Student name |
Email |
Topic |
Keyword |
Opponent |
Joona Ahonen |
joona.ahonen@aalto.fi |
Computer-aided proofs for cryptography |
Security |
Giancarlo Andriano |
Giancarlo Andriano |
giancarlo.andriano@aalto.fi |
Cryptocurrencies price predictions using effictive factors |
Security |
Aleksi Hirvensalo |
Tarmo Asikainen |
tarmo.asikainen@aalto.fi |
Semantic interoperability for automotive vertical |
IoT |
Nami Naziri |
Pierre Chapeau |
pierre.chapeau@aalto.fi |
Adversarial attacks and defenses |
NN |
Kerkko Karttunen |
Ashok Dhungana |
ashok.dhungana@aalto.fi |
Microservices - when and how to use them |
Microservice |
Joonas Harjumäki |
Joonas Harjumäki |
joonas.harjumaki@aalto.fi |
Intent-Based Networking |
Microservice |
Dennis Marttinen |
Aleksi Hirvensalo |
aleksi.hirvensalo@aalto.fi |
Container isolation beyond namespaces |
Security |
Joona Ahonen |
Tiia Hyvönen |
tiia.hyvonen@aalto.fi |
Comparison of current Identity Management Solutions/technologies |
Security |
Valentin Ionita |
Valentin Ionita |
valentin.ionita@aalto.fi |
Container isolation beyond namespaces |
Security |
Iiris Joutsi |
Aaro Isomäki |
aaro.isomaki@aalto.fi |
Adapting Kubernetes for Fog Computing |
FC |
Oskari Järvinen |
Iiris Joutsi |
iiris.joutsi@aalto.fi |
Usability of passwords |
Security |
Hung Nguyen |
Kiran Joy Kulangara |
kiran.joykulangara@aalto.fi |
Psychometry for researching usable security |
Security |
Joel Rämö |
Oskari Järvinen |
oskari.jarvinen@aalto.fi |
(Semantic) Service Discovery for Fog, Edge, and Web |
FC |
Zunaira Salam |
Kerkko Karttunen |
kerkko.karttunen@aalto.fi |
Adversarial attacks and defenses |
NN |
Félix Lepeltier |
Félix Lepeltier |
felix.lepeltier@aalto.fi |
Recent advances in Reinforcement Learning |
NN |
Christian Montecchiani |
Dennis Marttinen |
dennis.marttinen@aalto.fi |
Microservices - when and how to use them |
Microservice |
Juho Pousi |
Christian Montecchiani |
christian.montecchiani@aalto.fi |
Modern Generative Modelling Landscape |
NN |
Elias Peltonen |
Timo Nappa |
timo.nappa@aalto.fi |
Psychometry for researching usable security |
Security |
Antti Nousiainen |
Nami Naziri |
nami.naziri@aalto.fi |
A Survey on Data-Driven Animation Techniques |
IoT |
Anton Sulkava |
Hung Nguyen |
hung.g.nguyen@aalto.fi |
Computer-aided proofs for cryptography |
Security |
Johanna Sänger |
Antti Nousiainen |
antti.h.nousiainen@aalto.fi |
Container isolation beyond namespaces |
Security |
Veli-Matti Rantanen |
Elias Peltonen |
elias.m.peltonen@aalto.fi |
Recent advances in Reinforcement Learning |
NN |
Yejun Zhang |
Juho Pousi |
juho.pousi@aalto.fi |
Microservices - when and how to use them |
Microservice |
Ashok Dhungana |
Veli-Matti Rantanen |
veli-matti.rantanen@aalto.fi |
Computer-aided proofs for cryptography |
Security |
Tiia Hyvönen |
Joel Rämö |
joel.j.ramo@aalto.fi |
Inference in human-AI interaction |
NN |
Pierre Chapeau |
Nicholas Saarela |
nicholas.saarela@aalto.fi |
Interactive global illumination algorithms based on ray tracing |
IoT |
Tarmo Asikainen |
Zunaira Salam |
zunaira.salam@aalto.fi |
Low Latency, Low Loss, Scalable Throughput (L4S) Protocol |
FC |
Aaro Isomäki |
Anton Sulkava |
anton.sulkava@aalto.fi |
Passive IoT solutions for 6G |
IoT |
Nicholas Saarela |
Johanna Sänger |
johanna.sanger@aalto.fi |
Security indicators and warnings |
Security |
Vishal Verma |
Vishal Verma |
vishal.verma@aalto.fi |
Container isolation beyond namespaces |
Security |
Kiran Joy Kulangara |
Yejun Zhang |
yejun.zhang@aalto.fi |
Efficient methods for uncertainty in Deep learning |
NN |
Wan Yue |
Wan Yue |
yue.wan@aalto.fi |
Misinformation classification and community detection on Twitter |
Security |
Timo Nappa |