Year |
Citation |
Score |
2020 |
Xie T, Ma Y, Tong H, Thai MT, Maciejewski R. Auditing the Sensitivity of Graph-based Ranking with Visual Analytics. Ieee Transactions On Visualization and Computer Graphics. PMID 33027000 DOI: 10.1109/TVCG.2020.3028958 |
0.303 |
|
2020 |
Nguyen TDT, Thai MT. A Blockchain-based Iterative Double Auction Protocol using Multiparty State Channels Acm Transactions On Internet Technology. DOI: 10.1145/3389249 |
0.325 |
|
2020 |
Nguyen LN, Smith JD, Bae J, Kang J, Seo J, Thai MT. Auditing on Smart-Grid With Dynamic Traffic Flows: An Algorithmic Approach Ieee Transactions On Smart Grid. 11: 2293-2302. DOI: 10.1109/Tsg.2019.2951505 |
0.526 |
|
2020 |
Pan T, Li X, Kuhnle A, Thai MT. Influence Diffusion in Online Social Networks with Propagation Rate Changes Ieee Transactions On Network Science and Engineering. 1-1. DOI: 10.1109/Tnse.2020.3015935 |
0.337 |
|
2020 |
Kim D, Thai MT, Uma RN. Guest Editorial Introduction to the Special Section on Scalability and Privacy in Social Networks Ieee Transactions On Network Science and Engineering. 7: 843-844. DOI: 10.1109/Tnse.2019.2959674 |
0.376 |
|
2020 |
Li X, Smith JD, Pan T, Dinh TN, Thai M. Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model Ieee Transactions On Emerging Topics in Computing. 8: 855-868. DOI: 10.1109/Tetc.2018.2840433 |
0.421 |
|
2019 |
Pham CV, Duong HV, Hoang HX, Thai MT. Competitive Influence Maximization within Time and Budget Constraints in Online Social Networks: An Algorithmic Approach Applied Sciences. 9: 2274. DOI: 10.3390/App9112274 |
0.492 |
|
2019 |
Nguyen LN, Thai MT. Network Resilience Assessment via QoS Degradation Metrics Acm Sigmetrics Performance Evaluation Review. 47: 13-14. DOI: 10.1145/3376930.3376940 |
0.304 |
|
2019 |
Nguyen LN, Thai MT. Network Resilience Assessment via QoS Degradation Metrics Proceedings of the Acm On Measurement and Analysis of Computing Systems. 3: 1-32. DOI: 10.1145/3322205.3311072 |
0.304 |
|
2019 |
Kuhnle A, Crawford VG, Thai MT. Network Resilience and the Length-Bounded Multicut Problem Acm Sigmetrics Performance Evaluation Review. 46: 81-83. DOI: 10.1145/3308809.3308851 |
0.373 |
|
2019 |
Kuhnle A, Crawford VG, Thai MT. Network Resilience and the Length-Bounded Multicut Problem Acm Sigmetrics Performance Evaluation Review. 46: 81-83. DOI: 10.1145/3292040.3219650 |
0.373 |
|
2019 |
Li X, Pan T, Alim MA, Thai MT. Resource Allocation in Highly Dynamic Device-to-Device Communication: An Adaptive Set Multi-Cover Approach Ieee Transactions On Wireless Communications. 18: 4607-4619. DOI: 10.1109/Twc.2019.2912963 |
0.367 |
|
2019 |
Li X, Smith JD, Dinh TN, Thai MT. TipTop: (Almost) Exact Solutions for Influence Maximization in Billion-Scale Networks Ieee/Acm Transactions On Networking. 27: 649-661. DOI: 10.1109/Tnet.2019.2898413 |
0.393 |
|
2019 |
Zeng T, Semiari O, Saad W, Thai MT. Spatial Motifs for Device-to-Device Network Analysis in Cellular Networks Ieee Transactions On Communications. 67: 5474-5489. DOI: 10.1109/Tcomm.2019.2911281 |
0.414 |
|
2019 |
Hamidouche K, Saad W, Debbah M, Thai MT, Han Z. Contract-Based Incentive Mechanism for LTE Over Unlicensed Channels Ieee Transactions On Communications. 67: 6427-6440. DOI: 10.1109/Tcomm.2019.2910545 |
0.38 |
|
2019 |
Pham CV, Phu QV, Hoang HX, Pei J, Thai MT. Minimum budget for misinformation blocking in online social networks Journal of Combinatorial Optimization. 38: 1101-1127. DOI: 10.1007/S10878-019-00439-5 |
0.543 |
|
2018 |
Alim MA, Ay A, Hasan MM, Thai MT, Kahveci T. Construction of Signaling Pathways with RNAi Data and Multiple Reference Networks. Ieee/Acm Transactions On Computational Biology and Bioinformatics. 15: 1079-1091. PMID 30102599 DOI: 10.1109/Tcbb.2017.2710129 |
0.455 |
|
2018 |
Kuhnle A, Crawford VG, Thai MT. Network Resilience and the Length-Bounded Multicut Problem Proceedings of the Acm On Measurement and Analysis of Computing Systems. 2: 1-26. DOI: 10.1145/3179407 |
0.373 |
|
2018 |
Kuhnle A, Alim MA, Li X, Zhang H, Thai MT. Multiplex Influence Maximization in Online Social Networks With Heterogeneous Diffusion Models Ieee Transactions On Computational Social Systems. 5: 418-429. DOI: 10.1109/Tcss.2018.2813262 |
0.467 |
|
2018 |
Veremyev A, Pavlikov K, Pasiliao EL, Thai MT, Boginski V. Critical nodes in interdependent networks with deterministic and probabilistic cascading failures Journal of Global Optimization. 74: 803-838. DOI: 10.1007/S10898-018-0703-5 |
0.52 |
|
2018 |
Pham CV, Thai MT, Duong HV, Bui BQ, Hoang HX. Maximizing misinformation restriction within time and budget constraints Journal of Combinatorial Optimization. 35: 1202-1240. DOI: 10.1007/S10878-018-0252-3 |
0.535 |
|
2018 |
Kuhnle A, Crawford VG, Thai MT. Scalable approximations to k-cycle transversal problems on dynamic networks Knowledge and Information Systems. 61: 65-84. DOI: 10.1007/S10115-018-1296-5 |
0.508 |
|
2017 |
Alim MA, Pan T, Thai MT, Saad W. Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications Ieee Transactions On Wireless Communications. 16: 551-564. DOI: 10.1109/Twc.2016.2626280 |
0.345 |
|
2017 |
Nguyen HT, Thai MT, Dinh TN. A Billion-Scale Approximation Algorithm for Maximizing Benefit in Viral Marketing Ieee/Acm Transactions On Networking. 25: 2419-2429. DOI: 10.1109/Tnet.2017.2691544 |
0.474 |
|
2017 |
Pan T, Mishra S, Nguyen LN, Lee G, Kang J, Seo J, Thai MT. Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid Ieee Access. 5: 16774-16783. DOI: 10.1109/Access.2017.2738565 |
0.449 |
|
2017 |
Kuhnle A, Nguyen NP, Dinh TN, Thai MT. Vulnerability of clustering under node failure in complex networks Social Network Analysis and Mining. 7. DOI: 10.1007/S13278-017-0426-5 |
0.482 |
|
2017 |
Kuhnle A, Li X, Smith JD, Thai MT. Online set multicover algorithms for dynamic D2D communications Journal of Combinatorial Optimization. 34: 1237-1264. DOI: 10.1007/S10878-017-0144-Y |
0.396 |
|
2016 |
Zhang H, Alim MA, Li X, Thai MT, Nguyen HT. Misinformation in online social networks: Detect them all with a limited budget Acm Transactions On Information Systems. 34. DOI: 10.1145/2885494 |
0.532 |
|
2016 |
Nguyen HT, Thai MT, Dinh TN. Stop-and-Stare: Optimal sampling algorithms for viral marketing in billion-scale networks Proceedings of the Acm Sigmod International Conference On Management of Data. 26: 695-710. DOI: 10.1145/2882903.2915207 |
0.371 |
|
2016 |
Mishra S, Li X, Pan T, Kuhnle A, Thai MT, Seo J. Price Modification Attack and Protection Scheme in Smart Grid Ieee Transactions On Smart Grid. DOI: 10.1109/Tsg.2015.2509945 |
0.424 |
|
2016 |
Zhang H, Nguyen DT, Thai MT. Least cost influence maximization across multiple social networks Ieee/Acm Transactions On Networking. 24: 929-939. DOI: 10.1109/Tnet.2015.2394793 |
0.46 |
|
2016 |
Alim MA, Li X, Nguyen NP, Thai MT, Helal A. Structural Vulnerability Assessment of Community-Based Routing in Opportunistic Networks Ieee Transactions On Mobile Computing. 15: 3156-3170. DOI: 10.1109/Tmc.2016.2524571 |
0.501 |
|
2016 |
Dinh TN, Li X, Thai MT. Network clustering via maximizing modularity: Approximation algorithms and theoretical limits Proceedings - Ieee International Conference On Data Mining, Icdm. 2016: 101-110. DOI: 10.1109/ICDM.2015.139 |
0.363 |
|
2016 |
Mishra S, Dinh TN, Thai MT, Seo J, Shin I. Optimal packet scan against malicious attacks in smart grids Theoretical Computer Science. 609: 606-619. DOI: 10.1016/J.Tcs.2015.07.054 |
0.551 |
|
2016 |
Pham CV, Thai MT, Ha D, Ngo DQ, Hoang HX. Time-Critical viral marketing strategy with the competition on online social networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9795: 111-122. DOI: 10.1007/978-3-319-42345-6_10 |
0.34 |
|
2015 |
Alim MA, Ay A, Hasan MM, Thai MT, Kahveci T. Multiple reference networks improve accuracy of signaling network construction Bcb 2015 - 6th Acm Conference On Bioinformatics, Computational Biology, and Health Informatics. 176-185. DOI: 10.1145/2808719.2808737 |
0.396 |
|
2015 |
Dinh TN, Thai MT. Assessing attack vulnerability in networks with uncertainty Proceedings - Ieee Infocom. 26: 2380-2388. DOI: 10.1109/INFOCOM.2015.7218626 |
0.424 |
|
2015 |
Mishra S, Li X, Kuhnle A, Thai MT, Seo J. Rate alteration attacks in smart grid Proceedings - Ieee Infocom. 26: 2353-2361. DOI: 10.1109/INFOCOM.2015.7218623 |
0.336 |
|
2015 |
Zhang H, Alim MA, Thai MT, Nguyen HT. Monitor placement to timely detect misinformation in Online Social Networks Ieee International Conference On Communications. 2015: 1152-1157. DOI: 10.1109/ICC.2015.7248478 |
0.383 |
|
2015 |
Dinh TN, Thai MT. Toward optimal community detection: From trees to general weighted networks Internet Mathematics. 11: 181-200. DOI: 10.1080/15427951.2014.950875 |
0.499 |
|
2015 |
Seo J, Mishra S, Li X, Thai MT. Catastrophic cascading failures in power networks Theoretical Computer Science. DOI: 10.1016/J.Tcs.2015.08.021 |
0.536 |
|
2015 |
Zhang H, Shen Y, Thai MT. Robustness of power-law networks: its assessment and optimization Journal of Combinatorial Optimization. DOI: 10.1007/S10878-015-9893-7 |
0.472 |
|
2015 |
Dinh TN, Nguyen NP, Alim MA, Thai MT. A near-optimal adaptive algorithm for maximizing modularity in dynamic scale-free networks Journal of Combinatorial Optimization. 30: 747-767. DOI: 10.1007/S10878-013-9665-1 |
0.486 |
|
2015 |
Zhang H, Li X, Thai MT. Limiting the spread of misinformation while effectively raising awareness in social networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9197: 35-47. DOI: 10.1007/978-3-319-21786-4_4 |
0.401 |
|
2014 |
Nguyen NP, Dinh TN, Shen Y, Thai MT. Dynamic social community detection and its applications. Plos One. 9: e91431. PMID 24722164 DOI: 10.1371/Journal.Pone.0091431 |
0.418 |
|
2014 |
Thai MT, Tiwari R, Bose R, Helal A. On detection and tracking of variant phenomena clouds Acm Transactions On Sensor Networks. 10. DOI: 10.1145/2530525 |
0.395 |
|
2014 |
Alim MA, Nguyen NP, Dinh TN, Thai MT. Structural vulnerability analysis of overlapping communities in complex networks Proceedings - 2014 Ieee/Wic/Acm International Joint Conference On Web Intelligence and Intelligent Agent Technology - Workshops, Wi-Iat 2014. 1: e12528. DOI: 10.1109/WI-IAT.2014.10 |
0.38 |
|
2014 |
Dinh TN, Thai MT. Network Under Joint Node and Link Attacks: Vulnerability Assessment Methods and Analysis Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2014.2317486 |
0.512 |
|
2014 |
Dinh TN, Zhang H, Nguyen DT, Thai MT. Cost-effective viral marketing for time-critical campaigns in large-scale social networks Ieee/Acm Transactions On Networking. 22: 2001-2011. DOI: 10.1109/Tnet.2013.2290714 |
0.442 |
|
2014 |
Kuhnle A, Li X, Thai MT. Online algorithms for optimal resource management in dynamic D2D communications Proceedings - 2014 10th International Conference On Mobile Ad-Hoc and Sensor Networks, Msn 2014. 130-137. DOI: 10.1109/MSN.2014.24 |
0.338 |
|
2014 |
Alim MA, Kuhnle A, Thai MT. Are communities as strong as we think? Asonam 2014 - Proceedings of the 2014 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining. 314-319. DOI: 10.1109/ASONAM.2014.6921603 |
0.369 |
|
2014 |
Nguyen NP, Alim MA, Dinh TN, Thai MT. A method to detect communities with stability in social networks Social Network Analysis and Mining. 4: 1-15. DOI: 10.1007/S13278-014-0224-2 |
0.383 |
|
2014 |
Dinh TN, Thai MT, Nguyen HT. Bound and exact methods for assessing link vulnerability in complex networks Journal of Combinatorial Optimization. 28: 3-24. DOI: 10.1007/S10878-014-9742-0 |
0.492 |
|
2014 |
Shen Y, Dinh TN, Thai MT, Nguyen HT. Staying safe and visible via message sharing in online social networks Journal of Combinatorial Optimization. 28: 186-217. DOI: 10.1007/S10878-013-9667-Z |
0.438 |
|
2014 |
Dinh TN, Shen Y, Nguyen DT, Thai MT. On the approximability of positive influence dominating set in social networks Journal of Combinatorial Optimization. 27: 487-503. DOI: 10.1007/S10878-012-9530-7 |
0.5 |
|
2014 |
Hemmati M, Cole Smith J, Thai MT. A cutting-plane algorithm for solving a weighted influence interdiction problem Computational Optimization and Applications. 57: 71-104. DOI: 10.1007/S10589-013-9589-9 |
0.456 |
|
2014 |
Mishra S, Li X, Thai MT, Seo J. Cascading critical nodes detection with load redistribution in complex systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8881: 379-394. DOI: 10.1007/978-3-319-12691-3_29 |
0.384 |
|
2014 |
Shen Y, Li X, Thai MT. Approximation algorithms for optimization problems in random power-law graphs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8881: 343-355. DOI: 10.1007/978-3-319-12691-3_26 |
0.323 |
|
2014 |
Mishra S, Dinh TN, Thai MT, Shin I. Optimal inspection points for malicious attack detection in smart grids Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8591: 393-404. DOI: 10.1007/978-3-319-08783-2_34 |
0.391 |
|
2013 |
Nguyen NP, Alim MA, Shen Y, Thai MT. Assessing network vulnerability in a community structure point of view Proceedings of the 2013 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining, Asonam 2013. 231-235. DOI: 10.1145/2492517.2492644 |
0.384 |
|
2013 |
Nguyen DT, Shen Y, Thai MT. Detecting critical nodes in interdependent power networks for vulnerability assessment Ieee Transactions On Smart Grid. 4: 151-159. DOI: 10.1109/Tsg.2012.2229398 |
0.499 |
|
2013 |
Shen Y, Nguyen NP, Xuan Y, Thai MT. On the discovery of critical links and nodes for assessing network vulnerability Ieee/Acm Transactions On Networking. 21: 963-973. DOI: 10.1109/Tnet.2012.2215882 |
0.541 |
|
2013 |
Tiwari R, Dinh TN, Thai MT. On centralized and localized approximation algorithms for interference-aware broadcast scheduling Ieee Transactions On Mobile Computing. 12: 233-247. DOI: 10.1109/Tmc.2011.270 |
0.446 |
|
2013 |
Xuan Y, Shen Y, Nguyen NP, Thai MT. Efficient multi-link failure localization schemes in all-optical networks Ieee Transactions On Communications. 61: 1144-1151. DOI: 10.1109/Tcomm.2013.012313.110645 |
0.493 |
|
2013 |
Dinh TN, Thai MT. Community detection in scale-free networks: Approximation algorithms for maximizing modularity Ieee Journal On Selected Areas in Communications. 31: 997-1006. DOI: 10.1109/Jsac.2013.130602 |
0.525 |
|
2013 |
Shen Y, Nguyen DT, Thai MT. Adaptive approximation algorithms for hole healing in hybrid wireless sensor networks Proceedings - Ieee Infocom. 1178-1186. DOI: 10.1109/INFCOM.2013.6566909 |
0.375 |
|
2013 |
Dinh TN, Nguyen NP, Thai MT. An adaptive approximation algorithm for community detection in dynamic scale-free networks Proceedings - Ieee Infocom. 55-59. DOI: 10.1109/INFCOM.2013.6566734 |
0.396 |
|
2013 |
Nguyen DT, Zhang H, Das S, Thai MT, Dinh TN. Least cost influence in multiplex social networks: Model representation and analysis Proceedings - Ieee International Conference On Data Mining, Icdm. 567-576. DOI: 10.1109/ICDM.2013.24 |
0.359 |
|
2013 |
Zhang H, Dinh TN, Thai MT. Maximizing the spread of positive influence in online social networks Proceedings - International Conference On Distributed Computing Systems. 317-326. DOI: 10.1109/ICDCS.2013.37 |
0.307 |
|
2013 |
Nguyen DT, Das S, Thai MT. Influence maximization in multiple online social networks Globecom - Ieee Global Telecommunications Conference. 3060-3065. DOI: 10.1109/GLOCOM.2013.6831541 |
0.393 |
|
2013 |
Shen Y, Thai MT. Network vulnerability assessment under cascading failures Globecom - Ieee Global Telecommunications Conference. 1526-1531. DOI: 10.1109/GLOCOM.2013.6831290 |
0.443 |
|
2013 |
Nguyen NP, Yan G, Thai MT. Analysis of misinformation containment in online social networks Computer Networks. 57: 2133-2146. DOI: 10.1016/J.Comnet.2013.04.002 |
0.509 |
|
2012 |
Nguyen DT, Nguyen NP, Thai MT, Helal A. Optimal and distributed algorithms for coverage hole healing in hybrid sensor networks International Journal of Sensor Networks. 11: 228-240. DOI: 10.1504/Ijsnet.2012.047151 |
0.402 |
|
2012 |
Shen Y, Dinh TN, Zhang H, Thai MT. Interest-matching information propagation in multiple online social networks Acm International Conference Proceeding Series. 1824-1828. DOI: 10.1145/2396761.2398525 |
0.331 |
|
2012 |
Dinh TN, Shen Y, Thai MT. The walls have ears: Optimize sharing for visibility and privacy in online social networks Acm International Conference Proceeding Series. 1452-1461. DOI: 10.1145/2396761.2398451 |
0.316 |
|
2012 |
Nguyen NP, Yan G, Thai MT, Eidenbenz S. Containment of misinformation spread in online social networks Proceedings of the 3rd Annual Acm Web Science Conference, Websci'12. 213-222. DOI: 10.1145/2380718.2380746 |
0.402 |
|
2012 |
Shen Y, Syu YS, Nguyen DT, Thai MT. Maximizing circle of trust in online social networks Ht'12 - Proceedings of 23rd Acm Conference On Hypertext and Social Media. 155-164. DOI: 10.1145/2309996.2310023 |
0.331 |
|
2012 |
Li Y, Cao X, Beyah R, Thai MT. Guest editorial: Special issue on wireless computing and networking Tsinghua Science and Technology. 17: 485-486. DOI: 10.1109/Tst.2012.6314525 |
0.614 |
|
2012 |
Dinh TN, Xuan Y, Thai MT, Pardalos PM, Znati T. On new approaches of assessing network vulnerability: Hardness and approximation Ieee/Acm Transactions On Networking. 20: 609-619. DOI: 10.1109/Tnet.2011.2170849 |
0.54 |
|
2012 |
Xuan Y, Shen Y, Nguyen NP, Thai MT. A trigger identification service for defending reactive jammers in WSN Ieee Transactions On Mobile Computing. 11: 793-806. DOI: 10.1109/Tmc.2011.86 |
0.473 |
|
2012 |
Dinh TN, Shen Y, Thai MT. An efficient spectral bound for link vulnerability assessment in large-scale networks Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2012.6415860 |
0.387 |
|
2012 |
Nguyen DT, Nguyen NP, Thai MT. Sources of misinformation in Online Social Networks: Who to suspect? Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2012.6415780 |
0.324 |
|
2012 |
Nguyen NP, Thai MT. Finding overlapped communities in online social networks with Nonnegative Matrix Factorization Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2012.6415744 |
0.326 |
|
2012 |
Shen Y, Dinh TN, Thai MT. Adaptive algorithms for detecting critical links and nodes in dynamic networks Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2012.6415629 |
0.439 |
|
2012 |
Shen Y, Nguyen DT, Xuan Y, Thai MT. New techniques for approximating optimal substructure problems in power-law graphs Theoretical Computer Science. 447: 107-119. DOI: 10.1016/J.Tcs.2011.10.023 |
0.39 |
|
2012 |
Thai MT. Guest editorial: Computing and combinatorics Algorithmica. 64: 213-214. DOI: 10.1007/S00453-012-9649-Z |
0.387 |
|
2012 |
Nguyen NP, Xuan Y, Thai MT. On detection of community structure in dynamic social networks Springer Optimization and Its Applications. 58: 307-347. DOI: 10.1007/978-1-4614-0857-4_11 |
0.343 |
|
2012 |
Tiwari R, Thai MT. On enhancing fault tolerance of virtual backbone in a wireless sensor network with unidirectional links Springer Optimization and Its Applications. 61: 3-18. DOI: 10.1007/978-0-387-88619-0_1 |
0.426 |
|
2011 |
Nguyen NP, Dinh TN, Tokala S, Thai MT. Overlapping communities in dynamic networks: Their detection and mobile applications Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 85-95. DOI: 10.1145/2030613.2030624 |
0.387 |
|
2011 |
Dinh TN, Thai MT. Finding community structure with performance guarantees in scale-free networks Proceedings - 2011 Ieee International Conference On Privacy, Security, Risk and Trust and Ieee International Conference On Social Computing, Passat/Socialcom 2011. 888-891. DOI: 10.1109/PASSAT/SocialCom.2011.185 |
0.358 |
|
2011 |
Nguyen NP, Dinh TN, Nguyen DT, Thai MT. Overlapping community structures and their detection on social networks Proceedings - 2011 Ieee International Conference On Privacy, Security, Risk and Trust and Ieee International Conference On Social Computing, Passat/Socialcom 2011. 35-40. DOI: 10.1109/PASSAT/SocialCom.2011.16 |
0.331 |
|
2011 |
Shen Y, Xuan Y, Thai MT. On local approximation of minimum-latency broadcast scheduling in 3D MANETs Proceedings - Ieee Military Communications Conference Milcom. 866-871. DOI: 10.1109/MILCOM.2011.6127787 |
0.343 |
|
2011 |
Dinh TN, Thai MT. Precise structural vulnerability assessment via mathematical programming Proceedings - Ieee Military Communications Conference Milcom. 1351-1356. DOI: 10.1109/MILCOM.2011.6127492 |
0.449 |
|
2011 |
Nguyen DT, Nguyen NP, Thai MT, Helal A. An optimal algorithm for coverage hole healing in hybrid sensor networks Iwcmc 2011 - 7th International Wireless Communications and Mobile Computing Conference. 494-499. DOI: 10.1109/IWCMC.2011.5982583 |
0.302 |
|
2011 |
Nguyen NP, Dinh TN, Xuan Y, Thai MT. Adaptive algorithms for detecting community structure in dynamic social networks Proceedings - Ieee Infocom. 2282-2290. DOI: 10.1109/INFCOM.2011.5935045 |
0.381 |
|
2011 |
Shen Y, Nguyen NP, Thai MT. Exploiting the robustness on power-law networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6842: 379-390. DOI: 10.1007/978-3-642-22685-4_34 |
0.358 |
|
2010 |
Xuan Y, Shin I, Thai MT, Znati T. Detecting application denial-of-service attacks: A group-testing-based approach Ieee Transactions On Parallel and Distributed Systems. 21: 1203-1216. DOI: 10.1109/Tpds.2009.147 |
0.397 |
|
2010 |
Dinh TN, Xuan Y, Thai MT, Park EK, Znati T. On approximation of new optimization methods for assessing network vulnerability Proceedings - Ieee Infocom. DOI: 10.1109/INFCOM.2010.5462098 |
0.489 |
|
2010 |
Xuan Y, Shen Y, Nguyen NP, Thai MT. A graph-theoretic QoS-aware vulnerability assessment for network topologies Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2010.5683938 |
0.422 |
|
2010 |
Shin I, Shen Y, Thai MT. On approximation of dominating tree in wireless sensor networks Optimization Letters. 4: 393-403. DOI: 10.1007/S11590-010-0175-0 |
0.44 |
|
2010 |
Shen Y, Nguyen DT, Thai MT. On the hardness and inapproximability of optimization problems on power law graphs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6508: 197-211. DOI: 10.1007/978-3-642-17458-2_17 |
0.322 |
|
2010 |
Dinh TN, Shin I, Thai NK, Thai MT, Znati T. A general approach for modules identification in evolving networks Springer Optimization and Its Applications. 40: 83-100. DOI: 10.1007/978-1-4419-5689-7_4 |
0.392 |
|
2009 |
Thakur GS, Tiwari R, Thai MT, Chen SS, Dress AWM. Detection of local community structures in complex dynamic networks with random walks Iet Systems Biology. 3: 266-278. PMID 19640165 DOI: 10.1049/Iet-Syb.2007.0061 |
0.458 |
|
2009 |
Shin I, Shen Y, Xuan Y, Thai MT, Znati T. Reactive jamming attacks in multi-radio wireless sensor networks: An efficient mitigating measure by identifying trigger nodes Fowanc'09 - Proceedings of the 2nd Acm International Workshop On Foundations of Wireless Ad Hoc and Sensor Networking and Computing, Co-Located With Mobihoc'09. 87-96. DOI: 10.1145/1540343.1540357 |
0.356 |
|
2009 |
Wang F, Thai MT, Du DZ. On the construction of 2-connected virtual backbone in wireless networks Ieee Transactions On Wireless Communications. 8: 1230-1237. DOI: 10.1109/Twc.2009.051053 |
0.647 |
|
2009 |
Dinh TN, Xuan Y, Thai MT. Towards social-aware routing in dynamic communication networks 2009 Ieee 28th International Performance Computing and Communications Conference, Ipccc 2009. 161-168. DOI: 10.1109/PCCC.2009.5403845 |
0.385 |
|
2009 |
Xuan Y, Shen Y, Shin I, Thai MT. On trigger detection against Reactive Jamming Attacks: A clique-independent set based approach 2009 Ieee 28th International Performance Computing and Communications Conference, Ipccc 2009. 223-230. DOI: 10.1109/PCCC.2009.5403842 |
0.313 |
|
2009 |
Wang C, Thai MT, Li Y, Wang F, Wu W. Optimization scheme for sensor coverage scheduling with bandwidth constraints Optimization Letters. 3: 63-75. DOI: 10.1007/S11590-008-0091-8 |
0.618 |
|
2009 |
Thai MT, Znati T. On the complexity and approximation of non-unique probe selection using d-disjunct matrix Journal of Combinatorial Optimization. 17: 45-53. DOI: 10.1007/S10878-008-9188-3 |
0.324 |
|
2008 |
Thai MT, Wang F, Du DH, Jia X. Coverage problems in wireless sensor networks: Designs and analysis International Journal of Sensor Networks. 3: 191-200. DOI: 10.1504/Ijsnet.2008.018485 |
0.481 |
|
2008 |
Zhang N, Shin I, Zou F, Wu W, Thai MT. Trade-off scheme for fault tolerant connected dominating sets on size and diameter Proceedings of the International Symposium On Mobile Ad Hoc Networking and Computing (Mobihoc). 1-8. DOI: 10.1145/1374718.1374720 |
0.354 |
|
2008 |
Thai MT, Tiwari R, Du DZ. On construction of virtual backbone in wireless ad hoc networks with unidirectional links Ieee Transactions On Mobile Computing. 7: 1098-1109. DOI: 10.1109/Tmc.2008.22 |
0.671 |
|
2008 |
Wang F, Thai MT, Li Y, Cheng X, Du DZ. Fault-tolerant topology control for all-to-one and one-to-all communication in wireless networks Ieee Transactions On Mobile Computing. 7: 322-331. DOI: 10.1109/Tmc.2007.70743 |
0.724 |
|
2008 |
Thai MT, Xuan Y, Shin I, Znati T. On detection of malicious users using group testing techniques Proceedings - the 28th International Conference On Distributed Computing Systems, Icdcs 2008. 206-213. DOI: 10.1109/ICDCS.2008.75 |
0.313 |
|
2008 |
Zhang N, Shin I, Li B, Boyaci C, Tiwari R, Thai MT. New approximation for minimum-weight routing backbone in wireless sensor network Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5258: 96-108. DOI: 10.1007/978-3-540-88582-5-12 |
0.356 |
|
2007 |
Thai MT, Maccallum D, Deng P, Wu W. Decoding algorithms in pooling designs with inhibitors and error-tolerance. International Journal of Bioinformatics Research and Applications. 3: 145-52. PMID 18048185 DOI: 10.1504/Ijbra.2007.013599 |
0.684 |
|
2007 |
Wang F, Xu K, Thai MT, Du DZ. Fault tolerant topology control for one-to-all communications in symmetric wireless networks International Journal of Sensor Networks. 2: 163-168. DOI: 10.1504/Ijsnet.2007.013196 |
0.64 |
|
2007 |
Park MA, Willson J, Wang C, Thai M, Wu W, Farago A. A dominating and absorbent set in a wireless ad-hoc network with different transmission ranges Proceedings of the International Symposium On Mobile Ad Hoc Networking and Computing (Mobihoc). 22-31. DOI: 10.1145/1288107.1288111 |
0.461 |
|
2007 |
Tiwari R, Mishra T, Li Y, Thai MT. K-strongly connected m-dominating and absorbing set in wireless ad hoc networks with unidirectional links Wasa 2007 - the 2nd International Conference On Wireless Algorithms, Systems and Applications. 103-112. DOI: 10.1109/WASA.2007.28 |
0.406 |
|
2007 |
Thai MT, Wang F, Liu D, Zhu S, Du DZ. Connected dominating sets in wireless networks with different transmission ranges Ieee Transactions On Mobile Computing. 6: 721-730. DOI: 10.1109/Tmc.2007.1034 |
0.739 |
|
2007 |
Thai MT, Li Y, Du DZ, Wang F. O (log n) -localized algorithms on the coverage problem in heterogeneous sensor networks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 85-92. DOI: 10.1109/PCCC.2007.358882 |
0.585 |
|
2007 |
Wu Y, Wang F, Thai MT, Li Y. Constructing k-connected M-dominating sets in wireless sensor networks Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2007.4454774 |
0.576 |
|
2007 |
Wang C, Thai MT, Li Y, Wang F, Wu W. Minimum coverage breach and maximum network lifetime in wireless sensor networks Globecom - Ieee Global Telecommunications Conference. 1118-1123. DOI: 10.1109/GLOCOM.2007.215 |
0.566 |
|
2007 |
Thai MT, Cai Z, Du DZ. Genetic networks: Processing data, regulatory network modelling and their analysis Optimization Methods and Software. 22: 169-185. DOI: 10.1080/10556780600881860 |
0.528 |
|
2007 |
Thai MT, Zhang N, Tiwari R, Xu X. On approximation algorithms of k-connected m-dominating sets in disk graphs Theoretical Computer Science. 385: 49-59. DOI: 10.1016/J.Tcs.2007.05.025 |
0.439 |
|
2006 |
Li Y, Thai MT, Wang F, Du DZ. On the construction of a strongly connected broadcast arborescence with bounded transmission delay Ieee Transactions On Mobile Computing. 5: 1460-1470. DOI: 10.1109/Tmc.2006.154 |
0.714 |
|
2006 |
Thai MT. 2-Connected dominating set in wireless networks Proc. - Seventh Acis Int. Conf. On Software Eng., Artific. Intelligence, Netw., and Parallel/Distributed Comput., Snpd 2006, Including Second Acis Int. Worshop On Sawn 2006. 2006: 227. DOI: 10.1109/SNPD-SAWN.2006.1 |
0.371 |
|
2006 |
Thai MT, Du DZ. Connected dominating sets in disk graphs with bidirectional links Ieee Communications Letters. 10: 138-140. DOI: 10.1109/Lcomm.2006.1603363 |
0.652 |
|
2006 |
Gao H, Hwang FK, Thai MT, Wu W, Znati T. Construction of d(H)-disjunct matrix for group testing in hypergraphs Journal of Combinatorial Optimization. 12: 297-301. DOI: 10.1007/S10878-006-9634-Z |
0.336 |
|
2006 |
Du DZ, Thai MT, Li Y, Liu D, Zhu S. Strongly connected dominating sets in wireless sensor networks with unidirectional links Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3841: 13-24. DOI: 10.1007/11610113_2 |
0.7 |
|
2005 |
Li Y, Thai MT, Liu Z, Wu W. Protein-protein interaction and group testing in bipartite graphs. International Journal of Bioinformatics Research and Applications. 1: 414-9. PMID 18048145 DOI: 10.1504/Ijbra.2005.008444 |
0.519 |
|
2005 |
Thai MT, Li Y, Du DZ. A combination of wireless multicast advantage and Hitch-hiking Ieee Communications Letters. 9: 1037-1039. DOI: 10.1109/Lcomm.2005.1576580 |
0.687 |
|
2005 |
Li J, Li Y, Thai MT. Data caching and query processing in MANETs International Journal of Pervasive Computing and Communications. 1: 169-178. DOI: 10.1108/17427370580000122 |
0.545 |
|
2005 |
Guo L, Wu W, Wang F, Thai M. An approximation for minimum multicast route in optical networks with nonsplitting nodes Journal of Combinatorial Optimization. 10: 391-394. DOI: 10.1007/S10878-005-4925-3 |
0.473 |
|
2005 |
Du H, Jia X, Wang F, Thai M, Li Y. A note on optical network with nonsplitting nodes Journal of Combinatorial Optimization. 10: 199-202. DOI: 10.1007/S10878-005-2273-Y |
0.605 |
|
2005 |
Li Y, Thai MT, Wang F, Yi CW, Wan PJ, Du DZ. On greedy construction of connected dominating sets in wireless networks Wireless Communications and Mobile Computing. 5: 927-932. DOI: 10.1002/Wcm.356 |
0.705 |
|
2005 |
Thai MT, Li Y, Du DZ, Ai C. On the construction of energy-efficient broadcast tree with hitch-hiking in wireless networks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 135-139. |
0.316 |
|
Show low-probability matches. |