To prospective students: If you want to take Master Project with me, you must have taken one of the following classes before (CSC 250, CSC 254, CSC 255). Before contacting me (or any potential advisor), do your homework: read the advisor's home page and at least one recent paper. If doing this doesn't give you any interesting ideas, this is probably not someone with whom you want to do project so you shouldn't waste time contacting her or him. If this does, send a short introductory email with your resume and transcript.
Name | Project | Start | Complete |
---|---|---|---|
Stephen Ly | A Secure Platform for Distributed Learning on Sensitive Data | Spring 2022 | Spring 2023 |
Alexandr Nosenko | Learning the Rules of Password Modification with Recurrent Neural Networks | Spring 2021 | Fall 2021 |
Arun Reddy | An Empirical Study on the Usability and Security of CAPTCHAs | Spring 2021 | Spring 2022 |
Francisco Vega | An Empirical Study on the Usability and Security of Two-Factor Authentication | Spring 2021 | Spring 2022 |
Satya Devu | Secure Data Sharing on Cloud Storage Platforms | Spring 2020 | Spring 2022 |
Radha Dhekane | Towards a Secure Fallback Authentication Mechanism | Fall 2019 | Spring 2020 |
Rutvik Patel | A Framework for Data Privacy Protection on Social Networks | Fall 2019 | Fall 2020 |
Shweta Shenoy | Empirical Analysis on the Usability and Security of Passwords | Fall 2018 | Spring 2019 |
Bhuvan Bhatia | Flight Delay Prediction | Fall 2017 | Spring 2018 |
Reena Dalavi | Video-Based Emotion Recognition on Social Media | Fall 2017 | Spring 2018 |
Jaidipkumar Patel | A Browser Extension to Detect Malicious PDFs | Fall 2017 | Fall 2019 |
Pujitha Vemuri | Detecting Malicious Shortened URLs Using Machine Learning | Spring 2017 | Spring 2018 |
Srivats Srinivasan | Human or Bot | Fall 2016 | Fall 2017 |
Savleen Kaur | Opinion Mining on Social Media | Fall 2016 | Spring 2017 |
Nishitha Vunnam | Intelligent Rating System | Fall 2016 | Spring 2017 |
Name | Project | First Reader | Start | Complete |
---|---|---|---|---|
Kavya Gopireddy | Contactless Vital Sign Monitoring and Recognition with Wi-Fi CSI and Camera | Dr. Xuyu Wang | Fall 2021 | Summer 2022 |
Steven Mackey | RF Fingerprinting Using Multi-Adversarial Domain Adaptation | Dr. Xuyu Wang | Spring 2021 | Summer 2022 |
Ashka Soni | A Social Network Application with End-to-End Security and Privacy | Dr. Jinsong Ouyang | Spring 2020 | Summer 2020 |
Dennis Poon | Implementing Refactoring Guidance into Eclipse | Dr. Jingwei Yang | Fall 2018 | Spring 2019 |
Michael Colson | Enabling User-Mode Processes in the Target OS for CSC 159 Operating System Pragmatics | Dr. Weide Chang | Spring 2018 | Spring 2018 |
Akshay Poosarla | Bone Age Prediction with Convolutional Neural Network | Dr. Meiliu Lu | Spring 2018 | Fall 2018 |
Aniruddha Rajguru | Sensor Monitor for Android | Dr. Ahmed Salem | Spring 2018 | Spring 2019 |
Saranya Kalyanaraman | A Software Oversight System | Dr. Ahmed Salem | Fall 2017 | Fall 2018 |
Krishna Kaja | Security Policy Implementation Using Graph Database | Dr. Ying Jin | Fall 2017 | Fall 2018 |
Paril Shah | Mobile Learning Application (Android Version) | Dr. Jinsong Ouyang | Spring 2017 | Fall 2017 |
Utkarsh Trivedi | Stock Pundit | Dr. Jinsong Ouyang | Spring 2017 | Fall 2017 |
Pranavi Appana | Mission Impact Analysis in Enterprise Networks | Dr. Xiaoyan Sun | Fall 2016 | Fall 2017 |
Sushmitha Bachu | Three-Step Authentication for an ATM | Dr. Xiaoyan Sun | Fall 2016 | Fall 2017 |
Pallavi Vardhamane | Detecting Botnet Traffic by Using Machine Learning | Dr. Xiaoyan Sun | Fall 2016 | Fall 2017 |
Kristofer Robles | Acceleration of Digital Forensics Functions Using a GPU | Dr. Pinar Muyan-Ozcelik | Fall 2016 | Spring 2017 |
Suraj Ponugoti | Exporting SCSI Devices Through CTL | Dr. Jinsong Ouyang | Fall 2016 | Fall 2016 |