A hybrid service selection and composition model for cloud-edge computing in the internet of things M Hosseinzadeh, QT Tho, S Ali, AM Rahmani, A Souri, M Norouzi, ... IEEE Access 8, 85939-85949, 2020 | 56 | 2020 |
An enhanced authentication protocol for RFID systems M Hosseinzadeh, OH Ahmed, SH Ahmed, C Trinh, N Bagheri, S Kumari, ... IEEE Access 8, 126977-126987, 2020 | 33 | 2020 |
An efficient approach for mining sequential patterns using multiple threads on very large databases B Huynh, C Trinh, H Huynh, TT Van, B Vo, V Snasel Engineering Applications of Artificial Intelligence 74, 242-251, 2018 | 31 | 2018 |
An efficient method for mining frequent sequential patterns using multi-Core processors B Huynh, B Vo, V Snasel Applied Intelligence 46 (3), 703–716, 2017 | 28 | 2017 |
Optimized fuzzy clustering using moth-flame optimization algorithm in wireless sensor networks C Trinh, B Huynh, M Bidaki, AM Rahmani, M Hosseinzadeh, M Masdari Artificial Intelligence Review 55 (3), 1915-1945, 2022 | 24 | 2022 |
An efficient parallel method for mining frequent closed sequential patterns B Huynh, B Vo, V Snasel IEEE Access 5, 17392-17402, 2017 | 22 | 2017 |
Mining constrained inter-sequence patterns: a novel approach to cope with item constraints T Le, A Nguyen, B Huynh, B Vo, W Pedrycz Applied Intelligence 48 (5), 1327-1343, 2018 | 21 | 2018 |
A novel lightweight block cipher-based mutual authentication protocol for constrained environments C Trinh, B Huynh, J Lansky, S Mildeova, M Safkhani, N Bagheri, S Kumari, ... IEEE Access 8, 165536-165550, 2020 | 19 | 2020 |
A new strong adversary model for RFID authentication protocols M Hosseinzadeh, J Lansky, AM Rahmani, C Trinh, M Safkhani, N Bagheri, ... IEEE Access 8, 125029-125045, 2020 | 17 | 2020 |
A parallel method for mining frequent patterns with multiple minimum support thresholds B Huynh, C Trinh, V Dang, B Vo International Journal of Innovative Computing, Information and Control 15 (2 …, 2019 | 9 | 2019 |
An efficient method for mining erasable itemsets using multicore processor platform B Huynh, B Vo Complexity 2018 (1), 8487641, 2018 | 9 | 2018 |
Detecting malicious Fast-Flux domains using feature-based classification techniques J DT Truong, DT Tran, B Huynh Journal of Internet Technology 21 (4), 1061-1072, 2020 | 8 | 2020 |
Constraint-based method for mining colossal patterns in high dimensional databases TL Nguyen, B Vo, B Huynh, V Snasel, LTT Nguyen Information Systems Architecture and Technology: Proceedings of 38th …, 2018 | 8 | 2018 |
Mining colossal patterns with length constraints T Le, TL Nguyen, B Huynh, H Nguyen, TP Hong, V Snasel Applied Intelligence, 1-12, 2021 | 7 | 2021 |
Efficient methods for clickstream pattern mining on incremental databases B Vo, HC Nguyen, B Huynh, T Le IEEE Access 9, 161305-161317, 2021 | 6 | 2021 |
Parallel Frequent Subgraph Mining on Multi-Core Processor Systems B Huynh, D Nguyen, B Vo ICIC-EL 10 (9), 2105-2113, 2016 | 6 | 2016 |
Using Multi-Core Processors for Mining Frequent Sequential Patterns B Huynh, B Vo ICIC-EL 9 (11), 3071-3079, 2015 | 6 | 2015 |
Efficient method for mining high-utility itemsets using high-average utility measure LTT Nguyen, TDD Nguyen, A Nguyen, PN Tran, C Trinh, B Huynh, B Vo Computational Collective Intelligence: 12th International Conference, ICCCI …, 2020 | 5 | 2020 |
A novel approach for mining closed clickstream patterns B Huynh, LTT Nguyen, HM Huynh, A Kozierkiewicz, U Yun, ZK Oplatková, ... Cybernetics and Systems 52 (5), 328-349, 2021 | 2 | 2021 |
An efficient method for mining clickstream patterns BV Bui, B Vo, HM Huynh, TA Nguyen-Hoang, B Huynh Rough Sets: International Joint Conference, IJCRS 2018, Quy Nhon, Vietnam …, 2018 | 2 | 2018 |