Bao Huynh Quoc
Bao Huynh Quoc
Ho Chi Minh City University of Technology (HUTECH), Vietnam
Geverifieerd e-mailadres voor hutech.edu.vn
Titel
Geciteerd door
Geciteerd door
Jaar
An efficient method for mining frequent sequential patterns using multi-Core processors
B Huynh, B Vo, V Snasel
Applied Intelligence 46 (3), 703–716, 2017
172017
Mining constrained inter-sequence patterns: a novel approach to cope with item constraints
T Le, A Nguyen, B Huynh, B Vo, W Pedrycz
Applied Intelligence 48 (5), 1327-1343, 2018
132018
An efficient approach for mining sequential patterns using multiple threads on very large databases
B Huynh, C Trinh, H Huynh, TT Van, B Vo, V Snasel
Engineering Applications of Artificial Intelligence 74, 242-251, 2018
122018
An efficient parallel method for mining frequent closed sequential patterns
B Huynh, B Vo, V Snasel
IEEE Access 5, 17392-17402, 2017
122017
A hybrid service selection and composition model for cloud-edge computing in the internet of things
M Hosseinzadeh, QT Tho, S Ali, AM Rahmani, A Souri, M Norouzi, ...
IEEE Access 8, 85939-85949, 2020
92020
Constraint-based method for mining colossal patterns in high dimensional databases
TL Nguyen, B Vo, B Huynh, V Snasel, LTT Nguyen
International Conference on Information Systems Architecture and Technology …, 2017
62017
Using Multi-Core Processors for Mining Frequent Sequential Patterns
B Huynh, B Vo
ICIC-EL 9 (11), 3071-3079, 2015
62015
An enhanced authentication protocol for RFID systems
M Hosseinzadeh, OH Ahmed, SH Ahmed, C Trinh, N Bagheri, S Kumari, ...
IEEE Access 8, 126977-126987, 2020
52020
A parallel method for mining frequent patterns with multiple minimum support thresholds
B Huynh, C Trinh, V Dang, B Vo
International Journal of Innovative Computing, Information and Control 15 (2 …, 2019
42019
Parallel Frequent Subgraph Mining on Multi-Core Processor Systems
B Huynh, D Nguyen, B Vo
ICIC-EL 10 (9), 2105-2113, 2016
42016
A new strong adversary model for RFID authentication protocols
M Hosseinzadeh, J Lansky, AM Rahmani, C Trinh, M Safkhani, N Bagheri, ...
IEEE Access 8, 125029-125045, 2020
22020
An efficient method for mining erasable itemsets using multicore processor platform
B Huynh, B Vo
Complexity 2018, 2018
22018
A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments
C Trinh, B Huynh, J Lansky, S Mildeova, M Safkhani, N Bagheri, S Kumari, ...
IEEE Access 8, 165536-165550, 2020
12020
Detecting Malicious Fast-Flux Domains Using Feature-based Classification Techniques
DT Truong, DT Tran, B Huynh
Journal of Internet Technology 21 (4), 1061-1072, 2020
12020
An efficient method for mining clickstream patterns
BV Bui, B Vo, HM Huynh, TA Nguyen-Hoang, B Huynh
International Joint Conference on Rough Sets, 572-583, 2018
12018
Mining colossal patterns with length constraints
T Le, TL Nguyen, B Huynh, H Nguyen, TP Hong, V Snasel
Applied Intelligence, 1-12, 2021
2021
A Novel Approach for Mining Closed Clickstream Patterns
B Huynh, LTT Nguyen, HM Huynh, A Kozierkiewicz, U Yun, ZK Oplatková, ...
Cybernetics and Systems, 1-22, 2021
2021
Efficient Method for Mining High-Utility Itemsets Using High-Average Utility Measure
LTT Nguyen, TDD Nguyen, A Nguyen, PN Tran, C Trinh, B Huynh, B Vo
International Conference on Computational Collective Intelligence, 305-315, 2020
2020
Parallel Methods for Mining Frequent Sequential patterns
QB Huynh
Vysoká škola báňská-Technická univerzita Ostrava, 2017
2017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–19