Skip to main content

Showing 1–34 of 34 results for author: Dang, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.17926  [pdf, other

    cs.CV

    SarcNet: A Novel AI-based Framework to Automatically Analyze and Score Sarcomere Organizations in Fluorescently Tagged hiPSC-CMs

    Authors: Huyen Le, Khiet Dang, Tien Lai, Nhung Nguyen, Mai Tran, Hieu Pham

    Abstract: Quantifying sarcomere structure organization in human-induced pluripotent stem cell-derived cardiomyocytes (hiPSC-CMs) is crucial for understanding cardiac disease pathology, improving drug screening, and advancing regenerative medicine. Traditional methods, such as manual annotation and Fourier transform analysis, are labor-intensive, error-prone, and lack high-throughput capabilities. In this st… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  2. arXiv:2405.08654  [pdf, other

    cs.LG cs.AI cs.CV eess.IV

    Can we Defend Against the Unknown? An Empirical Study About Threshold Selection for Neural Network Monitoring

    Authors: Khoi Tran Dang, Kevin Delmas, Jérémie Guiochet, Joris Guérin

    Abstract: With the increasing use of neural networks in critical systems, runtime monitoring becomes essential to reject unsafe predictions during inference. Various techniques have emerged to establish rejection scores that maximize the separability between the distributions of safe and unsafe predictions. The efficacy of these approaches is mostly evaluated using threshold-agnostic metrics, such as the ar… ▽ More

    Submitted 21 May, 2024; v1 submitted 14 May, 2024; originally announced May 2024.

    Comments: 13 pages, 5 figures, 6 tables. To appear in the proceedings of the 40th Conference on Uncertainty in Artificial Intelligence (UAI 2024)

  3. arXiv:2403.08843  [pdf, other

    cs.AI

    Fuzzy Fault Trees Formalized

    Authors: Thi Kim Nhung Dang, Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga

    Abstract: Fault tree analysis is a vital method of assessing safety risks. It helps to identify potential causes of accidents, assess their likelihood and severity, and suggest preventive measures. Quantitative analysis of fault trees is often done via the dependability metrics that compute the system's failure behaviour over time. However, the lack of precise data is a major obstacle to quantitative analys… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: 14 pages

  4. arXiv:2402.02655  [pdf, other

    cs.CL

    VlogQA: Task, Dataset, and Baseline Models for Vietnamese Spoken-Based Machine Reading Comprehension

    Authors: Thinh Phuoc Ngo, Khoa Tran Anh Dang, Son T. Luu, Kiet Van Nguyen, Ngan Luu-Thuy Nguyen

    Abstract: This paper presents the development process of a Vietnamese spoken language corpus for machine reading comprehension (MRC) tasks and provides insights into the challenges and opportunities associated with using real-world data for machine reading comprehension tasks. The existing MRC corpora in Vietnamese mainly focus on formal written documents such as Wikipedia articles, online newspapers, or te… ▽ More

    Submitted 6 April, 2024; v1 submitted 4 February, 2024; originally announced February 2024.

    Comments: To appear as the main conference paper at EACL 2024

  5. arXiv:2401.12346  [pdf, other

    cs.CR

    Fuzzy quantitative attack tree analysis

    Authors: Thi Kim Nhung Dang, Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga

    Abstract: Attack trees are important for security, as they help to identify weaknesses and vulnerabilities in a system. Quantitative attack tree analysis supports a number security metrics, which formulate important KPIs such as the shortest, most likely and cheapest attacks. A key bottleneck in quantitative analysis is that the values are usually not known exactly, due to insufficient data and/or lack of… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: 23 pages, 6 figures, FASE2024

  6. arXiv:2312.16470  [pdf, other

    cs.CV cs.AI

    ReSynthDetect: A Fundus Anomaly Detection Network with Reconstruction and Synthetic Features

    Authors: **gqi Niu, Qinji Yu, Shiwen Dong, Zilong Wang, Kang Dang, Xiaowei Ding

    Abstract: Detecting anomalies in fundus images through unsupervised methods is a challenging task due to the similarity between normal and abnormal tissues, as well as their indistinct boundaries. The current methods have limitations in accurately detecting subtle anomalies while avoiding false positives. To address these challenges, we propose the ReSynthDetect network which utilizes a reconstruction netwo… ▽ More

    Submitted 27 December, 2023; originally announced December 2023.

    Comments: Accepted at BMVC2023

  7. arXiv:2310.09883  [pdf, other

    cs.CV cs.RO

    Zero-Shot Object Goal Visual Navigation With Class-Independent Relationship Network

    Authors: Xinting Li, Shiguang Zhang, Yue LU, Kerry Dang, Lingyan Ran

    Abstract: This paper investigates the zero-shot object goal visual navigation problem. In the object goal visual navigation task, the agent needs to locate navigation targets from its egocentric visual input. "Zero-shot" means that the target the agent needs to find is not trained during the training phase. To address the issue of coupling navigation ability with target features during training, we propose… ▽ More

    Submitted 14 March, 2024; v1 submitted 15 October, 2023; originally announced October 2023.

    ACM Class: I.2.9; I.2.10

  8. arXiv:2309.16609  [pdf, other

    cs.CL

    Qwen Technical Report

    Authors: **ze Bai, Shuai Bai, Yunfei Chu, Zeyu Cui, Kai Dang, Xiaodong Deng, Yang Fan, Wenbin Ge, Yu Han, Fei Huang, Binyuan Hui, Luo Ji, Mei Li, Junyang Lin, Runji Lin, Dayiheng Liu, Gao Liu, Chengqiang Lu, Keming Lu, Jianxin Ma, Rui Men, Xingzhang Ren, Xuancheng Ren, Chuanqi Tan, Sinan Tan , et al. (23 additional authors not shown)

    Abstract: Large language models (LLMs) have revolutionized the field of artificial intelligence, enabling natural language processing tasks that were previously thought to be exclusive to humans. In this work, we introduce Qwen, the first installment of our large language model series. Qwen is a comprehensive language model series that encompasses distinct models with varying parameter counts. It includes Q… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: 59 pages, 5 figures

  9. arXiv:2307.09769  [pdf, other

    cs.CV

    Source-Free Domain Adaptation for Medical Image Segmentation via Prototype-Anchored Feature Alignment and Contrastive Learning

    Authors: Qinji Yu, Nan Xi, Junsong Yuan, Ziyu Zhou, Kang Dang, Xiaowei Ding

    Abstract: Unsupervised domain adaptation (UDA) has increasingly gained interests for its capacity to transfer the knowledge learned from a labeled source domain to an unlabeled target domain. However, typical UDA methods require concurrent access to both the source and target domain data, which largely limits its application in medical scenarios where source data is often unavailable due to privacy concern.… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

    Comments: Accepted by MICCAI23

  10. arXiv:2304.13833  [pdf, other

    stat.ML cs.LG

    Mixtures of Gaussian process experts based on kernel stick-breaking processes

    Authors: Yuji Saikai, Khue-Dung Dang

    Abstract: Mixtures of Gaussian process experts is a class of models that can simultaneously address two of the key limitations inherent in standard Gaussian processes: scalability and predictive performance. In particular, models that use Dirichlet processes as gating functions permit straightforward interpretation and automatic selection of the number of experts in a mixture. While the existing models are… ▽ More

    Submitted 5 May, 2023; v1 submitted 26 April, 2023; originally announced April 2023.

  11. Region and Spatial Aware Anomaly Detection for Fundus Images

    Authors: **gqi Niu, Shiwen Dong, Qinji Yu, Kang Dang, Xiaowei Ding

    Abstract: Recently anomaly detection has drawn much attention in diagnosing ocular diseases. Most existing anomaly detection research in fundus images has relatively large anomaly scores in the salient retinal structures, such as blood vessels, optical cups and discs. In this paper, we propose a Region and Spatial Aware Anomaly Detection (ReSAD) method for fundus images, which obtains local region and long-… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

    Report number: 2303.03817

    Journal ref: 2023 IEEE 20th International Symposium on Biomedical Imaging (ISBI), Cartagena, Colombia, 2023, pp. 1-5

  12. arXiv:2302.06961  [pdf, other

    cs.CV cs.AI

    DualStreamFoveaNet: A Dual Stream Fusion Architecture with Anatomical Awareness for Robust Fovea Localization

    Authors: Sifan Song, **feng Wang, Zilong Wang, Jionglong Su, Xiaowei Ding, Kang Dang

    Abstract: Accurate fovea localization is essential for analyzing retinal diseases to prevent irreversible vision loss. While current deep learning-based methods outperform traditional ones, they still face challenges such as the lack of local anatomical landmarks around the fovea, the inability to robustly handle diseased retinal images, and the variations in image conditions. In this paper, we propose a no… ▽ More

    Submitted 26 December, 2023; v1 submitted 14 February, 2023; originally announced February 2023.

    Comments: This paper is currently under review

  13. arXiv:2212.04408  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    OFASys: A Multi-Modal Multi-Task Learning System for Building Generalist Models

    Authors: **ze Bai, Rui Men, Hao Yang, Xuancheng Ren, Kai Dang, Yichang Zhang, Xiaohuan Zhou, Peng Wang, Sinan Tan, An Yang, Zeyu Cui, Yu Han, Shuai Bai, Wenbin Ge, Jianxin Ma, Junyang Lin, **gren Zhou, Chang Zhou

    Abstract: Generalist models, which are capable of performing diverse multi-modal tasks in a task-agnostic way within a single model, have been explored recently. Being, hopefully, an alternative to approaching general-purpose AI, existing generalist models are still at an early stage, where modality and task coverage is limited. To empower multi-modal task-scaling and speed up this line of research, we rele… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

  14. arXiv:2208.14294  [pdf, other

    cs.CV

    Coarse Retinal Lesion Annotations Refinement via Prototypical Learning

    Authors: Qinji Yu, Kang Dang, Ziyu Zhou, Yongwei Chen, Xiaowei Ding

    Abstract: Deep-learning-based approaches for retinal lesion segmentation often require an abundant amount of precise pixel-wise annotated data. However, coarse annotations such as circles or ellipses for outlining the lesion area can be six times more efficient than pixel-level annotation. Therefore, this paper proposes an annotation refinement network to convert a coarse annotation into a pixel-level segme… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

    Comments: MICCAI22 workshop MLMI 2022

  15. arXiv:2208.03648  [pdf, other

    cs.CV cs.AI eess.IV

    Weakly Supervised Online Action Detection for Infant General Movements

    Authors: Tongyi Luo, Jia Xiao, Chuncao Zhang, Siheng Chen, Yuan Tian, Guangjun Yu, Kang Dang, Xiaowei Ding

    Abstract: To make the earlier medical intervention of infants' cerebral palsy (CP), early diagnosis of brain damage is critical. Although general movements assessment(GMA) has shown promising results in early CP detection, it is laborious. Most existing works take videos as input to make fidgety movements(FMs) classification for the GMA automation. Those methods require a complete observation of videos and… ▽ More

    Submitted 7 August, 2022; originally announced August 2022.

    Comments: MICCAI 2022

    MSC Class: 68T06 ACM Class: I.2; I.4; J.3

  16. arXiv:2203.02901  [pdf, other

    cs.CV cs.AI

    A Robust Framework of Chromosome Straightening with ViT-Patch GAN

    Authors: Sifan Song, **feng Wang, Fengrui Cheng, Qirui Cao, Yihan Zuo, Yongteng Lei, Ruomai Yang, Chunxiao Yang, Frans Coenen, Jia Meng, Kang Dang, Jionglong Su

    Abstract: Chromosomes carry the genetic information of humans. They exhibit non-rigid and non-articulated nature with varying degrees of curvature. Chromosome straightening is an important step for subsequent karyotype construction, pathological diagnosis and cytogenetic map development. However, robust chromosome straightening remains challenging, due to the unavailability of training images, distorted chr… ▽ More

    Submitted 16 May, 2023; v1 submitted 6 March, 2022; originally announced March 2022.

    Comments: Camera-ready version for IEEE ISBI2023

  17. ADAM Challenge: Detecting Age-related Macular Degeneration from Fundus Images

    Authors: Huihui Fang, Fei Li, Huazhu Fu, Xu Sun, Xingxing Cao, Fengbin Lin, Jaemin Son, Sunho Kim, Gwenole Quellec, Sarah Matta, Sharath M Shankaranarayana, Yi-Ting Chen, Chuen-heng Wang, Nisarg A. Shah, Chia-Yen Lee, Chih-Chung Hsu, Hai Xie, Baiying Lei, Ujjwal Baid, Shubham Innani, Kang Dang, Wenxiu Shi, Ravi Kamble, Nitin Singhal, Ching-Wei Wang , et al. (6 additional authors not shown)

    Abstract: Age-related macular degeneration (AMD) is the leading cause of visual impairment among elderly in the world. Early detection of AMD is of great importance, as the vision loss caused by this disease is irreversible and permanent. Color fundus photography is the most cost-effective imaging modality to screen for retinal disorders. Cutting edge deep learning based algorithms have been recently develo… ▽ More

    Submitted 6 May, 2022; v1 submitted 16 February, 2022; originally announced February 2022.

    Comments: 31 pages, 17 figures

  18. arXiv:2111.05062  [pdf, other

    cs.LG

    Look back, look around: a systematic analysis of effective predictors for new outlinks in focused Web crawling

    Authors: Thi Kim Nhung Dang, Doina Bucur, Berk Atil, Guillaume Pitel, Frank Ruis, Hamidreza Kadkhodaei, Nelly Litvak

    Abstract: Small and medium enterprises rely on detailed Web analytics to be informed about their market and competition. Focused crawlers meet this demand by crawling and indexing specific parts of the Web. Critically, a focused crawler must quickly find new pages that have not yet been indexed. Since a new page can be discovered only by following a new outlink, predicting new outlinks is very relevant in p… ▽ More

    Submitted 15 November, 2022; v1 submitted 9 November, 2021; originally announced November 2021.

    Comments: 23 pages, 15 figures, 4 tables, uses arxiv.sty, added new title, heuristic features and their results added, figures 7, 14, and 15 updated, accepted version

  19. arXiv:2110.09860  [pdf, other

    eess.IV cs.CV

    Bilateral-ViT for Robust Fovea Localization

    Authors: Sifan Song, Kang Dang, Qinji Yu, Zilong Wang, Frans Coenen, Jionglong Su, Xiaowei Ding

    Abstract: The fovea is an important anatomical landmark of the retina. Detecting the location of the fovea is essential for the analysis of many retinal diseases. However, robust fovea localization remains a challenging problem, as the fovea region often appears fuzzy, and retina diseases may further obscure its appearance. This paper proposes a novel Vision Transformer (ViT) approach that integrates inform… ▽ More

    Submitted 3 March, 2022; v1 submitted 19 October, 2021; originally announced October 2021.

    Comments: This work has been accepted for oral presentation by ISBI2022

  20. arXiv:2103.10178  [pdf, other

    cs.CV

    A Location-Sensitive Local Prototype Network for Few-Shot Medical Image Segmentation

    Authors: Qinji Yu, Kang Dang, Nima Tajbakhsh, Demetri Terzopoulos, Xiaowei Ding

    Abstract: Despite the tremendous success of deep neural networks in medical image segmentation, they typically require a large amount of costly, expert-level annotated data. Few-shot segmentation approaches address this issue by learning to transfer knowledge from limited quantities of labeled examples. Incorporating appropriate prior knowledge is critical in designing high-performance few-shot segmentation… ▽ More

    Submitted 18 March, 2021; originally announced March 2021.

    Comments: ISBI2021 accepted

  21. arXiv:2005.07160  [pdf

    cs.CR

    XACs-DyPol: Towards an XACML-based Access Control Model for Dynamic Security Policy

    Authors: Tran Khanh Dang, Xuan Son Ha, Luong Khiem Tran

    Abstract: Authorization and access control play an essential role in protecting sensitive information from malicious users. The system is based on security policies to determine if an access request is allowed. However, of late, the growing popularity of big data has created a new challenge which the security policy management is facing with such as dynamic and update policies in run time. Applications of d… ▽ More

    Submitted 10 April, 2020; originally announced May 2020.

    Comments: 12 pages

  22. A low-overhead soft-hard fault-tolerant architecture, design and management scheme for reliable high-performance many-core 3D-NoC systems

    Authors: Khanh N Dang, Michael Meyer, Yuichi Okuyama, Abderazek Ben Abdallah

    Abstract: The Network-on-Chip (NoC) paradigm has been proposed as a favorable solution to handle the strict communication requirements between the increasingly large number of cores on a single chip. However, NoC systems are exposed to the aggressive scaling down of transistors, low operating voltages, and high integration and power densities, making them vulnerable to permanent (hard) faults and transient… ▽ More

    Submitted 21 March, 2020; originally announced March 2020.

    Comments: arXiv admin note: text overlap with arXiv:2003.09616

    Journal ref: The Journal of Supercomputing volume 73 (2017)

  23. arXiv:2003.09847  [pdf, other

    cs.NE

    An Efficient Software-Hardware Design Framework for Spiking Neural Network Systems

    Authors: Khanh N. Dang, Abderazek Ben Abdallah

    Abstract: Spiking Neural Network (SNN) is the third generation of Neural Network (NN) mimicking the natural behavior of the brain. By processing based on binary input/output, SNNs offer lower complexity, higher density and lower power consumption. This work presents an efficient software-hardware design framework for develo** SNN systems in hardware. In addition, a design of low-cost neurosynaptic core is… ▽ More

    Submitted 22 March, 2020; originally announced March 2020.

    Journal ref: 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC)

  24. Reliability Assessment and Quantitative Evaluation of Soft-Error Resilient 3D Network-on-Chip Systems

    Authors: Khanh N Dang, Michael Meyer, Yuichi Okuyama, Abderazek Ben Abdallah

    Abstract: Three-Dimensional Networks-on-Chips (3D-NoCs) have been proposed as an auspicious solution, merging the high parallelism of the Network-on-Chip (NoC) paradigm with the high-performance and low-power cost of 3D-ICs. However, as technology scales down, the reliability issues are becoming more crucial, especially for complex 3D-NoC which provides the communication requirements of multi and many-core… ▽ More

    Submitted 21 March, 2020; originally announced March 2020.

    Journal ref: 2016 IEEE 25th Asian Test Symposium (ATS)

  25. arXiv:2003.09616  [pdf, other

    cs.AR

    Soft-Error and Hard-fault Tolerant Architecture and Routing Algorithm for Reliable 3D-NoC Systems

    Authors: Khanh N. Dang, Yuichi Okuyama, Abderazek Ben Abdallah

    Abstract: Network-on-Chip (NoC) paradigm has been proposed as an auspicious solution to handle the strict communication requirements between the increasingly large number of cores on a single multi and many-core chips. However, NoC systems are exposed to a variety of manufacturing, design and energetic particles factors making them vulnerable to permanent (hard) faults and transient (soft) errors. In this p… ▽ More

    Submitted 21 March, 2020; originally announced March 2020.

  26. arXiv:2003.08648  [pdf

    cs.AR

    Report on power, thermal and reliability prediction for 3D Networks-on-Chip

    Authors: Khanh N. Dang, Akram Ben Ahmed, Abderazek Ben Abdallah, Xuan-Tu Tran

    Abstract: By combining Three Dimensional Integrated Circuits with the Network-on-Chip infrastructure to obtain 3D Networks-on-Chip (3D-NoCs), the new on-chip communication paradigm brings several advantages on lower power, smaller footprint and lower latency. However, thermal dissipation is one of the most critical challenges for 3D-ICs where the heat cannot easily transfer through several layers of silicon… ▽ More

    Submitted 19 March, 2020; originally announced March 2020.

  27. arXiv:1907.11881  [pdf, other

    cs.CV cs.RO eess.IV stat.ML

    Context Model for Pedestrian Intention Prediction using Factored Latent-Dynamic Conditional Random Fields

    Authors: Satyajit Neogi, Michael Hoy, Kang Dang, Hang Yu, Justin Dauwels

    Abstract: Smooth handling of pedestrian interactions is a key requirement for Autonomous Vehicles (AV) and Advanced Driver Assistance Systems (ADAS). Such systems call for early and accurate prediction of a pedestrian's crossing/not-crossing behaviour in front of the vehicle. Existing approaches to pedestrian behaviour prediction make use of pedestrian motion, his/her location in a scene and static context… ▽ More

    Submitted 15 September, 2020; v1 submitted 27 July, 2019; originally announced July 2019.

    Comments: Accepted by IEEE Transactions on Intelligent Transportation Systems

  28. arXiv:1904.04710  [pdf

    cs.CR

    Secure Biometric-based Remote Authentication Protocol using Chebyshev Polynomials and Fuzzy Extractor

    Authors: Thi Ai Thao Nguyen, Tran Khanh Dang, Quynh Chi Truong, Dinh Thanh Nguyen

    Abstract: In this paper, we have proposed a multi factor biometric-based remote authentication protocol. Our proposal overcomes the vulnerabilities of some previous works. At the same time, the protocol also obtains a low false accept rate (FAR) and false reject rate (FRR).

    Submitted 9 April, 2019; originally announced April 2019.

    Comments: RCCIE17

  29. arXiv:1904.03320  [pdf

    cs.CR

    A Visual Model for Web Applications Security Monitoring

    Authors: Tran Tri Dang, Tran Khanh Dang

    Abstract: This paper proposes a novel visual model for web applications security monitoring. Although an automated intrusion detection system can shield a web application from common attacks, it usually cannot detect more complicated break-ins. So, a human-assisted monitoring system is an indispensable complement, following the "Defense in depth" strategy. To support human operators working more effectively… ▽ More

    Submitted 5 April, 2019; originally announced April 2019.

    Comments: ISIC2011 (Best paper award)

  30. arXiv:1904.00264  [pdf

    cs.CR

    A New Biometric Template Protection using Random Orthonormal Projection and Fuzzy Commitment

    Authors: Thi Ai Thao Nguyen, Tran Khanh Dang, Dinh Thanh Nguyen

    Abstract: Biometric template protection is one of most essential parts in putting a biometric-based authentication system into practice. There have been many researches proposing different solutions to secure biometric templates of users. They can be categorized into two approaches: feature transformation and biometric cryptosystem. However, no one single template protection approach can satisfy all the req… ▽ More

    Submitted 30 March, 2019; originally announced April 2019.

    Comments: 11 pages, 6 figures, accepted for IMCOM 2019

  31. arXiv:1903.10018  [pdf

    cs.CR

    The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach

    Authors: Tran Khanh Dang, Khanh T. K. Tran

    Abstract: Wireless sensor networks consist of a large number of distributed sensor nodes so that potential risks are becoming more and more unpredictable. The new entrants pose the potential risks when they move into the secure zone. To build a door wall that provides safe and secured for the system, many recent research works applied the initial authentication process. However, the majority of the previous… ▽ More

    Submitted 24 March, 2019; originally announced March 2019.

    Comments: 27 pages

    Journal ref: Security and Communication Networks (SCN), Hindawi, 2019

  32. arXiv:1807.08430  [pdf, other

    cs.CV cs.AI cs.MM

    Actor-Action Semantic Segmentation with Region Masks

    Authors: Kang Dang, Chunluan Zhou, Zhigang Tu, Michael Hoy, Justin Dauwels, Junsong Yuan

    Abstract: In this paper, we study the actor-action semantic segmentation problem, which requires joint labeling of both actor and action categories in video frames. One major challenge for this task is that when an actor performs an action, different body parts of the actor provide different types of cues for the action category and may receive inconsistent action labeling when they are labeled independentl… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

    Comments: Accepted by BMVC 2018

  33. A NoSQL Data-based Personalized Recommendation System for C2C e-Commerce

    Authors: Khanh Dang, Khuong Vo, Josef Küng

    Abstract: With the considerable development of customer-to-customer (C2C) e-commerce in the recent years, there is a big demand for an effective recommendation system that suggests suitable websites for users to sell their items with some specified needs. Nonetheless, e-commerce recommendation systems are mostly designed for business-to-customer (B2C) websites, where the systems offer the consumers the prod… ▽ More

    Submitted 26 June, 2018; originally announced June 2018.

    Comments: Accepted to DEXA 2017

  34. arXiv:0912.2289  [pdf

    cs.NI cs.CR cs.HC

    Security Visualization for peer-to-peer resource sharing applications

    Authors: Dand Tran Tri, Tran Khanh Dang

    Abstract: Security of an information system is only as strong as its weakest element. Popular elements of such system include hardware, software, network and people. Current approaches to computer security problems usually exclude people in their studies even though it is an integral part of these systems. To fill that gap, this paper discusses crucial people-related problems in computer security and prop… ▽ More

    Submitted 11 December, 2009; originally announced December 2009.

    Journal ref: IJCSE Volume 1 Issue 2 2009 47-55