Remember to bring your own laptop with the slides and questions for the student you are opponent for.

Location 1
Fri 09:15-18:00 R037/1021-1022 AS3 Saab Space (Jan-Mikael Rybicki)
Timeslot Student name Title Opponent
9:15-9:35 Jana Fischer Likelihood-free Model Selection Fan Yuanhao
9:35-9:55 Fan Yuanhao Approahes to Accelerate Mesh Deformation in Certain Practical Situations Jana Fischer
9:55-10:15 Xu Feng Review on the security of OpenID Connect Anoosha Sajid (pre-record video)
10:15-10:35 Shweta Jaiswal Migration from Monolithic Architecture to Microservices: Challenges and Opportunities Je-Ruei Yang
Break      
10:40-11:00 Huong Pham Thi Song Kubernetes Approach to Public Key Infrastructure Sandeep Aryal
11:00-11:20 Jiehong Mo Audio-Viusal Speaker Recognition on Deep Learning: A Survey Ishani Bhardwaj
11:20-11:40 Chathurangi Edussuriya Blockchain and consensus algorithms: security vulnerabilities and tradeoffs Praewpiraya Wiwatphonthana
11:40-12:00 Tenho Korhonen Virtual reality toward the internet of senses Touko Nurminen
Lunch Break      
13:00-13:20 Jawad Zaheer Microservices: Describing usage based upon granularity Ashok Dhungana
13:20-13:40 Salem Wollel Effects of habituation on security warnings and ways to minimize it Javier Rosales
13:40-14:00 Yifan Zhang Artificial Noise Management in Backscatter Communication: A Review Bai Yu
14:00-14:20 Phong Tran Kubernetes for greener environment Songlin Jiang
Break      
14:30-14:50 Praewpiraya Wiwatphonthana Security and Privacy in Metaverse Chathurangi Edussuriya
14:50-15:10 Samath Lenaduwa Lokuge Using Deep Reinforcement Learning to solve Fog Computing and Service Placement Problems Roope Kajoluoto
15:10-15:30 Murali Abinaov The Biases of Algorithms Roope Karppinen
15:30-15:50 Andrea Amadei Energy saving capabilities of Kubernetes Zainab Khan (pre-record video)
Break      
16:00-16:20 Wendy Yunuen Arevalo Espinal Gaze Interactions in Virtual Characters and Their Impact on Player Experience Leonardo Pasquarelli
16:20-16:40 Berk Türetken Can we certainly trust in Microsoft &
Google Authenticators? Evaluation of
Security Vulnerabilities of Microsoft &
Google Authenticators
Apramey Bhat
16:40-17:00 Zainab Ahmad Managing Secrets in Cloud Applications Philipp Giersfeld
17:00-17:20 Philipp Giersfeld Review of recent advances of leveraging symbolic execution for fuzzing Niko Vanttila

Location 2
Fri 09:15-18:00 CS building T5 (Wencan Mao)
Timeslot Student name Title Opponent
9:15-9:35 Dang Hai Luong An Analysis of Security Vulnerabilities in JWT Implementations and Proposed Mitigations Xu Feng
9:35-9:55 Janne Hölttä Animation of interactions with dynamic objects using neural networks Jiehong Mo
9:55-10:15 Leonardo Pasquarelli Digital Scent in Mulsemedia applications Patrik Mäki
10:15-10:35 Ken Riippa The Power of Screening Algorithms: Examining Biases and Implications Janne Hölttä
Break      
10:40-11:00 Patrik Mäki Virtual reality toward the internet of senses Tenho Korhonen
11:00-11:20 Touko Nurminen Dynamics of social interactions in social Mixed Reality Wendy Yunuen Arevalo Espinal
11:20-11:40 Kwan Li Machine learning for fog and edge service placement Samath Lenaduwa Lokuge
11:40-12:00 Ashok Dhungana A survey on participant selection for mobile crowdsensing Vipul Kumar
Lunch Break      
13:00-13:20 Samu Kähkönen Adversarial attacks Meri Lemponen
13:20-13:40 Basak Amasya Modern Applications of Software Reliability Growth Models Uuna Saarela
13:40-14:00 Meri Lemponen Secret Management in Infrastructure as Code Berk Türetken
14:00-14:20 Xinjue Wang Regularized Tensor Regression in Image Processing Tutor of the student
Break      
14:30-14:50 Henri Katvio A Comparative Study of Deep Learning Based Video Codecs Xinjue Wang
14:50-15:10 Niko Vanttila Analysing the security properties of the APT package
manager
Farjad Ali
15:10-15:30 Walerius Kyllönen Usability of MFA solutions Samu Kähkönen

Location 3
Fri 09:15-18:00 CS building T2 (Tuomas Aura)
Timeslot Student name Title Opponent
9:15-9:35 Atte Rouhe Kubernetes Cluster Network Model and its Limitations Zainab Ahmad
9:35-9:55 Zsombor Takacs Comparative analysis of Container Network Interface (CNI) implementations Atte Rouhe
9:55-10:15 Ishani Bhardwaj Programming Orchestration of Data
Analysis Workflows in Edge Cloud
Continuum
Zsombor Takacs
10:15-10:35 Roope Karppinen Algorithmic voting power Markus Kähkönen
Break      
10:40-11:00 Markus Kähkönen Algorithmic Power might be changed Murali Abinaov
11:00-11:20 Jinjia Zhang Service Mesh Technical Details Huong Pham Thi Song
11:20-11:40 Parsa Sadri Sinaki A Survey on Security of Microservices Jinjia Zhang, Jawad Zaheer 
11:40-12:00 Songlin Jiang Implementing a Virtual Private Network System among Containers Parsa Sadri Sinaki
Lunch Break      
13:00-13:20 Je-Ruei Yang Docker Container Networking Model and Its Limitations Shweta Jaiswal
13:20-13:40 Rasmus Blässar Zero trust network security model in cloud networks Walerius Kyllönen
13:40-14:00 Pawel Strozanski Profiling stencil computations for GPUs using Astaroth library Tomi Molander
14:00-14:20 Tomi Molander Comparison of NVIDIA and AMD GPU
Performance on Parallel Stencil
Calculations with CUDA-MPI library
Astaroth
Pawel Strozanski
Break      
14:30-14:50 Roope Rasanen Supply chain security in the npm ecosystem Fajar Malik (pre-record video)
14:50-15:10 Apramey Bhat A Security Overview of OAuth 2.0 Roope Rasanen
15:10-15:30 Sandeep Aryal A Survey on Participant Selection for Mobile Crowdsensing Ken Riippa, Henri Katvio

Location 4
Fri 09:15-18:00 CS building T6 (Antti Ylä-Jääski)
Timeslot Student name Title Opponent
9:15-9:35 Vipul Kumar Managing Secrets in Cloud Applications Salem Wollel
9:35-9:55 Roope Kajoluoto Uncertainty estimation in model-based reinforcement learning
with ensembles
Kwan Li
9:55-10:15 Nimer Amol Singh Safe cloud deployment with Docker Iikka Näsälä
10:15-10:35 Javier Rosales Overview of Adversarial attacks for Machine Learning Classifiers Ville Vastamäki
Break      
10:40-11:00 Uuna Saarela Using formal verification with instant messaging protocols Basak Amasya
11:00-11:20 Yu Bai Towards Autonomous Multi-UAV
Wireless Network: A Survey of
Reinforcement Learning-based
Approaches
Yifan Zhang
11:20-11:40 Ville Vastamäki Comparative Analysis of Kubernetes
Security Tools
Andrea Amadei
11:40-12:00 Ali Ghazal Debugging, Logging and Monitoring ML Systems: Techniques and Tools Shuto Kuriyama
Lunch Break      
13:00-13:20 Farjad Ali Web applications session management
security
No opponet
13:20-13:40 Iikka Näsälä Comparative of security tools for the
cloud
Nimer Amol Singh
13:40-14:00 Alina Kostetska How to produce formally verified
cryptographic constructions
Ali Ghazal
14:00-14:20 Shuto Kuriyama Succinct Non-Interactive Arguments Alina Kostetska
Break      
14:30-14:50 Rui Liao Exploring the Threats of White-box Targeted Adversarial Examples for Automatic Speech Recognition Ioana Moflic
14:50-15:10 Ioana Moflic Quantum Natural Language Processing Rui Liao
15:10-15:30 Sanzhar Yeleuov  Adversial Attacks (unsubmitted yet) No opponet

Last modified: Wednesday, 19 April 2023, 10:42 AM