Get my own profile
Public access
View all2 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Chakchai So-InProfessor of Computer Science, Khon Kaen University (IEEE/ACM SMs)Verified email at kku.ac.th
- Trung Phan VanPhD Fellow, Technische Universität Chemnitz, GermanyVerified email at etit.tu-chemnitz.de
- Surasak SanguanpongAssoc. Professor, Computer Engineering, Kasetsart UniversityVerified email at ku.ac.th
- Zubair BaigAssociate Professor, Cyber-Security, Deakin University, Melbourne, AustraliaVerified email at deakin.edu.au
- Dinh Thai HoangUniversity of Technology Sydney (UTS), AustraliaVerified email at uts.edu.au
- Van Nhan VoPhD, Duy Tan UniversityVerified email at dtu.edu.vn
- Tran Duc LeUniversité du Québec à Trois-RivièresVerified email at uqtr.ca
- Flavio EspositoAssociate Professor, Saint Louis University, USAVerified email at slu.edu
- Nguyen Huu ThanhSchool of Electrical and Electronic Engineering, Hanoi University of Science and TechnologyVerified email at hust.edu.vn
- Nhu-Ngoc DAOSejong University, Department of Computer Science and EngineeringVerified email at sejong.ac.kr
- Truong Thu HuongHanoi University of Science and TechnologyVerified email at hust.edu.vn
- Nguyen Gia NhuAssociate Professor at School of Computer Science, Duy Tan University, Viet NamVerified email at duytan.edu.vn
- Hung TranDATCOM Lab, Hanoi, Vietnam
- Tu N. NguyenAssistant Professor, Kennesaw State University | IEEE Senior MemberVerified email at kennesaw.edu