


default search action
Ying Xuan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j9]Kuan-Bing Chen, Ying Xuan, Ai-Jun Lin, Shao-Hua Guo:
Lung computed tomography image segmentation based on U-Net network fused with dilated convolution. Comput. Methods Programs Biomed. 207: 106170 (2021) - [j8]Kuan-Bing Chen, Ying Xuan, Ai-Jun Lin, Shao-Hua Guo:
Esophageal cancer detection based on classification of gastrointestinal CT images using improved Faster RCNN. Comput. Methods Programs Biomed. 207: 106172 (2021)
2010 – 2019
- 2018
- [c10]Deepak Agarwal, Kinjal Basu, Souvik Ghosh, Ying Xuan, Yang Yang, Liang Zhang:
Online Parameter Selection for Web-based Ranking Problems. KDD 2018: 23-32 - 2014
- [c9]Hernan Badenes, Mateo N. Bengualid, Jilin Chen, Liang Gou, Eben M. Haber, Jalal Mahmud, Jeffrey W. Nichols, Aditya Pal, Jerald Schoudt, Barton A. Smith, Ying Xuan, Huahai Yang, Michelle X. Zhou:
System U: automatically deriving personality traits from social media for people recommendation. RecSys 2014: 373-374 - 2013
- [j7]Ying Xuan, Yilin Shen, Nam P. Nguyen, My T. Thai:
Efficient Multi-Link Failure Localization Schemes in All-Optical Networks. IEEE Trans. Commun. 61(3): 1144-1151 (2013) - [j6]Yilin Shen, Nam P. Nguyen, Ying Xuan, My T. Thai:
On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability. IEEE/ACM Trans. Netw. 21(3): 963-973 (2013) - 2012
- [j5]Yilin Shen, Dung T. Nguyen, Ying Xuan, My T. Thai:
New techniques for approximating optimal substructure problems in power-law graphs. Theor. Comput. Sci. 447: 107-119 (2012) - [j4]Ying Xuan, Yilin Shen, Nam P. Nguyen, My T. Thai:
A Trigger Identification Service for Defending Reactive Jammers in WSN. IEEE Trans. Mob. Comput. 11(5): 793-806 (2012) - [j3]Thang N. Dinh
, Ying Xuan, My T. Thai, Panos M. Pardalos, Taieb Znati:
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation. IEEE/ACM Trans. Netw. 20(2): 609-619 (2012) - 2011
- [j2]Incheol Shin, Yilin Shen, Ying Xuan, My T. Thai, Taieb Znati:
A Novel Approach Against Reactive Jamming Attacks. Ad Hoc Sens. Wirel. Networks 12(1-2): 125-149 (2011) - [c8]Nam P. Nguyen, Thang N. Dinh
, Ying Xuan, My T. Thai:
Adaptive algorithms for detecting community structure in dynamic social networks. INFOCOM 2011: 2282-2290 - [c7]Yilin Shen, Ying Xuan, My T. Thai:
On local approximation of minimum-latency broadcast scheduling in 3D MANETs. MILCOM 2011: 866-871 - 2010
- [j1]Ying Xuan, Incheol Shin, My T. Thai, Taieb Znati:
Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach. IEEE Trans. Parallel Distributed Syst. 21(8): 1203-1216 (2010) - [c6]Ying Xuan, Yilin Shen, Nam P. Nguyen, My T. Thai:
A Graph-Theoretic QoS-Aware Vulnerability Assessment for Network Topologies. GLOBECOM 2010: 1-5 - [c5]Thang N. Dinh
, Ying Xuan, My T. Thai, E. K. Park, Taieb Znati:
On Approximation of New Optimization Methods for Assessing Network Vulnerability. INFOCOM 2010: 2678-2686
2000 – 2009
- 2009
- [c4]Thang N. Dinh
, Ying Xuan, My T. Thai:
Towards social-aware routing in dynamic communication networks. IPCCC 2009: 161-168 - [c3]Ying Xuan, Yilin Shen, Incheol Shin, My T. Thai:
On trigger detection against reactive Jamming Attacks: A clique-independent set based approach. IPCCC 2009: 223-230 - [c2]Incheol Shin, Yilin Shen, Ying Xuan, My Tra Thai, Taieb Znati:
Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes. FOWANC@MobiHoc 2009: 87-96 - 2008
- [c1]My T. Thai, Ying Xuan, Incheol Shin, Taieb Znati:
On Detection of Malicious Users Using Group Testing Techniques. ICDCS 2008: 206-213
Coauthor Index
aka: My Tra Thai

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint