I currently stopped advising for undergraduate theses, student research projects at UIT to pursue the Ph.D. degree at The University of Melbourne (2021-2025). Please contact other lecturers for supervision.
Wish you all the best!
Topics for 2021
1. Federated Learning – Privacy-preserving ML
2. Security and Privacy in/using Machine Learning
3. Quantum Machine Learning
Topics for 2020 (no longer available)
R1 – Network Virtualization, Microservices, and Serverless Computing
- Virtualization/Containerization and Microservices:
- Container-based application and microservices deployment, management, monitoring and optimization (Docker, Traefik, Prometheus, Grafana, …)
- Container orchestration and OS platform for Cloud-Edge, Serverless computing (Kubernetes, Rancher, k3s)
- Serverless Computing:
- Open-source platform: OpenFaaS, OpenWhisk
- Vendor lock-in: Amazon Lambda, Azure Functions
- DevSecOps
Nice if you have (optional):
- Grades of at least 7.0 in IT005, IT007, NT132 or good background in computer networks, Linux OS
- Experience with virtualization and containerization, for example, VMWare; Docker; Kubernetes; Rancher; Traefik or another platform here is a plus
- Experience with following languages: Golang; Python 3; NodeJS is a plus
- Experience with Serverless platform (OpenFaaS, OpenWhisk or AWS Lambda, Azure Functions) is a plus
References
- Shafiei, H., Khonsari, A., & Mousavi, P. (2020). Serverless Computing: A Survey of Opportunities, Challenges and Applications.
- U. Zdun, E. Wittern and P. Leitner, “Emerging Trends, Challenges, and Experiences in DevOps and Microservice APIs,” in IEEE Software, vol. 37, no. 1, pp. 87-91, Jan.-Feb. 2020.
- A. Sill, “The Design and Architecture of Microservices,” in IEEE Cloud Computing, vol. 3, no. 5, pp. 76-80, Sept.-Oct. 2016.
- D. S. Linthicum, “Practical Use of Microservices in Moving Workloads to the Cloud,” in IEEE Cloud Computing, vol. 3, no. 5, pp. 6-9, Sept.-Oct. 2016.
- A. Balalaie, A. Heydarnoori and P. Jamshidi, “Microservices Architecture Enables DevOps: Migration to a Cloud-Native Architecture,” in IEEE Software, vol. 33, no. 3, pp. 42-52, May-June 2016.
- Ian Miell, Aiden Hobson Sayers (2019), Docker in Practice (Book)
R2 – Cloud-Edge/Fog Computing, Software-Defined and Networks Intelligence
- Multi-Access Edge Computing
- Application for Mobile Edge computing (Android, iOS)
- Computation Offloading and Scheduling
- Mobility Management and Resource Allocation
- Next-gen Software-Defined Network (not available now)
- P4 programming
- Stratum, OpenDaylight, ONOS, Ryu Controller
- SDN Testbed
- Learning-based (Machine Learning, Deep Learning) for networks (not available now)
- Traffic generation and zero-attack detection with Generative Adversarial Networks
- ML/DL networks applications
Nice if you have (optional):
- Grades of at least 7.0 in IT005, IT007, NT132 or good background in computer networks, Linux OS, mathematical
- Experience with Cloud-Edge computing, Software-defined Networks, virtualization, and containerization is a plus
- Experience with following languages: Golang; Python 3; NodeJS; P4; Kotlin/Java or Swift is a plus
References
- P. Mach and Z. Becvar, “Mobile Edge Computing: A Survey on Architecture and Computation Offloading,” in IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1628-1656, thirdquarter 2017.
- Y. Mao, C. You, J. Zhang, K. Huang and K. B. Letaief, “A Survey on Mobile Edge Computing: The Communication Perspective,” in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2322-2358, Fourthquarter 2017.
- C. Mouradian, D. Naboulsi, S. Yangui, R. H. Glitho, M. J. Morrow and P. A. Polakos, “A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges,” in IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 416-464, Firstquarter 2018.
R3 – Cybersecurity
- Web and data privacy
- Network Attacks detection
- Microservices/Container security
- Edge-Cloud computing security
Nice if you have (optional):
- Grades of at least 7.0 in IT005, IT007, NT101, NT219 or good background in computer networks, Linux OS, information security, cryptography
- Understanding of OWASP Top 10 is a plus
- Experience with CEH, CTF, penetration testing is a plus
- Experience with following languages: Golang; Python 3, Bash is a plus
References
- T. Bujlow, V. Carela-Español, J. Solé-Pareta and P. Barlet-Ros, “A Survey on Web Tracking: Mechanisms, Implications, and Defenses,” in Proceedings of the IEEE, vol. 105, no. 8, pp. 1476-1510, Aug. 2017.
- Lin, Zilong, Yong Shi, and Zhi Xue. “IDSGAN: Generative adversarial networks for attack generation against intrusion detection.” arXiv preprint arXiv:1809.02077 (2018).
- Yilmaz, I., & Masum, R. (2019). Expansion of cyber attack data from unbalanced datasets using generative techniques. arXiv preprint arXiv:1912.04549.
- S. Sultan, I. Ahmad and T. Dimitriou, “Container Security: Issues, Challenges, and the Road Ahead,” in IEEE Access, vol. 7, pp. 52976-52996, 2019.
General Requirements
These are some key requirements for all of my students:
- Good background knowledge in the selected subject area
- Have passion and be curious to learn and explore new things – stay abreast of the cutting-edge technologies trends
- Responsibility, prioritize and always try to complete the project with the best effort
- Good teamwork and proactive problem-solving skill, self-study ability
- Good programming skill is a plus!
I want you to succeed, success means “learn with the best effort“, not only get a good grade or just enough to pass!