| Name | Project | Start | Complete |
|---|---|---|---|
| Stephen Ly | A Secure Platform for Distributed Learning on Sensitive Data | Spring 2022 | Spring 2023 |
| Alexandr Nosenko | Learning the Rules of Password Modification with Recurrent Neural Networks | Spring 2021 | Fall 2021 |
| Arun Reddy | An Empirical Study on the Usability and Security of CAPTCHAs | Spring 2021 | Spring 2022 |
| Francisco Vega | An Empirical Study on the Usability and Security of Two-Factor Authentication | Spring 2021 | Spring 2022 |
| Satya Devu | Secure Data Sharing on Cloud Storage Platforms | Spring 2020 | Spring 2022 |
| Radha Dhekane | Towards a Secure Fallback Authentication Mechanism | Fall 2019 | Spring 2020 |
| Rutvik Patel | A Framework for Data Privacy Protection on Social Networks | Fall 2019 | Fall 2020 |
| Shweta Shenoy | Empirical Analysis on the Usability and Security of Passwords | Fall 2018 | Spring 2019 |
| Bhuvan Bhatia | Flight Delay Prediction | Fall 2017 | Spring 2018 |
| Reena Dalavi | Video-Based Emotion Recognition on Social Media | Fall 2017 | Spring 2018 |
| Jaidipkumar Patel | A Browser Extension to Detect Malicious PDFs | Fall 2017 | Fall 2019 |
| Pujitha Vemuri | Detecting Malicious Shortened URLs Using Machine Learning | Spring 2017 | Spring 2018 |
| Srivats Srinivasan | Human or Bot | Fall 2016 | Fall 2017 |
| Savleen Kaur | Opinion Mining on Social Media | Fall 2016 | Spring 2017 |
| Nishitha Vunnam | Intelligent Rating System | Fall 2016 | Spring 2017 |
| Name | Project | First Reader | Start | Complete |
|---|---|---|---|---|
| Kavya Gopireddy | Contactless Vital Sign Monitoring and Recognition with Wi-Fi CSI and Camera | Dr. Xuyu Wang | Fall 2021 | Summer 2022 |
| Steven Mackey | RF Fingerprinting Using Multi-Adversarial Domain Adaptation | Dr. Xuyu Wang | Spring 2021 | Summer 2022 |
| Ashka Soni | A Social Network Application with End-to-End Security and Privacy | Dr. Jinsong Ouyang | Spring 2020 | Summer 2020 |
| Dennis Poon | Implementing Refactoring Guidance into Eclipse | Dr. Jingwei Yang | Fall 2018 | Spring 2019 |
| Michael Colson | Enabling User-Mode Processes in the Target OS for CSC 159 Operating System Pragmatics | Dr. Weide Chang | Spring 2018 | Spring 2018 |
| Akshay Poosarla | Bone Age Prediction with Convolutional Neural Network | Dr. Meiliu Lu | Spring 2018 | Fall 2018 |
| Aniruddha Rajguru | Sensor Monitor for Android | Dr. Ahmed Salem | Spring 2018 | Spring 2019 |
| Saranya Kalyanaraman | A Software Oversight System | Dr. Ahmed Salem | Fall 2017 | Fall 2018 |
| Krishna Kaja | Security Policy Implementation Using Graph Database | Dr. Ying Jin | Fall 2017 | Fall 2018 |
| Paril Shah | Mobile Learning Application (Android Version) | Dr. Jinsong Ouyang | Spring 2017 | Fall 2017 |
| Utkarsh Trivedi | Stock Pundit | Dr. Jinsong Ouyang | Spring 2017 | Fall 2017 |
| Pranavi Appana | Mission Impact Analysis in Enterprise Networks | Dr. Xiaoyan Sun | Fall 2016 | Fall 2017 |
| Sushmitha Bachu | Three-Step Authentication for an ATM | Dr. Xiaoyan Sun | Fall 2016 | Fall 2017 |
| Pallavi Vardhamane | Detecting Botnet Traffic by Using Machine Learning | Dr. Xiaoyan Sun | Fall 2016 | Fall 2017 |
| Kristofer Robles | Acceleration of Digital Forensics Functions Using a GPU | Dr. Pinar Muyan-Ozcelik | Fall 2016 | Spring 2017 |
| Suraj Ponugoti | Exporting SCSI Devices Through CTL | Dr. Jinsong Ouyang | Fall 2016 | Fall 2016 |