Publications

Scholarly Book Chapters

  1. Ducatelle, F., Gambardella, L., Kurant, M., Nguyen, H., & Thiran, P. (2006). Algorithms for Failure Protection in Large IP-over-Fiber and Wireless Ad Hoc Networks. In J. Kohlas, B. Meyer, & A. Schiper (Eds.), Lecture Notes in Computer Science (LNCS) 4028: Dependable Systems: Software, Computing, Networks (1 ed., pp. 231-259). Berlin: Springer. doi:10.1007/11808107_11
  2. Kurant, M., Nguyen, H., & Thiran, P. (2006). Survey on Dependable IP-over-Fiber Networks. In D. Hutchison, T. Kanade, J. Kittler, J. Kleinberg, A. Kobsa, F. Mattern, . . . G. Weikum (Eds.), Lecture Notes in Computer Science (LNCS) 4028: Dependable Systems: Software, Computing, Networks (1 ed., pp. 55-81). Berlin: Springer. doi:10.1007/11808107_3
  3. Mas, C., Nguyen, H., & Thiran, P. (2005). Failure location in WDM networks. In K. M. Sivalingam, & S. Subramaniam (Eds.), Emerging Optical Network Technologies: Architectures, Protocols and Performance (1 ed., pp. 379-399). New York: Springer. doi:10.1007/0-387-22584-6_16

Refereed Journal Articles

  1. Duong D. Nguyen, Hung X. Nguyen, Langford White. (2017).  Reinforcement Learning with Network-Assisted Feedback for Heterogeneous RAT Selection. Accepted to IEEE Transactions on Wireless Communications 
  2. Dinesha Ranathunga, Nguyen, H. X., Matthew Roughan. (2017).  MGtoolkit: A Python Package for implementing metagraphs, SoftwareX. doi: 10.1016/j.softx.2017.04.001
  3. Dinesha Ranathunga., Matthew Roughan., Nguyen, H., Phil Kernick., & Nick Falkner. (2016). Case Studies of SCADA Firewall Con gurations and the Implications for Best Practices. IEEE Transactions on Network and Service Management, 13(4), 871-884. doi:10.1109/TNSM.2016.2597245
  4. Nguyen, H. X., & Roughan, M. (2013). Multi-observer privacy-preserving hidden Markov models. IEEE Transactions on Signal Processing, 61(23), 6010-6019. doi:10.1109/TSP.2013.2282911
  5. Nguyen, H., & Roughan, M. (2013). Rigorous statistical analysis of internet loss measurements. IEEE – ACM Transactions on Networking, 21(3), 734-745. doi:10.1109/TNET.2012.2207915
  6. Knight, S., Falkner, N., Nguyen, H., Tune, P., & Roughan, M. (2012). I can see for miles: re-visualizing the internet. IEEE Network, 26(6), 26-32. doi:10.1109/MNET.2012.6375890
  7. Nguyen, H., & Roughan, M. (2012). Improving hidden Markov model inferences with private data from multiple observers. IEEE Signal Processing Letters, 19(10), 696-699. doi:10.1109/LSP.2012.2213811
  8. Knight, S., Nguyen, H., Falkner, N., Bowden, R., & Roughan, M. (2011). The internet topology zoo. IEEE Journal on Selected Areas in Communications, 29(9), 1765-1775. doi:10.1109/JSAC.2011.111002
  9. Nguyen, H. X., & Matthew Roughan. (2010). Rigorous statistical analysis of internet loss measurements. ACM SIGMETRICS Performance Evaluation Review, 38(1), 361-362. doi:10.1145/1811099.1811087

Refereed Conference Papers

  1. Ba-Dung Le, Hung X. Nguyen, Hong Shen and Nickolas Falkner (2017). GLFR: A Generalized LFR Benchmark for Testing Community Detection Algorithms. Accepted to the 26th International Conference on Computer Communications and Networks (ICCCN 2017), July 31 -August 3, 2017, Vancouver, Canada
  2. Duong Duc Nguyen, Lang White and Nguyen, H. X. (2016). Adaptive Multiagent Reinforcement Learning with Non-positive Regret. Accepted to appear in Proceedings  of 29th Australasian Joint Conference on Artificial Intelligence (AI 2016)  (pp. 1-5). Hobart, Australia.
  3. Nguyen, H., Nguyen, D. D., Pham, T., Hoang, K., & Parsonage, E. (2016). A Prototype of Policy Defined Wireless Access Networks. In Proceedings of the IEEE International Telecommunication Networks and Applications Conference (ITNAC) (pp. 6 pages pages). Dunedin, New Zealand.
  4. Nguyen, D. D., White, L. B., & Nguyen, H. X. (2016). Adaptive Multiagent Reinforcement Learning with Non-positive Regret. In Proceedings of the 29th Australasian Joint Conference on Artificial Intelligence (AI 2016) Vol. 9992 LNAI (pp. 13 pages). Hobart, Australia. doi:10.1007/978-3-319-50127-7_3
  5. Nguyen, D. D., Nguyen, H. X., & White, L. B. (2016). Performance of Adaptive RAT Selection Algorithms in 5G Heterogeneous Wireless Networks. In Proceedings of the IEEE International Telecommunication Networks and Applications Conference (ITNAC) (pp. 6 pages). Dunedin, New Zealand.
  6. Nguyen, H. X., Webb, M. R., & Naguleswaran, S. (2016). Achieving policy defined networking for military operations. In 2016 Military Communications and Information Systems Conference, MilCIS 2016 – Proceedings (pp. 6 pages). Canberra, AUSTRALIA: IEEE. doi:10.1109/MilCIS.2016.7797339
  7. Dinesha Ranathunga., Matthew Roughan., Phil Kernick., Nick Falkner., Nguyen, H., Michelle McClintock., & Marian Mihailescu. (2016). Verifiable Policy-Defined Networking for Security Management. In Proceedings of International Conference on Security and Cryptography (SECRYPT 2016) Vol. 4 (pp. 344-351). Lisbon, Portugal: SCITEPRESS. doi:10.5220/0005990303440351
  8. Le, B. D., Nguyen, H., & Shen, H. (2016). Community detection in networks with less significant community structure. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 10086 LNAI (pp. 65-80). doi:10.1007/978-3-319-49586-6_5
  9. Nguyen, H., Naguleswaran, S., & Webb, M. (2016). Emergency Communication in Australia: Current Situation and Future Directions. In Proceedings of  The 5th Disaster and Emergency Management Conference. Gold Coast, QLD, Australia.
  10. Nguyen, H., & Northcote, B. (2016). User spectral efficiency: combining spectral efficiency with user experience. In IEEE ICC’16: Cummincations for all things: IEEE International Conference on Communications (pp. 1-6). Kuala Lumpur, Malaysia: IEEE. doi:10.1109/ICC.2016.7511204
  11. Nguyen, H., Mihailescu, M., & Webb, M. (2015). Enhancing wireless communications with software defined networking. In Proceedings of of the Military Communications and Information Systems Conference (MilCIS) (pp. 1-5). Canberra, Australia: IEEE. doi:10.1109/MilCIS.2015.7348945
  12. Ranathunga, D., Roughan, M., Kernick, P., Falkner, N., & Nguyen, H. (2015). Identifying the missing aspects of the ANSI/ISA best practices for security policy. In CPSS 2015 – Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, Part of ASIACCS 2015 (pp. 37-48). doi:10.1145/2732198.2732201
  13. Knight, S., Nguyen, H., Maennel, O., Phillips, I., Falkner, N., Bush, R., & Roughan, M. (2013). An automated system for emulated network experimentation. In Proceedings of the 9th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT 2013 (pp. 235-246). USA: Association for Computing Machinery. doi:10.1145/2535372.2535378
  14. Tune, P., Nguyen, H., & Roughan, M. (2013). Hidden Markov model identifiability via tensors. In IEEE International Symposium on Information Theory, ISIT 2013 (pp. 2299-2303). Online: IEEE. doi:10.1109/ISIT.2013.6620636
  15. Nguyen, H., & Roughan, M. (2012). Multi-observer privacy-preserving hidden Markov models. In Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012 (pp. 514-517). USA: IEEE. doi:10.1109/NOMS.2012.6211944
  16. Nguyen, H., & Roughan, M. (2012). On the identifiability of multi-observer hidden Markov models. In Proceedings of the 2012 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2012 (pp. 1873-1876). USA: IEEE. doi:10.1109/ICASSP.2012.6288268
  17. Parsonage, E., Nguyen, H., & Roughan, M. (2011). Absorbing lexicographic products in metarouting. In Proceedings of 1st International Workshop on Rigorous Protocol Engineering (WRiPE) 2011 (pp. 1-6). Vancouver, Canada. Retrieved from http://wripe11.cis.upenn.edu/program/papers/wripe11-paper4.pdf
  18. Parsonage, E., Nguyen, H., Bowden, R., Knight, S., Falkner, N., & Roughan, M. (2011). Generalized graph products for network design and analysis. In Proceedings of the 19th EEE International Conference on Network Protocols (pp. 79-88). USA: IEEE. doi:10.1109/ICNP.2011.6089084
  19. Bowden, R., Nguyen, H., Falkner, N., Knight, S., & Roughan, M. (2011). Planarity of data networks. In Proceedings of the 2011 23rd International Teletraffic Congress (pp. 254-261). USA: ITC Press. Retrieved from http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6031617
  20. Coyle, A., & Nguyen, H. (2010). A frequency control algorithm for a mobile adhoc network. In Proceedings of Military Communications and Information Systems Conference (pp. 1-6). Canberra, ACT.
  21. Nguyen, H., Roughan, M., Knight, S., Falkner, N., Maennel, O., & Bush, R. (2010). How to build complex, large-scale emulated networks. In Proceedings of TridentCom 2010 Vol. 46 (pp. 1-14). www: ICST. doi:10.1007/978-3-642-17851-1_1
  22. Ghita, D., Nguyen, H., Kurant, M., Argyraki, K., & Thiran, P. (2010). Netscope: practical network loss tomography. In 2010 Proceedings of IEEE INFOCOM (pp. 1-9). San Diego, CA: IEEE. doi:10.1109/INFCOM.2010.5461918
  23. Nguyen, H., & Roughan, M. (2010). Rigorous statistical analysis of internet loss measurements. In ACM SIGMETRICS Performance Evaluation Review Special Issue Vol. 38 (pp. 361-362). United States: Association for Computing Machinery, Inc.. doi:10.1145/1811099.1811087
  24. Nguyen, H., Teixeira, R., Thiran, P., & Diot, C. (2009). Minimizing Probing Cost for Detecting Interface Failures: Algorithms and Scalability Analysis. In Proceedings of the IEEE INFOCOM Conference 2009 (pp. 1-9). USA: IEEE. doi:10.1109/INFCOM.2009.5062054
  25. Nguyen, H., Figueiredo, D., Grossglauser, M., & Thiran, P. (2008). Balanced relay allocation on heterogeneous unstructured overlays. In INFOCOM 2008: The 27th Conference on Computer Communications IEEE (pp. 126-130). Online: IEEE.
  26. Nguyen, H., & Roughan, M. (2008). On the correlation of internet packet losses. In Proceeding of the Australasian Telecommunication Networks and Applications Conference (pp. 1-6). CD: IEEE. doi:10.1109/ATNAC.2008.4783289
  27. Nguyen, H., & Thiran, P. (2007). Network loss inference with second order statistics of end-to-end flows. In Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, San Diego, USA, 24-26 October, 2007 (pp. 227-240). New York: ACM. doi:10.1145/1298306.1298339
  28. Nguyen, H., & Thiran, P. (2007). The boolean solution to the congested IP link location problem: theory and practice. In IEEE INFOCOM 2007 26th IEEE International Conference on Computer Communications (pp. 2117-2125). Online: IEEE. doi:10.1109/INFCOM.2007.245
  29. Nguyen, H., & Thiran, P. (2006). Using end-to-end data to infer lossy links in sensor networks. In IEEE INFOCOM 2006 Proceedings of the 25th IEEE International Conference on Computer Communications (pp. 1-12). Online: IEEE.
  30. Nguyen, H., & Thiran, P. (2005). Binary Versus Analogue Path Monitoring in IP Networks. In Passive and Active Network Measurement: Lecture Notes in Computer Science, Vol. 3431, 6th International Workshop 2005 Proceedings. (pp. 97-107). Germany: Springer. doi:10.1007/b135479
  31. Dousse, O., Nguyen, H., & Thiran, P. (2005). Deux applications de processus ponctuels aux réseaux de communication. In 20th GRESTI Symposium on Signal and Image Processing 2005 (pp. 269-272). Louvain-la-Neuve, Belgium.
  32. Nguyen, H., & Thiran, P. (2005). Failure location in transparent optical networks: The asymmetry between false and missing alarms. In 19th International Teletraffic Congress (ITC 19) 2005. Performance Challenges for Efficient Next generation networks (pp. 991-1000). Beijing, China.
  33. Nguyen, H., & Thiran, P. (2004). Active Measurement for Multiple Link Failures Diagnosis in IP Networks. In Passive and Active Network Measurement: Lecture Notes in Computer Science, Vol. 3051, Proceedings of the Workshop on Passive and Active Measurements (PAM) (pp. 185-194). Berlin: Springer-Verlag. doi:10.1007/b96961
  34. Nguyen, H., Thiran, P., & Barakat, C. (2004). On the correlation of TCP traffic in backbone networks. In IEEE International Symposium on Circuits and Systems (ISCAS) 2004 Proceedings (pp. 481-484). Online: IEEE.
  35. Nguyen, H., Rajesh, S., & Abbott, D. (2001). Motion detection algorithms using template model. In N. W. Bergmann (Ed.), Proceedings of SPIE – The International Society for Optical Engineering Vol. 4591 (pp. 78-90). PO BOX 10 BELLINGHAM WASHINGTON USA: THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERING. doi:10.1117/12.449137

Technical Reports ( for external bodies)

  1. Coyle, A. J., Nguyen, H., & Northcote, B. (2016). Tactical Radio Modelling – Overview Report.
  2. Northcote, B., Costa, A., Nguyen, H., & FitzGerald, D. (2015). TEMS™ Capacity Manager Dar Es Salam Capacity Analysis Report Prepared for Airtel Tanzania: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
  3. Northcote, B., Costa, A., Nguyen, H., Warner, N., & FitzGerald, D. (2015). TEMS™ Capacity Manager Mandalay Capacity Analysis Report Prepared for Ooredoo Myanmar: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
  4. Northcote, B., Costa, A., McMahon, J. J., Nguyen, H., Oliu, C., & FitzGerald, D. (2015). TEMS™ Capacity Manager Guadalajara Capacity Analysis Project Validation Report Prepared for AT&T Mexico: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
  5. Northcote, B., Costa, A., Nguyen, H., Warner, N., & FitzGerald, D. (2015). TEMS™ Capacity Manager Mandalay Capacity Analysis Project Validation Report Prepared for Ooredoo Myanmar: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
  6. Northcote, B., McMahon, J. J., Nguyen, H., Brooks, T., & FitzGerald, D. (2015). TEMS™ Capacity Manager Atlanta Capacity Analysis Report Prepared for AT&T USA: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
  7. Northcote, B., Warner, N., McMahon, J. J., Coyle, A., Costa, A., Mihailescu, M., . . . Li, Y. (2014). Devil WCDMA network dimensioning 2014 workshop. Telstra.
  8. Northcote, B., Warner, N., Coyle, A., Costa, A., Mihailescu, M., Nguyen, H., . . . Li, Y. (2013). Devil WCDMA network dimensioning 2013 workshop. Telstra.
  9. Nguyen, H., & Costa, A. (2014). SAPN Restoration Analysis Forecast Tool v1.0.
  10. Nguyen, H., & Webb, M. R. (2014). Wireless Mesh and Backhaul Solutions for  Responder Check-in Systems.
  11. Northcote, B., Warner, N., McMahon, J. J., Coyle, A., Costa, A., Mihailescu, M., . . . Britton, M. (2015). Devil WCDMA network dimensioning 2015 workshop. Telstra.
  12. Britton, M., Naguleswaran, S., Nguyen, H., Coyle, A., Yates, S., & Mihailescu, M. (2012). FogNet v4.0 User Guide.
  13. Coyle, A., Nguyen, H., Naguleswaran, S., Britton, M., Porter, C., & Webb, M. R. (2010). SANLab Year 2 Report.
  14. Northcote, B., Warner, N., Coyle, A., Costa, A., Mihailescu, M., Nguyen, H., . . . Yates, S. (2012). Devil WCDMA network dimensioning 2012 workshop. Telstra.
  15. Coyle, A., Nguyen, H., Naguleswaran, S., Britton, M., Porter, C., & Webb, M. R. (2011). SANLab Year 3 Report.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s