-
Notifications
You must be signed in to change notification settings - Fork 1
/
Paper_discussion.tgn
1 lines (1 loc) · 4.84 KB
/
Paper_discussion.tgn
1
{"rows_views":[[{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}},{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}},{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}}],[{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}},{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}},{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}}],[{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}},{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}},{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}}],[{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}},{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}},{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}}],[{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}},{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}},{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}}],[{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}},{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}},{"style":{"borders":"","font_style":{},"text_color":"","bg_color":"","halign":"left","valign":"middle","padding":{"top":10,"right":5,"bottom":10,"left":5},"border_color":""}}]],"model":{"rows":[[{"value":"Discussion Leader","cspan":1,"rspan":1,"markup":[1,17]},{"value":"Paper","cspan":1,"rspan":1,"markup":[1,5]},{"value":"Time","cspan":1,"rspan":1,"markup":[1,4]}],[{"value":"Wenbo Ding","cspan":1,"rspan":1,"markup":[1,10]},{"value":"DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning, [link](http://www.cs.utah.edu/~lifeifei/papers/deeplog.pdf)","cspan":1,"rspan":1,"markup":[1,140]},{"value":"Nov 16, 2018","cspan":1,"rspan":1,"markup":[1,12]}],[{"value":"Fei Ding","cspan":1,"rspan":1,"markup":[1,8]},{"value":"Tiresias: Predicting Security Events Through Deep Learning, [link](https://seclab.bu.edu/people/gianluca/papers/tiresias-ccs2018.pdf)","cspan":1,"rspan":1,"markup":[1,133]},{"value":"TBD","cspan":1,"rspan":1,"markup":[1,3]}],[{"value":"Feng Wei","cspan":1,"rspan":1,"markup":[1,8]},{"value":"Learning with Interpretable Structure from RNN, [link](https://arxiv.org/pdf/1810.10708.pdf)","cspan":1,"rspan":1,"markup":[1,92]},{"value":"TBD","cspan":1,"rspan":1,"markup":[1,3]}],[{"value":"Hongda Li","cspan":1,"rspan":1,"markup":[1,9]},{"value":"Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape, [link](https://link.springer.com/content/pdf/10.1007%2F978-3-030-00470-5_26.pdf)","cspan":1,"rspan":1,"markup":[1,152]},{"value":"TBD","cspan":1,"rspan":1,"markup":[1,3]}],[{"value":"\nNishant Vishwamitra\n","cspan":1,"rspan":1,"markup":[1,21]},{"value":"Weakly-supervised learning of visual relations, [link](http://openaccess.thecvf.com/content_ICCV_2017/papers/Peyre_Weakly-Supervised_Learning_of_ICCV_2017_paper.pdf)","cspan":1,"rspan":1,"markup":[1,165]},{"value":"TBD","cspan":1,"rspan":1,"markup":[1,3]}]]},"theme":null,"fixed_layout":false,"markup":{"instances":[{},{"style":{}}]}}