CS-E4000 - Seminar in Computer Science D, Lecture, 9.1.2023-21.4.2023
This course space end date is set to 21.04.2023 Search Courses: CS-E4000
Students and Opponents
Completion requirements
Name (who sends the draft) | Title | Opponent (who sends the feedback) | ||||||||||
Sandeep Aryal | sandeep.aryal@aalto.fi | A Survey on Participant Selection for Mobile Crowdsensing | Ken Riippa | |||||||||
Songlin Jiang | songlin.jiang@aalto.fi | Implementing a Virtual Private Network System among Containers | Parsa Sadri Sinaki | |||||||||
Parsa Sadri Sinaki | parsa.sadrisinaki@aalto.fi | A Survey on Security of Microservices | Jinjia Zhang | |||||||||
Dang Hai Luong | hai.luong@aalto.fi | An Analysis of Security Vulnerabilities in JWT Implementations and Proposed Mitigations | Xu Feng | |||||||||
Xu Feng | xu.feng@aalto.fi | Review on the security of OpenID Connect | Anoosha Sajid | |||||||||
Jinjia Zhang | jinjia.zhang@aalto.fi | Service Mesh Technical Details | Huong Pham Thi Song | |||||||||
Janne Hölttä | janne.s.holtta@aalto.fi | Animation of interactions with dynamic objects using neural networks | Jiehong Mo | |||||||||
Shweta Jaiswal | shweta.jaiswal@aalto.fi | Migration from Monolithic Architecture to Microservices: Challenges and Opportunities | Je-Ruei Yang | |||||||||
Leonardo Pasquarelli | leonardo.pasquarelli@aalto.fi | Digital Scent in Mulsemedia applications | Patrik Mäki | |||||||||
Huong Pham Thi Song | songhuong.phamthi@aalto.fi | Kubernetes Approach to Public Key Infrastructure | Sandeep Aryal | |||||||||
Anoosha Sajid | anoosha.sajid@aalto.fi | The Password Conundrum: Rethinking Authentication for the Digital Age | Dang Hai Luong | |||||||||
Jiehong Mo | jiehong.mo@aalto.fi | Audio-Viusal Speaker Recognition on Deep Learning: A Survey | Ishani Bhardwaj | |||||||||
Ken Riippa | ken.riippa@aalto.fi | The Power of Screening Algorithms: Examining Biases and Implications | Janne Hölttä | |||||||||
Chathurangi Edussuriya | chathurangi.edussuriya@aalto.fi | Blockchain and consensus algorithms: security vulnerabilities and tradeoffs | Praewpiraya Wiwatphonthana | |||||||||
Patrik Mäki | patrik.maki@aalto.fi | Virtual reality toward the internet of senses | Tenho Korhonen | |||||||||
Jana Fischer | jana.fischer@aalto.fi | Likelihood-free Model Selection | Fan Yuanhao | |||||||||
Zainab Khan | zainab.khan@aalto.fi | Microservices - when and how to use them | Phong Tran | |||||||||
Je-Ruei Yang | je-ruei.yang@aalto.fi | Docker Container Networking Model and Its Limitations | Shweta Jaiswal | |||||||||
Pawel Strozanski | pawel.strozanski@aalto.fi | Profiling stencil computations for GPUs using Astaroth library | Tomi Molander | |||||||||
Touko Nurminen | touko.nurminen@aalto.fi | Dynamics of social interactions in social Mixed Reality | Wendy Yunuen Arevalo Espinal | |||||||||
Tenho Korhonen | tenho.korhonen@aalto.fi | Virtual reality toward the internet of senses | Touko Nurminen | |||||||||
Jawad Zaheer | jawad.zaheer@aalto.fi | Microservices: Describing usage based upon granularity | Ashok Dhungana | |||||||||
Yifan Zhang | yifan.1.zhang@aalto.fi | Artificial Noise Management in Backscatter Communication: A Review | Bai Yu | |||||||||
Phong Tran | phong.tran@aalto.fi | Kubernetes for greener environment | Songlin Jiang | |||||||||
Kwan Li | kwan.li@aalto.fi | Machine learning for fog and edge service placement | Samath Lenaduwa Lokuge | |||||||||
Praewpiraya Wiwatphonthana | praewpiraya.wiwatphonthana@aalto.fi | Security and Privacy in Metaverse | Chathurangi Edussuriya | |||||||||
Samath Lenaduwa Lokuge | samath.lenaduwalokuge@aalto.fi | Using Deep Reinforcement Learning to solve Fog Computing and Service Placement Problems | Roope Kajoluoto | |||||||||
Roope Karppinen | roope.karppinen@aalto.fi | Algorithmic voting power | Markus Kähkönen | |||||||||
Fan Yuanhao | yuanhao.fan@aalto.fi | Approahes to Accelerate Mesh Deformation in Certain Practical Situations | Jana Fischer | |||||||||
Murali Abinaov | muraliamudha.abinaov@aalto.fi | The Biases of Algorithms | Roope Karppinen | |||||||||
Ashok Dhungana | ashok.dhungana@aalto.fi | A survey on participant selection for mobile crowdsensing | Vipul Kumar | |||||||||
Atte Rouhe | atte.rouhe@aalto.fi | Kubernetes Cluster Network Model and its Limitations | Zainab Ahmad | |||||||||
Samu Kähkönen | samu.kahkonen@aalto.fi | Adversarial attacks | Meri Lemponen | |||||||||
Andrea Amadei | andrea.amadei@aalto.fi | Energy saving capabilities of Kubernetes | Zainab Khan | |||||||||
Wendy Yunuen Arevalo Espinal | wendyyunuen.arevaloespinal@aalto.fi | Gaze Interactions in Virtual Characters and Their Impact on Player Experience | Leonardo Pasquarelli | |||||||||
Basak Amasya | basak.amasya@aalto.fi | Modern Applications of Software Reliability Growth Models | Uuna Saarela | |||||||||
Meri Lemponen | meri.lemponen@aalto.fi | Secret Management in Infrastructure as Code | Berk Türetken | |||||||||
Xinjue Wang | xinjue.wang@aalto.fi | Regularized Tensor Regression in Image Processing | Henri Katvio | |||||||||
Markus Kähkönen | markus.kahkonen@aalto.fi | Algorithmic Power might be changed | Murali Abinaov | |||||||||
Jaakko Perttula | jaakko.perttula@aalto.fi | Linux network virtualization | Jawad Zaheer | |||||||||
Berk Türetken | berk.turetken@aalto.fi | Can we certainly trust in Microsoft & Google Authenticators? Evaluation of Security Vulnerabilities of Microsoft & Google Authenticators |
Apramey Bhat | |||||||||
Vipul Kumar | vipul.kumar@aalto.fi | Managing Secrets in Cloud Applications | Salem Wollel | |||||||||
Zainab Ahmad | zainab.ahmad@aalto.fi | Managing Secrets in Cloud Applications | Philipp Giersfeld | |||||||||
Henri Katvio | henri.katvio@aalto.fi | A Comparative Study of Deep Learning Based Video Codecs | Xinjue Wang | |||||||||
Zsombor Takacs | zsombor.takacs@aalto.fi | Comparative analysis of Container Network Interface (CNI) implementations | Atte Rouhe | |||||||||
Salem Wollel | salemgetachew.wollel@aalto.fi | Effects of habituation on security warnings and ways to minimize it | Javier Rosales | |||||||||
Roope Kajoluoto | roope.kajoluoto@aalto.fi | Uncertainty estimation in model-based reinforcement learning with ensembles |
Kwan Li | |||||||||
Roope Rasanen | roope.rasanen@aalto.fi | Supply chain security in the npm ecosystem | Fajar Malik | |||||||||
Nimer Amol Singh | nimer.singh@aalto.fi | Safe cloud deployment with Docker | Iikka Näsälä | |||||||||
Fajar Malik | fajar.malik@aalto.fi | Psychometry for Researching Usable Security | Rasmus Blässar | |||||||||
Javier Rosales | javieralberto.rosalesflores@aalto.fi | Overview of Adversarial attacks for Machine Learning Classifiers | Ville Vastamäki | |||||||||
Niko Vanttila | niko.vanttila@aalto.fi | Analysing the security properties of the APT package manager |
Farjad Ali | |||||||||
Walerius Kyllönen | walerius.kyllonen@aalto.fi | Usability of MFA solutions | Samu Kähkönen | |||||||||
Uuna Saarela | uuna.saarela@aalto.fi | Using formal verification with instant messaging protocols | Basak Amasya | |||||||||
Apramey Bhat | apramey.bhat@aalto.fi | A Security Overview of OAuth 2.0 | Roope Rasanen | |||||||||
Yu Bai | yu.bai@aalto.fi | Towards Autonomous Multi-UAV Wireless Network: A Survey of Reinforcement Learning-based Approaches |
Yifan Zhang | |||||||||
Tomi Molander | tomi.molander@aalto.fi | Comparison of NVIDIA and AMD GPU Performance on Parallel Stencil Calculations with CUDA-MPI library Astaroth |
Pawel Strozanski | |||||||||
Philipp Giersfeld | philipp.giersfeld@aalto.fi | Review of recent advances of leveraging symbolic execution for fuzzing | Niko Vanttila | |||||||||
Rasmus Blässar | rasmus.blassar@aalto.fi | Zero trust network security model in cloud networks | Walerius Kyllönen | |||||||||
Ville Vastamäki | ville.vastamaki@aalto.fi | Comparative Analysis of Kubernetes Security Tools |
Andrea Amadei | |||||||||
Ali Ghazal | ali.ghazal@aalto.fi | Debugging, Logging and Monitoring ML Systems: Techniques and Tools | Shuto Kuriyama | |||||||||
Farjad Ali | farjad.ali@aalto.fi | Web applications session management security |
Jaakko Perttula | |||||||||
Iikka Näsälä | iikka.nasala@aalto.fi | Comparative of security tools for the cloud |
Nimer Amol Singh | |||||||||
Ishani Bhardwaj | ishani.bhardwaj@aalto.fi | Programming Orchestration of Data Analysis Workflows in Edge Cloud Continuum |
Zsombor Takacs | |||||||||
Alina Kostetska | alina.kostetska@aalto.fi | How to produce formally verified cryptographic constructions |
Ali Ghazal | |||||||||
Shuto Kuriyama | shuto.kuriyama@aalto.fi | Succinct Non-Interactive Arguments | Alina Kostetska |
Last modified: Thursday, 9 March 2023, 4:01 PM