University Staff Directory The University of Adelaide Australia
Faculties & Divisions | People A to Z | Media Expertise | Phonebook
Public browsing [Login]
Text Zoom: S | M | L

Dr Hung Nguyen

Telephone +61 8 8313 6214
Position Research Fellow
Email hung.nguyen@adelaide.edu.au
Fax +61 8 8313 4395
Building Ingkarni Wardli
Floor/Room 5 17
Campus North Terrace
Org Unit Teletraffic Research Centre for Mathematical Modelling

To link to this page, please use the following URL:
http://www.adelaide.edu.au/directory/hung.nguyen

Biography/ Background

I am currently a senior network engineer/Analyst at the Teletraffic Research Centre, the University of Adelaide, Australia.

I started at the Teletraffic Research Centre (TRC) in 2012  working 100% on Telari (aka TEMS Capacity Management), a start-up joint venture  between the University of Adelaide, Telstra and Ascom. Previously, I spent 3 years as a senior research fellow in the School of Mathematical Sciences. 

I have been one of the lead developers of the TEMS Capacity Management software, which is now used by mobile operators worldwide for capacity dimensioning of cellular (3G/4G) networks.

In addition to these commercial activities, through a number of research  grants that I won since 2014, I have been able to spend 20% of my time on research and get back to publishing papers in the last two years.

I have published 51 publications: 3 book chapters, 7 journal articles, 27 refereed conference papers and 14 technical research reports. 13 of these appear in A* or A ranked journals and conferences. My Google scholar h-index is 11, and i10-index is 13. The total number of citations for my publications according to Google Scholar is 696 (09/06/2015).

I have served in technical program committees for several prestigious IEEE and ACM conferences (ACM IMC, ACM CoNEXT, IEEE ICC, etc) and am an active reviewer for most of the A* journals in networking. 

I have a PhD in Computer Science and Telecommunications from the Swiss Federal Institute of Technology, Lausanne, Switzerland (EPFL). Prior to that, I received the B.Eng. degree in Information Technology and Telecommunications Engineering from the University of Adelaide, Australia and completed the Pre-Doctoral school in communication systems at EPFL.

Find out more about my research at my research blog: http://nguyenxuanhung.wordpress.com


Prospective students (2016-06-09): We are offering top-up scholarships (PhDs) and summer research scholarships (undergraduates) on software defined networking, cybersecurity and data analytics. Please contact me directly if interested.


Research Funding

In the last 4 years, I secured (by myself or part of a team) more than $3m in funding ( $2.5m (commercial)+$0.6m (research grants)).

Research Grants:  Table 1 lists 6 projects for which over $650K has been awarded in the last five years.  

Project Source Amount Years Investigators
1 SDN for Emergency Comm. ARC LP $195,000 2014--2017 Nguyen, Roughan, Naguleswaran
2 Australian National SDN testbed ARC LIEF $270,000 2015 Sivaraman et al.
3 SA Gov. Research Challenge elmTek Pty Ltd $11,250 2015 Nguyen, Webb
4 SA Gov. Research Challenge SRA IT Pty Ltd $11,250 2015 Nguyen, Webb
5 Policy Defined Networking DSTG $125,000 2016 Nguyen, Webb
6 Grant Impr. ECMS $36,000 2009--2010 Nguyen, Roughan
TOTAL $652,500

Table 1. Research funding secured since late 2009 (CI is first named investigator)

Consulting Funding: In addition to the research grants,  I was  a key member of the Telari development team of 5 people, led by Associate Professor Bruce Northcote, that secured more than $2.5m in contract work for the TEMS Capacity Management software in the last 4 years. These projects are commercial-in-confidence. About 3% of the funding secured, that is just over $100k, has been for professional consultancy work outside of information networking. 

Publications

I have published 51 publications: 3 book chapters, 7 journal articles, 27 refereed conference papers and 14 technical research reports. 13 of these appear in A* or A ranked journals and conferences. My Google scholar h-index is 11, and i10-index is 13 with a total citation count of 696 (09/06/2016). 

Conference Ranking: My research area is Communication Networks. Following the publishing practice of the networking research community, I have focussed most of my publishing e ffort on good conferences.  The highest  ERA 2010 ranking for computer science conferences is A, which is equivalent to A* and A journals. 

  Scholarly Book Chapters

  1. C. Mas, H. X. Nguyen and P. Thiran, "Failure Location in WDM Networks", Chapter 16 in Emerging Optical Network Technologies: Architectures, Protocols and Performance, Springer, 2005.
  2. F. Ducatelle, L. M. Gambardella, M. Kurant, Hung X. Nguyen and Patrick Thiran , ``Algorithms for Failure Protection in Large IP-over-Fiber and Wireless Ad Hoc Networks'', In Springer Lecture Notes in Computer Science (LNCS) 4028 : "Dependable Systems: Software, Computing, Networks", J. Kohlas and B. Meyer and A. Schiper (Eds.), pp.231-259, 2006.
  3. M. Kurant, Hung X. Nguyen and P. Thiran, ``Survey on Dependable IP-over-Fiber Networks ", In Springer Lecture Notes in Computer Science (LNCS) 4028 : "Dependable Systems: Software, Computing, Networks", J. Kohlas and B. Meyer and A. Schiper (Eds.), pp. 55-81, 2006. 
  4. Refereed Journal Articles

  5. Dinesha Ranathunga., Matthew Roughan., Nguyen, H. X., Phil Kernick., & Nick Falkner. (2016). Case Studies of SCADA Firewall Con gurations and the Implications for Best Practices. IEEE Transactions on Network and Service Management. Under Revision
  6. Nguyen, H. X., & Roughan, M. (2013). Multi-observer privacy-preserving hidden Markov models. IEEE Transactions on Signal Processing, 61(23), 6010-6019. doi:10.1109/TSP.2013.2282911
  7. Nguyen, H. X., & Roughan, M. (2013). Rigorous statistical analysis of internet loss measurements. IEEE - ACM Transactions on Networking, 21(3), 734-745. doi:10.1109/TNET.2012.2207915
  8. Knight, S., Falkner, N., Nguyen, H. X., Tune, P., & Roughan, M. (2012). I can see for miles: re-visualizing the internet. IEEE Network, 26(6), 26-32. doi:10.1109/MNET.2012.6375890
  9. Nguyen, H. X., & Roughan, M. (2012). Improving hidden Markov model inferences with private data from multiple observers. IEEE Signal Processing Letters, 19(10), 696-699. doi:10.1109/LSP.2012.2213811
  10. Knight, S., Nguyen, H. X., Falkner, N., Bowden, R., & Roughan, M. (2011). The internet topology zoo. IEEE Journal on Selected Areas in Communications, 29(9), 1765-1775. doi:10.1109/JSAC.2011.111002
  11. Nguyen, H. X., & Matthew Roughan. (2010). Rigorous statistical analysis of internet loss measurements. ACM SIGMETRICS Performance Evaluation Review, 38(1), 361-362. doi:10.1145/1811099.1811087
  12. Refereed Conference Papers

  13. Dinesha Ranathunga., Matthew Roughan., Phil Kernick., Nick Falkner., Nguyen, H. X., Michelle McClintock., & Marian Mihailescu. (2016). Verifiable Policy-Defined Networking for Security Management. In Proceedings of International Conference on Security and Cryptography (SECRYPT 2016). Lisbon, Portugal.
  14. Nguyen, H. X., Naguleswaran, S., & Webb, M. (2016). Emergency Communication in Australia: Current Situation and Future Directions. In Proceedings of  The 5th Disaster and Emergency Management Conference. Gold Coast, QLD, Australia.
  15. Nguyen, H. X., & northcote, B. (2016). User Spectral Efficiency: Combining Spectral Efficiency with User Experience. In Proceedings of the IEEE International Conference on Communications. Kuala Lumpur, Malaysia.
  16. Nguyen, H. X., Mihailescu, M., & Webb, M. (2015). Enhancing wireless communications with software defined networking. In Proceedings of of the Military Communications and Information Systems Conference (MilCIS) (pp. 1-5). Canberra, Australia: IEEE. doi:10.1109/MilCIS.2015.7348945
  17. Ranathunga, D., Roughan, M., Kernick, P., Falkner, N., & Nguyen, H. X. (2015). Identifying the missing aspects of the ANSI/ISA best practices for security policy. In CPSS 2015 - Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, Part of ASIACCS 2015 (pp. 37-48). doi:10.1145/2732198.2732201
  18. Knight, S., Nguyen, H. X., Maennel, O., Phillips, I., Falkner, N., Bush, R., & Roughan, M. (2013). An automated system for emulated network experimentation. In Proceedings of the 9th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT 2013 (pp. 235-246). USA: Association for Computing Machinery. doi:10.1145/2535372.2535378
  19. Tune, P., Nguyen, H. X., & Roughan, M. (2013). Hidden Markov model identifiability via tensors. In IEEE International Symposium on Information Theory, ISIT 2013 (pp. 2299-2303). Online: IEEE. doi:10.1109/ISIT.2013.6620636
  20. Nguyen, H. X., & Roughan, M. (2012). Multi-observer privacy-preserving hidden Markov models. In F. DeTurck, L. P. Gaspary, & D. Medhi (Eds.), Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012 (pp. 514-517). USA: IEEE. doi:10.1109/NOMS.2012.6211944
  21. Nguyen, H. X., & Roughan, M. (2012). On the identifiability of multi-observer hidden Markov models. In Proceedings of the 2012 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2012 (pp. 1873-1876). USA: IEEE. doi:10.1109/ICASSP.2012.6288268
  22. Parsonage, E., Nguyen, H. X., & Roughan, M. (2011). Absorbing lexicographic products in metarouting. In Proceedings of 1st International Workshop on Rigorous Protocol Engineering (WRiPE) 2011 (pp. 1-6). Vancouver, Canada. Retrieved from http://wripe11.cis.upenn.edu/program/papers/wripe11-paper4.pdf
  23. Parsonage, E., Nguyen, H. X., Bowden, R., Knight, S., Falkner, N., & Roughan, M. (2011). Generalized graph products for network design and analysis. In Proceedings of the 19th EEE International Conference on Network Protocols (pp. 79-88). USA: IEEE. doi:10.1109/ICNP.2011.6089084
  24. Bowden, R., Nguyen, H. X., Falkner, N., Knight, S., & Roughan, M. (2011). Planarity of data networks. In Å. Arvidsson, G. D. Veciana, S. H. Low, C. R. Kalmanek, & D. Medhi (Eds.), Proceedings of the 2011 23rd International Teletraffic Congress (pp. 254-261). USA: ITC Press. Retrieved from http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6031617
  25. Coyle, A., & Nguyen, H. X. (2010). A frequency control algorithm for a mobile adhoc network. In Proceedings of Military Communications and Information Systems Conference (pp. 1-6). Canberra, ACT.
  26. Nguyen, H. X., Roughan, M., Knight, S., Falkner, N., Maennel, O., & Bush, R. (2010). How to build complex, large-scale emulated networks. In T. Magedanz, A. Gavras, H. T. Nguyen, & J. S. Chase (Eds.), Proceedings of TridentCom 2010 Vol. 46 (pp. 1-14). www: ICST. doi:10.1007/978-3-642-17851-1_1
  27. Ghita, D., Nguyen, H. X., Kurant, M., Argyraki, K., & Thiran, P. (2010). Netscope: practical network loss tomography. In 2010 Proceedings of IEEE INFOCOM (pp. 1-9). San Diego, CA: IEEE. doi:10.1109/INFCOM.2010.5461918
  28. Nguyen, H. X., Teixeira, R., Thiran, P., & Diot, C. (2009). Minimizing Probing Cost for Detecting Interface Failures: Algorithms and Scalability Analysis. In Proceedings of the IEEE INFOCOM Conference 2009 (pp. 1-9). USA: IEEE. doi:10.1109/INFCOM.2009.5062054
  29. Nguyen, H. X., Figueiredo, D., Grossglauser, M., & Thiran, P. (2008). Balanced relay allocation on heterogeneous unstructured overlays. In INFOCOM 2008: The 27th Conference on Computer Communications IEEE (pp. 126-130). Online: IEEE.
  30. Nguyen, H. X., & Roughan, M. (2008). On the correlation of internet packet losses. In Proceeding of the Australasian Telecommunication Networks and Applications Conference (pp. 1-6). CD: IEEE. doi:10.1109/ATNAC.2008.4783289
  31. Nguyen, H. X., & Thiran, P. (2007). Network loss inference with second order statistics of end-to-end flows. In Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, San Diego, USA, 24-26 October, 2007 (pp. 227-240). New York: ACM. doi:10.1145/1298306.1298339
  32. Nguyen, H. X., & Thiran, P. (2007). The boolean solution to the congested IP link location problem: theory and practice. In IEEE INFOCOM 2007 26th IEEE International Conference on Computer Communications (pp. 2117-2125). Online: IEEE. doi:10.1109/INFCOM.2007.245
  33. Nguyen, H. X., & Thiran, P. (2006). Using end-to-end data to infer lossy links in sensor networks. In IEEE INFOCOM 2006 Proceedings of the 25th IEEE International Conference on Computer Communications (pp. 1-12). Online: IEEE.
  34. Nguyen, H. X., & Thiran, P. (2005). Binary Versus Analogue Path Monitoring in IP Networks. In Passive and Active Network Measurement: Lecture Notes in Computer Science, Vol. 3431, 6th International Workshop 2005 Proceedings. (pp. 97-107). Germany: Springer. doi:10.1007/b135479
  35. Dousse, O., Nguyen, H. X., & Thiran, P. (2005). Deux applications de processus ponctuels aux réseaux de communication. In 20th GRESTI Symposium on Signal and Image Processing 2005 (pp. 269-272). Louvain-la-Neuve, Belgium.
  36. Nguyen, H. X., & Thiran, P. (2005). Failure location in transparent optical networks: The asymmetry between false and missing alarms. In 19th International Teletraffic Congress (ITC 19) 2005. Performance Challenges for Efficient Next generation networks (pp. 991-1000). Beijing, China.
  37. Nguyen, H. X., & Thiran, P. (2004). Active Measurement for Multiple Link Failures Diagnosis in IP Networks. In Passive and Active Network Measurement: Lecture Notes in Computer Science, Vol. 3051, Proceedings of the Workshop on Passive and Active Measurements (PAM) (pp. 185-194). Berlin: Springer-Verlag. doi:10.1007/b96961
  38. Nguyen, H. X., Thiran, P., & Barakat, C. (2004). On the correlation of TCP traffic in backbone networks. In IEEE International Symposium on Circuits and Systems (ISCAS) 2004 Proceedings (pp. 481-484). Online: IEEE.
  39. Nguyen, H. X., Rajesh, S., & Abbott, D. (2001). Motion detection algorithms using template model. In N. W. Bergmann (Ed.), Proceedings of SPIE - The International Society for Optical Engineering Vol. 4591 (pp. 78-90). PO BOX 10 BELLINGHAM WASHINGTON USA: THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERING. doi:10.1117/12.449137
  40. Technical Reports 

  41. Northcote, B., Costa, A., Nguyen, H. X., & FitzGerald, D. (2015). TEMS™ Capacity Manager Dar Es Salam Capacity Analysis Report Prepared for Airtel Tanzania: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
  42. Northcote, B., Costa, A., Nguyen, H. X., Warner, N., & FitzGerald, D. (2015). TEMS™ Capacity Manager Mandalay Capacity Analysis Report Prepared for Ooredoo Myanmar: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
  43. Northcote, B., Costa, A., McMahon, J. J., Nguyen, H. X., Oliu, C., & FitzGerald, D. (2015). TEMS™ Capacity Manager Guadalajara Capacity Analysis Project Validation Report Prepared for AT&T Mexico: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
  44. Northcote, B., Costa, A., Nguyen, H. X., Warner, N., & FitzGerald, D. (2015). TEMS™ Capacity Manager Mandalay Capacity Analysis Project Validation Report Prepared for Ooredoo Myanmar: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
  45. Northcote, B., McMahon, J. J., Nguyen, H. X., Brooks, T., & FitzGerald, D. (2015). TEMS™ Capacity Manager Atlanta Capacity Analysis Report Prepared for AT&T USA: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
  46. Northcote, B., Warner, N., McMahon, J. J., Coyle, A., Costa, A., Mihailescu, M., . . . Li, Y. (2014). Devil WCDMA network dimensioning 2014 workshop. Telstra.
  47. Northcote, B., Warner, N., Coyle, A., Costa, A., Mihailescu, M., Nguyen, H. X., . . . Li, Y. (2013). Devil WCDMA network dimensioning 2013 workshop. Telstra.
  48. Nguyen, H. X., & Costa, A. (2014). SAPN Restoration Analysis Forecast Tool v1.0.
  49. Nguyen, H. X., & Webb, M. R. (2014). Wireless Mesh and Backhaul Solutions for  Responder Check-in Systems.
  50. Northcote, B., Warner, N., McMahon, J. J., Coyle, A., Costa, A., Mihailescu, M., . . . Britton, M. (2015). Devil WCDMA network dimensioning 2015 workshop. Telstra.
  51. Britton, M., Naguleswaran, S., Nguyen, H. X., Coyle, A., Yates, S., & Mihailescu, M. (2012). FogNet v4.0 User Guide.
  52. Coyle, A., Nguyen, H. X., Naguleswaran, S., Britton, M., Porter, C., & Webb, M. R. (2010). SANLab Year 2 Report.
  53. Northcote, B., Warner, N., Coyle, A., Costa, A., Mihailescu, M., Nguyen, H. X., . . . Yates, S. (2012). Devil WCDMA network dimensioning 2012 workshop. Telstra.
  54. Coyle, A., Nguyen, H. X., Naguleswaran, S., Britton, M., Porter, C., & Webb, M. R. (2011). SANLab Year 3 Report.
  55. Thesis

  56. Nguyen, H. X. (2008). User-level Internet tomography and overlay routing. (PhD Thesis, Thèse École polytechnique fédérale de Lausanne EPFL). Retrieved from http://infoscience.epfl.ch/
  57. Software

  58. Northcote, B., Warner, N., Coyle, A., McMahon, J. J., Mihailescu, M., Costa, A., . . . Britton, M. (2015). TelAri Analytics v2.0 [Computer Software].
  59. Nguyen, H. X., & Costa, A. (2014). SAPN Restoration Analysis Forecast Tool v1.0 [Computer Software].
  60. Northcote, B., Warner, N., Coyle, A., Yates, S., McMahon, J. J., Mihailescu, M., . . . Li, Y. (2014). TelAri Analytics v1.2 [Computer Software].
  61. Northcote, B., Warner, N., Coyle, A., Yates, S., Mihailescu, M., Costa, A., . . . Li, Y. (2012). TelAri Analytics v1.0 [Computer Software].
  62. Northcote, B., Warner, N., Coyle, A., Yates, S., Mihailescu, M., Costa, A., . . . Li, Y. (2013). TelAri Analytics v1.1 [Computer Software].
  63. Britton, M., Naguleswaran, S., Nguyen, H. X., Coyle, A., Yates, S., & Mihailescu, M. (2012). FogNet v4.0 [Computer Software].

 

Files

Expertise for Media Contact

CategoriesInformation Technology, Mathematics & Statistics
ExpertiseNetwork measurement, Network Security, Communication network protocol, Network Management

Entry last updated: Friday, 10 Jun 2016

The information in this directory is provided to support the academic, administrative and business activities of the University of Adelaide. To facilitate these activities, entries in the University Phone Directory are not limited to University employees. The use of information provided here for any other purpose, including the sending of unsolicited commercial material via email or any other electronic format, is strictly prohibited. The University reserves the right to recover all costs incurred in the event of breach of this policy.