User Tools

Site Tools


presentation_schedule

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
presentation_schedule [2021/04/23 19:15] aanpresentation_schedule [2021/04/25 14:48] aan
Line 1: Line 1:
-====== Oral Presentation Schedule ======+====== Oral Presentation Schedule======
  
-====== EECS 4088 Capstone Project Presentation Schedule ======+====== EECS 4080/4480 Project Presentation Schedule======
  
-===== Monday April 26, 2021 =====+===== Tuesday April 27, 2021=====
  
 ^ Time      ^ Student             ^ Project title                  ^Supervisor         ^ ^ Time      ^ Student             ^ Project title                  ^Supervisor         ^
-2:30-2:50 |Walleed Khan and Andres Rojas Speech Sentiment Classification | Michael Jenkin| +1:30-1:50 |Shaked Brosh Sandbox Analysis of Gafgyt / Bashlite Gafgyt IoT Malware ([[https://echo360.ca/media/4a0f30ab-56b6-419b-ada4-64e18dea3b10/public|Teaser Video]]) Natalija Vlajic
-| 2:50-3:10 |Mahmoud Reza Eskandari Jam | Pharmacy Virtual Assistant  | Jeff Edmonds      | +1:50-2:10 |Daniel Brown TOR-User Deanonymization Deploying Client-Side JavaScript-Generated Watermarked Side-Channel |Natalija Vlajic| 
-| 3:10-3:30 |Baris Bagcilar       | Command-line Digital Audio Workstation| Vassilios Tzerpos| +2:10-2:30 |Ege CakmakDeep learning models for gait identification and analysis Manos Papagelis
-| 3:30-3:50 |Xingye Fan           Building Knowledge Graphs from Text     | Aijun An      +2:30-2:50 |Tayzoon Ismail|Fake News Detection using Machine Learning ([[https://echo360.ca/media/4810454c-f7c2-4119-8724-28f9c9cd054b/public|Teaser Video]]) Uyen Trang Nguyen 
-3:50-4:10 |Julian Galati    Comprehensive Study of Network-Traffic Characteristics of IoT Malware     | Natalija Vlajic      +2:50-3:10 |Dennis Sarovski Multidimensional FingerprintingSaed Alrabaee 
-4:10-4:30 |BREAK                           | +3:10-3:30 |Austin Vuong Spatiotemporal Interaction in Virtual Reality ([[https://drive.google.com/file/d/144DNraEwSo25i5uEY23clekIkDcpOw0B/view|Teaser Video]])| Matthew Kyan |  
- +3:30-3:50 |Aly Wakif Security Education Training and Awareness (SETA) Programs ([[https://echo360.ca/media/2fdf79cd-3ea5-4548-92dd-ea90c94500c7/public|Teaser Video]])| Saed Alrabaee
- +
- +
-3:30-3:45 |Diego Gonzalez       reCAPTCHAv3 as a Defence Against MWAP AttackEvaluation Study     | Natalija Vlajic      | +
-| 3:45-4:00 |Sukhrajan Johal      Blockchain-based Serverless Computing Platforms    | Hamzeh Khazaei      +
-4:00-4:15 |Jialin Sun Predicting and Mitigating the Likelihood of Infection of Geographical Areas via Trajectory Data Mining  Manos Papagelis      +
-4:15-4:30 |Yang Zhou         The Platform for Modeling and Optimizing Serverless Applications    Hamzeh Khazaei   +
-4:30-4:45 |Reem Aleithan       Explainable Software Bug Prediction ModelsAre We There Yet?  Song Wang | +
  
presentation_schedule.txt · Last modified: 2021/04/25 16:45 by aan