To prospective students: If you want to take Master Project with me, you must have taken one of the following classes before (CSC 250, CSC 254, CSC 255). Before contacting me (or any potential advisor), do your homework: read the advisor's home page and at least one recent paper. If doing this doesn't give you any interesting ideas, this is probably not someone with whom you want to do project so you shouldn't waste time contacting her or him. If this does, send a short introductory email with your resume and transcript.

As First Reader
Name Project Start Complete
Stephen Ly A Secure Platform for Distributed Learning on Sensitive Data Spring 2022 Spring 2023
Alexandr Nosenko Learning the Rules of Password Modification with Recurrent Neural Networks Spring 2021 Fall 2021
Arun Reddy An Empirical Study on the Usability and Security of CAPTCHAs Spring 2021 Spring 2022
Francisco Vega An Empirical Study on the Usability and Security of Two-Factor Authentication Spring 2021 Spring 2022
Satya Devu Secure Data Sharing on Cloud Storage Platforms Spring 2020 Spring 2022
Radha Dhekane Towards a Secure Fallback Authentication Mechanism Fall 2019 Spring 2020
Rutvik Patel A Framework for Data Privacy Protection on Social Networks Fall 2019 Fall 2020
Shweta Shenoy Empirical Analysis on the Usability and Security of Passwords Fall 2018 Spring 2019
Bhuvan Bhatia Flight Delay Prediction Fall 2017 Spring 2018
Reena Dalavi Video-Based Emotion Recognition on Social Media Fall 2017 Spring 2018
Jaidipkumar Patel A Browser Extension to Detect Malicious PDFs Fall 2017 Fall 2019
Pujitha Vemuri Detecting Malicious Shortened URLs Using Machine Learning Spring 2017 Spring 2018
Srivats Srinivasan Human or Bot Fall 2016 Fall 2017
Savleen Kaur Opinion Mining on Social Media Fall 2016 Spring 2017
Nishitha Vunnam Intelligent Rating System Fall 2016 Spring 2017
As Second/Third Reader
Name Project First Reader Start Complete
Kavya Gopireddy Contactless Vital Sign Monitoring and Recognition with Wi-Fi CSI and Camera Dr. Xuyu Wang Fall 2021 Summer 2022
Steven Mackey RF Fingerprinting Using Multi-Adversarial Domain Adaptation Dr. Xuyu Wang Spring 2021 Summer 2022
Ashka Soni A Social Network Application with End-to-End Security and Privacy Dr. Jinsong Ouyang Spring 2020 Summer 2020
Dennis Poon Implementing Refactoring Guidance into Eclipse Dr. Jingwei Yang Fall 2018 Spring 2019
Michael Colson Enabling User-Mode Processes in the Target OS for CSC 159 Operating System Pragmatics Dr. Weide Chang Spring 2018 Spring 2018
Akshay Poosarla Bone Age Prediction with Convolutional Neural Network Dr. Meiliu Lu Spring 2018 Fall 2018
Aniruddha Rajguru Sensor Monitor for Android Dr. Ahmed Salem Spring 2018 Spring 2019
Saranya Kalyanaraman A Software Oversight System Dr. Ahmed Salem Fall 2017 Fall 2018
Krishna Kaja Security Policy Implementation Using Graph Database Dr. Ying Jin Fall 2017 Fall 2018
Paril Shah Mobile Learning Application (Android Version) Dr. Jinsong Ouyang Spring 2017 Fall 2017
Utkarsh Trivedi Stock Pundit Dr. Jinsong Ouyang Spring 2017 Fall 2017
Pranavi Appana Mission Impact Analysis in Enterprise Networks Dr. Xiaoyan Sun Fall 2016 Fall 2017
Sushmitha Bachu Three-Step Authentication for an ATM Dr. Xiaoyan Sun Fall 2016 Fall 2017
Pallavi Vardhamane Detecting Botnet Traffic by Using Machine Learning Dr. Xiaoyan Sun Fall 2016 Fall 2017
Kristofer Robles Acceleration of Digital Forensics Functions Using a GPU Dr. Pinar Muyan-Ozcelik Fall 2016 Spring 2017
Suraj Ponugoti Exporting SCSI Devices Through CTL Dr. Jinsong Ouyang Fall 2016 Fall 2016