CS-E4000 - Seminar in Computer Science: Internet, Data and Things, 07.01.2019-04.05.2019
This course space end date is set to 04.05.2019 Search Courses: CS-E4000
Assigned topics
Student | Topic |
Akgun, Tolgahan | PK: Is Narrowband-IoT an efficient alternative for large-scale connected devices systems? |
Ali, Amaanat | RW: How deep is the learning used in wireless communications? Can we go deeper? |
Askola, Tommi | GP: Distributed data analytics at the edge |
Bállega Fernández, Héctor | AM1: Mobile edge computing assisted Internet of Things |
Beder, Ahmed | CB: On the conceptual weirdness of indistinguishability obfuscation |
Benitez Fernández, Javier | VTB1: Software Defined Radios in IoT |
Biswas, Shamim | AM1: Mobile edge computing assisted Internet of Things |
Cheng, John | JX2: Comparison of modern deep convolutional neural networks |
Chowdhury, Arnab | AM2: Mobile crowdsensing in Internet of Things |
Cornelissen, Eric | AP1: Formal Verification of Cryptographic Protocols with Tamarin Prover |
Ding, Ruiyang | SR2: Analysis of fallback authentication mechanisms |
Duarte Coscia, Bruno | CZ1: V2X for Autonomous Vehicles |
Duisembiyeva, Akzharkyn | MJ: Fraudulent user identification methods on social media |
Ebeling, Tuomas | JN3: Quantum Key Distribution |
Elhariry, Mohammad |
GI2: Machine Learning for video encoding |
Gavrilenko, Natalia |
KH: Memory-model aware verification tools: A survey |
Gödeke, Alexander |
TB1: Email security |
Hamidy, Gilang |
HG: Survey on pointer analysis (using LLVM) |
Helkavaara, Ilkka | LG1: Designing application programming interfaces for security |
Hietanen, Jussi |
TA2: GPS jamming and spoofing |
Hitz, Andreas |
MMF1: Designing solutions for pervasive displays: A survey |
Hovsepyan, Satenik | SR2: Analysis of fallback authentication mechanisms |
Islam, Md Kamrul |
BJ1: Video Caching, Computing and Delivery in Wireless Mobile Edge Networks |
Jain, Tanvi |
MDF2: Barcodes for mobile computing applications |
Jernström, Harri |
GI1: Machine learning based rate adaption in adaptive HTTP video streaming |
Kanerva, Miika |
MDF1: Function orchestration in serverless computing |
Kankkonen, Miska |
BGA1: Security of Deep Reinforcement Learning Applications |
Kartaev, Timur |
SS2: Electronic identification for citizens |
Klein, Lukas |
MS1: Beyond the Google's BeyondCorp |
Kärkkäinen, Lasse |
AJ: Convergence Analysis of Machine Learning Methods using Dynamic System Theory |
Long, Shiting | VG: DNA Origami Nanostructures |
Lähetkangas, Roope |
TB2: Native code security |
Mammo, Kidus |
AK: State of the Art of IoT Data Model Translation |
Mariani, Giacomo | AP3: Formal Verification of EAP with mCRL2 |
Mulder, Mats |
TG: Automatic detection of rumor from social media |
Mustonen, Auli |
BGA2: A Survey on Intrusion Detection Datasets |
Mäki-Kihniä, Matti |
SS1: Active/Continuous authentication for mobile devices |
Nettey, Noah |
GI1: Machine learning based rate adaption in adaptive HTTP video streaming |
Nguyen, Xuan Nam |
LG2: Tor network |
Oro, Ervin |
JW: Android App Collusion |
Papli, Kaspar | SR1: Defense against server breach attacks |
Perä, Tuomo |
JN1: Quantum computing for solving optimization problems – practical perspective |
Phutrakul, Sataponn |
CZ2: Crowdsourcing in Vehicular Network |
Plaku, Ngadhnjim |
TA1: Bluetooth LE locator and security and privacy |
Pohjalainen, Mikko |
AT: Survey: IPv6 Honeypots for IoT |
Pulkkinen, Joel |
AP2: Formal Verification of Cryptographic Protocols with ProVerif |
Romanov, Aleksandr |
HLT2: Robotic Process Automation and Enterprise Cloud Software Services |
Saxén, Daniel |
JN2: Coverage testing of neural networks |
Seligmann, Robert |
AYJ: AR/VR in the industrial field |
Shmeleva, Ekaterina |
MMF2: Data exchange between smartphones using visible light |
Stigzelius, Oscar |
HF: Service mesh concept and its realizations |
Sulaeman, Adika |
HLT1: Digital Twin for Industrial Edge 4.0: Concepts and Tools |
Tran, Luong Khiem |
MS3: CoAP Congestion control and DoS attacks |
Ujjwal, Sonika |
VH: Microservices for IIoT applications |
Vaarnamo, Antero |
MMF3: User engagement with public displays |
Wang, Hongkuan |
GI2: Machine Learning for video encoding |
Viinikka, Ville |
VTB2: Survey on machine learning for signal detection |
Vobilisetty, Sriram Varun |
JX1: Lightweight modern convolutional object detectors |
Xia, Yuxi |
SM: Privacy-Preserving Machine Learning using trusted hardware |
Yudhistira, Christian |
MS2: Access Control for IoT devices |
Zhuravleva, Aleksandra |
BJ2: Intelligent Edge Computing and Caching Techniques in Future Wireless Networks |
Last modified: Friday, 18 January 2019, 11:36 AM