VECTOR | [2-0-0:2] |
---|---|
DESCRIPTION | This inquiry-based course aims to introduce students to the concepts and skills needed to drive digital transformation in the information age. Students will learn to conduct research, explore real-world applications, and discuss grand challenges in the four thrust areas of the Information hub, namely Artificial Intelligence, Data Science and Analytics, Internet of Things, and Computational Media and Arts. The course incorporates various teaching and learning formats including lectures, seminars, online courses, group discussions, and a term project. |
Section | Date & Time | Room | Instructor | Quota | Enrol | Avail | Wait | Remarks |
---|---|---|---|---|---|---|---|---|
L01 (6029) | We 03:00PM - 04:50PM | Lecture Hall A | CHEN, Huangxun TANG, Nan WANG, Xin YU, Luwen | 200 | 197 | 3 | 0 | The class is delivered in mixed mode. |
VECTOR | [3-0-0:3] |
---|---|
DESCRIPTION | This course explores cutting-edge techniques for creating efficient machine-learning models to address the growing demand for real-time decision-making and localized processing across diverse application fields, including IoT/robotics/smart manufacturing systems and beyond. Key topics include model compression, pruning, quantization, neural architecture search, knowledge distillation, on-device fine-tuning, transfer learning, application-specific acceleration techniques, etc. Through hands-on projects, students will learn to optimize and adapt deep learning models for resource-constrained devices while maintaining accuracy and performance. |
Section | Date & Time | Room | Instructor | Quota | Enrol | Avail | Wait | Remarks |
---|---|---|---|---|---|---|---|---|
L01 (6211) | Th 04:30PM - 07:20PM | Rm 222, W1 | CHEN, Huangxun | 30 | 7 | 23 | 0 |
VECTOR | [3-0-0:3] |
---|---|
PREVIOUS CODE | IOTA 6910A |
DESCRIPTION | This course covers fundamental aspects of cybersecurity and privacy. The course will equip students with the ability to understand and analyze security technologies. This course will then explain how these technologies are used and deployed in practical real-world environments, before exploring how recent attacks have discovered new vulnerabilities. The course will emphasize the value of empirical observations and give students insight into how these vulnerabilities can be measured in-the-wild. This course is ideal for students who are interested in understanding cybersecurity risks in a broad range of technologies. |
Section | Date & Time | Room | Instructor | Quota | Enrol | Avail | Wait | Remarks |
---|---|---|---|---|---|---|---|---|
L01 (6044) | Fr 01:30PM - 04:20PM | Rm 202, W4 | CHEN, Huangxun TYSON, Gareth John | 30 | 9 | 21 | 0 |