


default search action
Le Xuan Hung
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j19]Le Xuan Hung, Ngo Dac Tan
:
Vertex-Disjoint Cycles of Different Lengths in Local Tournaments. Graphs Comb. 39(4): 92 (2023) - [j18]Linh Thao Thi Le
, Linh Thao Tran
, Cong Son Dang, Phuoc Duy Nguyen, Ngoc Anh Tran
, Thi Ha Pham, Hai Thanh Phan, Xuan Hung Le
:
Testing reliability and validity of the Vietnamese version of the eHealth literacy scale (eHEALS) among medical students in Vietnam. Int. J. Medical Informatics 170: 104962 (2023) - [j17]Tran Manh Hoang
, Le The Dung
, Ba Cao Nguyen
, Xuan Hung Le, Xuan Nam Tran
, Taejoon Kim
:
Outage Probability and Throughput of Mobile Multiantenna UAV-Assisted FD-NOMA Relay System With Imperfect CSI. IEEE Syst. J. 17(1): 1477-1488 (2023) - 2022
- [j16]Le Xuan Hung, Duy Hieu Do
, Ngo Dac Tan
:
Vertex-disjoint cycles of different lengths in multipartite tournaments. Discret. Math. 345(6): 112819 (2022) - [j15]Phuong T. Tran
, Ba Cao Nguyen
, Tran Manh Hoang
, Xuan Hung Le, Van Duan Nguyen:
Exploiting Multiple RISs and Direct Link for Performance Enhancement of Wireless Systems With Hardware Impairments. IEEE Trans. Commun. 70(8): 5599-5611 (2022) - 2021
- [j14]Ba Cao Nguyen
, Xuan Hung Le, Van Duan Nguyen, Le The Dung
:
On the Capacity of Full-Duplex AF/DF Relay System with Energy Harvesting for Vehicle-to-Vehicle Communications. Wirel. Commun. Mob. Comput. 2021: 8865615:1-8865615:11 (2021)
2010 – 2019
- 2015
- [c32]Dongwen Wang, Xuan Hung Le, Amneris E. Luque:
Identifying Effective Approaches for Dissemination of Clinical Evidence - Correlation Analyses on Promotional Activities and Usage of a Guideline-Driven Interactive Case Simulation Tool in a Statewide HIV-HCV-STD Clinical Education Program. MedInfo 2015: 515-519 - [p1]Xuan Hung Le, Dongwen Wang:
Managing Access Control in Collaborative Processes for Healthcare Applications. Medical Data Privacy Handbook 2015: 313-359 - 2014
- [j13]Xuan Hung Le, Terry Doll, Monica Barbosu
, Amneris E. Luque, Dongwen Wang:
Evaluation of an Enhanced Role-Based Access Control model to manage information access in collaborative processes for a statewide clinical education program. J. Biomed. Informatics 50: 184-195 (2014) - 2013
- [j12]Murad Khalid, Le Xuan Hung, In-ho Ra, Ravi Sankar
:
Polarization-based cooperative directional MAC protocol for ad hoc networks. Ad Hoc Networks 11(4): 1522-1538 (2013) - [c31]Xuan Hung Le, Amneris E. Luque, Dongwen Wang:
Correlations between Promotional Activities and Usage of a Guideline-Driven Interactive Case Simulation Tool. AMIA 2013 - [c30]Xuan Hung Le, Amneris E. Luque, Dongwen Wang:
Assessing the Usage of a Guideline-Driven Interactive Case Simulation Tool for Insomnia Screening and Treatment in an HIV Clinical Education Program. MedInfo 2013: 323-327 - 2012
- [j11]Xuan Hung Le, Terry Doll, Monica Barbosu
, Amneris E. Luque, Dongwen Wang:
An enhancement of the Role-Based Access Control model to facilitate information access management in context of team collaboration and workflow. J. Biomed. Informatics 45(6): 1084-1107 (2012) - [j10]Murad Khalid, Yufeng Wang, Le Xuan Hung, In-ho Ra, Ravi Sankar
:
Distributed Adaptive Scheduling for Finite Horizon in Wireless Ad hoc Networks. J. Commun. 7(2): 155-164 (2012) - [c29]Xuan Hung Le, Amneris E. Luque, Dongwen Wang:
Development of Guideline-Driven Mobile Applications for Clinical Education and Decision Support with Customization to Individual Patient Cases. AMIA 2012 - [c28]Xuan Hung Le, Dongwen Wang:
Neuroimage Data Sets: Rethinking Privacy Policies. HealthSec 2012 - 2011
- [j9]La The Vinh, Sungyoung Lee, Le Xuan Hung, Hung Quoc Ngo, Hyoung-Il Kim, Manhyung Han, Young-Koo Lee:
Semi-Markov conditional random fields for accelerometer-based activity recognition. Appl. Intell. 35(2): 226-241 (2011) - [j8]Le Xuan Hung, Murad Khalid, Ravi Sankar
, Sungyoung Lee:
An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare. J. Networks 6(3): 355-364 (2011) - [j7]Asad Masood Khattak, Phan Tran Ho Truc, Le Xuan Hung, La The Vinh, Viet-Hung Dang, Donghai Guan, Zeeshan Pervez
, Manhyung Han, Sungyoung Lee, Young-Koo Lee:
Towards Smart Homes Using Low Level Sensory Data. Sensors 11(12): 11581-11604 (2011) - 2010
- [j6]Murad Khalid, Le Xuan Hung, In-ho Ra, Ravi Sankar
:
ADMAC with Integrated Destination Discovery for Ad Hoc Networks. IEEE Commun. Lett. 14(8): 704-706 (2010) - [j5]Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee, Murad Khalid, Ravi Sankar
:
Activity-oriented access control to ubiquitous hospital information and services. Inf. Sci. 180(16): 2979-2990 (2010) - [c27]Ismail Butun
, Sumit Birla, Xuan Hung Le, Sungyoung Lee, Ravi Sankar
:
Performance Evaluation of Quick-Start in Low Latency Networks. CCNC 2010: 1-3 - [c26]Xuan Hung Le, Sungyoung Lee, Phan Tran Ho Truc, La The Vinh, Asad Masood Khattak, Manhyung Han, Viet-Hung Dang, Mohammad Mehedi Hassan, Miso Kim, Koo Kyo Ho, Young-Koo Lee, Eui-Nam Huh:
Secured WSN-integrated cloud computing for u-Life Care. CCNC 2010: 1-2 - [c25]Le Xuan Hung, Ravi Sankar
, Murad Khalid, Sungyoung Lee:
Public key cryptography-based security scheme for wireless sensor networks in healthcare. ICUIMC 2010: 5 - [c24]Murad Khalid, Le Xuan Hung, In-ho Ra, Ravi Sankar:
Ratio-based Finite Horizon Scheduling in Wireless Ad hoc Networks. ICWN 2010: 104-110
2000 – 2009
- 2009
- [j4]Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks. IEICE Trans. Commun. 92-B(1): 131-142 (2009) - [j3]Xuan Hung Le, Sungyoung Lee, Ismail Butun
, Murad Khalid, Ravi Sankar
, Miso Kim, Manhyung Han, Young-Koo Lee, Heejo Lee:
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. J. Commun. Networks 11(6): 599-606 (2009) - [c23]Ngo Trong Canh, Phan Tran Ho Truc, Tran Hoang Hai
, Le Xuan Hung, Young-Koo Lee, Sungyoung Lee:
Enhanced Group-Based Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge. CCNC 2009: 1-5 - [c22]Le Xuan Hung, Riaz Ahmed Shaikh
, Hassan Jameel, Syed Muhammad Khaliq-ur-Rahman Raazi
, Weiwei Yuan, Ngo Trong Canh, Phan Tran Ho Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes:
Activity-Oriented Access Control for Ubiquitous Environments. CCNC 2009: 1-5 - [c21]Brian J. d'Auriol
, Le Xuan Hung, Sungyoung Lee, Young-Koo Lee:
Visualizations of human activities in sensor-enabled ubiquitous environments. ICUMT 2009: 1-6 - 2008
- [c20]Le Xuan Hung, Hassan Jameel, Riaz Ahmed Shaikh, Syed Muhammad Khaliq-ur-Rahman Raazi
, Weiwei Yuan, Ngo Trong Canh, Phan Tran Ho Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes, Miso Kim, Yonil Zhung:
Activity-based Security Scheme for Ubiquitous Environments. IPCCC 2008: 475-481 - [c19]Hassan Jameel, Riaz Ahmed Shaikh
, Le Xuan Hung, Weiwei Yuan, Syed Muhammad Khaliq-ur-Rahman Raazi
, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes:
Image-Feature Based Human Identification Protocols on Limited Display Devices. WISA 2008: 211-224 - 2007
- [c18]Tran Van Phuong, Le Xuan Hung, Young-Koo Lee, Sungyoung Lee, Heejo Lee:
TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks. CCNC 2007: 593-598 - [c17]Brian J. d'Auriol, Tuyen Nguyen, Vo Quoc Hung, Duc Thang, Hassan Jameel, Le Xuan Hung, Syed Muhammad Khaliq-ur-Rahman Raazi, Dao Phuong Thuy, Ngo Trong Canh, Adil Mehmood Khan, Sunghyun Kim, Lei Shu, Sakib Pathan, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee:
Embedded Processor Security. Security and Management 2007: 591- - [c16]Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
Enforcing Access Control Using Risk Assessment. ECUMN 2007: 419-424 - [c15]Pho Duc Giang, Le Xuan Hung, Riaz Ahmed Shaikh
, Yonil Zhung, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments. ICPS 2007: 149-152 - [c14]Pho Duc Giang, Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems. MUE 2007: 698-703 - [c13]Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
Activity-based Access Control Model to Hospital Information. RTCSA 2007: 488-496 - 2006
- [c12]Weiwei Yuan, Donghai Guan, Le Xuan Hung, Young-Koo Lee, Sungyoung Lee:
A Trust Model with Dynamic Decision Making for Ubiquitous Environments. ICON 2006: 1-6 - [c11]Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee:
A Flexible and Scalable Access Control for Ubiquitous Computing Environments. ISI 2006: 688-689 - [c10]Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Young-Koo Lee, Sungyoung Lee:
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks. ISI 2006: 735-736 - [c9]Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee:
A Trust-Based Security Architecture for Ubiquitous Computing Systems. ISI 2006: 753-754 - [c8]Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei Yuan, Young-Koo Lee, Sungyoung Lee:
A Trust Model for Uncertain Interactions in Ubiquitous Environments. ISI 2006: 755-757 - [c7]Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee:
A Home Firewall Solution for Securing Smart Spaces. ISI 2006: 760-761 - [c6]Le Xuan Hung, Tran Van Phuong, Pho Duc Giang, Yonil Zhung, Sungyoung Lee, Young-Koo Lee:
Security for Ubiquitous Computing: Problems and Proposed Solutionl. RTCSA 2006: 110-116 - 2005
- [j2]Ngo Dac Tan
, Le Xuan Hung:
On the Burkard-Hammer condition for hamiltonian split graphs. Discret. Math. 296(1): 59-72 (2005) - [c5]Hung Le Xuan, Youngku Lee, Sungyoung Lee:
Two Energy-Efficient Routing Algorithms for Wireless Sensor Networks. ICN (1) 2005: 698-705 - [c4]Hung Le Xuan, Sungyoung Lee, Young-Koo Lee:
A Key-Exchanging Scheme for Distributed Sensor Networks. INTELLCOMM 2005: 271-279 - [c3]Do Dat Tran, Eric Castelli, Jean-François Serignat, Van Loan Trinh, Le Xuan Hung:
Influence of F0 on Vietnamese syllable perception. INTERSPEECH 2005: 1697-1700 - [c2]Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajjad, Sungyoung Lee, Young-Koo Lee:
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values. ISM 2005: 674-679 - [c1]Hung Le Xuan, Dae Hong Seo, Sungyoung Lee, Young-Koo Lee:
Minimum-Energy Data Dissemination in Coordination-Based Sensor Networks. RTCSA 2005: 381-386 - 2004
- [j1]Le Xuan Hung, Ngo Dac Tan
:
Hamilton cycles in split graphs with large minimum degree. Discuss. Math. Graph Theory 24(1): 23-40 (2004)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint