CS-E4000 - Seminar in Computer Science D, 11.01.2021-30.04.2021
This course space end date is set to 30.04.2021 Search Courses: CS-E4000
Assigned topics
Completion requirements
Student | Topic | |
Tomasz | Czajęcki | AYJ: WEB-based mobile augmented reality |
Michal | Czuper | AYJ: WEB-based mobile augmented reality |
Wei | Sun | SJ: Benchmarking MIMIC-IV medical code prediction with NLP models |
Wojciech | Geisler | MK: Real-time networking |
Julia | Sulina | LC: Approaches to building secure software systems |
Tommi | Jäske | JB: Service enumeration techniques in microservices architectures |
Chuhan | Jiao | PM: Bayesian preference learning and recommender systems |
Zara Wajid | Butt | TA: Recent developments security protocol standards |
Michał | Osadnik | JR2: Safety of cryptographic hash functions and approaches to break them |
Claudiu | Mihali | ER: Semantic description of policies for intelligent services in distributed environments |
Brent | Carey | LC: Approaches to building secure software systems |
Yunhao | Yuan | RM1: Predict unplanned events with Twitter data |
Erikas | Eigelis | MS2: Analyzing unknown, unexpected, and sometimes unwanted features in modern messaging protocols and platforms |
Joseph | Attieh | Bl2:Adversarial machine learning attacks |
Hamna | Zahid | TA: Recent developments security protocol standards |
Jose Luis | Martin Navarro | VTB: Resource allocation using game theory in LPWAN |
Niilo | Lappi | JR1: Proof systems for the propositional logic |
Huy | Ngo | BGAT: Robustness and Privacy in Federated Learning |
Svitlana | Chaplinska | MS1: Security for Dynamic Host Configuration Protocol (DHCP) |
Junsheng | Tan | ER: Semantic description of policies for intelligent services in distributed environments |
Zeyu | Liang | MS1: Security for Dynamic Host Configuration Protocol (DHCP) |
Sofia | Bogdanova | JR3: Software package management with SAT and other combinatorial search methods |
Ujjwol | Dandekhya | RM2: How do people make privacy decisions |
Angel | Lomeli Ramos | ASA: Use of GSMA consumer RSP protocol in the IoT domain and its security implication |
Nikola | Nemes | LC: Approaches to building secure software systems |
Aleksandar | Nedaković | Bl2:Adversarial machine learning attacks |
Axel | Neergaard | How to balance the individual freedom and crime in the cryptocurrency transactions |
Swetha Latha | Meeranath | RM1: Predict unplanned events with Twitter data |
Roope | Lehikoinen | AP: Formal Verification of Cryptographic Protocols |
Antti | Kuikka | TA: Recent developments security protocol standards |
Santeri | Volkov | JB: Service enumeration techniques in microservices architectures |
Anmol | Sinha | JH1: Instrumentation of Distributed Computing Systems |
TAHSINUR | RAHMAN | WM: Machine Learning-based Traffic Flow Prediction |
Gustav | Larsson | AN: Auto time series forecasting for the regression problems |
Nafis | Kamal | WM: Machine Learning-based Traffic Flow Prediction |
Asad | Tariq | TA: Recent developments security protocol standards |
Lassi | Koponen | VTB: Resource allocation using game theory in LPWAN |
Jani | Saranpää | HD: TinyML as-a-Service - bringing Machine Learning inference to the deepest IoT edge |
Rafi Kurnia | Putra | JH1: Instrumentation of Distributed Computing Systems |
Joonatan | Mäkinen | GI: Foveated Video Quality Metrics |
Braulio | Gutierrez | MS2: Analyzing unknown, unexpected, and sometimes unwanted features in modern messaging protocols and platforms |
Haishan | Wang | SDP1: Tractable Deep Density Estimation with SPNs |
Sami | Laine | JH1: Instrumentation of Distributed Computing Systems |
Jaakko | Koskela | BGAT: Robustness and Privacy in Federated Learning |
Lu | Lin | BL1: Adversarial machine learning defenses |
Alazar | Abebaw | CUSTOM: Memory vulnerability types, attacks and mitigation methods” |
Sandeep | Aryal | CUSTOM: Cloud Gaming and Local Gaming Streaming |
Ayoub | Chouak | CUSTOM: Side-channel attacks and defences |
Anupam | Dahal | AA: Causal reasoning in reinforcement learning |
Adhirath | Kabra | TA: Recent Development security protocol standards |
Jarl-Otto | Siikasmaa | AP: Formal Verification of Cryptographic Protocols |
Henri-Matias | Tuomaala | JH2: Simulating 5G for Distributed System Communications |
Ravindu | Rajatheva | BL1: Adversarial machine learning defenses |
Veera | Hänninen | HD: TinyML as-a-Service - bringing Machine Learning inference to the deepest IoT edge |
Last modified: Tuesday, 26 January 2021, 10:14 AM