CS-E4000 - Seminar in Computer Science D, Lecture, 9.1.2023-21.4.2023
Kurssiasetusten perusteella kurssi on päättynyt 21.04.2023 Etsi kursseja: CS-E4000
Seminar Day Schedule
Suorituksen vaatimukset
Remember to bring your own laptop with the slides and questions for the student you are opponent for.
Location 1Fri 09:15-18:00 R037/1021-1022 AS3 Saab Space (Jan-Mikael Rybicki) | |||
Timeslot | Student name | Title | Opponent |
9:15-9:35 | Jana Fischer | Likelihood-free Model Selection | Fan Yuanhao |
9:35-9:55 | Fan Yuanhao | Approahes to Accelerate Mesh Deformation in Certain Practical Situations | Jana Fischer |
9:55-10:15 | Xu Feng | Review on the security of OpenID Connect | Anoosha Sajid (pre-record video) |
10:15-10:35 | Shweta Jaiswal | Migration from Monolithic Architecture to Microservices: Challenges and Opportunities | Je-Ruei Yang |
Break | |||
10:40-11:00 | Huong Pham Thi Song | Kubernetes Approach to Public Key Infrastructure | Sandeep Aryal |
11:00-11:20 | Jiehong Mo | Audio-Viusal Speaker Recognition on Deep Learning: A Survey | Ishani Bhardwaj |
11:20-11:40 | Chathurangi Edussuriya | Blockchain and consensus algorithms: security vulnerabilities and tradeoffs | Praewpiraya Wiwatphonthana |
11:40-12:00 | Tenho Korhonen | Virtual reality toward the internet of senses | Touko Nurminen |
Lunch Break | |||
13:00-13:20 | Jawad Zaheer | Microservices: Describing usage based upon granularity | Ashok Dhungana |
13:20-13:40 | Salem Wollel | Effects of habituation on security warnings and ways to minimize it | Javier Rosales |
13:40-14:00 | Yifan Zhang | Artificial Noise Management in Backscatter Communication: A Review | Bai Yu |
14:00-14:20 | Phong Tran | Kubernetes for greener environment | Songlin Jiang |
Break | |||
14:30-14:50 | Praewpiraya Wiwatphonthana | Security and Privacy in Metaverse | Chathurangi Edussuriya |
14:50-15:10 | Samath Lenaduwa Lokuge | Using Deep Reinforcement Learning to solve Fog Computing and Service Placement Problems | Roope Kajoluoto |
15:10-15:30 | Murali Abinaov | The Biases of Algorithms | Roope Karppinen |
15:30-15:50 | Andrea Amadei | Energy saving capabilities of Kubernetes | Zainab Khan (pre-record video) |
Break | |||
16:00-16:20 | Wendy Yunuen Arevalo Espinal | Gaze Interactions in Virtual Characters and Their Impact on Player Experience | Leonardo Pasquarelli |
16:20-16:40 | Berk Türetken | Can we certainly trust in Microsoft & Google Authenticators? Evaluation of Security Vulnerabilities of Microsoft & Google Authenticators |
Apramey Bhat |
16:40-17:00 | Zainab Ahmad | Managing Secrets in Cloud Applications | Philipp Giersfeld |
17:00-17:20 | Philipp Giersfeld | Review of recent advances of leveraging symbolic execution for fuzzing | Niko Vanttila |
Location 2
Fri 09:15-18:00 CS building T5 (Wencan Mao) | |||
Timeslot | Student name | Title | Opponent |
9:15-9:35 | Dang Hai Luong | An Analysis of Security Vulnerabilities in JWT Implementations and Proposed Mitigations | Xu Feng |
9:35-9:55 | Janne Hölttä | Animation of interactions with dynamic objects using neural networks | Jiehong Mo |
9:55-10:15 | Leonardo Pasquarelli | Digital Scent in Mulsemedia applications | Patrik Mäki |
10:15-10:35 | Ken Riippa | The Power of Screening Algorithms: Examining Biases and Implications | Janne Hölttä |
Break | |||
10:40-11:00 | Patrik Mäki | Virtual reality toward the internet of senses | Tenho Korhonen |
11:00-11:20 | Touko Nurminen | Dynamics of social interactions in social Mixed Reality | Wendy Yunuen Arevalo Espinal |
11:20-11:40 | Kwan Li | Machine learning for fog and edge service placement | Samath Lenaduwa Lokuge |
11:40-12:00 | Ashok Dhungana | A survey on participant selection for mobile crowdsensing | Vipul Kumar |
Lunch Break | |||
13:00-13:20 | Samu Kähkönen | Adversarial attacks | Meri Lemponen |
13:20-13:40 | Basak Amasya | Modern Applications of Software Reliability Growth Models | Uuna Saarela |
13:40-14:00 | Meri Lemponen | Secret Management in Infrastructure as Code | Berk Türetken |
14:00-14:20 | Xinjue Wang | Regularized Tensor Regression in Image Processing | Tutor of the student |
Break | |||
14:30-14:50 | Henri Katvio | A Comparative Study of Deep Learning Based Video Codecs | Xinjue Wang |
14:50-15:10 | Niko Vanttila | Analysing the security properties of the APT package manager |
Farjad Ali |
15:10-15:30 | Walerius Kyllönen | Usability of MFA solutions | Samu Kähkönen |
Location 3
Fri 09:15-18:00 CS building T2 (Tuomas Aura) | |||
Timeslot | Student name | Title | Opponent |
9:15-9:35 | Atte Rouhe | Kubernetes Cluster Network Model and its Limitations | Zainab Ahmad |
9:35-9:55 | Zsombor Takacs | Comparative analysis of Container Network Interface (CNI) implementations | Atte Rouhe |
9:55-10:15 | Ishani Bhardwaj | Programming Orchestration of Data Analysis Workflows in Edge Cloud Continuum |
Zsombor Takacs |
10:15-10:35 | Roope Karppinen | Algorithmic voting power | Markus Kähkönen |
Break | |||
10:40-11:00 | Markus Kähkönen | Algorithmic Power might be changed | Murali Abinaov |
11:00-11:20 | Jinjia Zhang | Service Mesh Technical Details | Huong Pham Thi Song |
11:20-11:40 | Parsa Sadri Sinaki | A Survey on Security of Microservices | Jinjia Zhang, Jawad Zaheer |
11:40-12:00 | Songlin Jiang | Implementing a Virtual Private Network System among Containers | Parsa Sadri Sinaki |
Lunch Break | |||
13:00-13:20 | Je-Ruei Yang | Docker Container Networking Model and Its Limitations | Shweta Jaiswal |
13:20-13:40 | Rasmus Blässar | Zero trust network security model in cloud networks | Walerius Kyllönen |
13:40-14:00 | Pawel Strozanski | Profiling stencil computations for GPUs using Astaroth library | Tomi Molander |
14:00-14:20 | Tomi Molander | Comparison of NVIDIA and AMD GPU Performance on Parallel Stencil Calculations with CUDA-MPI library Astaroth |
Pawel Strozanski |
Break | |||
14:30-14:50 | Roope Rasanen | Supply chain security in the npm ecosystem | Fajar Malik (pre-record video) |
14:50-15:10 | Apramey Bhat | A Security Overview of OAuth 2.0 | Roope Rasanen |
15:10-15:30 | Sandeep Aryal | A Survey on Participant Selection for Mobile Crowdsensing | Ken Riippa, Henri Katvio |
Location 4
Fri 09:15-18:00 CS building T6 (Antti Ylä-Jääski) | |||
Timeslot | Student name | Title | Opponent |
9:15-9:35 | Vipul Kumar | Managing Secrets in Cloud Applications | Salem Wollel |
9:35-9:55 | Roope Kajoluoto | Uncertainty estimation in model-based reinforcement learning with ensembles |
Kwan Li |
9:55-10:15 | Nimer Amol Singh | Safe cloud deployment with Docker | Iikka Näsälä |
10:15-10:35 | Javier Rosales | Overview of Adversarial attacks for Machine Learning Classifiers | Ville Vastamäki |
Break | |||
10:40-11:00 | Uuna Saarela | Using formal verification with instant messaging protocols | Basak Amasya |
11:00-11:20 | Yu Bai | Towards Autonomous Multi-UAV Wireless Network: A Survey of Reinforcement Learning-based Approaches |
Yifan Zhang |
11:20-11:40 | Ville Vastamäki | Comparative Analysis of Kubernetes Security Tools |
Andrea Amadei |
11:40-12:00 | Ali Ghazal | Debugging, Logging and Monitoring ML Systems: Techniques and Tools | Shuto Kuriyama |
Lunch Break | |||
13:00-13:20 | Farjad Ali | Web applications session management security |
No opponet |
13:20-13:40 | Iikka Näsälä | Comparative of security tools for the cloud |
Nimer Amol Singh |
13:40-14:00 | Alina Kostetska | How to produce formally verified cryptographic constructions |
Ali Ghazal |
14:00-14:20 | Shuto Kuriyama | Succinct Non-Interactive Arguments | Alina Kostetska |
Break | |||
14:30-14:50 | Rui Liao | Exploring the Threats of White-box Targeted Adversarial Examples for Automatic Speech Recognition | Ioana Moflic |
14:50-15:10 | Ioana Moflic | Quantum Natural Language Processing | Rui Liao |
15:10-15:30 | Sanzhar Yeleuov | Adversial Attacks (unsubmitted yet) | No opponet |
Viimeksi muutettu: keskiviikkona 19. huhtikuuta 2023, 10.42