My T. Thai, Ph.D. - Publications

Affiliations: 
2005 University of Minnesota, Twin Cities, Minneapolis, MN 
Area:
Computer Science

137 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Xie T, Ma Y, Tong H, Thai MT, Maciejewski R. Auditing the Sensitivity of Graph-based Ranking with Visual Analytics. Ieee Transactions On Visualization and Computer Graphics. PMID 33027000 DOI: 10.1109/TVCG.2020.3028958  0.303
2020 Nguyen TDT, Thai MT. A Blockchain-based Iterative Double Auction Protocol using Multiparty State Channels Acm Transactions On Internet Technology. DOI: 10.1145/3389249  0.325
2020 Nguyen LN, Smith JD, Bae J, Kang J, Seo J, Thai MT. Auditing on Smart-Grid With Dynamic Traffic Flows: An Algorithmic Approach Ieee Transactions On Smart Grid. 11: 2293-2302. DOI: 10.1109/Tsg.2019.2951505  0.526
2020 Pan T, Li X, Kuhnle A, Thai MT. Influence Diffusion in Online Social Networks with Propagation Rate Changes Ieee Transactions On Network Science and Engineering. 1-1. DOI: 10.1109/Tnse.2020.3015935  0.337
2020 Kim D, Thai MT, Uma RN. Guest Editorial Introduction to the Special Section on Scalability and Privacy in Social Networks Ieee Transactions On Network Science and Engineering. 7: 843-844. DOI: 10.1109/Tnse.2019.2959674  0.376
2020 Li X, Smith JD, Pan T, Dinh TN, Thai M. Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model Ieee Transactions On Emerging Topics in Computing. 8: 855-868. DOI: 10.1109/Tetc.2018.2840433  0.421
2019 Pham CV, Duong HV, Hoang HX, Thai MT. Competitive Influence Maximization within Time and Budget Constraints in Online Social Networks: An Algorithmic Approach Applied Sciences. 9: 2274. DOI: 10.3390/App9112274  0.492
2019 Nguyen LN, Thai MT. Network Resilience Assessment via QoS Degradation Metrics Acm Sigmetrics Performance Evaluation Review. 47: 13-14. DOI: 10.1145/3376930.3376940  0.304
2019 Nguyen LN, Thai MT. Network Resilience Assessment via QoS Degradation Metrics Proceedings of the Acm On Measurement and Analysis of Computing Systems. 3: 1-32. DOI: 10.1145/3322205.3311072  0.304
2019 Kuhnle A, Crawford VG, Thai MT. Network Resilience and the Length-Bounded Multicut Problem Acm Sigmetrics Performance Evaluation Review. 46: 81-83. DOI: 10.1145/3308809.3308851  0.373
2019 Kuhnle A, Crawford VG, Thai MT. Network Resilience and the Length-Bounded Multicut Problem Acm Sigmetrics Performance Evaluation Review. 46: 81-83. DOI: 10.1145/3292040.3219650  0.373
2019 Li X, Pan T, Alim MA, Thai MT. Resource Allocation in Highly Dynamic Device-to-Device Communication: An Adaptive Set Multi-Cover Approach Ieee Transactions On Wireless Communications. 18: 4607-4619. DOI: 10.1109/Twc.2019.2912963  0.367
2019 Li X, Smith JD, Dinh TN, Thai MT. TipTop: (Almost) Exact Solutions for Influence Maximization in Billion-Scale Networks Ieee/Acm Transactions On Networking. 27: 649-661. DOI: 10.1109/Tnet.2019.2898413  0.393
2019 Zeng T, Semiari O, Saad W, Thai MT. Spatial Motifs for Device-to-Device Network Analysis in Cellular Networks Ieee Transactions On Communications. 67: 5474-5489. DOI: 10.1109/Tcomm.2019.2911281  0.414
2019 Hamidouche K, Saad W, Debbah M, Thai MT, Han Z. Contract-Based Incentive Mechanism for LTE Over Unlicensed Channels Ieee Transactions On Communications. 67: 6427-6440. DOI: 10.1109/Tcomm.2019.2910545  0.38
2019 Pham CV, Phu QV, Hoang HX, Pei J, Thai MT. Minimum budget for misinformation blocking in online social networks Journal of Combinatorial Optimization. 38: 1101-1127. DOI: 10.1007/S10878-019-00439-5  0.543
2018 Alim MA, Ay A, Hasan MM, Thai MT, Kahveci T. Construction of Signaling Pathways with RNAi Data and Multiple Reference Networks. Ieee/Acm Transactions On Computational Biology and Bioinformatics. 15: 1079-1091. PMID 30102599 DOI: 10.1109/Tcbb.2017.2710129  0.455
2018 Kuhnle A, Crawford VG, Thai MT. Network Resilience and the Length-Bounded Multicut Problem Proceedings of the Acm On Measurement and Analysis of Computing Systems. 2: 1-26. DOI: 10.1145/3179407  0.373
2018 Kuhnle A, Alim MA, Li X, Zhang H, Thai MT. Multiplex Influence Maximization in Online Social Networks With Heterogeneous Diffusion Models Ieee Transactions On Computational Social Systems. 5: 418-429. DOI: 10.1109/Tcss.2018.2813262  0.467
2018 Veremyev A, Pavlikov K, Pasiliao EL, Thai MT, Boginski V. Critical nodes in interdependent networks with deterministic and probabilistic cascading failures Journal of Global Optimization. 74: 803-838. DOI: 10.1007/S10898-018-0703-5  0.52
2018 Pham CV, Thai MT, Duong HV, Bui BQ, Hoang HX. Maximizing misinformation restriction within time and budget constraints Journal of Combinatorial Optimization. 35: 1202-1240. DOI: 10.1007/S10878-018-0252-3  0.535
2018 Kuhnle A, Crawford VG, Thai MT. Scalable approximations to k-cycle transversal problems on dynamic networks Knowledge and Information Systems. 61: 65-84. DOI: 10.1007/S10115-018-1296-5  0.508
2017 Alim MA, Pan T, Thai MT, Saad W. Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications Ieee Transactions On Wireless Communications. 16: 551-564. DOI: 10.1109/Twc.2016.2626280  0.345
2017 Nguyen HT, Thai MT, Dinh TN. A Billion-Scale Approximation Algorithm for Maximizing Benefit in Viral Marketing Ieee/Acm Transactions On Networking. 25: 2419-2429. DOI: 10.1109/Tnet.2017.2691544  0.474
2017 Pan T, Mishra S, Nguyen LN, Lee G, Kang J, Seo J, Thai MT. Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid Ieee Access. 5: 16774-16783. DOI: 10.1109/Access.2017.2738565  0.449
2017 Kuhnle A, Nguyen NP, Dinh TN, Thai MT. Vulnerability of clustering under node failure in complex networks Social Network Analysis and Mining. 7. DOI: 10.1007/S13278-017-0426-5  0.482
2017 Kuhnle A, Li X, Smith JD, Thai MT. Online set multicover algorithms for dynamic D2D communications Journal of Combinatorial Optimization. 34: 1237-1264. DOI: 10.1007/S10878-017-0144-Y  0.396
2016 Zhang H, Alim MA, Li X, Thai MT, Nguyen HT. Misinformation in online social networks: Detect them all with a limited budget Acm Transactions On Information Systems. 34. DOI: 10.1145/2885494  0.532
2016 Nguyen HT, Thai MT, Dinh TN. Stop-and-Stare: Optimal sampling algorithms for viral marketing in billion-scale networks Proceedings of the Acm Sigmod International Conference On Management of Data. 26: 695-710. DOI: 10.1145/2882903.2915207  0.371
2016 Mishra S, Li X, Pan T, Kuhnle A, Thai MT, Seo J. Price Modification Attack and Protection Scheme in Smart Grid Ieee Transactions On Smart Grid. DOI: 10.1109/Tsg.2015.2509945  0.424
2016 Zhang H, Nguyen DT, Thai MT. Least cost influence maximization across multiple social networks Ieee/Acm Transactions On Networking. 24: 929-939. DOI: 10.1109/Tnet.2015.2394793  0.46
2016 Alim MA, Li X, Nguyen NP, Thai MT, Helal A. Structural Vulnerability Assessment of Community-Based Routing in Opportunistic Networks Ieee Transactions On Mobile Computing. 15: 3156-3170. DOI: 10.1109/Tmc.2016.2524571  0.501
2016 Dinh TN, Li X, Thai MT. Network clustering via maximizing modularity: Approximation algorithms and theoretical limits Proceedings - Ieee International Conference On Data Mining, Icdm. 2016: 101-110. DOI: 10.1109/ICDM.2015.139  0.363
2016 Mishra S, Dinh TN, Thai MT, Seo J, Shin I. Optimal packet scan against malicious attacks in smart grids Theoretical Computer Science. 609: 606-619. DOI: 10.1016/J.Tcs.2015.07.054  0.551
2016 Pham CV, Thai MT, Ha D, Ngo DQ, Hoang HX. Time-Critical viral marketing strategy with the competition on online social networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9795: 111-122. DOI: 10.1007/978-3-319-42345-6_10  0.34
2015 Alim MA, Ay A, Hasan MM, Thai MT, Kahveci T. Multiple reference networks improve accuracy of signaling network construction Bcb 2015 - 6th Acm Conference On Bioinformatics, Computational Biology, and Health Informatics. 176-185. DOI: 10.1145/2808719.2808737  0.396
2015 Dinh TN, Thai MT. Assessing attack vulnerability in networks with uncertainty Proceedings - Ieee Infocom. 26: 2380-2388. DOI: 10.1109/INFOCOM.2015.7218626  0.424
2015 Mishra S, Li X, Kuhnle A, Thai MT, Seo J. Rate alteration attacks in smart grid Proceedings - Ieee Infocom. 26: 2353-2361. DOI: 10.1109/INFOCOM.2015.7218623  0.336
2015 Zhang H, Alim MA, Thai MT, Nguyen HT. Monitor placement to timely detect misinformation in Online Social Networks Ieee International Conference On Communications. 2015: 1152-1157. DOI: 10.1109/ICC.2015.7248478  0.383
2015 Dinh TN, Thai MT. Toward optimal community detection: From trees to general weighted networks Internet Mathematics. 11: 181-200. DOI: 10.1080/15427951.2014.950875  0.499
2015 Seo J, Mishra S, Li X, Thai MT. Catastrophic cascading failures in power networks Theoretical Computer Science. DOI: 10.1016/J.Tcs.2015.08.021  0.536
2015 Zhang H, Shen Y, Thai MT. Robustness of power-law networks: its assessment and optimization Journal of Combinatorial Optimization. DOI: 10.1007/S10878-015-9893-7  0.472
2015 Dinh TN, Nguyen NP, Alim MA, Thai MT. A near-optimal adaptive algorithm for maximizing modularity in dynamic scale-free networks Journal of Combinatorial Optimization. 30: 747-767. DOI: 10.1007/S10878-013-9665-1  0.486
2015 Zhang H, Li X, Thai MT. Limiting the spread of misinformation while effectively raising awareness in social networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9197: 35-47. DOI: 10.1007/978-3-319-21786-4_4  0.401
2014 Nguyen NP, Dinh TN, Shen Y, Thai MT. Dynamic social community detection and its applications. Plos One. 9: e91431. PMID 24722164 DOI: 10.1371/Journal.Pone.0091431  0.418
2014 Thai MT, Tiwari R, Bose R, Helal A. On detection and tracking of variant phenomena clouds Acm Transactions On Sensor Networks. 10. DOI: 10.1145/2530525  0.395
2014 Alim MA, Nguyen NP, Dinh TN, Thai MT. Structural vulnerability analysis of overlapping communities in complex networks Proceedings - 2014 Ieee/Wic/Acm International Joint Conference On Web Intelligence and Intelligent Agent Technology - Workshops, Wi-Iat 2014. 1: e12528. DOI: 10.1109/WI-IAT.2014.10  0.38
2014 Dinh TN, Thai MT. Network Under Joint Node and Link Attacks: Vulnerability Assessment Methods and Analysis Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2014.2317486  0.512
2014 Dinh TN, Zhang H, Nguyen DT, Thai MT. Cost-effective viral marketing for time-critical campaigns in large-scale social networks Ieee/Acm Transactions On Networking. 22: 2001-2011. DOI: 10.1109/Tnet.2013.2290714  0.442
2014 Kuhnle A, Li X, Thai MT. Online algorithms for optimal resource management in dynamic D2D communications Proceedings - 2014 10th International Conference On Mobile Ad-Hoc and Sensor Networks, Msn 2014. 130-137. DOI: 10.1109/MSN.2014.24  0.338
2014 Alim MA, Kuhnle A, Thai MT. Are communities as strong as we think? Asonam 2014 - Proceedings of the 2014 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining. 314-319. DOI: 10.1109/ASONAM.2014.6921603  0.369
2014 Nguyen NP, Alim MA, Dinh TN, Thai MT. A method to detect communities with stability in social networks Social Network Analysis and Mining. 4: 1-15. DOI: 10.1007/S13278-014-0224-2  0.383
2014 Dinh TN, Thai MT, Nguyen HT. Bound and exact methods for assessing link vulnerability in complex networks Journal of Combinatorial Optimization. 28: 3-24. DOI: 10.1007/S10878-014-9742-0  0.492
2014 Shen Y, Dinh TN, Thai MT, Nguyen HT. Staying safe and visible via message sharing in online social networks Journal of Combinatorial Optimization. 28: 186-217. DOI: 10.1007/S10878-013-9667-Z  0.438
2014 Dinh TN, Shen Y, Nguyen DT, Thai MT. On the approximability of positive influence dominating set in social networks Journal of Combinatorial Optimization. 27: 487-503. DOI: 10.1007/S10878-012-9530-7  0.5
2014 Hemmati M, Cole Smith J, Thai MT. A cutting-plane algorithm for solving a weighted influence interdiction problem Computational Optimization and Applications. 57: 71-104. DOI: 10.1007/S10589-013-9589-9  0.456
2014 Mishra S, Li X, Thai MT, Seo J. Cascading critical nodes detection with load redistribution in complex systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8881: 379-394. DOI: 10.1007/978-3-319-12691-3_29  0.384
2014 Shen Y, Li X, Thai MT. Approximation algorithms for optimization problems in random power-law graphs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8881: 343-355. DOI: 10.1007/978-3-319-12691-3_26  0.323
2014 Mishra S, Dinh TN, Thai MT, Shin I. Optimal inspection points for malicious attack detection in smart grids Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8591: 393-404. DOI: 10.1007/978-3-319-08783-2_34  0.391
2013 Nguyen NP, Alim MA, Shen Y, Thai MT. Assessing network vulnerability in a community structure point of view Proceedings of the 2013 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining, Asonam 2013. 231-235. DOI: 10.1145/2492517.2492644  0.384
2013 Nguyen DT, Shen Y, Thai MT. Detecting critical nodes in interdependent power networks for vulnerability assessment Ieee Transactions On Smart Grid. 4: 151-159. DOI: 10.1109/Tsg.2012.2229398  0.499
2013 Shen Y, Nguyen NP, Xuan Y, Thai MT. On the discovery of critical links and nodes for assessing network vulnerability Ieee/Acm Transactions On Networking. 21: 963-973. DOI: 10.1109/Tnet.2012.2215882  0.541
2013 Tiwari R, Dinh TN, Thai MT. On centralized and localized approximation algorithms for interference-aware broadcast scheduling Ieee Transactions On Mobile Computing. 12: 233-247. DOI: 10.1109/Tmc.2011.270  0.446
2013 Xuan Y, Shen Y, Nguyen NP, Thai MT. Efficient multi-link failure localization schemes in all-optical networks Ieee Transactions On Communications. 61: 1144-1151. DOI: 10.1109/Tcomm.2013.012313.110645  0.493
2013 Dinh TN, Thai MT. Community detection in scale-free networks: Approximation algorithms for maximizing modularity Ieee Journal On Selected Areas in Communications. 31: 997-1006. DOI: 10.1109/Jsac.2013.130602  0.525
2013 Shen Y, Nguyen DT, Thai MT. Adaptive approximation algorithms for hole healing in hybrid wireless sensor networks Proceedings - Ieee Infocom. 1178-1186. DOI: 10.1109/INFCOM.2013.6566909  0.375
2013 Dinh TN, Nguyen NP, Thai MT. An adaptive approximation algorithm for community detection in dynamic scale-free networks Proceedings - Ieee Infocom. 55-59. DOI: 10.1109/INFCOM.2013.6566734  0.396
2013 Nguyen DT, Zhang H, Das S, Thai MT, Dinh TN. Least cost influence in multiplex social networks: Model representation and analysis Proceedings - Ieee International Conference On Data Mining, Icdm. 567-576. DOI: 10.1109/ICDM.2013.24  0.359
2013 Zhang H, Dinh TN, Thai MT. Maximizing the spread of positive influence in online social networks Proceedings - International Conference On Distributed Computing Systems. 317-326. DOI: 10.1109/ICDCS.2013.37  0.307
2013 Nguyen DT, Das S, Thai MT. Influence maximization in multiple online social networks Globecom - Ieee Global Telecommunications Conference. 3060-3065. DOI: 10.1109/GLOCOM.2013.6831541  0.393
2013 Shen Y, Thai MT. Network vulnerability assessment under cascading failures Globecom - Ieee Global Telecommunications Conference. 1526-1531. DOI: 10.1109/GLOCOM.2013.6831290  0.443
2013 Nguyen NP, Yan G, Thai MT. Analysis of misinformation containment in online social networks Computer Networks. 57: 2133-2146. DOI: 10.1016/J.Comnet.2013.04.002  0.509
2012 Nguyen DT, Nguyen NP, Thai MT, Helal A. Optimal and distributed algorithms for coverage hole healing in hybrid sensor networks International Journal of Sensor Networks. 11: 228-240. DOI: 10.1504/Ijsnet.2012.047151  0.402
2012 Shen Y, Dinh TN, Zhang H, Thai MT. Interest-matching information propagation in multiple online social networks Acm International Conference Proceeding Series. 1824-1828. DOI: 10.1145/2396761.2398525  0.331
2012 Dinh TN, Shen Y, Thai MT. The walls have ears: Optimize sharing for visibility and privacy in online social networks Acm International Conference Proceeding Series. 1452-1461. DOI: 10.1145/2396761.2398451  0.316
2012 Nguyen NP, Yan G, Thai MT, Eidenbenz S. Containment of misinformation spread in online social networks Proceedings of the 3rd Annual Acm Web Science Conference, Websci'12. 213-222. DOI: 10.1145/2380718.2380746  0.402
2012 Shen Y, Syu YS, Nguyen DT, Thai MT. Maximizing circle of trust in online social networks Ht'12 - Proceedings of 23rd Acm Conference On Hypertext and Social Media. 155-164. DOI: 10.1145/2309996.2310023  0.331
2012 Li Y, Cao X, Beyah R, Thai MT. Guest editorial: Special issue on wireless computing and networking Tsinghua Science and Technology. 17: 485-486. DOI: 10.1109/Tst.2012.6314525  0.614
2012 Dinh TN, Xuan Y, Thai MT, Pardalos PM, Znati T. On new approaches of assessing network vulnerability: Hardness and approximation Ieee/Acm Transactions On Networking. 20: 609-619. DOI: 10.1109/Tnet.2011.2170849  0.54
2012 Xuan Y, Shen Y, Nguyen NP, Thai MT. A trigger identification service for defending reactive jammers in WSN Ieee Transactions On Mobile Computing. 11: 793-806. DOI: 10.1109/Tmc.2011.86  0.473
2012 Dinh TN, Shen Y, Thai MT. An efficient spectral bound for link vulnerability assessment in large-scale networks Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2012.6415860  0.387
2012 Nguyen DT, Nguyen NP, Thai MT. Sources of misinformation in Online Social Networks: Who to suspect? Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2012.6415780  0.324
2012 Nguyen NP, Thai MT. Finding overlapped communities in online social networks with Nonnegative Matrix Factorization Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2012.6415744  0.326
2012 Shen Y, Dinh TN, Thai MT. Adaptive algorithms for detecting critical links and nodes in dynamic networks Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2012.6415629  0.439
2012 Shen Y, Nguyen DT, Xuan Y, Thai MT. New techniques for approximating optimal substructure problems in power-law graphs Theoretical Computer Science. 447: 107-119. DOI: 10.1016/J.Tcs.2011.10.023  0.39
2012 Thai MT. Guest editorial: Computing and combinatorics Algorithmica. 64: 213-214. DOI: 10.1007/S00453-012-9649-Z  0.387
2012 Nguyen NP, Xuan Y, Thai MT. On detection of community structure in dynamic social networks Springer Optimization and Its Applications. 58: 307-347. DOI: 10.1007/978-1-4614-0857-4_11  0.343
2012 Tiwari R, Thai MT. On enhancing fault tolerance of virtual backbone in a wireless sensor network with unidirectional links Springer Optimization and Its Applications. 61: 3-18. DOI: 10.1007/978-0-387-88619-0_1  0.426
2011 Nguyen NP, Dinh TN, Tokala S, Thai MT. Overlapping communities in dynamic networks: Their detection and mobile applications Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 85-95. DOI: 10.1145/2030613.2030624  0.387
2011 Dinh TN, Thai MT. Finding community structure with performance guarantees in scale-free networks Proceedings - 2011 Ieee International Conference On Privacy, Security, Risk and Trust and Ieee International Conference On Social Computing, Passat/Socialcom 2011. 888-891. DOI: 10.1109/PASSAT/SocialCom.2011.185  0.358
2011 Nguyen NP, Dinh TN, Nguyen DT, Thai MT. Overlapping community structures and their detection on social networks Proceedings - 2011 Ieee International Conference On Privacy, Security, Risk and Trust and Ieee International Conference On Social Computing, Passat/Socialcom 2011. 35-40. DOI: 10.1109/PASSAT/SocialCom.2011.16  0.331
2011 Shen Y, Xuan Y, Thai MT. On local approximation of minimum-latency broadcast scheduling in 3D MANETs Proceedings - Ieee Military Communications Conference Milcom. 866-871. DOI: 10.1109/MILCOM.2011.6127787  0.343
2011 Dinh TN, Thai MT. Precise structural vulnerability assessment via mathematical programming Proceedings - Ieee Military Communications Conference Milcom. 1351-1356. DOI: 10.1109/MILCOM.2011.6127492  0.449
2011 Nguyen DT, Nguyen NP, Thai MT, Helal A. An optimal algorithm for coverage hole healing in hybrid sensor networks Iwcmc 2011 - 7th International Wireless Communications and Mobile Computing Conference. 494-499. DOI: 10.1109/IWCMC.2011.5982583  0.302
2011 Nguyen NP, Dinh TN, Xuan Y, Thai MT. Adaptive algorithms for detecting community structure in dynamic social networks Proceedings - Ieee Infocom. 2282-2290. DOI: 10.1109/INFCOM.2011.5935045  0.381
2011 Shen Y, Nguyen NP, Thai MT. Exploiting the robustness on power-law networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6842: 379-390. DOI: 10.1007/978-3-642-22685-4_34  0.358
2010 Xuan Y, Shin I, Thai MT, Znati T. Detecting application denial-of-service attacks: A group-testing-based approach Ieee Transactions On Parallel and Distributed Systems. 21: 1203-1216. DOI: 10.1109/Tpds.2009.147  0.397
2010 Dinh TN, Xuan Y, Thai MT, Park EK, Znati T. On approximation of new optimization methods for assessing network vulnerability Proceedings - Ieee Infocom. DOI: 10.1109/INFCOM.2010.5462098  0.489
2010 Xuan Y, Shen Y, Nguyen NP, Thai MT. A graph-theoretic QoS-aware vulnerability assessment for network topologies Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2010.5683938  0.422
2010 Shin I, Shen Y, Thai MT. On approximation of dominating tree in wireless sensor networks Optimization Letters. 4: 393-403. DOI: 10.1007/S11590-010-0175-0  0.44
2010 Shen Y, Nguyen DT, Thai MT. On the hardness and inapproximability of optimization problems on power law graphs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6508: 197-211. DOI: 10.1007/978-3-642-17458-2_17  0.322
2010 Dinh TN, Shin I, Thai NK, Thai MT, Znati T. A general approach for modules identification in evolving networks Springer Optimization and Its Applications. 40: 83-100. DOI: 10.1007/978-1-4419-5689-7_4  0.392
2009 Thakur GS, Tiwari R, Thai MT, Chen SS, Dress AWM. Detection of local community structures in complex dynamic networks with random walks Iet Systems Biology. 3: 266-278. PMID 19640165 DOI: 10.1049/Iet-Syb.2007.0061  0.458
2009 Shin I, Shen Y, Xuan Y, Thai MT, Znati T. Reactive jamming attacks in multi-radio wireless sensor networks: An efficient mitigating measure by identifying trigger nodes Fowanc'09 - Proceedings of the 2nd Acm International Workshop On Foundations of Wireless Ad Hoc and Sensor Networking and Computing, Co-Located With Mobihoc'09. 87-96. DOI: 10.1145/1540343.1540357  0.356
2009 Wang F, Thai MT, Du DZ. On the construction of 2-connected virtual backbone in wireless networks Ieee Transactions On Wireless Communications. 8: 1230-1237. DOI: 10.1109/Twc.2009.051053  0.647
2009 Dinh TN, Xuan Y, Thai MT. Towards social-aware routing in dynamic communication networks 2009 Ieee 28th International Performance Computing and Communications Conference, Ipccc 2009. 161-168. DOI: 10.1109/PCCC.2009.5403845  0.385
2009 Xuan Y, Shen Y, Shin I, Thai MT. On trigger detection against Reactive Jamming Attacks: A clique-independent set based approach 2009 Ieee 28th International Performance Computing and Communications Conference, Ipccc 2009. 223-230. DOI: 10.1109/PCCC.2009.5403842  0.313
2009 Wang C, Thai MT, Li Y, Wang F, Wu W. Optimization scheme for sensor coverage scheduling with bandwidth constraints Optimization Letters. 3: 63-75. DOI: 10.1007/S11590-008-0091-8  0.618
2009 Thai MT, Znati T. On the complexity and approximation of non-unique probe selection using d-disjunct matrix Journal of Combinatorial Optimization. 17: 45-53. DOI: 10.1007/S10878-008-9188-3  0.324
2008 Thai MT, Wang F, Du DH, Jia X. Coverage problems in wireless sensor networks: Designs and analysis International Journal of Sensor Networks. 3: 191-200. DOI: 10.1504/Ijsnet.2008.018485  0.481
2008 Zhang N, Shin I, Zou F, Wu W, Thai MT. Trade-off scheme for fault tolerant connected dominating sets on size and diameter Proceedings of the International Symposium On Mobile Ad Hoc Networking and Computing (Mobihoc). 1-8. DOI: 10.1145/1374718.1374720  0.354
2008 Thai MT, Tiwari R, Du DZ. On construction of virtual backbone in wireless ad hoc networks with unidirectional links Ieee Transactions On Mobile Computing. 7: 1098-1109. DOI: 10.1109/Tmc.2008.22  0.671
2008 Wang F, Thai MT, Li Y, Cheng X, Du DZ. Fault-tolerant topology control for all-to-one and one-to-all communication in wireless networks Ieee Transactions On Mobile Computing. 7: 322-331. DOI: 10.1109/Tmc.2007.70743  0.724
2008 Thai MT, Xuan Y, Shin I, Znati T. On detection of malicious users using group testing techniques Proceedings - the 28th International Conference On Distributed Computing Systems, Icdcs 2008. 206-213. DOI: 10.1109/ICDCS.2008.75  0.313
2008 Zhang N, Shin I, Li B, Boyaci C, Tiwari R, Thai MT. New approximation for minimum-weight routing backbone in wireless sensor network Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5258: 96-108. DOI: 10.1007/978-3-540-88582-5-12  0.356
2007 Thai MT, Maccallum D, Deng P, Wu W. Decoding algorithms in pooling designs with inhibitors and error-tolerance. International Journal of Bioinformatics Research and Applications. 3: 145-52. PMID 18048185 DOI: 10.1504/Ijbra.2007.013599  0.684
2007 Wang F, Xu K, Thai MT, Du DZ. Fault tolerant topology control for one-to-all communications in symmetric wireless networks International Journal of Sensor Networks. 2: 163-168. DOI: 10.1504/Ijsnet.2007.013196  0.64
2007 Park MA, Willson J, Wang C, Thai M, Wu W, Farago A. A dominating and absorbent set in a wireless ad-hoc network with different transmission ranges Proceedings of the International Symposium On Mobile Ad Hoc Networking and Computing (Mobihoc). 22-31. DOI: 10.1145/1288107.1288111  0.461
2007 Tiwari R, Mishra T, Li Y, Thai MT. K-strongly connected m-dominating and absorbing set in wireless ad hoc networks with unidirectional links Wasa 2007 - the 2nd International Conference On Wireless Algorithms, Systems and Applications. 103-112. DOI: 10.1109/WASA.2007.28  0.406
2007 Thai MT, Wang F, Liu D, Zhu S, Du DZ. Connected dominating sets in wireless networks with different transmission ranges Ieee Transactions On Mobile Computing. 6: 721-730. DOI: 10.1109/Tmc.2007.1034  0.739
2007 Thai MT, Li Y, Du DZ, Wang F. O (log n) -localized algorithms on the coverage problem in heterogeneous sensor networks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 85-92. DOI: 10.1109/PCCC.2007.358882  0.585
2007 Wu Y, Wang F, Thai MT, Li Y. Constructing k-connected M-dominating sets in wireless sensor networks Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2007.4454774  0.576
2007 Wang C, Thai MT, Li Y, Wang F, Wu W. Minimum coverage breach and maximum network lifetime in wireless sensor networks Globecom - Ieee Global Telecommunications Conference. 1118-1123. DOI: 10.1109/GLOCOM.2007.215  0.566
2007 Thai MT, Cai Z, Du DZ. Genetic networks: Processing data, regulatory network modelling and their analysis Optimization Methods and Software. 22: 169-185. DOI: 10.1080/10556780600881860  0.528
2007 Thai MT, Zhang N, Tiwari R, Xu X. On approximation algorithms of k-connected m-dominating sets in disk graphs Theoretical Computer Science. 385: 49-59. DOI: 10.1016/J.Tcs.2007.05.025  0.439
2006 Li Y, Thai MT, Wang F, Du DZ. On the construction of a strongly connected broadcast arborescence with bounded transmission delay Ieee Transactions On Mobile Computing. 5: 1460-1470. DOI: 10.1109/Tmc.2006.154  0.714
2006 Thai MT. 2-Connected dominating set in wireless networks Proc. - Seventh Acis Int. Conf. On Software Eng., Artific. Intelligence, Netw., and Parallel/Distributed Comput., Snpd 2006, Including Second Acis Int. Worshop On Sawn 2006. 2006: 227. DOI: 10.1109/SNPD-SAWN.2006.1  0.371
2006 Thai MT, Du DZ. Connected dominating sets in disk graphs with bidirectional links Ieee Communications Letters. 10: 138-140. DOI: 10.1109/Lcomm.2006.1603363  0.652
2006 Gao H, Hwang FK, Thai MT, Wu W, Znati T. Construction of d(H)-disjunct matrix for group testing in hypergraphs Journal of Combinatorial Optimization. 12: 297-301. DOI: 10.1007/S10878-006-9634-Z  0.336
2006 Du DZ, Thai MT, Li Y, Liu D, Zhu S. Strongly connected dominating sets in wireless sensor networks with unidirectional links Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3841: 13-24. DOI: 10.1007/11610113_2  0.7
2005 Li Y, Thai MT, Liu Z, Wu W. Protein-protein interaction and group testing in bipartite graphs. International Journal of Bioinformatics Research and Applications. 1: 414-9. PMID 18048145 DOI: 10.1504/Ijbra.2005.008444  0.519
2005 Thai MT, Li Y, Du DZ. A combination of wireless multicast advantage and Hitch-hiking Ieee Communications Letters. 9: 1037-1039. DOI: 10.1109/Lcomm.2005.1576580  0.687
2005 Li J, Li Y, Thai MT. Data caching and query processing in MANETs International Journal of Pervasive Computing and Communications. 1: 169-178. DOI: 10.1108/17427370580000122  0.545
2005 Guo L, Wu W, Wang F, Thai M. An approximation for minimum multicast route in optical networks with nonsplitting nodes Journal of Combinatorial Optimization. 10: 391-394. DOI: 10.1007/S10878-005-4925-3  0.473
2005 Du H, Jia X, Wang F, Thai M, Li Y. A note on optical network with nonsplitting nodes Journal of Combinatorial Optimization. 10: 199-202. DOI: 10.1007/S10878-005-2273-Y  0.605
2005 Li Y, Thai MT, Wang F, Yi CW, Wan PJ, Du DZ. On greedy construction of connected dominating sets in wireless networks Wireless Communications and Mobile Computing. 5: 927-932. DOI: 10.1002/Wcm.356  0.705
2005 Thai MT, Li Y, Du DZ, Ai C. On the construction of energy-efficient broadcast tree with hitch-hiking in wireless networks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 135-139.  0.316
Show low-probability matches.