


default search action
Kim-Hung Le
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j18]Xuan Chau Le
, Kim Hung Le, Minh Quan Duong
:
Model-Free Fast Integral Terminal Sliding Mode Control for Maximum Power Point Tracking With High-Order Disturbance Observer in WECSs. IEEE Access 14: 15311-15330 (2026)
[j17]Hoang-Trung Le-Pham
, The-Phong Nguyen
, Anh-Duy Tran
, Kim-Hung Le
:
MTAS: A temporal-aware multiview graph attention framework for early rumor detection on social media. Inf. Fusion 126: 103598 (2026)- 2025
[j16]Ngoc-Truong Nguyen
, Kim-Hung Le
:
Beyond VirusTotal: A semantic approach to building reliable and up-to-date android malware datasets from threat reports. Array 28: 100583 (2025)
[j15]Huy-Tan Thai
, Kim-Hung Le
, Ngan Luu-Thuy Nguyen:
EF-CenterNet: An efficient anchor-free model for UAV-based banana leaf disease detection. Comput. Electron. Agric. 231: 109927 (2025)
[j14]Hoang-Hai Huynh, Xuan-Ha Nguyen, Xuan-Duong Nguyen, Kim-Hung Le:
Bigsids: an efficient SDN-based network intrusion detection systems for big data environments. Clust. Comput. 28(6): 395 (2025)
[j13]Nhu-Y. Tran-Van, Kim-Hung Le
:
A multimodal skin lesion classification through cross-attention fusion and collaborative edge computing. Comput. Medical Imaging Graph. 124: 102588 (2025)
[j12]Hoai-Chau Tran
, Anh-Duy Tran, Kim-Hung Le
:
DetectVul: A statement-level code vulnerability detection for Python. Future Gener. Comput. Syst. 163: 107504 (2025)
[j11]Van-Linh Truong-Dang, Huy-Tan Thai
, Kim-Hung Le
:
TinyResViT: A lightweight hybrid deep learning model for on-device corn leaf disease detection. Internet Things 30: 101495 (2025)
[j10]Xuan-Ha Nguyen
, Kim-Hung Le
:
nNFST: A single-model approach for multiclass novelty detection in network intrusion detection systems. J. Netw. Comput. Appl. 236: 104128 (2025)
[j9]Nhu-Y. Tran-Van, Kim-Hung Le
:
CoFANN: A collaborative framework for accelerating DNN inference in drone-based agricultural monitoring systems. Simul. Model. Pract. Theory 144: 103176 (2025)
[c21]Dat-Thinh Nguyen, Kim-Hung Le, Nhien-An Le-Khac
:
Stabilizing Data-Free Model Extraction. ECAI 2025: 1905-1912
[c20]Huy-Cuong Nguyen
, Hoang-Trung Le-Pham
, Xuan-Ha Nguyen
, Khanh-Hoi Le Minh
, Kim-Hung Le
:
A Dual-Layer Defense Mechanism for Dropout Attack in Wireless Link Estimation. ICCCI (2) 2025: 169-183
[i2]Dat-Thinh Nguyen, Kim-Hung Le, Nhien-An Le-Khac:
Stabilizing Data-Free Model Extraction. CoRR abs/2509.11159 (2025)- 2024
[c19]Qui Cao, Phuc Dao-Hoang, Dat-Thinh Nguyen, Xuan-Ha Nguyen, Kim-Hung Le:
BERT-Enhanced DGA Botnet Detection: A Comparative Analysis of Machine Learning and Deep Learning Models. ICCAIS 2024: 1-6
[c18]Minh-Hao Ho, Nhu-Y. Tran-Van, Kim-Hung Le:
A Multi-Input Bi-LSTM Autoencoder Model with Wavelet Transform for Air Quality Prediction. MAPR 2024: 1-6
[c17]Hoang-Cong-Thanh Nguyen, Xuan-Ha Nguyen, Kim-Hung Le:
An Automated Benchmarking Framework for Anomaly-based Intrusion Detection Systems. MAPR 2024: 1-6
[i1]Trong-Nhan Phan, Hoang-Hai Nguyen, Thi-Thu-Hien Ha, Huy-Tan Thai, Kim-Hung Le:
Deep Learning Models for UAV-Assisted Bridge Inspection: A YOLO Benchmark Analysis. CoRR abs/2411.04475 (2024)- 2023
[j8]Huy-Tan Thai
, Kim-Hung Le
, Ngan Luu-Thuy Nguyen:
FormerLeaf: An efficient vision transformer for Cassava Leaf Disease detection. Comput. Electron. Agric. 204: 107518 (2023)
[j7]Huy-Tan Thai
, Kim-Hung Le
, Ngan Luu-Thuy Nguyen:
Towards sustainable agriculture: A lightweight hybrid model and cloud-based collection of datasets for efficient leaf disease detection. Future Gener. Comput. Syst. 148: 488-500 (2023)
[j6]Kim-Hung Le
, Khanh-Hoi Le Minh
, Huy-Tan Thai
:
BrainyEdge: An AI-enabled framework for IoT edge computing. ICT Express 9(2): 211-221 (2023)
[j5]Xuan-Ha Nguyen
, Kim-Hung Le
:
Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model. Internet Things 23: 100851 (2023)
[j4]Dat-Thinh Nguyen
, Kim-Hung Le
:
The robust scheme for intrusion detection system in Internet of Things. Internet Things 24: 100999 (2023)
[c16]Ngoc-Truong Nguyen
, Ton-Nhan Le, Khanh-Hoi Le Minh, Kim-Hung Le
:
Towards Generating Semi-Synthetic Datasets for Network Intrusion Detection System. ICOIN 2023: 62-66
[c15]Dat-Thinh Nguyen
, Xuan-Ha Nguyen, Kim-Hung Le
:
The Impact of Rotational Invariance on Tree- and Deep Learning-Based Network Intrusion Detection System. RIVF 2023: 509-514
[c14]Xuan-Ha Nguyen, Dat-Thinh Nguyen
, Kim-Hung Le
:
Benchmarking SVM Variants for Unsupervised Intrusion Detection System. RIVF 2023: 521-526- 2022
[j3]Xuan-Ha Nguyen
, Xuan-Duong Nguyen
, Hoang-Hai Huynh, Kim-Hung Le
:
Realguard: A Lightweight Network Intrusion Detection System for IoT Gateways. Sensors 22(2): 432 (2022)
[c13]Khanh-Hoi Le Minh, Kim-Hung Le
, Quan Le Trung:
A lightweight Machine-learning based Wireless Link Estimation for IoT devices. APCC 2022: 526-531
[c12]Thanh-Nhan Nguyen, Khanh-Mai Dang, Anh-Duy Tran
, Kim-Hung Le
:
Towards an Attention-Based Threat Detection System for IoT Networks. FDSE (CCIS Volume) 2022: 301-315
[c11]Xuan-Ha Nguyen
, Xuan-Duong Nguyen
, Kim-Hung Le
:
Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection System. ISPEC 2022: 382-396
[c10]Dang-Khoa Luong-Huu, Tan-An Ngo, Huy-Tan Thai, Kim-Hung Le
:
A Real-time Border Surveillance System using Deep Learning and Edge Computing. RIVF 2022: 1-6
[c9]Thi-Ngoc-Phuc Ho, Thuy-Linh Nguyen, Xuan-Ha Nguyen
, Kim-Hung Le
:
Enhancing Explainability of Machine Learning-based Intrusion Detection Systems. RIVF 2022: 606-611- 2021
[j2]Thang Trung Nguyen
, Kim Hung Le
, Tan Minh Phan
, Minh Quan Duong
:
An Effective Reactive Power Compensation Method and a Modern Metaheuristic Algorithm for Loss Reduction in Distribution Power Networks. Complex. 2021: 8346738:1-8346738:21 (2021)
[c8]Huu-Vinh Nguyen, Hung Nguyen, Kim Hung Le, Minh Tien Cao, Qui-Thoi Le, Ngoc-Tuan Tran:
Application Firefly Algorithm for Improvement STATCOM Controller to Enhance the Stability in a Grid Connected to Wind Power. ICSSE 2021: 1-6
[c7]Khanh-Hoi Le Minh
, Kim-Hung Le
:
AirGen: GAN-based synthetic data generator for air monitoring in Smart City. RTSI 2021: 317-322- 2020
[j1]Kim-Hung Le
, Quan Le Trung
:
User-Driven Adaptive Sampling for Massive Internet of Things. IEEE Access 8: 135798-135810 (2020)
[c6]Kim-Hung Le
, Paolo Papotti
:
User-driven Error Detection for Time Series with Events. ICDE 2020: 745-757
2010 – 2019
- 2019
[c5]Kim-Hung Le
, Soumya Kanti Datta, Christian Bonnet, François Hamon:
WoT-AD: A Descriptive Language for Group of Things in Massive IoT. WF-IoT 2019: 257-262- 2018
[c4]Minh Quan Duong
, Kim Hung Le, Francesco Grimaccia, Sonia Leva, Marco Mussetta:
Modeling and Performance Evaluation of a Fuzzy Logic Controller for Buck-Boost DC/DC Converters. FUZZ-IEEE 2018: 1-7- 2017
[c3]Kim-Hung Le
, Soumya Kanti Datta, Christian Bonnet, François Hamon, Alexandre Boudonne:
An industrial IoT framework to simplify connection process using system-generated connector. RTSI 2017: 1-6
[c2]Kim-Hung Le
, Soumya Kanti Datta, Christian Bonnet, François Hamon, Alexandre Boudonne:
A scalable IoT framework to design logical data flow using virtual sensor. WiMob 2017: 1-7- 2016
[c1]Minh Quan Duong
, Francesco Grimaccia, Sonia Leva, Marco Mussetta
, Kim Hung Le
:
A hybrid Fuzzy-PI cascade controller for transient stability improvement in DFIG wind generators. FUZZ-IEEE 2016: 1733-1739
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-27 00:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







