<?xml version="1.0"?>
<dblpperson name="Didik Sudyana" pid="313/2995" n="11">
<person key="homepages/313/2995" mdate="2022-02-10">
<author pid="313/2995">Didik Sudyana</author>
</person>
<r><article key="journals/network/YudhaLLSH25" mdate="2025-12-07">
<author orcid="0000-0002-4590-1780" pid="382/2789">Fietyata Yudha</author>
<author orcid="0000-0002-5226-4396" pid="l/YingDarLin">Ying-Dar Lin</author>
<author orcid="0000-0003-3695-5784" pid="12/2250">Yuan-Cheng Lai</author>
<author orcid="0000-0001-5378-2622" pid="313/2995">Didik Sudyana</author>
<author orcid="0000-0001-7996-4184" pid="57/5091">Ren-Hung Hwang</author>
<title>Reproducing ATT&#38;CK Techniques and Lifecycles to Train Machine Learning Classifier.</title>
<pages>288-296</pages>
<year>2025</year>
<month>November</month>
<volume>39</volume>
<journal>IEEE Netw.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/MNET.2025.3551333</ee>
<url>db/journals/network/network39.html#YudhaLLSH25</url>
<stream>streams/journals/network</stream>
</article>
</r>
<r><article key="journals/tnsm/HwangCLSLL25" mdate="2025-05-09">
<author orcid="0000-0001-7996-4184" pid="57/5091">Ren-Hung Hwang</author>
<author pid="404/4134">Tsai-Ying Chou</author>
<author orcid="0000-0003-0222-2339" pid="294/5345">Jia-You Lin</author>
<author orcid="0000-0001-5378-2622" pid="313/2995">Didik Sudyana</author>
<author orcid="0000-0003-3695-5784" pid="12/2250">Yuan-Cheng Lai</author>
<author orcid="0000-0002-5226-4396" pid="l/YingDarLin">Ying-Dar Lin</author>
<title>Optimal Resource Allocation for AIoT as a Service Under Various Service Scenarios and Architectures.</title>
<pages>1420-1436</pages>
<year>2025</year>
<month>April</month>
<volume>22</volume>
<journal>IEEE Trans. Netw. Serv. Manag.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TNSM.2024.3503575</ee>
<url>db/journals/tnsm/tnsm22.html#HwangCLSLL25</url>
<stream>streams/journals/tnsm</stream>
</article>
</r>
<r><article key="journals/tnsm/LinLLS25" mdate="2025-09-06">
<author pid="l/YingDarLin">Ying-Dar Lin</author>
<author orcid="0009-0006-8506-6405" pid="413/8084">Yin-Tao Ling</author>
<author orcid="0000-0003-3695-5784" pid="12/2250">Yuan-Cheng Lai</author>
<author orcid="0000-0001-5378-2622" pid="313/2995">Didik Sudyana</author>
<title>Reinforcement Learning for AI as a Service: CPU-GPU Task Scheduling for Preprocessing, Training, and Inference Tasks.</title>
<pages>3433-3448</pages>
<year>2025</year>
<month>August</month>
<volume>22</volume>
<journal>IEEE Trans. Netw. Serv. Manag.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TNSM.2025.3564480</ee>
<url>db/journals/tnsm/tnsm22.html#LinLLS25</url>
<stream>streams/journals/tnsm</stream>
</article>
</r>
<r><article key="journals/tsc/SudyanaLLC25" mdate="2025-07-04">
<author orcid="0000-0001-5378-2622" pid="313/2995">Didik Sudyana</author>
<author orcid="0000-0003-3695-5784" pid="12/2250">Yuan-Cheng Lai</author>
<author orcid="0000-0002-5226-4396" pid="l/YingDarLin">Ying-Dar Lin</author>
<author orcid="0000-0003-2018-4057" pid="13/4355">Piotr Cholda</author>
<title>ML-Based Intrusion Detection as a Service: Traffic Split Offloading and Cost Allocation in a Multi-Tier Architecture.</title>
<pages>1557-1572</pages>
<year>2025</year>
<month>May - June</month>
<volume>18</volume>
<journal>IEEE Trans. Serv. Comput.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TSC.2025.3563680</ee>
<url>db/journals/tsc/tsc18.html#SudyanaLLC25</url>
<stream>streams/journals/tsc</stream>
</article>
</r>
<r><article key="journals/compsec/LinYSYLH24" mdate="2024-08-22">
<author pid="l/YingDarLin">Ying-Dar Lin</author>
<author pid="146/2146">Shin-Yi Yang</author>
<author orcid="0000-0001-5378-2622" pid="313/2995">Didik Sudyana</author>
<author orcid="0000-0002-4590-1780" pid="382/2789">Fietyata Yudha</author>
<author orcid="0000-0003-3695-5784" pid="12/2250">Yuan-Cheng Lai</author>
<author orcid="0000-0001-7996-4184" pid="57/5091">Ren-Hung Hwang</author>
<title>Two-stage multi-datasource machine learning for attack technique and lifecycle detection.</title>
<pages>103859</pages>
<year>2024</year>
<volume>142</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2024.103859</ee>
<url>db/journals/compsec/compsec142.html#LinYSYLH24</url>
<stream>streams/journals/compsec</stream>
</article>
</r>
<r><article key="journals/jnca/LinHSL24" mdate="2024-07-19">
<author pid="l/YingDarLin">Ying-Dar Lin</author>
<author pid="379/8714">Hao-Xuan Huang</author>
<author orcid="0000-0001-5378-2622" pid="313/2995">Didik Sudyana</author>
<author orcid="0000-0003-3695-5784" pid="12/2250">Yuan-Cheng Lai</author>
<title>AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities.</title>
<pages>103936</pages>
<year>2024</year>
<volume>229</volume>
<journal>J. Netw. Comput. Appl.</journal>
<ee>https://doi.org/10.1016/j.jnca.2024.103936</ee>
<url>db/journals/jnca/jnca229.html#LinHSL24</url>
</article>
</r>
<r><article key="journals/computer/LinLSH23" mdate="2023-12-10">
<author orcid="0000-0002-5226-4396" pid="l/YingDarLin">Ying-Dar Lin</author>
<author orcid="0000-0003-3695-5784" pid="12/2250">Yuan-Cheng Lai</author>
<author orcid="0000-0001-5378-2622" pid="313/2995">Didik Sudyana</author>
<author orcid="0000-0001-7996-4184" pid="57/5091">Ren-Hung Hwang</author>
<title>Artificial Intelligence for Internet of Things as a Service: Small or Big Data, Private or Public Model, Centralized or Federated Learning?</title>
<pages>65-79</pages>
<year>2023</year>
<month>December</month>
<volume>56</volume>
<journal>Computer</journal>
<number>12</number>
<ee>https://doi.org/10.1109/MC.2023.3303370</ee>
<url>db/journals/computer/computer56.html#LinLSH23</url>
</article>
</r>
<r><article key="journals/tnsm/LaiSLVDWVT23" mdate="2023-03-28">
<author orcid="0000-0003-3695-5784" pid="12/2250">Yuan-Cheng Lai</author>
<author orcid="0000-0001-5378-2622" pid="313/2995">Didik Sudyana</author>
<author orcid="0000-0002-5226-4396" pid="l/YingDarLin">Ying-Dar Lin</author>
<author orcid="0000-0002-1781-900X" pid="280/0644">Miel Verkerken</author>
<author orcid="0000-0001-5086-6361" pid="242/4195">Laurens D'hooge</author>
<author orcid="0000-0003-2618-3311" pid="43/1771">Tim Wauters</author>
<author orcid="0000-0003-0575-5894" pid="56/3545">Bruno Volckaert</author>
<author orcid="0000-0003-4824-1199" pid="30/888">Filip De Turck</author>
<title>Task Assignment and Capacity Allocation for ML-Based Intrusion Detection as a Service in a Multi-Tier Architecture.</title>
<pages>672-683</pages>
<year>2023</year>
<month>March</month>
<volume>20</volume>
<journal>IEEE Trans. Netw. Serv. Manag.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TNSM.2022.3203427</ee>
<url>db/journals/tnsm/tnsm20.html#LaiSLVDWVT23</url>
</article>
</r>
<r><article key="journals/tnsm/VerkerkenDSLWVT23" mdate="2023-10-27">
<author orcid="0000-0002-1781-900X" pid="280/0644">Miel Verkerken</author>
<author orcid="0000-0001-5086-6361" pid="242/4195">Laurens D'hooge</author>
<author orcid="0000-0001-5378-2622" pid="313/2995">Didik Sudyana</author>
<author orcid="0000-0002-5226-4396" pid="l/YingDarLin">Ying-Dar Lin</author>
<author orcid="0000-0003-2618-3311" pid="43/1771">Tim Wauters</author>
<author orcid="0000-0003-0575-5894" pid="56/3545">Bruno Volckaert</author>
<author orcid="0000-0003-4824-1199" pid="30/888">Filip De Turck</author>
<title>A Novel Multi-Stage Approach for Hierarchical Intrusion Detection.</title>
<pages>3915-3929</pages>
<year>2023</year>
<month>September</month>
<volume>20</volume>
<journal>IEEE Trans. Netw. Serv. Manag.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TNSM.2023.3259474</ee>
<url>db/journals/tnsm/tnsm20.html#VerkerkenDSLWVT23</url>
</article>
</r>
<r><article key="journals/istr/LinPSLHLLLC22" mdate="2022-12-25">
<author pid="l/YingDarLin">Ying-Dar Lin</author>
<author pid="335/9004">Jehoshua-Hanky Pratama</author>
<author pid="313/2995">Didik Sudyana</author>
<author pid="12/2250">Yuan-Cheng Lai</author>
<author orcid="0000-0001-7996-4184" pid="57/5091">Ren-Hung Hwang</author>
<author orcid="0000-0001-8294-5857" pid="79/591">Po-Ching Lin</author>
<author pid="45/6163">Hsuan-Yu Lin</author>
<author pid="50/3431">Wei-Bin Lee</author>
<author orcid="0000-0001-5276-1109" pid="51/4692">Chen-Kuo Chiang</author>
<title>ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions.</title>
<pages>103348</pages>
<year>2022</year>
<volume>71</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2022.103348</ee>
<url>db/journals/istr/istr71.html#LinPSLHLLLC22</url>
</article>
</r>
<r><inproceedings key="conf/ucc/LaiSLVDWVT21" mdate="2023-03-21">
<author pid="12/2250">Yuan-Cheng Lai</author>
<author pid="313/2995">Didik Sudyana</author>
<author pid="l/YingDarLin">Ying-Dar Lin</author>
<author orcid="0000-0002-1781-900X" pid="280/0644">Miel Verkerken</author>
<author orcid="0000-0001-5086-6361" pid="242/4195">Laurens D'hooge</author>
<author pid="43/1771">Tim Wauters</author>
<author pid="56/3545">Bruno Volckaert</author>
<author pid="30/888">Filip De Turck</author>
<title>Machine learning based intrusion detection as a service: task assignment and capacity allocation in a multi-tier architecture.</title>
<pages>27:1-27:6</pages>
<year>2021</year>
<booktitle>UCC Companion</booktitle>
<ee>https://doi.org/10.1145/3492323.3495613</ee>
<crossref>conf/ucc/2021c</crossref>
<url>db/conf/ucc/ucc2021c.html#LaiSLVDWVT21</url>
</inproceedings>
</r>
<coauthors n="20" nc="1">
<co c="0"><na f="c/Chiang:Chen=Kuo" pid="51/4692">Chen-Kuo Chiang</na></co>
<co c="0"><na f="c/Cholda:Piotr" pid="13/4355">Piotr Cholda</na></co>
<co c="0"><na f="c/Chou:Tsai=Ying" pid="404/4134">Tsai-Ying Chou</na></co>
<co c="0"><na f="d/D=hooge:Laurens" pid="242/4195">Laurens D'hooge</na></co>
<co c="0"><na f="h/Huang:Hao=Xuan" pid="379/8714">Hao-Xuan Huang</na></co>
<co c="0"><na f="h/Hwang:Ren=Hung" pid="57/5091">Ren-Hung Hwang</na></co>
<co c="0"><na f="l/Lai:Yuan=Cheng" pid="12/2250">Yuan-Cheng Lai</na></co>
<co c="0"><na f="l/Lee:Wei=Bin" pid="50/3431">Wei-Bin Lee</na></co>
<co c="0"><na f="l/Lin:Hsuan=Yu" pid="45/6163">Hsuan-Yu Lin</na></co>
<co c="0"><na f="l/Lin:Jia=You" pid="294/5345">Jia-You Lin</na></co>
<co c="0"><na f="l/Lin:Po=Ching" pid="79/591">Po-Ching Lin</na></co>
<co c="0"><na f="l/Lin:Ying=Dar" pid="l/YingDarLin">Ying-Dar Lin</na></co>
<co c="0"><na f="l/Ling:Yin=Tao" pid="413/8084">Yin-Tao Ling</na></co>
<co c="0"><na f="p/Pratama:Jehoshua=Hanky" pid="335/9004">Jehoshua-Hanky Pratama</na></co>
<co c="0"><na f="t/Turck:Filip_De" pid="30/888">Filip De Turck</na></co>
<co c="0"><na f="v/Verkerken:Miel" pid="280/0644">Miel Verkerken</na></co>
<co c="0"><na f="v/Volckaert:Bruno" pid="56/3545">Bruno Volckaert</na></co>
<co c="0"><na f="w/Wauters:Tim" pid="43/1771">Tim Wauters</na></co>
<co c="0"><na f="y/Yang:Shin=Yi" pid="146/2146">Shin-Yi Yang</na></co>
<co c="0"><na f="y/Yudha:Fietyata" pid="382/2789">Fietyata Yudha</na></co>
</coauthors>
</dblpperson>

