Student name Email Topic  Keyword Opponent
Joona Ahonen joona.ahonen@aalto.fi Computer-aided proofs for cryptography Security Giancarlo Andriano
Giancarlo Andriano giancarlo.andriano@aalto.fi Cryptocurrencies price predictions using effictive factors Security Aleksi Hirvensalo
Tarmo Asikainen tarmo.asikainen@aalto.fi Semantic interoperability for automotive vertical IoT Nami Naziri
Pierre Chapeau pierre.chapeau@aalto.fi Adversarial attacks and defenses NN Kerkko Karttunen
Ashok Dhungana ashok.dhungana@aalto.fi Microservices - when and how to use them Microservice Joonas Harjumäki
Joonas Harjumäki joonas.harjumaki@aalto.fi Intent-Based Networking Microservice Dennis Marttinen
Aleksi Hirvensalo aleksi.hirvensalo@aalto.fi Container isolation beyond namespaces Security Joona Ahonen
Tiia Hyvönen tiia.hyvonen@aalto.fi Comparison of current Identity Management Solutions/technologies Security Valentin Ionita
Valentin Ionita valentin.ionita@aalto.fi Container isolation beyond namespaces Security Iiris Joutsi
Aaro Isomäki aaro.isomaki@aalto.fi Adapting Kubernetes for Fog Computing FC Oskari Järvinen
Iiris Joutsi iiris.joutsi@aalto.fi Usability of passwords Security Hung Nguyen
Kiran Joy Kulangara kiran.joykulangara@aalto.fi Psychometry for researching usable security Security Joel Rämö 
Oskari Järvinen oskari.jarvinen@aalto.fi (Semantic) Service Discovery for Fog, Edge, and Web FC Zunaira Salam
Kerkko Karttunen kerkko.karttunen@aalto.fi Adversarial attacks and defenses NN Félix Lepeltier
Félix Lepeltier felix.lepeltier@aalto.fi Recent advances in Reinforcement Learning NN Christian Montecchiani
Dennis Marttinen dennis.marttinen@aalto.fi Microservices - when and how to use them Microservice Juho Pousi
Christian Montecchiani christian.montecchiani@aalto.fi Modern Generative Modelling Landscape NN Elias Peltonen
Timo Nappa timo.nappa@aalto.fi Psychometry for researching usable security Security Antti Nousiainen
Nami Naziri nami.naziri@aalto.fi A Survey on Data-Driven Animation Techniques IoT Anton Sulkava
Hung Nguyen hung.g.nguyen@aalto.fi Computer-aided proofs for cryptography Security Johanna Sänger
Antti Nousiainen antti.h.nousiainen@aalto.fi Container isolation beyond namespaces Security Veli-Matti Rantanen
Elias Peltonen elias.m.peltonen@aalto.fi Recent advances in Reinforcement Learning NN Yejun Zhang
Juho Pousi juho.pousi@aalto.fi Microservices - when and how to use them Microservice Ashok Dhungana
Veli-Matti Rantanen veli-matti.rantanen@aalto.fi Computer-aided proofs for cryptography Security Tiia Hyvönen
Joel Rämö joel.j.ramo@aalto.fi Inference in human-AI interaction NN Pierre Chapeau
Nicholas Saarela nicholas.saarela@aalto.fi Interactive global illumination algorithms based on ray tracing IoT Tarmo Asikainen
Zunaira Salam zunaira.salam@aalto.fi Low Latency, Low Loss, Scalable Throughput (L4S) Protocol FC Aaro Isomäki
Anton Sulkava anton.sulkava@aalto.fi Passive IoT solutions for 6G IoT Nicholas Saarela
Johanna Sänger johanna.sanger@aalto.fi Security indicators and warnings Security Vishal Verma
Vishal Verma vishal.verma@aalto.fi Container isolation beyond namespaces Security Kiran Joy Kulangara
Yejun Zhang yejun.zhang@aalto.fi Efficient methods for uncertainty in Deep learning NN Wan Yue
Wan Yue yue.wan@aalto.fi Misinformation classification and community detection on Twitter Security Timo Nappa

Last modified: Thursday, 27 October 2022, 5:29 PM