Zum Hauptinhalt springen

Showing 1–9 of 9 results for author: Nguyen, L N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.05538  [pdf, other

    cs.LG

    Multi-objective Feature Selection in Remote Health Monitoring Applications

    Authors: Le Ngu Nguyen, Constantino Álvarez Casado, Manuel Lage Cañellas, Anirban Mukherjee, Nhi Nguyen, Dinesh Babu Jayagopi, Miguel Bordallo López

    Abstract: Radio frequency (RF) signals have facilitated the development of non-contact human monitoring tasks, such as vital signs measurement, activity recognition, and user identification. In some specific scenarios, an RF signal analysis framework may prioritize the performance of one task over that of others. In response to this requirement, we employ a multi-objective optimization approach inspired by… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

    Comments: Under review

  2. arXiv:2312.07601  [pdf, other

    eess.SP cs.LG

    Non-contact Multimodal Indoor Human Monitoring Systems: A Survey

    Authors: Le Ngu Nguyen, Praneeth Susarla, Anirban Mukherjee, Manuel Lage Cañellas, Constantino Álvarez Casado, Xiaoting Wu, Olli~Silvén, Dinesh Babu Jayagopi, Miguel Bordallo López

    Abstract: Indoor human monitoring systems leverage a wide range of sensors, including cameras, radio devices, and inertial measurement units, to collect extensive data from users and the environment. These sensors contribute diverse data modalities, such as video feeds from cameras, received signal strength indicators and channel state information from WiFi devices, and three-axis acceleration data from ine… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: 19 pages, 5 figures

  3. arXiv:2204.13832  [pdf, ps, other

    cs.DS

    Efficient Algorithms for Monotone Non-Submodular Maximization with Partition Matroid Constraint

    Authors: Lan N. Nguyen, My T. Thai

    Abstract: In this work, we study the problem of monotone non-submodular maximization with partition matroid constraint. Although a generalization of this problem has been studied in literature, our work focuses on leveraging properties of partition matroid constraint to (1) propose algorithms with theoretical bound and efficient query complexity; and (2) provide better analysis on theoretical performance gu… ▽ More

    Submitted 28 April, 2022; originally announced April 2022.

  4. arXiv:2012.07936  [pdf, other

    cs.DS

    Minimum Robust Multi-Submodular Cover for Fairness

    Authors: Lan N. Nguyen, My T. Thai

    Abstract: In this paper, we study a novel problem, Minimum Robust Multi-Submodular Cover for Fairness (MinRF), as follows: given a ground set $V$; $m$ monotone submodular functions $f_1,...,f_m$; $m$ thresholds $T_1,...,T_m$ and a non-negative integer $r$, MinRF asks for the smallest set $S$ such that for all $i \in [m]$, $\min_{|X| \leq r} f_i(S \setminus X) \geq T_i$. We prove that MinRF is inapproximable… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

  5. arXiv:2009.09955  [pdf, other

    cs.DS

    Length-Bounded Paths Interdiction in Continuous Domain for Network Performance Assessment

    Authors: Lan N. Nguyen, My T. Thai

    Abstract: Studying on networked systems, in which a communication between nodes is functional if their distance under a given metric is lower than a pre-defined threshold, has received significant attention recently. In this work, we propose a metric to measure network resilience on guaranteeing the pre-defined performance constraint. This metric is investigated under an optimization problem, namely \textbf… ▽ More

    Submitted 18 September, 2020; originally announced September 2020.

  6. OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding

    Authors: Lan N. Nguyen, Truc Nguyen, Thang N. Dinh, My T. Thai

    Abstract: A major challenge in blockchain sharding protocols is that more than 95% transactions are cross-shard. Not only those cross-shard transactions degrade the system throughput but also double the confirmation time, and exhaust an already scarce network bandwidth. Are cross-shard transactions imminent for sharding schemes? In this paper, we propose a new sharding paradigm, called OptChain, in which cr… ▽ More

    Submitted 18 October, 2021; v1 submitted 16 July, 2020; originally announced July 2020.

  7. Threat from being Social: Vulnerability Analysis of Social Network Coupled Smart Grid

    Authors: Tianyi Pan, Subhankar Mishra, Lan N. Nguyen, Gunhee Lee, Jungmin Kang, Jungtaek Seo, My T. Thai

    Abstract: Social Networks (SNs) have been gradually applied by utility companies as an addition to smart grid and are proved to be helpful in smoothing load curves and reducing energy usage. However, SNs also bring in new threats to smart grid: misinformation in SNs may cause smart grid users to alter their demand, resulting in transmission line overloading and in turn leading to catastrophic impact to the… ▽ More

    Submitted 15 May, 2020; originally announced May 2020.

    Comments: 16 pages

    Journal ref: IEEE Access 5 (2017): 16774-16783

  8. arXiv:1902.01701  [pdf, other

    cs.DS cs.PF

    Network Resilience Assessment via QoS Degradation Metrics: An Algorithmic Approach

    Authors: Lan N. Nguyen, My T. Thai

    Abstract: This paper focuses on network resilience to perturbation of edge weight. Other than connectivity, many network applications nowadays rely upon some measure of network distance between a pair of connected nodes. In these systems, a metric related to network functionality is associated to each edge. A pair of nodes only being functional if the weighted, shortest-path distance between the pair is bel… ▽ More

    Submitted 5 February, 2019; originally announced February 2019.

  9. arXiv:1612.06209  [pdf, other

    cs.CR cs.CY cs.HC

    Personalized Image-based User Authentication using Wearable Cameras

    Authors: Le Ngu Nguyen, Stephan Sigg

    Abstract: Personal devices (e.g. laptops, tablets, and mobile phones) are conventional in daily life and have the ability to store users' private data. The security problems related to these appliances have become a primary concern for both users and researchers. In this paper, we analyse first-person-view videos to develop a personalized user authentication mechanism. Our proposed algorithm generates provi… ▽ More

    Submitted 29 March, 2017; v1 submitted 19 December, 2016; originally announced December 2016.