If you made any changes in Pure these will be visible here soon.

Research Output

EEG-Based Age and Gender Recognition Using Tensor Decomposition and Speech Feature

HUANG, X. & MA, W., 2013, International Conference on Neural Information Processing (ICONIP 2013): Lecture Notes in Computer Science. Lee, M., Hirose, A., Hou, Z-G. & Kil, R. M. (eds.). Berlin Heidelberg: Springer, Vol. 8227. p. 632-639 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

5 Citations (Scopus)
6 Downloads (Pure)

EEG-Based Person Authentication System in Different Brain States

Tran, N., TRAN, D., LIU, S., MA, W. & PHAM, T., 16 May 2019, 9th International IEEE EMBS Conference on Neural Engineering, NER 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 1050-1053 4 p. 8716949. (International IEEE/EMBS Conference on Neural Engineering, NER; vol. 2019-March).

Research output: A Conference proceeding or a Chapter in BookConference contribution

2 Citations (Scopus)

EEG-Based Person Verification Using Multi-Sphere SVDD and UBM

NGUYEN, P., TRAN, D., Le, T., HUANG, X. & MA, W., 2013, Pacific-Asia Conference on Knowledge Discovery and Data Mining: Lecture Notes in Computer Science. Goebel, R., Tanaka, Y. & Wahlster, W. (eds.). Australia: Springer, Vol. 7818. p. 289-300 12 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

11 Citations (Scopus)
1 Downloads (Pure)

EEG-Based random number generators

Nguyen, D., Tran, D., Ma, W. & Nguyen, K., 26 Jul 2017, Proceedings 11th International Conference on Network and System Security (NSS 2017): Lecture Notes in Computer Science. Yan, Z. (ed.). Cham, Switzerland: Springer-Verlag London Ltd., Vol. 10394. p. 248-256 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10394 LNCS).

Research output: A Conference proceeding or a Chapter in BookConference contribution

5 Citations (Scopus)

EEG-Based User Authentication in Multilevel Security Systems

MA, W. & TRAN, D., 2013, International Conference on Advanced Data Mining and Applications (ADMA 2013): Lecture Notes in Computer Science. Goebel, R., Tanaka, Y. & WolfgangWahlster (eds.). Berlin Heidelberg: Springer, Vol. 8347. p. 513-523 11 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

11 Citations (Scopus)

EEG-Based User Authentication Using Artifacts

PHAM, T., MA, W., TRAN, D., NGUYEN, P. & PHUNG, D., 2014, International Joint Conference SOCO’14-CISIS’14-ICEUTE’14: Bilbao, Spain, June 25th–27th, 2014, Proceedings. de la Puerta, J. G., Ferreira, I. G., Bringas, P. G., Klett, F., Abraham, A., de Carvalho, A. C. P. L. F., Herrero, Á., Baruque, B., Quintián, H. & Corchado, E. (eds.). Cham, Switzerland: Springer, Vol. 299. p. 343-353 10 p. (Advances in Intelligent Systems and Computing; vol. 299).

Research output: A Conference proceeding or a Chapter in BookConference contribution

5 Citations (Scopus)

Emotional Influences on Cryptographic Key Generation Systems using EEG signals

NGUYEN, D., TRAN, D., SHARMA, D. & MA, W., 3 Sep 2018, 22nd International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2018. Howlett, R. J., Jain, L. C., Popovic, Z., Popovic, D., Vukosavic, S., Toro, C. & Hicks, Y. (eds.). Belgrade, Serbia: Elsevier, Vol. 126. p. 703-712 10 p. (Procedia Computer Science).

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
1 Citation (Scopus)
2 Downloads (Pure)

Enhancing performance of EEG based emotion recognition systems using feature smoothing

PHAM, T. D., TRAN, D., MA, W. & Tran, N., 18 Nov 2015, International Conference on Neural Information processing (ICONIP 2015): Lecture notes in computer science. Arik, S., Huang, T., Lai, W. K. & Liu, Q. (eds.). Switzerland: Springer, Vol. 9492. p. 95-102 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9492).

Research output: A Conference proceeding or a Chapter in BookConference contribution

7 Citations (Scopus)

Enhancing Security in E-Health Communications using Muti-agent System

Sulaiman, R., Sharma, D. & Ma, W., 2012, In : Journal of Computer Science. 8, 5, p. 637-647 11 p.

Research output: Contribution to journalArticle

Open Access
File

Experimental study on the effects of watermarking techniques on EEG-based application system performance

Pham, T. D., Tran, D. & Ma, W., 26 Oct 2017, Neural Information Processing - Proceedings of the 24th International Conference (ICONIP 2017). Guangzhou, China: Springer-Verlag London Ltd., p. 662-671 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10639 LNCS).

Research output: A Conference proceeding or a Chapter in BookConference contribution

Filtering Spam Email with Flexible Preprocessors

Ma, W., Tran, D. & Sharma, D., 2008, Advances in Communication Systes and Electrial Engineering. Huang, X., Chen, Y-S. & Ao, S. (eds.). New York, USA: Springer, p. 211-227 17 p.

Research output: A Conference proceeding or a Chapter in BookChapter

3 Citations (Scopus)

Fuzzy and Markov Models for Keystroke Biometrics Authentication

Tran, D., Ma, W., Chetty, G. & Sharma, D., 2007, New Advances in Simulation, Modeling and Optimization. Xu, D. (ed.). Beijing, China: World Scientific Publishing, p. 89-94 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access

Fuzzy Entropy Semi-Supervised Support Vector Data Description

LE, T. M., TRAN, D., Tran, T., Nyugen, K. & MA, W., 2013, The 2013 International Joint Conference on Neural Networks (IJCNN). Angelov, P. & Levine, D. (eds.). USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 2339-2343 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

5 Citations (Scopus)

Fuzzy feature weighting techniques for vector quantisation

Tran, D., Ma, W. & Sharma, D., 2010, 2010 IEEE World Congress on Computational Intelligence. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1-6 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File

Fuzzy Kernel Stochastic Gradient Descent Machines

Nguyen, T., Duong, P., Le, T., Le, A., Ngo, V., TRAN, D. & MA, W., 2016, 2016 International Joint Conference on Neural Networks (IJCNN). Abbass, H. A. & Chen, H. (eds.). United States of America: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 3226-3232 7 p. 7727611. (Proceedings of the International Joint Conference on Neural Networks; vol. 2016-October).

Research output: A Conference proceeding or a Chapter in BookConference contribution

1 Downloads (Pure)

Fuzzy Multi-Sphere Support Vector Data Description: Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2013)

LE, T. M., TRAN, D. & MA, W., 2013, Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2013). Pei, J., Tseny, V. S., Cao, L., Motoda, H. & Xu, G. (eds.). Berlin: Springer, Vol. 7819. p. 570-581 12 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

5 Citations (Scopus)

Fuzzy Multi-Sphere Support Vector Data Description: International Conference on Fuzzy Systems (FUZZ-IEEE)

Le, T., Tran, D., Ma, W. & Sharma, D., 2012, 2012 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). Abbass, H. (ed.). New York: IEEE, Institute of Electrical and Electronics Engineers, p. 1956-1960 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

4 Citations (Scopus)
1 Downloads (Pure)

Fuzzy Normalisation Methods for Typist Verification

Tran, D., Ma, W., Sharma, D. & Chetty, G., 2007, Lecture Notes in Engineering and Computer Science. Ao, S. I. & Castillo, O. (eds.). Hong Kong: Newswood Ltd. International Association of Engineers, p. 212-216 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Fuzzy Normalization for Spam Email Detection

Tran, D. & Ma, W., 2006, Proceedings of the Joint 3rd International Conference on Soft Computing and Intelligent Systems and 7th International Symposium on advanced Intelligent Systems. Kikuchi, Z., Taniguchi, T. & Kang, G. T. (eds.). Tokyo, Japan: Tokyo Institute of Technology, p. 1505-1509 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Fuzzy Subspace Hidden Markov Models for Pattern Recognition

Tran, D., Ma, W. & Sharma, D., 2009, IEEE-RIVF International Conference on Computing and Communication Technologies: Research, Innovation and Vision for the Future. Cao, T., Kutsche, R-D. & Demaille, A. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 43-48 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
1 Downloads (Pure)

Fuzzy Vector Quantization for Network Intrusion Detection

Tran, D., Ma, W., Sharma, D. & Nguyen, T., 2007, Proceedings: 2007 IEEE International Conference on Granular Computing (GrC 2007). Lin, T. Y. & Hu, X. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 566-570 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
10 Citations (Scopus)
3 Downloads (Pure)

Generalized Support Vector Machine for Brain-Computer Interface

Tran, D., Ma, W. & Sharma, D., 2011, International Conference on Neural Information Processing (ICONIP 2011): Lecture Notes in Computer Science. Lu, B-L., Zhang, L. & Kwok, J. (eds.). Germany: Springer, Vol. 7062. p. 692-700 9 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

2 Citations (Scopus)
6 Downloads (Pure)

Grammatical Dependency-Based Relations for Term Weighting in Text Classification

Hyunh, D., Tran, D., Ma, W. & Sharma, D., 2011, Pacific-Asia Conference on Knowledge Discovery and Data Mining PAKDD 2011: Advances in Knowledge Discovery and Data Mining . Zhexue, J., Cao, H. L. & Srivastava, J. (eds.). Berlin: Springer, Vol. 6634. p. 476-487 12 p. (LNCS (Lecture Notes in Computer Science); vol. 6634).

Research output: A Conference proceeding or a Chapter in BookConference contribution

1 Citation (Scopus)

Graph-based semi-supervised support vector data description for novelty detection

Duong, P., Nguyen, V., Dinh, M., Le, T., TRAN, D. & MA, W., 2015, 2015 International joint conference on neural networks (IJCNN 2015). Hussain, A. (ed.). USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 1985-1990 6 p. 7280565. (Proceedings of the International Joint Conference on Neural Networks; vol. 2015-September).

Research output: A Conference proceeding or a Chapter in BookConference contribution

7 Citations (Scopus)
3 Downloads (Pure)

Hoodwinking Spam Email Filters

Ma, W., Tran, D. & Sharma, D., 2007, Proceedings of WSEAS International Conference on Computer Engineering and Applications (CEA 2007). Pham, T., Sohrab, S. H., Catrakis, H. J., Necasova, S., Sharma, D., Jain, L. C., Tran, D. & Ma, W. (eds.). Queensland, Australia: WSEAS Press, p. 533-577 45 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access

Impact of lossy data compression techniques on EEG-based pattern recognition systems

NGUYEN, T. B., MA, W. & TRAN, D., 20 Aug 2018, 2018 24th International Conference on Pattern Recognition (ICPR). Beijing, PRC: IEEE, p. 2308-2313 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

1 Citation (Scopus)

Impact of restrictive composition policy on user password choices

Campbell, J., Ma, W. & Kleeman, D., 2011, In : Behaviour and Information Technology. 30, 3, p. 379-388 10 p.

Research output: Contribution to journalArticle

23 Citations (Scopus)

Improved HOG Descriptors in Image Classification with CP Demonstration

Vo, T., TRAN, D., MA, W. & NGUYEN, K., 2013, International Conference on Neural Information Processing (ICONIP 2013): Lecture Notes in Computer Science. Lee, M., Hirose, A., Hou, Z-G. & Kil, R. M. (eds.). Germany: Springer, Vol. 8228. p. 384-391 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

2 Citations (Scopus)

Information technologies: opportunities and challenges in personal healthcare systems

Ma, W., Tran, D., Hong, L., Zhou, S-M., Oh, B., Waddington, G., Sharma, D., Sirisaengtaksin, O., Scarvell, J., McGrath, T. & Huynh, D., 2012, In : International Journal of Healthcare Technology and Management. 13, 5/6, p. 345-362 18 p.

Research output: Contribution to journalArticle

Investigating the Impact of Epilepsy on EEG-based Cryptographic Key Generation Systems

Nguyen, D., Tran, D., Sharma, D. & Ma, W., 1 Sep 2017, Procedia Computer Science: International Conference on Knowledge Based and Intelligent Information and ENgineering Systems (KES 2017). 2017 ed. Netherlands: Elsevier, Vol. 112. p. 177-185 9 p. (Procedia Computer Science).

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
2 Citations (Scopus)

Investigating the Impacts of Brain Conditions on EEG-Based Person Identification

PHUNG, D., TRAN, D., MA, W. & PHAM, T., 27 May 2015, International Joint Conference CISIS 2015 and ICEUTE 2015. Herrero, A., Baruque, B., Sedano, J., Quintian, H. & Corchado, E. (eds.). Springer, Vol. 369. p. 145-155 11 p. (Advances in Intelligent Systems and Computing; vol. 369).

Research output: A Conference proceeding or a Chapter in BookConference contribution

Investigating the impacts of epilepsy on EEG-based person identification systems

Phung, D., TRAN, D., MA, W., Nguyen, P. & Pham, T., 6 Jul 2014, 2014 International Joint Conference on Neural Networks (IJCNN). Liu, D. & Si, J. (eds.). USA: IEEE, Institute of Electrical and Electronics Engineers, p. 3644-3648 5 p. 6889567. (Proceedings of the International Joint Conference on Neural Networks).

Research output: A Conference proceeding or a Chapter in BookConference contribution

4 Citations (Scopus)
3 Downloads (Pure)

Investigating the possibility of applying EEG lossy compression to EEG-based user authentication

NGUYEN, T. B., Nguyen, D., Ma, W. & Tran, D., 14 May 2017, 2017 International Joint Conference on Neural Networks, IJCNN 2017 - Proceedings. IEEE, Institute of Electrical and Electronics Engineers, Vol. 2017-May. p. 79-85 7 p. 7965839. (Proceedings of the International Joint Conference on Neural Networks; vol. 2017-May).

Research output: A Conference proceeding or a Chapter in BookConference contribution

11 Citations (Scopus)

Least square support vector machine for large scale dataset

Nguyen, K., Le, T., Lai, V., Nguyen, D., TRAN, D. & MA, W., 2015, 2015 International Joint Conference on Neural Networks, IJCNN 2015. Hussain, A. (ed.). USA: IEEE, Vol. 1. p. 2057-2065 9 p. (Proceedings of the International Joint Conference on Neural Networks; vol. 2015-September).

Research output: A Conference proceeding or a Chapter in BookConference contribution

3 Citations (Scopus)
1 Downloads (Pure)

MAITS: A Multi-Agent-Based IT Security Approach

Sharma, D., Ma, W., Tran, D. & Liu, S., 2007, Architectural Design of Multi-Agent Systems: Technologies and Techniques. Lin, H. (ed.). United States: Information Science Reference, p. 189-208 20 p.

Research output: A Conference proceeding or a Chapter in BookChapter

1 Citation (Scopus)

Maximal Margin Learning Vector Quantisation

TRAN, D., Nguyen, V. & MA, W., 2013, The 2013 International Joint Conference on Neural Networks (IJCNN). Angelov, P. & Levine, D. (eds.). USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 1668-1673 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Motor imagery EEG-based person verification

Tran, D., Huang, X. & Ma, W., 2013, International Work-Conference on Artificial Neural Networks: Advances in Computational Intelligence IWANN 2013. Rojas, I., Joya, G. & Gabestany, J. (eds.). Berlin: Springer, Vol. 2. p. 430-438 9 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

12 Citations (Scopus)
3 Downloads (Pure)

Multi-factor EEG-based user authentication

Pham, T., MA, W., TRAN, D., Nguyen, P. & PHUNG, D., 2014, 2014 International Joint Conference on Neural Networks (IJCNN). Liu, D. & Si, J. (eds.). USA: IEEE, Institute of Electrical and Electronics Engineers, p. 4029-4034 6 p. (Proceedings of the International Joint Conference on Neural Networks).

Research output: A Conference proceeding or a Chapter in BookConference contribution

24 Citations (Scopus)
1 Downloads (Pure)

Multiple distribution data description learning algorithm for novelty detection

Le, T., Tran, D., Ma, W. & Sharma, D., 2011, Advances in Knowledge Discovery and Data Mining: 15th Pacific-Asia Conference, PAKDD 2011, Proceedings, Part II. Huang, J. Z., Cao, L. & Srivastava, J. (eds.). Berlin, Germany: Springer, p. 246-257 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6635 LNAI, no. PART 2).

Research output: A Conference proceeding or a Chapter in BookConference contribution

3 Citations (Scopus)

Multiple Distribution Data Description Learning Method for Novelty Detection

Tran, D., Ma, W. & Sharma, D., 31 Jul 2011, The 2011 International Joint Conference on Neural Networks (IJCNN 2011). Minai, A. A. (ed.). San Jose, USA: IEEE, Vol. 1. p. 2321-2326 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

9 Citations (Scopus)

Multi-sphere support vector clustering

Le, T., Tran, D., Nguyen, P., Ma, W. & Sharma, D., 2011, Neural Information Processing: 18th International Conference, ICONIP 2011, Proceedings, Part II. Lu, B-L., Zhang, L. & Kwok, J. (eds.). Berlin, Germany, p. 537-544 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7063 LNCS, no. PART 2).

Research output: A Conference proceeding or a Chapter in BookConference contribution

1 Citation (Scopus)

Negative selection as a means of discovering unknown temporal patterns

Ma, W., Tran, D. & Sharma, D., 2010, ICIS 2010: International Conference on Intelligent Systems. Lacity, M., March, S. & Niederman, F. (eds.). Online: World Academy of Science, Engineering and Technology, Vol. 65. p. 996-1002 7 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access

Negative Selection with Antigen Feedback in Intrusion Detection

Ma, W., Tran, D. & Sharma, D., 2008, 7th International Conference on Artificial Immune Systems (ICARIS 2008). Bentley, P. J., Lee, D. & Jung, S. (eds.). Germany: Springer, p. 200-209 10 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
5 Citations (Scopus)
1 Downloads (Pure)

Network Intrusion detection Using Subspace Methods

Tran, D., Ma, W. & Sharma, D., 2008, Proceedings of the Second International Conference on communications and Electronics. Trung, N. Q., Zich, R. & Popescu-Zeletin, R. (eds.). Vietnam: IEEE, Institute of Electrical and Electronics Engineers, p. 471-475 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Object Recognition in a Context-Aware Application

VO, T., TRAN, D. & MA, W., 4 Aug 2013, The 2013 International Joint Conference on Neural Networks (IJCNN). Angelov, P. & Levine, D. (eds.). USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 2817-2824 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

2 Downloads (Pure)

On an IT security framework

Sharma, D., Ma, W. & Tran, D., 2005, Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Proceedings. Khosla, Howlett & Jain. (eds.). Germany: Springer, p. 226-232 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3681 LNAI).

Research output: A Conference proceeding or a Chapter in BookConference contribution

1 Citation (Scopus)

On Extendable Software Architecture for Spam Email Filtering

Ma, W., Tran, D. & Sharma, D., 2007, In : IAENG International Journal of Computer Science. 34, 1, p. 133-139 7 p.

Research output: Contribution to journalArticle

Open Access

On the Study of EEG-based Cryptographic Key Generation

Nguyen, D., Tran, D., Sharma, D. & Ma, W., 1 Sep 2017, Procedia Computer Science: International Conference on Kno wledge Based and Intelligent Information and Engineering Systems (KES2017). Marseille, France: Elsevier, Vol. 112. p. 936-945 10 p. (Procedia Computer Science).

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
2 Citations (Scopus)