Abstract is missing.
- Training-Free Multi-Objective and Many-Objective Evolutionary Neural Architecture Search with Synaptic FlowAn Vo, Tan Ngoc Pham, Van Bich Nguyen, Ngoc Hoang Luong. 1-8 [doi]
- Optimizing energy generation in short-term hydro unit commitment using efficiency pointsLuat Le Ba, Bach Do Viet, Hoang Ha Minh, Giang Pham Hoang. 9-14 [doi]
- Implementation of a RISC-V SMT Core in an AI processorHidetaro Tanaka, Tomoaki Tanaka, Ryosuke Higashi, Tsutomu Sekibe, Shuichi Takada, Hironori Nakajo. 15-22 [doi]
- Multi-task Learning-based Text Classification with Subword-Phrase ExtractionYusuke Kimura, Takahiro Komamizu, Kenji Hatano. 23-30 [doi]
- Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware DetectorsThe Duy Phan, Tran Duc Luong, Nguyen Hoang Quoc An, Quyen Nguyen Huu, Hoang Khoa Nghi, Van-Hau Pham. 31-38 [doi]
- Benchmarking Gradient Estimation Mechanisms in Evolution Strategies for Solving Black-Box Optimization Functions and Reinforcement Learning ProblemsThai Bao Tran, Ngoc Hoang Luong. 39-46 [doi]
- Solving resource forecasting in WiFi Network by NeuralProphetAnh Son Ta, Ngoc Bach Pham. 47-51 [doi]
- Method for Evaluating Quality of Automatically Generated Product DescriptionsKenji Fukumoto, Risa Takeuchi, Akiyo Nadamoto. 52-58 [doi]
- Cross-Location Activity Recognition using Adversarial LearningAsad Khattak, Adil Khan. 59-65 [doi]
- Random Generative Adversarial NetworksKhoa Nguyen, Nghia Vu, Dung Nguyen, Khoat Than. 66-73 [doi]
- A Shape of Geo-tagged Media Bias in COVID-19 Related TwitterTaehoon Kim, Yijun Duan, Kyoung-Sook Kim. 74-81 [doi]
- An Experiment on Localization of Ontology Concepts in Deep Convolutional Neural NetworksAnton Agafonov, Andrew Ponomarev. 82-87 [doi]
- Methods of Calculating Usefulness Ratings of Behavioral Facilitation Tweets in Disaster SituationsFuto Yamamoto, Tadahiko Kumamoto, Yu Suzuki, Akiyo Nadamoto. 88-95 [doi]
- An incorporation of deep temporal convolutional networks with hidden markov models post-processing for sensor-based human activity recognitionLinh Trinh, Bach Ha. 96-102 [doi]
- Unsupervised Air Quality Interpolation with Attentive Graph Neural NetworkThu Hang Phung, Duc-Long Nguyen, Viet-Hung Vu, Thanh Trung Huynh, Thanh-Hung Nguyen, Phi-Le Nguyen. 103-110 [doi]
- Identifying A Target Scope of Complaints on Social MediaKazuhiro Ito, Taichi Murayama, Shuntaro Yada, Shoko Wakamiya, Eiji Aramaki. 111-118 [doi]
- A Study on Machine Learning Based Gene Selection for Pediatric Sepsis ClassificationVan Duc Khuat, Tuan Anh Tran 0005, Minh Tuan Nguyen, Hai-Chau Le. 119-125 [doi]
- Investigate Evolutionary Strategies for Black-box Attacks to Deepfake Forensic SystemsNguyen Thi My Binh, Dao Hoang Long, Nguyen-Ngoc, Huynh Thi Thanh Binh, Nguyen Khanh Phuong. 126-133 [doi]
- Leveraging Deep Learning Image Classifiers for Visual Similarity-based Phishing Website DetectionNguyen Bac Trinh, The Duy Phan, Van-Hau Pham. 134-141 [doi]
- A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality PreservationHien Do Thi Thu, The Duy Phan, Hao Le Anh, Lan Nguyen Duy, Khoa Nghi Hoang, Van-Hau Pham. 142-149 [doi]
- Knowledge-defined Heterogeneous Network: Use-case of QoS-based Server and Route Selection in Large-scale NetworkNam-Thang Hoang, Cong-Son Duong, Tran-Le-Tuan Nguyen, Van Tong, Hai Anh Tran. 150-157 [doi]
- Detecting DGA Botnet based on Malware Behavior AnalysisKhanh Nguyen Quoc, Tung Bui, Dong Le, Duc Tran, Toan Nguyen, Huu Trung Nguyen Nguyen. 158-164 [doi]
- Assessing web security risks using dynamic Bayesian networkThi-Huong-Giang Vu, Trung-Hieu Hoang, Manh Tuan Nguyen. 165-172 [doi]
- An LSTM-based Approach for Predicting Resource Utilization in Cloud ComputingTu Nguyen, Tri Do, Khanh Le, Seungkyu Go, Sunghyun Na, Dukyun Kim, Duc Tran. 173-179 [doi]
- Performance Analysis of Short-Packet Communications in Multi-RIS-based Uplink SystemsThi-Mien Nguyen, Linh T. Nguyen, Khac-Tuan Nguyen, Hai-Chau Le. 180-185 [doi]
- Decision graph for timely delivery of multi-AGVs in healthcare environmentThanh Nguyen Tien, Khanh-Van Nguyen. 186-192 [doi]
- An Empirical Study of MPQUIC Schedulers in Mobile Wireless NetworksMinh Hai Vu, Giang T. T. Nguyen, Hai Dang Tran, Thanh Trung Nguyen, Phan-Thuan Do, Phi-Le Nguyen, Kien Nguyen. 193-200 [doi]
- Experimental Evaluation of Multiple Multipath Schedulers over Various Urban Mobile EnvironmentsPapa Bara Diakhate, Tran-Tuan Chu, Mohamed Aymen Labiod, Brice Augustin, Hai Anh Tran, Abdelhamid Mellouk. 201-207 [doi]
- Leveraging AI-Driven Realtime Intrusion Detection by Using WGAN and XGBoostHoang V. Vo, Duong H. Nguyen, Tuyen T. Nguyen, Hoa N. Nguyen, Duan V. Nguyen. 208-215 [doi]
- COVID-19 Deep Clustering: An Ontology construction clustering method with dynamic medical labelingCong-Phuoc Phan, Jung-Hsien Chiang. 216-222 [doi]
- Sports Visual Data Analysis with Deep VisionMinh-Hieu Huynh, Bao Bui-Xuan, Minh-Triet Tran. 223-230 [doi]
- EnsFace: An Ensemble Method of Deep Convolutional Neural Networks with Novel Effective Loss Functions for Face RecognitionAnh-Duc Nguyen, Dat Trong Nguyen, Hanh Phuong Du, Hai Nam Dao Ngoc, Hoa Ngoc Nguyen. 231-238 [doi]
- A study on skeleton-based action recognition and its application to physical exercise recognitionQuang-Tien Pham, Duc Anh Nguyen, Tien Thanh Nguyen, Thanh-Nam Nguyen, Duy-Tung Nguyen, Dinh-Tan Pham, Thanh-Hai Tran 0001, Thi-Lan Le, Hai Vu. 239-246 [doi]
- Utilizing Keywords Evolution in Context for Emerging Trend Detection in Scientific PublicationsNhu Khoa Nguyen, Emanuela Boros, Gaël Lejeune, Antoine Doucet, Thierry Delahaut. 247-253 [doi]
- A robust and high-performance neural network for classifying landmarks in upper gastrointestinal endoscopy imagesHai Vu, Cong Nguyen Xuan, Minh Nghia Le, Duc Anh Nguyen, Viet Hang Dao. 254-261 [doi]
- An integration of Pseudo Anomalies and Memory Augmented Autoencoder for Video Anomaly DetectionAnh Le, Quang Uy Nguyen, Ngoc Tran Nguyen, Hai-Hong Phan, Thi Huong Chu. 262-269 [doi]
- Improving Self-supervised Audio Representation based on Contrastive Learning with Conformer EncoderQuang Tien Duong, Duc Huy Nguyen, Bao Thang Ta, Nhat Minh Le, Van Hai Do. 270-275 [doi]
- Improving Khmer-Vietnamese Machine Translation with Data Augmentation methodsHanh Pham Van, Huong Le Thanh. 276-282 [doi]
- Designing and Implementation of Novel Ensemble model based on ANFIS and Gradient Boosting methods for Hand Gestures ClassificationNamal Rathnayake, Tuan Linh Dang, Yukinobu Hoshino. 283-289 [doi]
- Intent Detection and Slot Filling with Low Resource and DomainHuu Hiep Nguyen, Ngoc Dung Nguyen, Khac-Hoai Nam Bui. 290-294 [doi]
- Retrieving Keywords in Historical Vietnamese Stele Images Without Human AnnotationsAnna Scius-Bertrand, Andreas Fischer 0002, Marc Bui. 295-301 [doi]
- Motion Embedded Image: A combination of spatial and temporal features for action recognitionTri Le, Nham Huynh-Duc, Chung Thai Nguyen, Minh-Triet Tran. 302-308 [doi]
- Prototype of a parking system with path recommendationTuan Linh Dang, Sy Dat Tran, Thuy Ha Hoang, Trong-Nghia Nguyen, Tuan Minh Vu. 309-316 [doi]
- Error Resilient Deep Compressive SensingThuong Nguyen Canh, Trinh Van Chien, Quyet Bui Van. 317-321 [doi]
- Incremental Boundary Refinement using Self Axial Reverse Attention and Uncertainty-aware Gate for Colon Polyp SegmentationSang Dinh Viet, Quang Do Duy. 322-328 [doi]
- Improving text recognition by combining visual and linguistic features of textCong Tran, Khanh Nguyen Trong, Cuong Pham, Dat Tran-Anh, Tien Nguyen-Thi-Tan. 329-335 [doi]
- Model Checking Techniques Enable Schedulability Analysis of Real-Time SystemsNhat-Hoa Tran. 336-343 [doi]
- Generating Multi-platform Single Page Applications: A Hierarchical Domain-Driven Design ApproachDuc Minh Le, Anh Phuong Nguyen, Linh Quang Tran, Hong Thi Le, Hai Van-Anh Tong. 344-351 [doi]
- Automatic Stub Generation for Dynamic Symbolic Execution of ARM binaryAnh T. V. Nguyen, Mizuhito Ogawa. 352-359 [doi]
- Combining Deep Learning and Kernel PCA for Software Defect PredictionAnh Ho, Nguyen Nhat Hai, Bui Thi Mai Anh. 360-367 [doi]
- ml-Codesmell: A code smell prediction dataset for machine learning approachesBinh Nguyen Thanh, Minh Nguyen N. H., Hanh Le Thi My, Binh Nguyen Thanh. 368-374 [doi]
- Query-based Performance Comparison of Graph Database and Relational DatabaseThi-Thu-Trang Do, Thai-Bao Mai-Hoang, Van-Quyet Nguyen, Quyet Thang Huynh. 375-381 [doi]
- An improved NSGA-II based-on project scheduling principles for workforce scheduling optimization in warehouseThi-Huong-Giang Vu, Thi-Hong-Anh Nguyen. 382-389 [doi]
- Big Data Knowledge Acquisition Platform for Smart FarmingVan-Quyet Nguyen, Van-Hau Nguyen, Minh-Quy Nguyen, Quyet Thang Huynh, Kyungbaek Kim. 390-397 [doi]
- Blockmarking: Hybrid model of blockchain and watermarking technique for copyright protectionLe Danh Tai, Nguyen Van Thanh, Ta Minh Thanh. 398-404 [doi]
- Analysis Model for Decentralized Lending ProtocolsViet-Bang Pham, Tuan-Dat Trinh. 405-412 [doi]
- Empirical Analysis of Filter Feature Selection Criteria on Financial DatasetsBui Quoc Trung, Tran Van Tri, Bui Thi Mai Anh. 413-419 [doi]
- B4E: A System for Creating and Validating Digital Credentials using Remote Signing and BlockchainBa-Lam Do, Hoang-Nam Dinh, Van Thanh Nguyen, Manh-Hung Tran, Thanh-Long Le, Viet-Thang Nghiem. 420-426 [doi]
- V-Endpoint: Decentralized Endpoint for Blockchain Applications Based on Spark and Byzantine ConsensusThanh-Chung Dao, Duc Pham, Tien Thao Nguyen, Ba-Lam Do, Binh Minh Nguyen. 427-434 [doi]
- A Privacy-Preserving Approach For Building Learning Models in Smart Healthcare using Blockchain and Federated LearningLuyen Ngan Van, Anh Hoang Tuan, Duy Phan The, Tan-Khoa Vo, Van-Hau Pham. 435-441 [doi]
- k-Submodular Cover Problem: Application and AlgorithmsPhuong N. H. Pham, Quy T. N. Co, Anh N. Su, Phuong T. Pham, Canh V. Pham, Václav Snásel. 442-449 [doi]