Advanced Topics in AI for Computing and Networking (Summer 2024): Difference between revisions

No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 48: Line 48:
8. Energy-Efficient 360-Degree Video Streaming on Multicore-Based Mobile Devices [https://ieeexplore.ieee.org/document/10228863]  
8. Energy-Efficient 360-Degree Video Streaming on Multicore-Based Mobile Devices [https://ieeexplore.ieee.org/document/10228863]  


9. Hawkeye: A Dynamic and Stateless Multicast Mechanism with Deep Reinforcement Learning [https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9796875]
9. Hawkeye: A Dynamic and Stateless Multicast Mechanism with Deep Reinforcement Learning [https://ieeexplore.ieee.org/document/10228869]


10. WiseCam: Wisely Tuning Wireless Pan-Tilt Cameras for Cost-Effective Moving Object Tracking [https://ieeexplore.ieee.org/document/10228911]
10. WiseCam: Wisely Tuning Wireless Pan-Tilt Cameras for Cost-Effective Moving Object Tracking [https://ieeexplore.ieee.org/document/10228926]


11. Two-level Graph Caching for Expediting Distributed GNN Training [https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9796984]
11. Two-level Graph Caching for Expediting Distributed GNN Training [https://ieeexplore.ieee.org/document/10228911]


12. From Ember to Blaze: Swift Interactive Video Adaptation via Meta-Reinforcement Learning [https://ieeexplore.ieee.org/document/10228909]
12. From Ember to Blaze: Swift Interactive Video Adaptation via Meta-Reinforcement Learning [https://ieeexplore.ieee.org/document/10228909]
Line 62: Line 62:
15. DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks [https://ieeexplore.ieee.org/document/10228962]
15. DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks [https://ieeexplore.ieee.org/document/10228962]


16. FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning [https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9796926]
16. Federated Few-Shot Learning for Mobile NLP [https://dl.acm.org/doi/10.1145/3570361.3613277]


17. TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic Classifiers [https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9796878]
17. A Joint Analysis of Input Resolution and Quantization Precision in Deep Learning [https://dl.acm.org/doi/10.1145/3570361.3615753]


18. Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation [https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9796936]
18. Automated Spray Control using Deep Learning and Image Processing [https://dl.acm.org/doi/10.1145/3570361.3615757]


19. Ekya: Continuous Learning of Video Analytics Models on Edge Compute Servers [https://www.usenix.org/conference/nsdi22/presentation/bhardwaj]
19. Cross-Modal Perception for Customer Service [https://dl.acm.org/doi/10.1145/3570361.3615751]


20. Top-K Deep Video Analytics: A Probabilistic Approach [https://dl.acm.org/doi/pdf/10.1145/3448016.3452786]
20. Cross-modal meta-learning for WiFi-based human activity recognition [https://dl.acm.org/doi/10.1145/3570361.3615754]


==Schedule==
==Schedule==
56

edits