default search action
Kim-Hung Le
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Hoai-Chau Tran, Anh-Duy Tran, Kim-Hung Le:
DetectVul: A statement-level code vulnerability detection for Python. Future Gener. Comput. Syst. 163: 107504 (2025) - 2024
- [c18]Minh-Hao Ho, Nhu-Y. Tran-Van, Kim-Hung Le:
A Multi-Input Bi-LSTM Autoencoder Model with Wavelet Transform for Air Quality Prediction. MAPR 2024: 1-6 - [c17]Hoang-Cong-Thanh Nguyen, Xuan-Ha Nguyen, Kim-Hung Le:
An Automated Benchmarking Framework for Anomaly-based Intrusion Detection Systems. MAPR 2024: 1-6 - 2023
- [j8]Huy-Tan Thai, Kim-Hung Le, Ngan Luu-Thuy Nguyen:
FormerLeaf: An efficient vision transformer for Cassava Leaf Disease detection. Comput. Electron. Agric. 204: 107518 (2023) - [j7]Huy-Tan Thai, Kim-Hung Le, Ngan Luu-Thuy Nguyen:
Towards sustainable agriculture: A lightweight hybrid model and cloud-based collection of datasets for efficient leaf disease detection. Future Gener. Comput. Syst. 148: 488-500 (2023) - [j6]Kim-Hung Le, Khanh-Hoi Le Minh, Huy-Tan Thai:
BrainyEdge: An AI-enabled framework for IoT edge computing. ICT Express 9(2): 211-221 (2023) - [j5]Xuan-Ha Nguyen, Kim-Hung Le:
Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model. Internet Things 23: 100851 (2023) - [j4]Dat-Thinh Nguyen, Kim-Hung Le:
The robust scheme for intrusion detection system in Internet of Things. Internet Things 24: 100999 (2023) - [c16]Ngoc-Truong Nguyen, Ton-Nhan Le, Khanh-Hoi Le Minh, Kim-Hung Le:
Towards Generating Semi-Synthetic Datasets for Network Intrusion Detection System. ICOIN 2023: 62-66 - [c15]Dat-Thinh Nguyen, Xuan-Ha Nguyen, Kim-Hung Le:
The Impact of Rotational Invariance on Tree- and Deep Learning-Based Network Intrusion Detection System. RIVF 2023: 509-514 - [c14]Xuan-Ha Nguyen, Dat-Thinh Nguyen, Kim-Hung Le:
Benchmarking SVM Variants for Unsupervised Intrusion Detection System. RIVF 2023: 521-526 - 2022
- [j3]Xuan-Ha Nguyen, Xuan-Duong Nguyen, Hoang-Hai Huynh, Kim-Hung Le:
Realguard: A Lightweight Network Intrusion Detection System for IoT Gateways. Sensors 22(2): 432 (2022) - [c13]Khanh-Hoi Le Minh, Kim-Hung Le, Quan Le Trung:
A lightweight Machine-learning based Wireless Link Estimation for IoT devices. APCC 2022: 526-531 - [c12]Thanh-Nhan Nguyen, Khanh-Mai Dang, Anh-Duy Tran, Kim-Hung Le:
Towards an Attention-Based Threat Detection System for IoT Networks. FDSE (CCIS Volume) 2022: 301-315 - [c11]Xuan-Ha Nguyen, Xuan-Duong Nguyen, Kim-Hung Le:
Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection System. ISPEC 2022: 382-396 - [c10]Dang-Khoa Luong-Huu, Tan-An Ngo, Huy-Tan Thai, Kim-Hung Le:
A Real-time Border Surveillance System using Deep Learning and Edge Computing. RIVF 2022: 1-6 - [c9]Thi-Ngoc-Phuc Ho, Thuy-Linh Nguyen, Xuan-Ha Nguyen, Kim-Hung Le:
Enhancing Explainability of Machine Learning-based Intrusion Detection Systems. RIVF 2022: 606-611 - 2021
- [j2]Thang Trung Nguyen, Kim Hung Le, Tan Minh Phan, Minh Quan Duong:
An Effective Reactive Power Compensation Method and a Modern Metaheuristic Algorithm for Loss Reduction in Distribution Power Networks. Complex. 2021: 8346738:1-8346738:21 (2021) - [c8]Huu-Vinh Nguyen, Hung Nguyen, Kim Hung Le, Minh Tien Cao, Qui-Thoi Le, Ngoc-Tuan Tran:
Application Firefly Algorithm for Improvement STATCOM Controller to Enhance the Stability in a Grid Connected to Wind Power. ICSSE 2021: 1-6 - [c7]Khanh-Hoi Le Minh, Kim-Hung Le:
AirGen: GAN-based synthetic data generator for air monitoring in Smart City. RTSI 2021: 317-322 - 2020
- [j1]Kim-Hung Le, Quan Le Trung:
User-Driven Adaptive Sampling for Massive Internet of Things. IEEE Access 8: 135798-135810 (2020) - [c6]Kim-Hung Le, Paolo Papotti:
User-driven Error Detection for Time Series with Events. ICDE 2020: 745-757
2010 – 2019
- 2019
- [c5]Kim-Hung Le, Soumya Kanti Datta, Christian Bonnet, François Hamon:
WoT-AD: A Descriptive Language for Group of Things in Massive IoT. WF-IoT 2019: 257-262 - 2018
- [c4]Minh Quan Duong, Kim Hung Le, Francesco Grimaccia, Sonia Leva, Marco Mussetta:
Modeling and Performance Evaluation of a Fuzzy Logic Controller for Buck-Boost DC/DC Converters. FUZZ-IEEE 2018: 1-7 - 2017
- [c3]Kim-Hung Le, Soumya Kanti Datta, Christian Bonnet, François Hamon, Alexandre Boudonne:
An industrial IoT framework to simplify connection process using system-generated connector. RTSI 2017: 1-6 - [c2]Kim-Hung Le, Soumya Kanti Datta, Christian Bonnet, François Hamon, Alexandre Boudonne:
A scalable IoT framework to design logical data flow using virtual sensor. WiMob 2017: 1-7 - 2016
- [c1]Minh Quan Duong, Francesco Grimaccia, Sonia Leva, Marco Mussetta, Kim Hung Le:
A hybrid Fuzzy-PI cascade controller for transient stability improvement in DFIG wind generators. FUZZ-IEEE 2016: 1733-1739
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint