{"id":7379,"date":"2025-05-12T06:29:02","date_gmt":"2025-05-12T06:29:02","guid":{"rendered":"https:\/\/iccies.tdtu.edu.vn\/?p=7379"},"modified":"2025-06-04T11:52:52","modified_gmt":"2025-06-04T11:52:52","slug":"accepted-papers","status":"publish","type":"post","link":"https:\/\/iccies.tdtu.edu.vn\/2025\/accepted-papers\/","title":{"rendered":"Accepted Papers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7379\" class=\"elementor elementor-7379\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e608d13 e-flex e-con-boxed e-con e-parent\" data-id=\"e608d13\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-310817e elementor-widget elementor-widget-heading\" data-id=\"310817e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 15-07-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Accepted Papers<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3beccf e-flex e-con-boxed e-con e-parent\" data-id=\"d3beccf\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f2ecd1e elementor-widget elementor-widget-text-editor\" data-id=\"f2ecd1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 15-07-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<table width=\"100%\"><tbody><tr><td><strong>No.<\/strong><\/td><td><strong>ID<\/strong><\/td><td><strong>Paper Title &#8211; Authors<\/strong><\/td><td><strong>Session<\/strong><\/td><\/tr><tr><td>1<\/td><td>24<\/td><td><strong>A Hardware-Friendly Approach for ECG Classification based on Deep Learning Algorithm<\/strong><br \/>Tuan-Kiet Tran, Minh-Tuyen Huynh, Quoc-Minh-Dang Do, Cong-Kha Pham, and Huu-Thuan Huynh<\/td><td style=\"white-space: nowrap;\">V1.1.1<br \/>Machine Learning 1<\/td><\/tr><tr><td>2<\/td><td>25<\/td><td><strong>PRIMO: A Privacy-Preserving Decentralized Machine Learning Algorithm<\/strong><br \/>Le Trieu Phong and Tran Thi Phuong<\/td><td style=\"white-space: nowrap;\">V1.1.1<br \/>Machine Learning 1<\/td><\/tr><tr><td>3<\/td><td>29<\/td><td><strong>Smart Harvesting: Sorting Coffee Fruit Maturity Using Deep Learning<\/strong><br \/>Tho Chi Phan, Dat Viet Nguyen, and Ngoc Hong Tran<\/td><td style=\"white-space: nowrap;\">V1.1.1<br \/>Machine Learning 1<\/td><\/tr><tr><td>4<\/td><td>30<\/td><td><strong>Combining Explainable AI (XAI) and Regression Analysis to Explain Relationships in Electricity Consumption Behavior<\/strong><br \/>Loc Tan Dinh, Huy Nguyen Thanh, Khanh Le Di, Chi Tran Thi Kim and Anh Quynh Hoang<\/td><td style=\"white-space: nowrap;\">V1.1.1<br \/>Machine Learning 1<\/td><\/tr><tr><td>5<\/td><td>38<\/td><td><strong>Detecting Anomalies and Defects in Integrated Circuits by Ensembling Deep Learning Models<\/strong><br \/>Ngoc Hong Tran, Vinh Ngoc Nguyen, Dat Viet Nguyen, Ngoc-Thao Thi Le, and Quoc-Binh Nguyen<\/td><td style=\"white-space: nowrap;\">V1.1.1<br \/>Machine Learning 1<\/td><\/tr><tr><td>6<\/td><td>39<\/td><td><strong>Doctor AI: A Hybrid Model for Clinical Ocular Disease Classification<\/strong><br \/>Pham Le Duc Thinh, Do Anh Kiet, Nguyen Thanh Binh, An Mai, Nguyen Thi Minh Phuong, and Nguyen Thuc Anh<\/td><td style=\"white-space: nowrap;\">V1.1.2<br \/>Machine Learning 2<\/td><\/tr><tr><td>7<\/td><td>40<\/td><td><strong>Forecasting Weather: A Scenario of the Mekong Delta<\/strong><br \/>Kim-Thanh Hoang Le, Cam-Tu Ha, Cuong Tuan Nguyen, Ngoc Hong Tran<\/td><td style=\"white-space: nowrap;\">V1.1.2<br \/>Machine Learning 2<\/td><\/tr><tr><td>8<\/td><td>43<\/td><td><strong>Melanoma Detection Using Augmented ResNet34 for High-Precision Dermoscopic Image Classification<\/strong><br \/>Mustakim Ahmed, Arifa Sultana, Prithanjoly Biswas Pew, Sourav Datto, Tanzim Ikram Sheikh, Kazi Redwan, and Md. Faruk Abdullah Al Sohan<\/td><td style=\"white-space: nowrap;\">V1.1.2<br \/>Machine Learning 2<\/td><\/tr><tr><td>9<\/td><td>45<\/td><td><strong>Abnormal Plum Fruit Detection Using Unsupervised Learning<\/strong><br \/>Doan-Tung Duong, Viet-Phuong Le, Thi-Thanh-Tam Nguyen, and Van-Toi Nguyen<\/td><td style=\"white-space: nowrap;\">V1.1.2<br \/>Machine Learning 2<\/td><\/tr><tr><td>10<\/td><td>54<\/td><td><strong>Hybrid Deep Learning Model for MRI Brain Tumor Identification<\/strong><br \/>Viet Hang Duong, Minh Quan Tran, Nguyen Khang Nguyen, Manh Quan Bui, Thanh Dung Nguyen, and Jia Ching Wang<\/td><td style=\"white-space: nowrap;\">V1.1.2<br \/>Machine Learning 2<\/td><\/tr><tr><td>11<\/td><td>46<\/td><td><strong>Optimizing NP-Hard Problems: A Comparative Study of Metaheuristic Algorithms with Benchmark Performance Analysis<\/strong><br \/>Md. Maruf Hossain Munna, Riazul Zannah, Sajedul Islam, Syeda Shakira Akter, Md. Asif Sarker Emon, Mustakim Ahmed and Md. Faruk Abdullah Al Sohan<\/td><td style=\"white-space: nowrap;\">V1.1.3<br \/>Machine Learning 3<\/td><\/tr><tr><td>12<\/td><td>57<\/td><td><strong>Leveraging Machine Learning for Accurate Order Quantity Forecasting: A Case Study of Vietnam\u2019s Coffee Production Industry<\/strong><br \/>Nguyen Khoi Nguyen, Pham Dong Kha, Tran Anh Dung, and Hoang Anh<\/td><td style=\"white-space: nowrap;\">V1.1.3<br \/>Machine Learning 3<\/td><\/tr><tr><td>13<\/td><td>71<\/td><td><strong>An Attentive Deep Neuro-Fuzzy Network for Interpretable Breast Cancer Diagnosis<\/strong><br \/>Thu-Hien Nguyen, Phuong-Nhung Nguyen, and Tuan-Linh Nguyen<\/td><td style=\"white-space: nowrap;\">V1.1.3<br \/>Machine Learning 3<\/td><\/tr><tr><td>14<\/td><td>72<\/td><td><strong>Detection of Littering Behavior Using MobileNet and Vision Transformer<\/strong><br \/>Cu Vinh Loc, Nguyen Thanh Hai, Truong Xuan Viet, Tran Hoang Viet, and Le Hoang Thao<\/td><td style=\"white-space: nowrap;\">V1.1.3<br \/>Machine Learning 3<\/td><\/tr><tr><td>15<\/td><td>75<\/td><td><strong>The effectiveness of channel and spatial attention for improving image classification<\/strong><br \/>Le Thao Tram Nguyen, Minh Phung Bui and Quoc Huy Nguyen<\/td><td style=\"white-space: nowrap;\">V1.1.3<br \/>Machine Learning 3<\/td><\/tr><tr><td>16<\/td><td>47<\/td><td><strong>A Fusion-Based Deep Learning Approach for Enhanced Polyp Detection in Medical Imaging<\/strong><br \/>Tran Nguyen Song Hieu, Nhu-Tai Do, and Quoc-Huy Nguyen<\/td><td style=\"white-space: nowrap;\">V2.1.1<br \/>Computer Vision 1<\/td><\/tr><tr><td>17<\/td><td>98<\/td><td><strong>Detection and Distribution Estimation of Rice Seedlings in Direct Seeding Conditions Using UAV-based Imagery<\/strong><br \/>Cong-Doan Le, Minh-Tuyen Truong, Huu-Hiep Nguyen Bui, Van-Hoa Nguyen<\/td><td style=\"white-space: nowrap;\">V2.1.1<br \/>Computer Vision 1<\/td><\/tr><tr><td>18<\/td><td>99<\/td><td><strong>Visual-GCN: A Hybrid Graph-Based Recommender System for Fashion<\/strong><br \/>Tin T. Tran, Manh Mai Van, Nguyen T. Phong, and Thuan Q. Nguyen<\/td><td style=\"white-space: nowrap;\">V2.1.1<br \/>Computer Vision 1<\/td><\/tr><tr><td>19<\/td><td>148<\/td><td><strong>Inception Vision Mamba UNet for Breast Ultrasound Tumor Segmentation<\/strong><br \/>Viet Dung Nguyen and Tat Chuyen Mai<\/td><td style=\"white-space: nowrap;\">V2.1.1<br \/>Computer Vision 1<\/td><\/tr><tr><td>20<\/td><td>182<\/td><td><strong>Explainable AI and Enhanced Fuzzy C-Means for Brain Tumor Detection<\/strong><br \/>Anh-Cang Phan, Khac-Tuong Nguyen, and Thuong-Cang Phan<\/td><td style=\"white-space: nowrap;\">V2.1.1<br \/>Computer Vision 1<\/td><\/tr><tr><td>21<\/td><td>169<\/td><td><strong>High-Precision 3D Insect Modeling with Photogrammetry: A Comparative Study<\/strong><br \/>Thanh-Nghi Doan, Hiep-Nguyen Le, and Thuy-Trang Bui-Thi<\/td><td style=\"white-space: nowrap;\">V2.1.2<br \/>Computer Vision 2<\/td><\/tr><tr><td>22<\/td><td>19<\/td><td><strong>Efficient Wheat Head Detection via Lightweight Deep Learning with YOLOv5 Enhancements<\/strong><br \/>Phuc-Thinh Huynh, Ngoc-Quy Pham, Van-Phuc Nguyen, and Thien Huynh-The<\/td><td style=\"white-space: nowrap;\">V2.1.2<br \/>Computer Vision 2<\/td><\/tr><tr><td>23<\/td><td>66<\/td><td><strong>Enhancing Video Anomaly Detection: Object-based Pseudo Anomalies and Memory Augmented Autoencoder<\/strong><br \/>Thi Huong Chu, Hong Quan Nguyen, Van Thieu Doan, Anh Le, Quang Uy Nguyen, and Hai Hong Phan<\/td><td style=\"white-space: nowrap;\">V2.1.2<br \/>Computer Vision 2<\/td><\/tr><tr><td>24<\/td><td>70<\/td><td><strong>Smart Food Manufacturing: Integrating Deep Learning Models for Enhancing Efficiency in Broken Egg Detection<\/strong><br \/>Dat Viet Nguyen, Quoc-Binh Nguyen, Hoang-Duy Pham Le and Ngoc Hong Tran<\/td><td style=\"white-space: nowrap;\">V2.1.2<br \/>Computer Vision 2<\/td><\/tr><tr><td>25<\/td><td>125<\/td><td><strong>An End-to-end System based on Deep Learning for Oral Disease Detection<\/strong><br \/>Duc-Quang Vu; Do Tien Trong; Nguyen Manh Hiep; Truong Thi Thanh and Le Thi Thu Hang<\/td><td style=\"white-space: nowrap;\">V2.1.2<br \/>Computer Vision 2<\/td><\/tr><tr><td>26<\/td><td>127<\/td><td><strong>Application of YOLO Models for Automated Object De-tection: Comparison, Analysis, and Recommendations<\/strong><br \/>Amangeldy Nurzada, Aizhan Nazyrova, Kurmetbek Bekbolat and Gazizova, Nazerke<\/td><td style=\"white-space: nowrap;\">V2.1.3<br \/>Computer Vision 3<\/td><\/tr><tr><td>27<\/td><td>128<\/td><td><strong>Current Trends in Developing Parallel Corpora for Text-to-Sign Language Translation<\/strong><br \/>Amangeldy Nurzada, Marek Milosz, Aigerim Yerimbetova, Tursynova Nazira, Kurmetbek Bekbolat and Gazizova Nazerke<\/td><td style=\"white-space: nowrap;\">V2.1.3<br \/>Computer Vision 3<\/td><\/tr><tr><td>28<\/td><td>135<\/td><td><strong>DETECTING SCRATCHES IN MICROBIOLOGICAL PIPING USING USB CAMERA AND DEEP LEARNING<\/strong><br \/>Nguyen Thai-Nghe, Ngo Thu Thao, Le Huynh Quoc Bao, and Thai Minh Tuan<\/td><td style=\"white-space: nowrap;\">V2.1.3<br \/>Computer Vision 3<\/td><\/tr><tr><td>29<\/td><td>52<\/td><td><strong>YOLO11n-RP: Lightweight deep learning model for the real-time detection based on YOLOv11<\/strong><br \/>Nguyen Thi Thu Ha, Doan Dinh Khanh, Tran Van Hung and Cao Van Kien<\/td><td style=\"white-space: nowrap;\">V2.1.3<br \/>Computer Vision 3<\/td><\/tr><tr><td>30<\/td><td>27<\/td><td><strong>Skeleton-based action recognition based on dynamic \u2013 adaptive spatial graph convolution neural network<\/strong><br \/>Thien Le-Chi and Cao Van Kien<\/td><td style=\"white-space: nowrap;\">V3.1.1<br \/>Intelligent Systems 1<\/td><\/tr><tr><td>31<\/td><td>31<\/td><td><strong>Pre-trained Intra- and Inter-framework: An Efficient Approach for Cocktail Party Effect<\/strong><br \/>Ha Minh Tan and Vo Ngoc Tan<\/td><td style=\"white-space: nowrap;\">V3.1.1<br \/>Intelligent Systems 1<\/td><\/tr><tr><td>32<\/td><td>50<\/td><td><strong>A Comparison of Frequent Itemset Mining Algorithms in Distributed File Systems Using PySpark: A-Priori versus PCY<\/strong><br \/>Luat TRAN, Truc CAO, Tien NGUYEN, Hung NGUYEN and Thanh-An NGUYEN<\/td><td style=\"white-space: nowrap;\">V3.1.1<br \/>Intelligent Systems 1<\/td><\/tr><tr><td>33<\/td><td>61<\/td><td><strong>Improved Greedy Algorithms for the Set Covering Problem<\/strong><br \/>Binh Thanh Dang<\/td><td style=\"white-space: nowrap;\">V3.1.1<br \/>Intelligent Systems 1<\/td><\/tr><tr><td>34<\/td><td>187<\/td><td><strong>Predicting The Likelihood of Discontinuing Banking Services Using Probabilistic Graphical Models<\/strong><br \/>Thien Nguyen and Phuoc Vo<\/td><td style=\"white-space: nowrap;\">V3.1.1<br \/>Intelligent Systems 1<\/td><\/tr><tr><td>35<\/td><td>77<\/td><td><strong>Blockchain-Based Detection of Unauthorized Data Modification in Database<\/strong><br \/>Cu Vinh Loc, Nguyen Thanh Hai, Truong Xuan Viet, Tran Hoang Viet, and Le Hoang Thao<\/td><td style=\"white-space: nowrap;\">V3.1.2<br \/>Intelligent Systems 2<\/td><\/tr><tr><td>36<\/td><td>79<\/td><td><strong>A Secure Identity-based Schnorr Multi-Signature Scheme<\/strong><br \/>Thi Tuyet Trinh Nguyen, Thi Hanh Tran, Van Nghi Nguyen, Minh Tu Le, Tien Thanh Dinh, and Thi Hien Pham<\/td><td style=\"white-space: nowrap;\">V3.1.2<br \/>Intelligent Systems 2<\/td><\/tr><tr><td>37<\/td><td>81<\/td><td><strong>An approach for enhancing Ripe Tomato Classification and Counting by using Deep Learning and SAHI image Processing<\/strong><br \/>Nguyen Minh Khiem, Tran Van Thanh, Nguyen Thanh Hai, Le Huynh Quoc Bao, and Nguyen Thai Nghe<\/td><td style=\"white-space: nowrap;\">V3.1.2<br \/>Intelligent Systems 2<\/td><\/tr><tr><td>38<\/td><td>92<\/td><td><strong>Performance Evaluation of NSGA-II Evolutionary Algorithm on ZCAT Test Problems with pymoo<\/strong><br \/>Marica Magagnini and Renato De Leone<\/td><td style=\"white-space: nowrap;\">V3.1.2<br \/>Intelligent Systems 2<\/td><\/tr><tr><td>39<\/td><td>146<\/td><td><strong>Game Theory Approaches for Pok\u00e9mon AI Battle Simulation<\/strong><br \/>Nguyen Dung, Dao The Hien, Bui Vu Khoa, Pham Tuan Kiet, and Doina Logof\u0103tu<\/td><td style=\"white-space: nowrap;\">V3.1.2<br \/>Intelligent Systems 2<\/td><\/tr><tr><td>40<\/td><td>159<\/td><td><strong>LOC-based Instruction Selection for Statistical Root Cause Analysis<\/strong><br \/>Duc Anh Bui and Thanh Le Dinh<\/td><td style=\"white-space: nowrap;\">V3.1.3<br \/>Intelligent Systems 3<\/td><\/tr><tr><td>41<\/td><td>167<\/td><td><strong>A Performance Study of Hashing Techniques Used in Bloom-Filters-Based Automatic Bus Ticketing Systems<\/strong><br \/>Tuan-Anh Van, Nhat-Anh Nguyen, Thanh Hoang Le Hai, Thanh-Dang Diep and Nam Thoai<\/td><td style=\"white-space: nowrap;\">V3.1.3<br \/>Intelligent Systems 3<\/td><\/tr><tr><td>42<\/td><td>178<\/td><td><strong>Digital document signing solution without PKI infrastructure for small and medium enterprises<\/strong><br \/>Minh Tu Le, Minh Hieu Le, Ngoc Hai Nguyen, Tien Thanh Dinh, Thi Hien Pham and Van Nghi Nguyen<\/td><td style=\"white-space: nowrap;\">V3.1.3<br \/>Intelligent Systems 3<\/td><\/tr><tr><td>43<\/td><td>193<\/td><td><strong>Tail-Diffusion: Simulation Scenarios in Finance with Denoising Diffusion Models and Tail Risk Analysis<\/strong><br \/>Nguyen Minh Thu, Huynh Hoang Trung Ngia, Tran Hong Huy, Vu Duc Thinh and Ngo Minh Man<\/td><td style=\"white-space: nowrap;\">V3.1.3<br \/>Intelligent Systems 3<\/td><\/tr><tr><td>44<\/td><td>155<\/td><td><strong>Clickbait Detection: A Comparative Analysis of Traditional Machine Learning, Deep Learning, and Large Language Models<\/strong><br \/>Nguyen Phuoc Dai, Luu Van Nhat Hao and Thien Khai Tran<\/td><td style=\"white-space: nowrap;\">V4.1.1<br \/>Machine Learning 5<\/td><\/tr><tr><td>45<\/td><td>161<\/td><td><strong>Breast cancer classification based on fuzzy rules and deep learning techniques<\/strong><br \/>Ho-Dat TRAN, Thuong-Cang PHAN, Vinh-Phong NGUYEN, and Anh-Cang PHAN<\/td><td style=\"white-space: nowrap;\">V4.1.1<br \/>Machine Learning 5<\/td><\/tr><tr><td>46<\/td><td>162<\/td><td><strong>Enhancing Financial Time Series Forecasting through Anomaly Detection and Repair<\/strong><br \/>Kiet Nguyen Tuan, Duong Tuan Anh and Vo Minh Tri<\/td><td style=\"white-space: nowrap;\">V4.1.1<br \/>Machine Learning 5<\/td><\/tr><tr><td>47<\/td><td>163<\/td><td><strong>Explainable AI for Lung Cancer Classification Using Histopathological Images<\/strong><br \/>Anh-Cang Phan, Ngoc-Hoang-Quyen Nguyen and Thuong-Cang Phan<\/td><td style=\"white-space: nowrap;\">V4.1.1<br \/>Machine Learning 5<\/td><\/tr><tr><td>48<\/td><td>113<\/td><td><strong>Illuminating Advances: A Comprehensive Review of Optical Character Recognition for the English Language<\/strong><br \/>Vu Tuyet Anh Pham, Tan Duy Le and Kha Tu Huynh<\/td><td style=\"white-space: nowrap;\">V4.1.1<br \/>Machine Learning 5<\/td><\/tr><tr><td>49<\/td><td>189<\/td><td><strong>Predicting protein-protein interactions: A case study using Hilbert transform with combining ensemble learning model<\/strong><br \/>Khanh Duy Truong, Xuan Van Mai and Tuong Tri Nguyen<\/td><td style=\"white-space: nowrap;\">V4.1.2<br \/>Machine Learning 6<\/td><\/tr><tr><td>50<\/td><td>233<\/td><td><strong>Understanding Job Switching Risks through Interpretability Evaluation<\/strong><br \/>Alexandra Vultureanu-Albisi and Costin Badica<\/td><td style=\"white-space: nowrap;\">V4.1.2<br \/>Machine Learning 6<\/td><\/tr><tr><td>51<\/td><td>49<\/td><td><strong>Tensor Synergy Network for Multimodal Hate Speech Detection<\/strong><br \/>Phuc H. Duong, Ngoc-Tu Huynh and Hien T. Nguyen<\/td><td style=\"white-space: nowrap;\">V4.1.2<br \/>Machine Learning 6<\/td><\/tr><tr><td>52<\/td><td>106<\/td><td><strong>An Ensemble-Based Approach with PhoBERT for Vietnamese Hate and Offensive Spans Detection<\/strong><br \/>Dinh-Hong Vu, Ky Pham and Tuong Le<\/td><td style=\"white-space: nowrap;\">V4.1.2<br \/>Machine Learning 6<\/td><\/tr><tr><td>53<\/td><td>140<\/td><td><strong>Scene Sino-Nom Text Optical Character Recognition in Vietnam: a novel approach combining deep learning and linguistic knowledge<\/strong><br \/>Le Thi Cam Thi, Dinh Si Dien and Nguyen Vinh Tiep<\/td><td style=\"white-space: nowrap;\">V4.1.2<br \/>Machine Learning 6<\/td><\/tr><tr><td>54<\/td><td>153<\/td><td><strong>RAG Prompting for Mental Health Classification with LLM: A Resource-Efficient Alternative to Instruction Tuning<\/strong><br \/>Nguyen Duy Anh, La Gia Hiep and Anh-Cuong Le<\/td><td style=\"white-space: nowrap;\">V4.1.3<br \/>Machine Learning 7<\/td><\/tr><tr><td>55<\/td><td>218<\/td><td><strong>Detecting AI-Generated Vietnamese News Articles with Multilingual-E5 and BERT<\/strong><br \/>Minh-Phuc Huynh, Hoang-Anh Nguyen and Anh-Cuong Le<\/td><td style=\"white-space: nowrap;\">V4.1.3<br \/>Machine Learning 7<\/td><\/tr><tr><td>56<\/td><td>67<\/td><td><strong>Time Series Classification based on Motif Information and Random Forest Algorithm<\/strong><br \/>Duong Tuan Anh and Nguyen Nhut Tan<\/td><td style=\"white-space: nowrap;\">V4.1.3<br \/>Machine Learning 7<\/td><\/tr><tr><td>57<\/td><td>68<\/td><td><strong>Deep Learning-Based Classification of Ovarian Cancer Subtypes in Histopathology<\/strong><br \/>Anh T. Vu-Xuan, Thuy Thi Nhu Nguyen, Linh T. Tran and Thien B. Nguyen-Tat<\/td><td style=\"white-space: nowrap;\">V4.1.3<br \/>Machine Learning 7<\/td><\/tr><tr><td>58<\/td><td>101<\/td><td><strong>ATMOS: IoT-Driven Air Quality Monitoring and Forecasting System Using Machine Learning and Fog Computing<\/strong><br \/>Nghia Duong Trong, Tan Duy Le and Hong Quan Nguyen<\/td><td style=\"white-space: nowrap;\">V1.1.4<br \/>Machine Learning 4<\/td><\/tr><tr><td>59<\/td><td>105<\/td><td><strong>Leveraging Deep Neural Networks for Regional Weather Forecasting in Vietnam<\/strong><br \/>Nguyen-Thanh Phong, Nguyen-Hoang-Kim Yen, Nguyen-Huu An and Dung-Cam Quang<\/td><td style=\"white-space: nowrap;\">V1.1.4<br \/>Machine Learning 4<\/td><\/tr><tr><td>60<\/td><td>112<\/td><td><strong>Detecting Abnormalities in Chest X-ray Images by Combining Classification Methods, Object Detection, and Data Balancing<\/strong><br \/>Nhu Q.T. Nguyen, Dat Q. Nguyen, Dat T. Ta and Huy V. Tran<\/td><td style=\"white-space: nowrap;\">V1.1.4<br \/>Machine Learning 4<\/td><\/tr><tr><td>61<\/td><td>145<\/td><td><strong>Support Decision Making for Supplier Selection using Feature Importance<\/strong><br \/>Trung Nguyen Chi and Thuy Nguyen Thi Thu<\/td><td style=\"white-space: nowrap;\">V1.1.4<br \/>Machine Learning 4<\/td><\/tr><tr><td>62<\/td><td>158<\/td><td><strong>A Lightweight Full-Resolution Encoder-Decoder Network for 5G-LTE Spectrogram-based Spectrum Sensing<\/strong><br \/>Huu-Tai Nguyen, Gia-Phat Hoang, Hai-Trang Phuoc Dang and Thien Huynh-The<\/td><td style=\"white-space: nowrap;\">V1.2.1<br \/>Wireless Networks 1<\/td><\/tr><tr><td>63<\/td><td>219<\/td><td><strong>On the Performance of Downlink LoRa Networks with Fountain Codes and Diversity Techniques<\/strong><br \/>Thi-Phuong-Anh Hoang, Thi-Tuyet-Hai Nguyen, Thien Huynh-The and Thi-Dan-Ngoc Pham<\/td><td style=\"white-space: nowrap;\">V1.2.1<br \/>Wireless Networks 1<\/td><\/tr><tr><td>64<\/td><td>220<\/td><td><strong>Maximizing Secrecy Performance in UAV-Based Cognitive Relay Systems<\/strong><br \/>Thanh Trung Nguyen, Tran Manh Hoang, Le Huu Luyen, T.T.Huyen Le and Xuan Nam Tran<\/td><td style=\"white-space: nowrap;\">V1.2.1<br \/>Wireless Networks 1<\/td><\/tr><tr><td>65<\/td><td>229<\/td><td><strong>Outage Performance of NOMA-Aided Multi-hop Relay Schemes in Underlay Cognitive Networks using Foun-tain Codes<\/strong><br \/>Nguyen Ngoc Lan, Le Anh Minh, Tran Dinh Dat, Hung-Cuong Trinh and Nguyen Trung Hieu<\/td><td style=\"white-space: nowrap;\">V1.2.1<br \/>Wireless Networks 1<\/td><\/tr><tr><td>66<\/td><td>232<\/td><td><strong>On Performance Evaluation of Fountain Codes-Based Multicast Scheme in Presence of Multiple Passive Eaves-droppers Over INID Rayleigh Fading Channels<\/strong><br \/>Tran Dinh Dat, Tran Trung Duy, Nguyen Trung Hieu, Phan Ngoc An, Nguyen Luong Nhat and Phu Tran Tin<\/td><td style=\"white-space: nowrap;\">V1.2.1<br \/>Wireless Networks 1<\/td><\/tr><tr><td>67<\/td><td>134<\/td><td><strong>Performance Enhancement for Antenna Array using Partial Ground and Reflective Surface<\/strong><br \/>Ngoc-Lan Nguyen, Nguyen Van Duc and Phan Thanh Toan<\/td><td style=\"white-space: nowrap;\">V1.2.1<br \/>Wireless Networks 1<\/td><\/tr><tr><td>68<\/td><td>156<\/td><td><strong>Energy Outage Analysis for NOMA-based UAV-MEC with imperfect CSI and SIC in IoT network<\/strong><br \/>Anh-Nhat Nguyen, Hai-Dang Le, Gia-Huy Nguyen, Khai Nguyen, Tung-Son Ngo, Ngoc-Anh Bui, Phuong-Chi Le, Manh-Duc Hoang, Tien-Dat Trinh and Tuan-Anh Hoang<\/td><td style=\"white-space: nowrap;\">V1.2.2<br \/>Wireless Networks 2<\/td><\/tr><tr><td>69<\/td><td>56<\/td><td><strong>Performance Analysis of MISO TAS System Using Short Packet Communication Under Impact of Co-Channel Interference<\/strong><br \/>Dang The Hung and To Hong Nhu<\/td><td style=\"white-space: nowrap;\">V1.2.2<br \/>Wireless Networks 2<\/td><\/tr><tr><td>70<\/td><td>91<\/td><td><strong>Secure Edge Computing in UAV-Assisted Backscatter Communication NOMA Wireless Sensor Network with Friendly Jamming<\/strong><br \/>Anh-Tuan Tran, Quang Nhat Tran, Duy-Hung Ha and Dac-Binh Ha<\/td><td style=\"white-space: nowrap;\">V1.2.2<br \/>Wireless Networks 2<\/td><\/tr><tr><td>71<\/td><td>195<\/td><td><strong>Multi-Factor Authentication Healthcare Data Security Framework<\/strong><br \/>Okewu Emmanuel and Misra Sanjay<\/td><td style=\"white-space: nowrap;\">V1.2.3<br \/>Wireless Networks 3<\/td><\/tr><tr><td>72<\/td><td>197<\/td><td><strong>Human-Centric Wireless Energy Harvesting System Design for Rural Ubiquitous Communication in Industry 5.0<\/strong><br \/>Okewu Emmanuel, Misra Sanjay and Okewu Victor<\/td><td style=\"white-space: nowrap;\">V1.2.3<br \/>Wireless Networks 3<\/td><\/tr><tr><td>73<\/td><td>199<\/td><td><strong>BLER analysis of Short Packet Communication in Wireless Energy Harvesting Relaying Networks over Nakagami-m fading<\/strong><br \/>Tu-Trinh Thi Nguyen and Xuan-Xinh Nguyen<\/td><td style=\"white-space: nowrap;\">V1.2.3<br \/>Wireless Networks 3<\/td><\/tr><tr><td>74<\/td><td>136<\/td><td><strong>A Transformer-Based OCR for Vietnamese Handwritten Text Recognition<\/strong><br \/>Dang Le Khanh Toan, Nguyen Truong Gia Huy, Duong Dinh Minh and Nguyen Khanh Loi<\/td><td style=\"white-space: nowrap;\">V2.2.1<br \/>NLP 1<\/td><\/tr><tr><td>75<\/td><td>202<\/td><td><strong>Parallel Corpus Construction for Chinese and Vietnamese in Historical Texts<\/strong><br \/>Minh-Nhut Dang, Thanh-Hau Cao, Thanh-Duy Lam, Minh-Hoang Le, Duc-Nhuan Le and Si-Dien Dinh<\/td><td style=\"white-space: nowrap;\">V2.2.1<br \/>NLP 1<\/td><\/tr><tr><td>76<\/td><td>78<\/td><td><strong>Saigon Tourism: A Domain-Specific Dataset for Question Answering Systems<\/strong><br \/>Tam Khoi Tran and Phuoc Tran<\/td><td style=\"white-space: nowrap;\">V2.2.1<br \/>NLP 1<\/td><\/tr><tr><td>77<\/td><td>142<\/td><td><strong>SymQA: Enhanced Knowledge Graph Question Answering with Symbolic Program Generation and Execution<\/strong><br \/>Viet-Nhat Thai and Long Nguyen<\/td><td style=\"white-space: nowrap;\">V2.2.1<br \/>NLP 1<\/td><\/tr><tr><td>78<\/td><td>150<\/td><td><strong>Insights into Customer Experience in Luxury Hotels: A Topic Modeling and Sentiment Analysis Approach<\/strong><br \/>Khanh-Tuong Nguyen, Thuy-Huong Thi Le and Thai-Doan Dang<\/td><td style=\"white-space: nowrap;\">V2.2.2<br \/>NLP 2<\/td><\/tr><tr><td>79<\/td><td>185<\/td><td><strong>Enhancing Water Conservation through Voice-Activated Smart Irrigation: A User-Centric Approach for Sustainable Agriculture in Vietnam<\/strong><br \/>Manh-Khang Nguyen, Ngoc-Sang Vo, Hoang-Nhat-Khang Vo, Ngoc-Thanh-Xuan Nguyen, Gia-Phat Le, Phan-Nhat-Minh Nguyen and Hoang-Anh Pham<\/td><td style=\"white-space: nowrap;\">V2.2.2<br \/>NLP 2<\/td><\/tr><tr><td>80<\/td><td>200<\/td><td><strong>Speech Synthesis on Mobile Device for Fon Language<\/strong><br \/>Th\u00e9ophile K. Dagba and Charbel Y. Boco<\/td><td style=\"white-space: nowrap;\">V2.2.2<br \/>NLP 2<\/td><\/tr><tr><td>81<\/td><td>230<\/td><td><strong>A study on the application of Large Language Models for library security testing under low-resource conditions<\/strong><br \/>Tran Chi Thien and Pham Van Huy<\/td><td style=\"white-space: nowrap;\">V2.2.2<br \/>NLP 2<\/td><\/tr><tr><td>82<\/td><td>183<\/td><td><strong>Pedagogically Anchored Code Clustering: Integrating Assignment Specifications with Control Flow and Structural Features<\/strong><br \/>Duy Tran Ngoc Bao and Dang Le Binh<\/td><td style=\"white-space: nowrap;\">V2.2.2<br \/>NLP 2<\/td><\/tr><tr><td>83<\/td><td>44<\/td><td><strong>Improving Text Generation Using Multi-Step Queries<\/strong><br \/>Tr\u1ea7n V\u0103n Quy\u1ebft and Long Nguyen<\/td><td style=\"white-space: nowrap;\">V2.2.2<br \/>NLP 2<\/td><\/tr><tr><td>84<\/td><td>60<\/td><td><strong>Natural Language Processing and Data Analysis for Cybercriminal Attribution: Conti Ransomware Chats<\/strong><br \/>Elizabeth Stratton, Jack Nicholls and Nhien-An Le-Khac<\/td><td style=\"white-space: nowrap;\">V2.2.3<br \/>NLP 3<\/td><\/tr><tr><td>85<\/td><td>141<\/td><td><strong>Automated Question-Answer Generation for Evaluating Vietnamese RAG-based Approaches<\/strong><br \/>Dinh-Huan Nguyen and Long Nguyen<\/td><td style=\"white-space: nowrap;\">V2.2.3<br \/>NLP 3<\/td><\/tr><tr><td>86<\/td><td>143<\/td><td><strong>Building Machine Translation for Ancient Vietnamese Texts into English with Low Resources<\/strong><br \/>Thinh-Phat Vo, Hon-Sam O, Phat-Minh Le, Quang-Thang Duong, Dien Dinh and Buu-Long Nguyen Hong<\/td><td style=\"white-space: nowrap;\">V2.2.3<br \/>NLP 3<\/td><\/tr><tr><td>87<\/td><td>166<\/td><td><strong>Combination of Traditional Methods for Ukrainian-Vietnamese Deep Translation Models<\/strong><br \/>Thien Nguyen and Trang Nguyen<\/td><td style=\"white-space: nowrap;\">V2.2.4<br \/>NLP 4<\/td><\/tr><tr><td>88<\/td><td>217<\/td><td><strong>Applying Graph RAG: Enhancing Retrieval and Synthesis of Vietnamese Legal Text Information<\/strong><br \/>Minh-Phuc Huynh, Thuy-Vy Nguyen-Thi, Hoang Thi Ngoc Trang and Anh-Cuong Le<\/td><td style=\"white-space: nowrap;\">V2.2.4<br \/>NLP 4<\/td><\/tr><tr><td>89<\/td><td>180<\/td><td><strong>Decision Support System for Drug Recognition and Disease Diagnosis<\/strong><br \/>Dung Tri Truong and Sinh Van Nguyen and Ky Trung Nguyen<\/td><td style=\"white-space: nowrap;\">V2.2.4<br \/>NLP 4<\/td><\/tr><tr><td>90<\/td><td>69<\/td><td><strong>Impact Of Knowledge Management System On Competitive Advantage In Small And Medium Enterprises<\/strong><br \/>Vu Xuan Nam and Nguyen Hoang Nguyen<\/td><td style=\"white-space: nowrap;\">V3.1.4<br \/>Intelligent Systems 4<\/td><\/tr><tr><td>91<\/td><td>120<\/td><td><strong>Option pricing problems in the Heston Model using Discretization and Neural Networks<\/strong><br \/>Duc Thinh Vu, Quang Cuong Duong and Diu Tran<\/td><td style=\"white-space: nowrap;\">V3.1.4<br \/>Intelligent Systems 4<\/td><\/tr><tr><td>92<\/td><td>124<\/td><td><strong>Intelligent Tutoring Systems for Personalized Mathematics Learning: A TPACK Perspective<\/strong><br \/>Vo Thi Kim Anh<\/td><td style=\"white-space: nowrap;\">V3.1.4<br \/>Intelligent Systems 4<\/td><\/tr><tr><td>93<\/td><td>126<\/td><td><strong>Comparison of Decision Tree and K-Nearest Neighbor for Ad Click Prediction<\/strong><br \/>Thao Da DANG, Cao Trung HUYNH and Hoang Phuong Lam NGO<\/td><td style=\"white-space: nowrap;\">V3.1.4<br \/>Intelligent Systems 4<\/td><\/tr><tr><td>94<\/td><td>222<\/td><td><strong>Joint Caching, Transmission Mode Selection, and Phase-shift Optimization for Video Multicasting in UAV-mounted IRS-assisted Edge Content Delivery Networks<\/strong><br \/>Phuong-Lan Le, Trang Hoang, Viet-Thanh Le, Long D. Nguyen, Dac-Binh Ha and Nguyen-Son Vo<\/td><td style=\"white-space: nowrap;\">V3.2.1<br \/>Internet of Things 1<\/td><\/tr><tr><td>95<\/td><td>151<\/td><td><strong>A Weighted-Sum Approach for Multi-Objective Optimization of Strong Barrier Coverage in IoT Heterogeneous Wireless Sensor Networks<\/strong><br \/>Binh Nguyen Thi My and Anh Le Thi<\/td><td style=\"white-space: nowrap;\">V3.2.1<br \/>Internet of Things 1<\/td><\/tr><tr><td>96<\/td><td>171<\/td><td><strong>Efficient FPGA-Based Hardware Noise Filtering and Real-time Motion Detection Using RE200B Sensor on Trion T8 BGA81<\/strong><br \/>Phuc Do, Chan Nguyen, Binh Nguyen, Tuong Le, Thang Huynh, Thanh Nguyen, Sang Ha, Trung Nguyen, Tho Nguyen, Thien Pham and Tho Quan<\/td><td style=\"white-space: nowrap;\">V3.2.1<br \/>Internet of Things 1<\/td><\/tr><tr><td>97<\/td><td>160<\/td><td><strong>BiAS: Transforming Cyber Defense &#8211; A Deep Learning Approach for APT Detection<\/strong><br \/>Nguyen Hoa C\u01b0\u01a1ng, Do Xuan Cho and Tran Quang Anh<\/td><td style=\"white-space: nowrap;\">V3.2.1<br \/>Internet of Things 1<\/td><\/tr><tr><td>98<\/td><td>173<\/td><td><strong>Applying virtualization technology in PLC Experiment course with VMWare ESXi hypervisor<\/strong><br \/>Quang Thanh Nguyen and Hau Huu Vo<\/td><td style=\"white-space: nowrap;\">V3.2.2<br \/>Internet of Things 2<\/td><\/tr><tr><td>99<\/td><td>204<\/td><td><strong>Temporal Pattern Image-Based Approach for Automotive Intrusion Detection on STM32 Embedded Platform<\/strong><br \/>Quoc-Tuan Le, Le-Minh-Quan Dinh, Le-Khanh-Trinh Phan and Hoang-Anh Pham<\/td><td style=\"white-space: nowrap;\">V3.2.2<br \/>Internet of Things 2<\/td><\/tr><tr><td>100<\/td><td>231<\/td><td><strong>Teaching C++ with pleasure in Multimedia by developing a virtual park learning environment<\/strong><br \/>L\u00ea Minh H\u00f3a and Phan Ngh\u0129a Hi\u1ec7p<\/td><td style=\"white-space: nowrap;\">V3.2.2<br \/>Internet of Things 2<\/td><\/tr><tr><td>101<\/td><td>114<\/td><td><strong>Imbalanced Data Handling in Financial Distress Prediction: Resampling or Weighted Loss?<\/strong><br \/>Jiaying Ni, Hung Le, Toan Nguyen-Mau and Van-Nam Huynh<\/td><td style=\"white-space: nowrap;\">V4.1.4<br \/>Machine Learning 8<\/td><\/tr><tr><td>102<\/td><td>116<\/td><td><strong>Spatial-Temporal Feature Extraction for Tanzanian Sign Language Recognition in Medical Diagnostics<\/strong><br \/>Japhari Mbaru and Hoai Nam Vu<\/td><td style=\"white-space: nowrap;\">V4.1.4<br \/>Machine Learning 8<\/td><\/tr><tr><td>103<\/td><td>132<\/td><td><strong>Convolutional Neural Network to Classify Lumber Spine Degenerative Conditions from MRI Images<\/strong><br \/>Kazi Md Abdullah Al Mubin and Doina Logof\u0103tu<\/td><td style=\"white-space: nowrap;\">V4.1.4<br \/>Machine Learning 8<\/td><\/tr><tr><td>104<\/td><td>190<\/td><td><strong>Time Series Classification Using HMM and GMM with Pomegranate Library<\/strong><br \/>Phi-Phung Cao, Thien Nguyen and Duong Thi Thuy Van<\/td><td style=\"white-space: nowrap;\">V4.1.4<br \/>Machine Learning 8<\/td><\/tr><tr><td>105<\/td><td>35<\/td><td><strong>Formation Control of Wheeled Mobile Robots for Moving Target Circumnavigation Using Distributed Estimator and Dynamic Surface Control<\/strong><br \/>Ngo An Thuyen, Pham Nguyen Nhut Thanh and Ho Pham Huy Anh<\/td><td style=\"white-space: nowrap;\">V4.2.1<br \/>Control Systems 1<\/td><\/tr><tr><td>106<\/td><td>152<\/td><td><strong>Integrating Visual Attention into Deep Reinforcement Learning for Enhanced Control in Racing Games<\/strong><br \/>Khanh-Linh Vuong, Huy Truong Dinh and Cuong Tuan Nguyen<\/td><td style=\"white-space: nowrap;\">V4.2.1<br \/>Control Systems 1<\/td><\/tr><tr><td>107<\/td><td>176<\/td><td><strong>PlanFormer: Enhancing Transformer-based Closed-loop Planning Performance for Autonomous Driving<\/strong><br \/>Hieu Pham Tien, Dat Vu Thanh and Son Le Anh<\/td><td style=\"white-space: nowrap;\">V4.2.1<br \/>Control Systems 1<\/td><\/tr><tr><td>108<\/td><td>26<\/td><td><strong>EMG-Based Upper Limb Joint Angle Estimation Using LSTM and High-speed Tracking System<\/strong><br \/>Khang Hoang Vinh Nguyen, Anh-Khoa Huu Nguyen and Xuan Phu Do<\/td><td style=\"white-space: nowrap;\">V4.2.1<br \/>Control Systems 1<\/td><\/tr><tr><td>109<\/td><td>51<\/td><td><strong>Comparative Evaluation of Memristor-Based 7T2M and 8T3M NVSRAM Architectures<\/strong><br \/>Ngoc Quan Hoang, Duc Quan Lam, Tan Do-Duy and Ngoc Son Truong<\/td><td style=\"white-space: nowrap;\">V4.2.1<br \/>Control Systems 1<\/td><\/tr><tr><td>110<\/td><td>44<\/td><td><strong>Reducing Energy Losses and Enhancing Efficiency of Inverter Systems in Electric Vehicle Drivetrains<\/strong><br \/>Leminhthien Huynh, Ducthinh Nguyen and Quocdan Le<\/td><td style=\"white-space: nowrap;\">V4.2.1<br \/>Control Systems 1<\/td><\/tr><tr><td>111<\/td><td>28<\/td><td><strong>Design of Control of Battery Storage System for Enhance Power Tracking following the Composite PID model<\/strong><br \/>Khang Hoang Vinh Nguyen, Xuan Phu Do and Gia Huan Bui<\/td><td style=\"white-space: nowrap;\">V4.2.2<br \/>Control Systems 2<\/td><\/tr><tr><td>112<\/td><td>36<\/td><td><strong>HYBRID METAHEURISTIC SPEED CONTROLLER FOR UNCERTAIN PERMANENT MAGNET SYNCHRONOUS MOTOR<\/strong><br \/>Nguyen Tien Dat and Ho Pham Huy Anh<\/td><td style=\"white-space: nowrap;\">V4.2.2<br \/>Control Systems 2<\/td><\/tr><tr><td>113<\/td><td>37<\/td><td><strong>Advanced Sliding Sensorless Speed Control of PMSM Driving System Using Enhanced Sliding Mode Observer<\/strong><br \/>Tran Nguyen Dang Khoa, Lu Trung Tin, Nguyen Tien Dat and Ho Pham Huy Anh<\/td><td style=\"white-space: nowrap;\">V4.2.2<br \/>Control Systems 2<\/td><\/tr><tr><td>114<\/td><td>80<\/td><td><strong>An Implementation of Rights Management Mechanism within the e-Healthcare Domain<\/strong><br \/>Quy-Anh Bui, Quoc-Binh Nguyen and Van-Viet Nguyen<\/td><td style=\"white-space: nowrap;\">V4.2.3<br \/>Control Systems 3<\/td><\/tr><tr><td>115<\/td><td>177<\/td><td><strong>A Real-time Gateway Hydroponic System Design<\/strong><br \/>Tran Thanh Trang, Tran Nhut Tam and Huu-Khoa Tran<\/td><td style=\"white-space: nowrap;\">V4.2.3<br \/>Control Systems 3<\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Accepted Papers No. ID Paper Title &#8211; Authors Session 1 24 A Hardware-Friendly Approach for ECG Classification based on Deep Learning AlgorithmTuan-Kiet Tran, Minh-Tuyen Huynh, Quoc-Minh-Dang Do, Cong-Kha Pham, and Huu-Thuan Huynh V1.1.1Machine Learning 1 2 25 PRIMO: A Privacy-Preserving Decentralized Machine Learning AlgorithmLe Trieu Phong and Tran Thi Phuong V1.1.1Machine Learning 1 3 29 &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/iccies.tdtu.edu.vn\/2025\/accepted-papers\/\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;Accepted Papers&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7379","post","type-post","status-publish","format-standard","hentry","category-news"],"featured_media_urls":[],"_links":{"self":[{"href":"https:\/\/iccies.tdtu.edu.vn\/2025\/wp-json\/wp\/v2\/posts\/7379"}],"collection":[{"href":"https:\/\/iccies.tdtu.edu.vn\/2025\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iccies.tdtu.edu.vn\/2025\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iccies.tdtu.edu.vn\/2025\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iccies.tdtu.edu.vn\/2025\/wp-json\/wp\/v2\/comments?post=7379"}],"version-history":[{"count":64,"href":"https:\/\/iccies.tdtu.edu.vn\/2025\/wp-json\/wp\/v2\/posts\/7379\/revisions"}],"predecessor-version":[{"id":7568,"href":"https:\/\/iccies.tdtu.edu.vn\/2025\/wp-json\/wp\/v2\/posts\/7379\/revisions\/7568"}],"wp:attachment":[{"href":"https:\/\/iccies.tdtu.edu.vn\/2025\/wp-json\/wp\/v2\/media?parent=7379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iccies.tdtu.edu.vn\/2025\/wp-json\/wp\/v2\/categories?post=7379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iccies.tdtu.edu.vn\/2025\/wp-json\/wp\/v2\/tags?post=7379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}