Dinh Thai Hoang
YOU?
Author Swipe
View article: STATE OWNERSHIP GOVERNANCE MODELS FOR STATE-OWNED ENTERPRISES: THEORETICAL AND PRACTICAL LESSONS FROM SELECTED COUNTRIES
STATE OWNERSHIP GOVERNANCE MODELS FOR STATE-OWNED ENTERPRISES: THEORETICAL AND PRACTICAL LESSONS FROM SELECTED COUNTRIES Open
View article: Privacy-Preserving Driver Drowsiness Detection with Spatial Self-Attention and Federated Learning
Privacy-Preserving Driver Drowsiness Detection with Spatial Self-Attention and Federated Learning Open
Driver drowsiness is one of the main causes of road accidents and is recognized as a leading contributor to traffic-related fatalities. However, detecting drowsiness accurately remains a challenging task, especially in real-world settings …
View article: Sustainable Development Goal: Impact of Organizational Justice on Leader Member Exchange and Employee's Job Perfomrance - Case of Retail Industry in Hochiminh City
Sustainable Development Goal: Impact of Organizational Justice on Leader Member Exchange and Employee's Job Perfomrance - Case of Retail Industry in Hochiminh City Open
Objective: The objective of this study is to investigate the impact of organizational justice on LMX and employee’s job performance in retail industry of Ho Chi Minh city (HCMC). Theoretical Framework: In this topic, the main concepts and …
View article: Potential Protective Effect of Hepatitis B Immunity Against Diabetes Mellitus: A Retrospective Propensity-Matched Cohort Study
Potential Protective Effect of Hepatitis B Immunity Against Diabetes Mellitus: A Retrospective Propensity-Matched Cohort Study Open
Background: Hepatitis B virus (HBV) infection affects glucose metabolism and increases diabetes risk; HBV vaccination may reduce this risk. The role of HBV immunity in diabetes prevention among individuals without HBV infection is underexp…
View article: Multi-Modal Beamforming with Model Compression and Modality Generation for V2X Networks
Multi-Modal Beamforming with Model Compression and Modality Generation for V2X Networks Open
Integrating sensing and communication (ISAC) has emerged as a cornerstone technology for predictive beamforming in 6G-enabled vehicle-to-everything (V2X) networks. However, existing ISAC paradigms rely solely on radio frequency (RF) signal…
View article: Digital twin framework to enhance facility management for relocatable modular buildings
Digital twin framework to enhance facility management for relocatable modular buildings Open
View article: "Security for Everyone" in Finite Blocklength IRS-aided Systems With Perfect and Imperfect CSI
"Security for Everyone" in Finite Blocklength IRS-aided Systems With Perfect and Imperfect CSI Open
Provisioning secrecy for all users, given the heterogeneity in their channel conditions, locations, and the unknown location of the attacker/eavesdropper, is challenging and not always feasible. The problem is even more difficult under fin…
View article: Revisiting Eosinophilia: A Neglected Indicator of Adrenal Insufficiency
Revisiting Eosinophilia: A Neglected Indicator of Adrenal Insufficiency Open
View article: Revolutionizing biological digital twins: Integrating internet of bio-nano things, convolutional neural networks, and federated learning
Revolutionizing biological digital twins: Integrating internet of bio-nano things, convolutional neural networks, and federated learning Open
Digital twins (DTs) are advancing biotechnology by providing digital models for drug discovery, digital health applications, and biological assets, including microorganisms. However, the hypothesis posits that implementing micro- and nanos…
View article: Right Reward Right Time for Federated Learning
Right Reward Right Time for Federated Learning Open
Critical learning periods (CLPs) in federated learning (FL) refer to early stages during which low-quality contributions (e.g., sparse training data availability) can permanently impair the learning performance of the global model owned by…
View article: Expanding Export Markets for Vietnamese Dragon Fruit
Expanding Export Markets for Vietnamese Dragon Fruit Open
Dragon fruit is one of the main fruits of Vietnam, bringing high economic value and contributing significantly to agricultural export turnover. However, Vietnam's dragon fruit exports are facing many challenges. The decline in demand from …
View article: Multiple-Input Variational Auto-Encoder for Anomaly Detection in Heterogeneous Data
Multiple-Input Variational Auto-Encoder for Anomaly Detection in Heterogeneous Data Open
Anomaly detection (AD) plays a pivotal role in AI applications, e.g., in classification, and intrusion/threat detection in cybersecurity. However, most existing methods face challenges of heterogeneity amongst feature subsets posed by non-…
View article: Energy-Efficient and Intelligent ISAC in V2X Networks with Spiking Neural Networks-Driven DRL
Energy-Efficient and Intelligent ISAC in V2X Networks with Spiking Neural Networks-Driven DRL Open
Integrated sensing and communication (ISAC) is emerging as a key enabler for vehicle-to-everything (V2X) systems. However, designing efficient beamforming schemes for ISAC signals to achieve accurate sensing and enhance communication perfo…
View article: Reconstruction of MODIS EVI Time Series to Map Maize Cropping Patterns in Sloping Areas: A Case Study in Son La of Vietnam
Reconstruction of MODIS EVI Time Series to Map Maize Cropping Patterns in Sloping Areas: A Case Study in Son La of Vietnam Open
Mapping maize cropping patterns and acreage is important to many stakeholders in Vietnam where official statistical data is not up-to-date. This study demonstrates the use of Savitzky - Golay and Support Vector Machine algorithms on a time…
View article: Efficient STAR-RIS Mode for Energy Minimization in WPT-FL Networks with NOMA
Efficient STAR-RIS Mode for Energy Minimization in WPT-FL Networks with NOMA Open
With the massive deployment of IoT devices in 6G networks, several critical challenges have emerged, such as large communication overhead, coverage limitations, and limited battery lifespan. FL, WPT, multi-antenna AP, and RIS can mitigate …
View article: PPVFL-SplitNN: Privacy-Preserving Vertical Federated Learning with Split Neural Networks for Distributed Patient Data
PPVFL-SplitNN: Privacy-Preserving Vertical Federated Learning with Split Neural Networks for Distributed Patient Data Open
View article: A Matching Game for LLM Layer Deployment in Heterogeneous Edge Networks
A Matching Game for LLM Layer Deployment in Heterogeneous Edge Networks Open
With the growing demand for computational and storage capabilities of modern learning models, performing their computation exclusively in a centralized manner has become increasingly impractical. Executing the inference of foundation model…
View article: Thermoelectric Optimization and Characterization of Bismuth Telluride–Selenium Alloy Ultra-Thin Films Via Three-Source Thermal Co-Evaporation
Thermoelectric Optimization and Characterization of Bismuth Telluride–Selenium Alloy Ultra-Thin Films Via Three-Source Thermal Co-Evaporation Open
View article: Exploiting NOMA Transmissions in Multi-UAV-assisted Wireless Networks: From Aerial-RIS to Mode-switching UAVs
Exploiting NOMA Transmissions in Multi-UAV-assisted Wireless Networks: From Aerial-RIS to Mode-switching UAVs Open
In this paper, we consider an aerial reconfigurable intelligent surface (ARIS)-assisted wireless network, where multiple unmanned aerial vehicles (UAVs) collect data from ground users (GUs) by using the non-orthogonal multiple access (NOMA…
View article: Privacy-Preserving Cyberattack Detection in Blockchain-Based IoT Systems Using AI and Homomorphic Encryption
Privacy-Preserving Cyberattack Detection in Blockchain-Based IoT Systems Using AI and Homomorphic Encryption Open
This work proposes a novel privacy-preserving cyberattack detection framework for blockchain-based Internet-of-Things (IoT) systems. In our approach, artificial intelligence (AI)-driven detection modules are strategically deployed at block…
View article: Jointly Optimizing Power Allocation and Device Association for Robust IoT Networks under Infeasible Circumstances
Jointly Optimizing Power Allocation and Device Association for Robust IoT Networks under Infeasible Circumstances Open
Jointly optimizing power allocation and device association is crucial in Internet-of-Things (IoT) networks to ensure devices achieve their data throughput requirements. Device association, which assigns IoT devices to specific access point…
View article: Biologically-Inspired Technologies: Integrating Brain-Computer Interface and Neuromorphic Computing for Human Digital Twins
Biologically-Inspired Technologies: Integrating Brain-Computer Interface and Neuromorphic Computing for Human Digital Twins Open
The integration of immersive communication into a human-centric ecosystem has intensified the demand for sophisticated Human Digital Twins (HDTs) driven by multifaceted human data. However, the effective construction of HDTs faces signific…
View article: Optimization and Characterization of Thermoelectric Properties in Selenium-Doped Bismuth Telluride Ultra Thin Films
Optimization and Characterization of Thermoelectric Properties in Selenium-Doped Bismuth Telluride Ultra Thin Films Open
Thermoelectricity in telluride materials is often improved by replacing telluride with selenium in its crystal. Most work, however, focuses on bulk crystal and leaves the 2D thin films intact. In this paper, we optimize the fabrication of …
View article: Dynamic Spectrum Access for Ambient Backscatter Communication-assisted D2D Systems with Quantum Reinforcement Learning
Dynamic Spectrum Access for Ambient Backscatter Communication-assisted D2D Systems with Quantum Reinforcement Learning Open
Spectrum access is an essential problem in device-to-device (D2D) communications. However, with the recent growth in the number of mobile devices, the wireless spectrum is becoming scarce, resulting in low spectral efficiency for D2D commu…
View article: Point Cloud Compression with Bits-back Coding
Point Cloud Compression with Bits-back Coding Open
This paper introduces a novel lossless compression method for compressing geometric attributes of point cloud data with bits-back coding. Our method specializes in using a deep learning-based probabilistic model to estimate the Shannon's e…
View article: Balancing Security and Accuracy: A Novel Federated Learning Approach for Cyberattack Detection in Blockchain Networks
Balancing Security and Accuracy: A Novel Federated Learning Approach for Cyberattack Detection in Blockchain Networks Open
This paper presents a novel Collaborative Cyberattack Detection (CCD) system aimed at enhancing the security of blockchain-based data-sharing networks by addressing the complex challenges associated with noise addition in federated learnin…
View article: A Lightweight Human Pose Estimation Approach for Edge Computing-Enabled Metaverse with Compressive Sensing
A Lightweight Human Pose Estimation Approach for Edge Computing-Enabled Metaverse with Compressive Sensing Open
The ability to estimate 3D movements of users over edge computing-enabled networks, such as 5G/6G networks, is a key enabler for the new era of extended reality (XR) and Metaverse applications. Recent advancements in deep learning have sho…
View article: Homomorphic Encryption-Enabled Federated Learning for Privacy-Preserving Intrusion Detection in Resource-Constrained IoV Networks
Homomorphic Encryption-Enabled Federated Learning for Privacy-Preserving Intrusion Detection in Resource-Constrained IoV Networks Open
This paper aims to propose a novel framework to address the data privacy issue for Federated Learning (FL)-based Intrusion Detection Systems (IDSs) in Internet-of-Vehicles(IoVs) with limited computational resources. In particular, in conve…
View article: Semi-Supervised Learning for Anomaly Detection in Blockchain-based Supply Chains
Semi-Supervised Learning for Anomaly Detection in Blockchain-based Supply Chains Open
Blockchain-based supply chain (BSC) systems have tremendously been developed recently and can play an important role in our society in the future. In this study, we develop an anomaly detection model for BSC systems. Our proposed model can…
View article: Diversity in flower characteristics and chromosome numbers of Rain Lily (Zephyranthes spp.)
Diversity in flower characteristics and chromosome numbers of Rain Lily (Zephyranthes spp.) Open
The study examined the flower characteristics and chromosome numbers of twenty rain lily genotypes with different origins. The bulbs of investigated genotypes were grown sequentially in an experimental garden under net-house conditions at …