StudentTopic
TomaszCzajęckiAYJ:  WEB-based mobile augmented reality
MichalCzuperAYJ:  WEB-based mobile augmented reality
WeiSun SJ: Benchmarking MIMIC-IV medical code prediction with NLP models
WojciechGeislerMK: Real-time networking
JuliaSulinaLC: Approaches to building secure software systems
TommiJäskeJB: Service enumeration techniques in microservices architectures
ChuhanJiaoPM: Bayesian preference learning and recommender systems
Zara WajidButtTA: Recent developments security protocol standards
MichałOsadnikJR2: Safety of cryptographic hash functions and approaches to break them
ClaudiuMihaliER: Semantic description of policies for intelligent services in distributed environments
BrentCareyLC: Approaches to building secure software systems
YunhaoYuanRM1: Predict unplanned events with Twitter data
ErikasEigelisMS2: Analyzing unknown, unexpected, and sometimes unwanted features in modern messaging protocols and platforms
JosephAttiehBl2:Adversarial machine learning attacks
HamnaZahidTA: Recent developments security protocol standards
Jose LuisMartin NavarroVTB: Resource allocation using game theory in LPWAN
NiiloLappiJR1: Proof systems for the propositional logic
HuyNgoBGAT: Robustness and Privacy in Federated Learning
SvitlanaChaplinskaMS1: Security for Dynamic Host Configuration Protocol (DHCP)
JunshengTanER: Semantic description of policies for intelligent services in distributed environments
 ZeyuLiangMS1: Security for Dynamic Host Configuration Protocol (DHCP)
SofiaBogdanovaJR3: Software package management with SAT and other combinatorial search methods
UjjwolDandekhyaRM2: How do people make privacy decisions
AngelLomeli RamosASA: Use of GSMA consumer RSP protocol in the IoT domain and its security implication
NikolaNemesLC: Approaches to building secure software systems
AleksandarNedakovićBl2:Adversarial machine learning attacks
AxelNeergaardHow to balance the individual freedom and crime in the cryptocurrency transactions
Swetha LathaMeeranathRM1: Predict unplanned events with Twitter data
RoopeLehikoinenAP: Formal Verification of Cryptographic Protocols
AnttiKuikkaTA: Recent developments security protocol standards
SanteriVolkovJB: Service enumeration techniques in microservices architectures
AnmolSinhaJH1: Instrumentation of Distributed Computing Systems
TAHSINURRAHMANWM: Machine Learning-based Traffic Flow Prediction
GustavLarssonAN: Auto time series forecasting for the regression problems
NafisKamalWM: Machine Learning-based Traffic Flow Prediction
AsadTariqTA: Recent developments security protocol standards
LassiKoponenVTB: Resource allocation using game theory in LPWAN
JaniSaranpääHD: TinyML as-a-Service - bringing Machine Learning inference to the deepest IoT edge
Rafi KurniaPutraJH1: Instrumentation of Distributed Computing Systems
JoonatanMäkinenGI: Foveated Video Quality Metrics
BraulioGutierrezMS2: Analyzing unknown, unexpected, and sometimes unwanted features in modern messaging protocols and platforms
HaishanWangSDP1: Tractable Deep Density Estimation with SPNs
SamiLaineJH1: Instrumentation of Distributed Computing Systems
JaakkoKoskelaBGAT: Robustness and Privacy in Federated Learning
LuLinBL1: Adversarial machine learning defenses
AlazarAbebawCUSTOM: Memory vulnerability types, attacks and mitigation methods”
SandeepAryalCUSTOM: Cloud Gaming and Local Gaming Streaming
Ayoub ChouakCUSTOM: Side-channel attacks and defences
AnupamDahalAA: Causal reasoning in reinforcement learning
AdhirathKabraTA: Recent Development security protocol standards
Jarl-OttoSiikasmaaAP: Formal Verification of Cryptographic Protocols
Henri-MatiasTuomaalaJH2: Simulating 5G for Distributed System Communications
RavinduRajathevaBL1: Adversarial machine learning defenses
VeeraHänninen HD: TinyML as-a-Service - bringing Machine Learning inference to the deepest IoT edge

Last modified: Tuesday, 26 January 2021, 10:14 AM