Name | Project | Start | Complete |
---|---|---|---|
Stephen Ly | A Secure Platform for Distributed Learning on Sensitive Data | Spring 2022 | Spring 2023 |
Alexandr Nosenko | Learning the Rules of Password Modification with Recurrent Neural Networks | Spring 2021 | Fall 2021 |
Arun Reddy | An Empirical Study on the Usability and Security of CAPTCHAs | Spring 2021 | Spring 2022 |
Francisco Vega | An Empirical Study on the Usability and Security of Two-Factor Authentication | Spring 2021 | Spring 2022 |
Satya Devu | Secure Data Sharing on Cloud Storage Platforms | Spring 2020 | Spring 2022 |
Radha Dhekane | Towards a Secure Fallback Authentication Mechanism | Fall 2019 | Spring 2020 |
Rutvik Patel | A Framework for Data Privacy Protection on Social Networks | Fall 2019 | Fall 2020 |
Shweta Shenoy | Empirical Analysis on the Usability and Security of Passwords | Fall 2018 | Spring 2019 |
Bhuvan Bhatia | Flight Delay Prediction | Fall 2017 | Spring 2018 |
Reena Dalavi | Video-Based Emotion Recognition on Social Media | Fall 2017 | Spring 2018 |
Jaidipkumar Patel | A Browser Extension to Detect Malicious PDFs | Fall 2017 | Fall 2019 |
Pujitha Vemuri | Detecting Malicious Shortened URLs Using Machine Learning | Spring 2017 | Spring 2018 |
Srivats Srinivasan | Human or Bot | Fall 2016 | Fall 2017 |
Savleen Kaur | Opinion Mining on Social Media | Fall 2016 | Spring 2017 |
Nishitha Vunnam | Intelligent Rating System | Fall 2016 | Spring 2017 |
Name | Project | First Reader | Start | Complete |
---|---|---|---|---|
Kavya Gopireddy | Contactless Vital Sign Monitoring and Recognition with Wi-Fi CSI and Camera | Dr. Xuyu Wang | Fall 2021 | Summer 2022 |
Steven Mackey | RF Fingerprinting Using Multi-Adversarial Domain Adaptation | Dr. Xuyu Wang | Spring 2021 | Summer 2022 |
Ashka Soni | A Social Network Application with End-to-End Security and Privacy | Dr. Jinsong Ouyang | Spring 2020 | Summer 2020 |
Dennis Poon | Implementing Refactoring Guidance into Eclipse | Dr. Jingwei Yang | Fall 2018 | Spring 2019 |
Michael Colson | Enabling User-Mode Processes in the Target OS for CSC 159 Operating System Pragmatics | Dr. Weide Chang | Spring 2018 | Spring 2018 |
Akshay Poosarla | Bone Age Prediction with Convolutional Neural Network | Dr. Meiliu Lu | Spring 2018 | Fall 2018 |
Aniruddha Rajguru | Sensor Monitor for Android | Dr. Ahmed Salem | Spring 2018 | Spring 2019 |
Saranya Kalyanaraman | A Software Oversight System | Dr. Ahmed Salem | Fall 2017 | Fall 2018 |
Krishna Kaja | Security Policy Implementation Using Graph Database | Dr. Ying Jin | Fall 2017 | Fall 2018 |
Paril Shah | Mobile Learning Application (Android Version) | Dr. Jinsong Ouyang | Spring 2017 | Fall 2017 |
Utkarsh Trivedi | Stock Pundit | Dr. Jinsong Ouyang | Spring 2017 | Fall 2017 |
Pranavi Appana | Mission Impact Analysis in Enterprise Networks | Dr. Xiaoyan Sun | Fall 2016 | Fall 2017 |
Sushmitha Bachu | Three-Step Authentication for an ATM | Dr. Xiaoyan Sun | Fall 2016 | Fall 2017 |
Pallavi Vardhamane | Detecting Botnet Traffic by Using Machine Learning | Dr. Xiaoyan Sun | Fall 2016 | Fall 2017 |
Kristofer Robles | Acceleration of Digital Forensics Functions Using a GPU | Dr. Pinar Muyan-Ozcelik | Fall 2016 | Spring 2017 |
Suraj Ponugoti | Exporting SCSI Devices Through CTL | Dr. Jinsong Ouyang | Fall 2016 | Fall 2016 |