutional Neural Network. 117-131 - Suong N. Hoang

, Linh V. Nguyen
, Tai Huynh
, Vuong T. Pham:
An Efficient Model for Sentiment Analysis of Electronic Product Reviews in Vietnamese. 132-142
Advances in Query Processing and Optimization
- Johann Eder:

Computing History-Dependent Schedules for Processes with Temporal Constraints. 145-164 - H. K. Dai:

Finding All Minimal Maximum Subsequences in Parallel. 165-184 - Hoang Nguyen Phuoc Bao, Manuel Clavel:

OCL2PSQL: An OCL-to-SQL Code-Generator for Model-Driven Engineering. 185-203
Big Data Analytics and Distributed Systems
- Vishwajeet Pattanaik

, Ioane Sharvadze, Dirk Draheim
:
Framework for Peer-to-Peer Data Sharing over Web Browsers. 207-225 - Trong Nhan Phan:

Efficiently Semantic-Aware Pairwise Similarity: an Applicable Use-Case. 226-238 - H. K. Dai, Michel Toulouse:

Lower Bound on Network Diameter for Distributed Function Computation. 239-251
Deep Learning and Applications
- Phuoc-Hai Huynh

, Van Hoa Nguyen
, Thanh-Nghi Do:
A Combined Enhancing and Feature Extraction Algorithm to Improve Learning Accuracy for Gene Expression Classification. 255-273 - Hoang Nguyen, Hieu Trung Huynh:

Age and Gender Estimation of Asian Faces Using Deep Residual Network. 274-286 - Thuong Le-Tien, Hanh Phan-Xuan, Sy Nguyen-Tan:

Light-Weight Deep Convolutional Network-Based Approach for Recognizing Emotion on FPGA Platform. 287-306 - Thanh Hai Nguyen

:
Metagenome-Based Disease Classification with Deep Learning and Visualizations Based on Self-organizing Maps. 307-319
Cloud Data Management and Infrastructure
- Manh-Hung Tran, Thien-Binh Dang

, Van Vi Vo, Duc-Tai Le, Moonseong Kim, Hyunseung Choo:
On Analyzing the Trade-Off Between Over-Commitment Ratio and Quality of Service in NFV Datacenter. 323-331 - Takeshi Tsuchiya

, Ryuichi Mochizuki, Hiroo Hirose, Tetsuyasu Yamada, Kei'ichi Koyanagi, Minh-Triet Tran, Tran Khanh Dang
:
Dynamic Data Management Strategy on Cloud Network by Fog Computing Model. 332-342 - Quang Tran Minh, Phat Nguyen Huu

, Takeshi Tsuchiya
, Michel Toulouse
:
Openness in Fog Computing for the Internet of Things. 343-357 - Van Vi Vo, Dung T. Nguyen

, Duc-Tai Le, Manh-Hung Tran, Moonseong Kim, Hyunseung Choo:
A Top-Down Scheduling for Time Efficient Data Aggregation in WSNs. 358-368
Security and Privacy Engineering
- Tun Myat Aung

, Ni Ni Hla:
A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes. 371-382 - Tran Tri Dang

, Josef Küng:
A Visual Model for Privacy Awareness and Understanding in Online Social Networks. 383-398 - Vinh Pham, Namuk Kim, Eunil Seo, Jun Suk Ha, Tai-Myoung Chung:

A Method to Enhance the Security Capability of Python IDE. 399-410 - Quang-Vinh Dang

:
Studying Machine Learning Techniques for Intrusion Detection Systems. 411-426
Authentication and Access Control
- Emmanuel Bruno

, Romane Gallier
, Alban Gabillon
:
Enforcing Access Controls in IoT Networks. 429-445 - Duc Minh Chau Pham, Thao L. P. Nguyen, Tran Khanh Dang

:
Resource-Constrained IoT Authentication Protocol: An ECC-Based Hybrid Scheme for Device-to-Server and Device-to-Device Communications. 446-466 - Anh Truong:

Adventures in the Analysis of Access Control Policies. 467-482
Blockchain and Cybersecurity
- Quoc-Bao Nguyen, Anh-Quynh Nguyen, Van Duc Nguyen, Thanh Nguyen-Le, Khuong Nguyen-An

:
Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors. 485-505 - Panchakshari N. Hiremath, Jack Armentrout, Son Vu, Tu N. Nguyen

, Quang Tran Minh, Phu H. Phung
:
MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web. 506-525 - Dinh-Duc Truong, Thanh Nguyen-Van, Quoc-Bao Nguyen, Nguyen Huynh Huy, Tuan Anh Tran, Quang Nhat Le, Khuong Nguyen-An

:
Blockchain-Based Open Data: An Approach for Resolving Data Integrity and Transparency. 526-541
Emerging Data Management Systems and Applications
- Thanh-Huyen Pham, Van-Vinh Le

, Tran Van Lang, Tran Van Hoai:
GMeta: A Novel Algorithm to Utilize Highly Connected Components for Metagenomic Binning. 545-559 - Van Sinh Nguyen, Manh Ha Tran, Son Truong Le:

Visualization of Medical Images Data Based on Geometric Modeling. 560-576 - Tran Khanh Dang

, Quang Phu Nguyen, Van Sinh Nguyen:
Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains. 577-592 - Vo Hoang Phuc, Vu Thanh Nguyen, Tuan Dinh Le:

Exploiting Social Data to Enhance Web Search. 593-607 - Thanh Binh Nguyen, Vo Thi Hong Tuyet, Nguyen Mong Hien, Nguyen Thanh Thuy:

Retinal Vessels Segmentation by Improving Salient Region Combined with Sobel Operator Condition. 608-617 - Vu Thu Diep, Phan Duy Hung

, Ta Duc Tung:
Energy Saving Solution for Air Conditioning Systems. 618-628
Short Papers: Security and Data Engineering
- Ngo Thanh Hung, Huynh Thanh Viet, Le Nhut Truong, Musab Bassam Yousef Zghoul:

Identifying Minimum Set of Persons that Influenced by a Promotion Campaign. 631-639 - Tan Quan Ngo, Seokhoon Yoon:

Facial Expression Recognition on Static Images. 640-647 - Phan Duy Hung

, Quang Thinh Tran:
Cryptocurrencies Price Index Prediction Using Neural Networks on Bittrex Exchange. 648-655 - Phan Duy Hung

, Nguyên Công Minh:
Application of Fuzzy Logic in University Suggestion System for Vietnamese High School Students. 656-664 - Lam Ha, Dang Tuan Nguyen:

Towards an Improvement of Complex Answer Retrieval System. 665-672 - Huy-Hoang Chung-Nguyen, Viet-Khoi Pham, Dinh-Hieu Hoang, Minh-Triet Tran

:
Keyword-Search Interval-Query Dynamic Symmetric Searchable Encryption. 673-680 - Thi Dieu Anh Nguyen

, Thanh Nguyen Vu, Tuan Dinh Le:
The Implicit Effect of Items Rating on Recommendation System. 681-687 - Phan Duy Hung

:
Counting People Using Images from Two Low Cost Webcams. 688-695 - Dinh Thuan Nguyen

, Huu-Vinh Le:
Predicting the Price of Bitcoin Using Hybrid ARIMA and Machine Learning. 696-704 - Anh Duc Le, Dung Van Pham, Tuan Anh Nguyen:

Deep Learning Approach for Receipt Recognition. 705-712 - Quan M. Tran

, Linh V. Nguyen
, Tai Huynh
, Hai H. Vo, Vuong T. Pham:
Efficient CNN Models for Beer Bottle Cap Classification Problem. 713-721 - Tran Thanh Dien

, Huynh Ngoc Han, Nguyen Thai-Nghe:
An Approach for Plagiarism Detection in Learning Resources. 722-730 - Anh Duc Le:

Detecting Kuzushiji Characters from Historical Documents by Two-Dimensional Context Box Proposal Network. 731-738 - Nguyen Thi Hong Anh, Bui Cong Giao

:
An Empirical Study on Fabric Defect Classification Using Deep Network Models. 739-746

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














