Please sort the Date column from latest to former.
Link to a paper is recommended to be a DOI URL.
Default order: 柏叡→承瀚→守維→俊凱→冠宏
Date | Speaker | Minute Taker | Presentation Title | Keywords |
---|---|---|---|---|
6/8 | 俊凱 | 柏叡 | Working Report | (None) |
6/8 | 守維 | 柏叡 | Working Report | (None) |
6/1 | 承瀚 | 俊凱 | Working Report | (None) |
6/1 | 柏叡 | 俊凱 | Working Report | (None) |
6/1 | 冠宏 | 俊凱 | Working Report | (None) |
5/25 | 俊凱 | 承瀚 | Working Report | (None) |
5/25 | 守維 | 承瀚 | Working Report | (None) |
5/18 | 承瀚 | 守維 | Working Report | (None) |
5/18 | 柏叡 | 守維 | Working Report: Thesis Introduction and Experiments | (None) |
5/18 | 冠宏 | 守維 | Working Report | (None) |
5/11 | 俊凱 | 冠宏 | Working Report | (None) |
5/11 | 守維 | 冠宏 | Working Report | (None) |
5/4 | 冠宏 | 俊凱 | Working Report | (None) |
4/27 | 俊凱 | 柏叡 | Working Report | (None) |
4/27 | 守維 | 柏叡 | Working Report | (None) |
4/20 | 承瀚 | 守維 | Working Report | (None) |
4/20 | 柏叡 | 守維 | Magpie: Automatically Tuning Static Parameters for Distributed File Systems using Deep Reinforcement Learning | Performance optimization, Parameter tuning, Reinforcement learning, Distributed storage systems, Cluster configuration |
4/20 | 冠宏 | 守維 | Working Report | (None) |
4/13 | 俊凱 | 承瀚 | Working Report | (None) |
4/13 | 守維 | 承瀚 | Working Report | (None) |
3/29 | 承瀚 | 俊凱 | Working Report | (None) |
3/29 | 冠宏 | 俊凱 | Working Report | (None) |
3/23 | 俊凱 | 冠宏 | Working Report | (None) |
3/23 | 守維 | 冠宏 | Working Report | (None) |
3/16 | 承瀚 | 守維 | Working Report | (None) |
3/16 | 柏叡 | 守維 | Working Report: Thesis Introduction and Related Work | (None) |
3/16 | 冠宏 | 守維 | Working Report | (None) |
3/9 | 俊凱 | 柏叡 | Working Report | (None) |
3/9 | 守維 | 柏叡 | Working Report: RPL Evaluation and Proposed Enhancement Method | (None) |
3/2 | 承瀚 | 俊凱 | DroidEvolver: Self-Evolving Android Malware Detection System | Feature extraction, Malware, Aging, Training, Adaptation models, Manuals, Labeling |
3/2 | 柏叡 | 俊凱 | Working Report and Storage Benchmarking with Deep Learning Workloads [PDF] | Storage systems, Object storage, Database, DL, Performance evaluation |
3/2 | 冠宏 | 俊凱 | Working Report | (None) |
2/23 | 俊凱 | 承瀚 | Working Report | (None) |
2/23 | 守維 | 承瀚 | Working Report | (None) |
2/16 | 承瀚 | 守維 | Working Report | (None) |
2/16 | 柏叡 | 守維 | Working Report: Disk Benchmark Summary | (None) |
2/16 | 冠宏 | 守維 | Working Report | (None) |
2/9 | 守維 | 柏叡 | Working Report: Experimental Insights: Problems and Solutions | (None) |
1/26 | 承瀚 | 俊凱 | Working Report | (None) |
1/26 | 柏叡 | 俊凱 | Working Report: Degree Thesis Proposal | (None) |
1/26 | 冠宏 | 俊凱 | Working Report | (None) |
1/26 | 俊凱 | 冠宏 | Working Report | (None) |
1/26 | 守維 | 冠宏 | Working Report | (None) |
1/12 | 柏叡18 | 守維 | Working Report: Degree Thesis Proposals | (None) |
1/12 | 冠宏16 | 守維 | Working Report | (None) |
1/5 | 守維17 | 承瀚 | Working Report: TabNet Implementation & Evaluation | (None) |
12/29 | 承瀚17 | 俊凱 | Working Report | (None) |
12/29 | 柏叡17 | 俊凱 | Working Report: A Survey of Metrics for Distributed System Benchmarks | (None) |
12/28 | 冠宏15 | 俊凱 | Working Report | (None) |
12/22 | 俊凱16 | 柏叡 | A Lean and Modular Two-Stage Network Intrusion Detection System for IoT Traffic | Training, Measurement, Network intrusion detection, Complexity theory, Proposals, Internet of Things, Security, Computer crime, Optimization, Open source software |
12/22 | 守維16 | 柏叡 | Working Report: BERT NIDS Implementation | (None) |
12/15 | 承瀚16 | 守維 | Working Report | (None) |
12/15 | 柏叡16 | 守維 | Working Report: Disk & Compression Benchmark | (None) |
12/15 | 冠宏14 | 守維 | Working Report | (None) |
12/8 | 俊凱15 | 冠宏 | Working Report | (None) |
12/8 | 守維15 | 冠宏 | Unknown Network Attack Detection Based on Open-Set Recognition and Active Learning in Drone Network | (Unknown) |
12/1 | 承瀚15 | 俊凱 | Working Report | (None) |
12/1 | 柏叡15 | 俊凱 | Working Report: Grafana and Gzip | (None) |
12/1 | 冠宏13 | 俊凱 | Working Report | (None) |
11/24 | 俊凱14 | 承瀚 | Working Report | (None) |
11/24 | 守維14 | 承瀚 | Working Report | (None) |
11/17 | 承瀚14 | 俊凱 | Working Report | (None) |
11/17 | 柏叡14 | 俊凱 | Working Report: Disk Benchmakrk & Environment Setup | (None) |
11/17 | 冠宏12 | 俊凱 | Predicting Network Attacks with CNN by Constructing Images from Netflow Data | NetFlow data, Intrusion detection, Deep Learning, CNN, ResNet |
11/21 | 俊凱13 | 自己 | Working Report | (None) |
11/10 | 守維13 | 柏叡 | Working Report: Open Set Recognition (OSR) Task | (None) |
11/3 | 承瀚13 | 守維 | Confidence May Cheat : Self-Training on Graph Neural Networks under Distribution Shift | Graph Neural Networks, Self-Training, Information Gain |
11/3 | 柏叡13 | 守維 | Working Report: DFS Choices for Out Lab: Weighing Pros and Cons | (None) |
11/3 | 冠宏11 | 守維 | Working Report | (None) |
10/20 | 俊凱12 | 冠宏 | Working Report: Transformer-LSTM | (None) |
10/20 | 守維12 | 冠宏 | Working Report: Open Set Recognition (OSR) Task | (None) |
10/13 | 承瀚12 | 守維 | Working Report | (None) |
10/13 | 冠宏10 | 守維 | Working Report | (None) |
10/13 | 柏叡12 | 守維 | Handover from Tse-An Lin (see below) | (None) |
10/6 | 守維11 | 承瀚 | Working Report | (None) |
10/6 | 俊凱11 | 承瀚 | An Intrusion Detection Method Based on Transformer-LSTM Model | Intrusion detection, Transformer, LSTM, Deep learning |
9/29 | 柏叡11 | 俊凱 | Handover from Tse-An Lin (see below) | (None) |
9/29 | 承瀚11 | 俊凱 | Energy-based Out-of-distribution Detection | (None) |
9/29 | 冠宏9 | 俊凱 | Considerably Improving Clustering Algorithms Using UMAP Dimensionality Reduction Technique: A Comparative Study | Dimensionality reduction, UMAP, Clustering, Embedding manifold, Big data analytics, ML, Comparative study |
9/22 | 俊凱10 | 柏叡 | Network Intrusion Detection via Flow-to-Image Conversion and Vision Transformer Classification | NIDS, Flow-to-image conversion, CNN, Vision transformers, Image classification |
9/22 | 守維10 | 柏叡 | A Hybrid Approach to Network Intrusion Detection Based on Graph Neural Networks and Transformer Architectures | Graph neural network, GraphSAGE, Transformer, NIDS |
9/15 | 柏叡10 | 守維 | Handover from Tse-An Lin (see below) | (None) |
9/15 | 承瀚10 | 守維 | Working Report | (None) |
9/8 | 柏叡9 | 冠宏 | Handover from Tse-An Lin: A MLOps Framework for Enhancing Self-Training utilizing In-Memory Caching of Pseudo-Labels | (None) |
9/8 | 俊凱9 | 冠宏 | Using Consumer Lag for Autoscaling on Kafka-Centric Model Serving | (None) |
9/8 | 守維9 | 冠宏 | Working Report: Implementation of FlowTransformer | (None) |
8/25 | 承瀚9 | 俊凱 | Working Report | (None) |
8/25 | 冠宏8 | 俊凱 | Mean teachers are better role models:Weight-averaged consistency targets improve semi-supervised deep learning results | (None) |
8/18 | 俊凱8 | 柏叡 | An Attention-Based Convolutional Neural Network for Intrusion Detection Model | NIDS, CNN, Computational complexity, Security, Network systems, Image synthesis, Computational efficiency |
8/18 | 守維8 | 柏叡 | FlowTransformer: A Transformer Framework for Flow-Based Network Intrusion Detection Systems | Transformers, NIDS, Machine learning, Generative pre-trained transformer, Network flow |
8/11 | 承瀚8 | 守維 | Handover: Enhancing Self-Training by Feature-Fusion and Similarity-Based Weighting for Botnet Detection | |
8/11 | 柏叡8 | 守維 | A Cost-Efficient Container Orchestration Strategy in Kubernetes-Based Cloud Computing Infrastructures with Heterogeneous Resources | Cluster management, Container orchestration, Resource heterogeneity, Cost efficiency |
8/11 | 冠宏7 | 守維 | Handover: Using a Hierarchical Clustering Approach with a Distribution Similarity Strategy for Multi-Class Botnet Labeling in Real-World Traffic | |
8/4 | 俊凱7 | 柏叡 | Sentiment Analysis Using Pre-Trained Language Model With No Fine-Tuning and Less Resource | Sentiment analysis, Natural language processing |
8/4 | 守維7 | 柏叡 | RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System | NIDS, Feature representation, Self-attention mechanism, Transformer |
6/2 | 承瀚7 | 守維 | Feature extraction for machine learning-based intrusion detection in IoT networks | Feature extraction, Machine learning, NIDS, IoT |
5/26 | 柏叡7 | 承瀚 | Heats: Heterogeneity-and Energy-Aware Task-Based Scheduling | (None) |
5/19 | 冠宏6 | 柏叡 | Adaptive Intrusion Detection in the Networking of Large Scale LANs with Segmented Federated Learning | Cybersecurity, Deep learning, NIDS, Segmented-federated learning, LAN, CNN |
5/12 | 俊凱6 | 冠宏 | Local LLM + RAG | (None) |
5/5 | 守維6 | 俊凱 | Mamba: Linear-Time Sequence Modeling with Selective State Spaces | (None) |
4/28 | 承瀚6 | 守維 | Self-organizing Maps (SOM) | (None) |
4/21 | 柏叡6 | 承瀚 | KubeShare: A Framework to Manage GPUs as First-Class and Shared Resources in Container Cloud | Cloud computing, GPU, Container, Scheduling, Cloud computing, GPU, Container, Scheduling |
4/14 | 冠宏5 | 柏叡 | Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices | Botnet detection, Cybersecurity, Deep learning, Deep neural network, Federated learning, IoT |
3/31 | 守維5 | 冠宏 | Efficiently Modeling Long Sequences with Structured State Spaces | (None) |
3/24 | 承瀚5 | 守維 | BotChase: Graph-Based Bot Detection Using Machine Learning | Security management, Botnet detection, Machine learning |
3/17 | 柏叡5 | 承瀚 | NetMARKS: Network Metrics-AwaRe Kubernetes Scheduler Powered by Service Mesh | K8s, Network statistics, Scheduling, Service mesh, Latency, Interoperability, 5G, Containerized network |
3/10 | 俊凱5 | 柏叡 | Azure OpenAI | (None) |
3/3 | 冠宏4 | 俊凱 | A Deep Learning Model for Network Intrusion Detection with Imbalanced Data | NIDS, Bi-LSTM, Attention mechanism, NSL-KDD |
2/4 | 俊凱4 | 冠宏 | Azure OpenAI | (None) |
1/28 | 承瀚4 | 俊凱 | BotGM: Unsupervised Graph Mining to Detect Botnets in Traffic Flows | IP networks, Ports (Computers), Security, Windows, Silicon, Focusing |
1/21 | 守維4 | 承瀚 | Hunt for Unseen Intrusion: Multi-Head Self-Attention Neural Detector | Deep neural network, NIDS, Multi-head attention, Realistic prediction performance evaluation, Self-attention |
2024/ 1/14 |
柏叡4 | 守維 | A Novel Flow-vector Generation Approach for Malicious Traffic Detection | Deep learning, Malicious traffic, Embedding, Attention mechanism |
12/24 | 冠宏3 | 柏叡 | E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT | Graph Neural Networks, NIDS, IoT |
12/17 | 俊凱3 | 冠宏 | A Fuzzy Logic based feature engineering approach for Botnet detection using ANN | Artificial Neural Networ, BotnetFuzzy Logic, Fuzzy rules, CTU-13, Cyber Security |
12/10 | 守維3 | 俊凱 | A Neural Attention Model for Real-Time Network Intrusion Detection | NIDS, Deep learning, Attention model, Network security |
12/3 | 承瀚3 | 守維 | Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning | Botnet, Adversarial, Reinforcement learning |
11/26 | 冠宏2 | 承瀚 | IoT Malware Network Traffic Classification using Visual Representation and Deep Learning | Network traffic, Machine learning, Security, NIDS |
11/19 | 柏叡3 | 冠宏 | Unsupervised Detection of Botnet Activities using Frequent Pattern Tree Mining | Botnet detection, Internet security, Frequent pattern tree, Data mining |
11/12 | 俊凱2 | 柏叡 | An Advanced Computing Approach for IoT-Botnet Detection in Industrial Internet of Things | Botnet, Malware, Feature extraction, IIoT, Static analysis, Informatics, Heuristic algorithms |
11/5 | 守維2 | 俊凱 | A Unified Approach to Interpreting Model Predictions [PDF] | (none) |
10/29 | 承瀚2 | 守維 | Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning | Botnet, Adversarial, Reinforcement learning |
10/15 | 冠宏1 | 柏叡 | Train Without Label: A Self-supervised One-Class Classification Approach for IoT Anomaly Detection | IoT, Self-supervised learning, One-class classification, Cyber-attacks, NIDS |
10/8 | 俊凱1 | 冠宏 | A Hybrid Model for Botnet Detection using Machine Learning | Botnet detection, kmeans, Rule-based system, decision tree, CTU-13 dataset |
9/24 | 守維1 | 俊凱 | BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning | IoT, Botnet, NIDS, Explainable machine learning |
9/17 | 承瀚1 | 守維 | Botnet Detection in the Internet of Things using Deep Learning Approaches | Botnet, Computer crime, Machine learning, Servers, IoT |
2023/ 9/10 |
柏叡1 | 承瀚 | A KNN-Based Intrusion Detection Model for Smart Cities Security | Smart cities, IoT, Security, AI, Machine learning, Classification |
Keyword abbreviations:
Recommended outlines of a paper (including its slides):
Related to the choice of paper to deliver a speech:
Related to slides, highly recommended to follow:
Related to slides, better if followed:
Related to working reports:
todo: from 2023-10-15哲賢Da-Jun
When you're about (in 2 days) to have paper report, please send the title of paper to the thread 報論文的時間和主題. If possible, update the schedule part in this notebook to prevent the others from choosing the same paper for presentation.
(todo)
The next scheduled speaker* has to take the meeting minutes, including the following content for each speaker:
The following text block is a sample meeting minutes. (Thanks 守維 and 柏叡.)
Chinese version:
2023/09/17 會議紀錄
林俊昇:QLD-IDS working report
謝老師:
* 多找幾個dataset試看看
* 做完實驗後要思考如何應用,發揮最大效果
張老師:
* 可以嘗試向原作者詢問原始碼,看和自己重現的部分有哪些差異
------------------------------
(Minutes in the same format as the above for the other speakers.)
English version:
Meeting Minutes 2023-09-17
SPEAKER:
Title: TODO
Teacher Shieh:
1. TODO
Teacher Chang:
1. TODO
Senior Jun-Yo:
1. TODO
------------------------------
(Minutes in the same format as the above for the other speakers.)
* The next scheduled speaker: For example, when 柏叡 is reporting, the next speaker is 承翰, referred from the default order in the schedule.
After the meeting ends, send the meeting minutes to the channel 會議記錄 in Discord.