Name (who sends the draft) Email  Title Opponent (who sends the feedback)
Sandeep Aryal sandeep.aryal@aalto.fi A Survey on Participant Selection for Mobile Crowdsensing Ken Riippa
Songlin Jiang songlin.jiang@aalto.fi Implementing a Virtual Private Network System among Containers Parsa Sadri Sinaki
Parsa Sadri Sinaki parsa.sadrisinaki@aalto.fi A Survey on Security of Microservices Jinjia Zhang
Dang Hai Luong hai.luong@aalto.fi An Analysis of Security Vulnerabilities in JWT Implementations and Proposed Mitigations Xu Feng
Xu Feng xu.feng@aalto.fi Review on the security of OpenID Connect Anoosha Sajid
Jinjia Zhang jinjia.zhang@aalto.fi Service Mesh Technical Details Huong Pham Thi Song
Janne Hölttä janne.s.holtta@aalto.fi Animation of interactions with dynamic objects using neural networks Jiehong Mo
Shweta Jaiswal shweta.jaiswal@aalto.fi Migration from Monolithic Architecture to Microservices: Challenges and Opportunities Je-Ruei Yang
Leonardo Pasquarelli leonardo.pasquarelli@aalto.fi Digital Scent in Mulsemedia applications Patrik Mäki
Huong Pham Thi Song songhuong.phamthi@aalto.fi Kubernetes Approach to Public Key Infrastructure Sandeep Aryal
Anoosha Sajid anoosha.sajid@aalto.fi The Password Conundrum: Rethinking Authentication for the Digital Age Dang Hai Luong
Jiehong Mo jiehong.mo@aalto.fi Audio-Viusal Speaker Recognition on Deep Learning: A Survey Ishani Bhardwaj
Ken Riippa ken.riippa@aalto.fi The Power of Screening Algorithms: Examining Biases and Implications Janne Hölttä
Chathurangi Edussuriya chathurangi.edussuriya@aalto.fi Blockchain and consensus algorithms: security vulnerabilities and tradeoffs Praewpiraya Wiwatphonthana
Patrik Mäki patrik.maki@aalto.fi Virtual reality toward the internet of senses Tenho Korhonen
Jana Fischer jana.fischer@aalto.fi Likelihood-free Model Selection Fan Yuanhao
Zainab Khan zainab.khan@aalto.fi Microservices - when and how to use them Phong Tran
Je-Ruei Yang je-ruei.yang@aalto.fi Docker Container Networking Model and Its Limitations Shweta Jaiswal
Pawel Strozanski pawel.strozanski@aalto.fi Profiling stencil computations for GPUs using Astaroth library Tomi Molander
Touko Nurminen touko.nurminen@aalto.fi Dynamics of social interactions in social Mixed Reality Wendy Yunuen Arevalo Espinal
Tenho Korhonen tenho.korhonen@aalto.fi Virtual reality toward the internet of senses Touko Nurminen
Jawad Zaheer jawad.zaheer@aalto.fi Microservices: Describing usage based upon granularity Ashok Dhungana
Yifan Zhang yifan.1.zhang@aalto.fi Artificial Noise Management in Backscatter Communication: A Review Bai Yu
Phong Tran phong.tran@aalto.fi Kubernetes for greener environment Songlin Jiang
Kwan Li kwan.li@aalto.fi Machine learning for fog and edge service placement Samath Lenaduwa Lokuge
Praewpiraya Wiwatphonthana praewpiraya.wiwatphonthana@aalto.fi Security and Privacy in Metaverse Chathurangi Edussuriya
Samath Lenaduwa Lokuge samath.lenaduwalokuge@aalto.fi Using Deep Reinforcement Learning to solve Fog Computing and Service Placement Problems Roope Kajoluoto
Roope Karppinen roope.karppinen@aalto.fi Algorithmic voting power Markus Kähkönen
Fan Yuanhao yuanhao.fan@aalto.fi Approahes to Accelerate Mesh Deformation in Certain Practical Situations Jana Fischer
Murali Abinaov muraliamudha.abinaov@aalto.fi The Biases of Algorithms Roope Karppinen
Ashok Dhungana ashok.dhungana@aalto.fi A survey on participant selection for mobile crowdsensing Vipul Kumar
Atte Rouhe atte.rouhe@aalto.fi Kubernetes Cluster Network Model and its Limitations Zainab Ahmad
Samu Kähkönen samu.kahkonen@aalto.fi Adversarial attacks Meri Lemponen
Andrea Amadei andrea.amadei@aalto.fi Energy saving capabilities of Kubernetes Zainab Khan
Wendy Yunuen Arevalo Espinal wendyyunuen.arevaloespinal@aalto.fi Gaze Interactions in Virtual Characters and Their Impact on Player Experience Leonardo Pasquarelli
Basak Amasya basak.amasya@aalto.fi Modern Applications of Software Reliability Growth Models Uuna Saarela
Meri Lemponen meri.lemponen@aalto.fi Secret Management in Infrastructure as Code Berk Türetken
Xinjue Wang xinjue.wang@aalto.fi Regularized Tensor Regression in Image Processing Henri Katvio
Markus Kähkönen markus.kahkonen@aalto.fi Algorithmic Power might be changed Murali Abinaov
Jaakko Perttula jaakko.perttula@aalto.fi Linux network virtualization Jawad Zaheer
Berk Türetken berk.turetken@aalto.fi Can we certainly trust in Microsoft &
Google Authenticators? Evaluation of
Security Vulnerabilities of Microsoft &
Google Authenticators
Apramey Bhat
Vipul Kumar vipul.kumar@aalto.fi Managing Secrets in Cloud Applications Salem Wollel
Zainab Ahmad zainab.ahmad@aalto.fi Managing Secrets in Cloud Applications Philipp Giersfeld
Henri Katvio henri.katvio@aalto.fi A Comparative Study of Deep Learning Based Video Codecs Xinjue Wang
Zsombor Takacs zsombor.takacs@aalto.fi Comparative analysis of Container Network Interface (CNI) implementations Atte Rouhe
Salem Wollel salemgetachew.wollel@aalto.fi Effects of habituation on security warnings and ways to minimize it Javier Rosales
Roope Kajoluoto roope.kajoluoto@aalto.fi Uncertainty estimation in model-based reinforcement learning
with ensembles
Kwan Li
Roope Rasanen roope.rasanen@aalto.fi Supply chain security in the npm ecosystem Fajar Malik
Nimer Amol Singh nimer.singh@aalto.fi Safe cloud deployment with Docker Iikka Näsälä
Fajar Malik fajar.malik@aalto.fi Psychometry for Researching Usable Security Rasmus Blässar
Javier Rosales javieralberto.rosalesflores@aalto.fi Overview of Adversarial attacks for Machine Learning Classifiers Ville Vastamäki
Niko Vanttila niko.vanttila@aalto.fi Analysing the security properties of the APT package
manager
Farjad Ali
Walerius Kyllönen walerius.kyllonen@aalto.fi Usability of MFA solutions Samu Kähkönen
Uuna Saarela uuna.saarela@aalto.fi Using formal verification with instant messaging protocols Basak Amasya
Apramey Bhat apramey.bhat@aalto.fi A Security Overview of OAuth 2.0 Roope Rasanen
Yu Bai yu.bai@aalto.fi Towards Autonomous Multi-UAV
Wireless Network: A Survey of
Reinforcement Learning-based
Approaches
Yifan Zhang
Tomi Molander tomi.molander@aalto.fi Comparison of NVIDIA and AMD GPU
Performance on Parallel Stencil
Calculations with CUDA-MPI library
Astaroth
Pawel Strozanski
Philipp Giersfeld philipp.giersfeld@aalto.fi Review of recent advances of leveraging symbolic execution for fuzzing Niko Vanttila
Rasmus Blässar rasmus.blassar@aalto.fi Zero trust network security model in cloud networks Walerius Kyllönen
Ville Vastamäki ville.vastamaki@aalto.fi Comparative Analysis of Kubernetes
Security Tools
Andrea Amadei
Ali Ghazal ali.ghazal@aalto.fi Debugging, Logging and Monitoring ML Systems: Techniques and Tools Shuto Kuriyama
Farjad Ali farjad.ali@aalto.fi Web applications session management
security
Jaakko Perttula
Iikka Näsälä iikka.nasala@aalto.fi Comparative of security tools for the
cloud
Nimer Amol Singh
Ishani Bhardwaj ishani.bhardwaj@aalto.fi Programming Orchestration of Data
Analysis Workflows in Edge Cloud
Continuum
Zsombor Takacs
Alina Kostetska alina.kostetska@aalto.fi How to produce formally verified
cryptographic constructions
Ali Ghazal
Shuto Kuriyama shuto.kuriyama@aalto.fi Succinct Non-Interactive Arguments Alina Kostetska


Viimeksi muutettu: torstaina 9. maaliskuuta 2023, 16.01