Events

Filter by:

Limit to events where the first date of the event:
Date range
Limit to events where the first date of the event:
Limit to events where the title matches:
Limit to events where the type is one or more of:
Limit to events tagged with one or more of:
Limit to events where the audience is one or more of:

Please note: This PhD seminar will be given online.

Dihong Jiang, PhD candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Yaoliang Yu

Out-of-distribution (OOD) data come from a distribution that is different from training data. Detecting OOD data contributes to secure deployment of machine learning models. Currently, deep generative models have been widely used as an unsupervised approach for OOD detection.

Please note: This master’s thesis presentation will be given online.

Vasisht Duddu, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor N. Asokan

Please note: This master’s thesis presentation will be given online.

Ching-wen Wang, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor N. Asokan

Deep reinforcement learning (DRL) has seen many successes in complex tasks such as robot manipulation, autonomous driving, and competitive games. However, there are few studies on the security threats against DRL systems. In this thesis, we focus on two security concerns in DRL.

Please note: This master’s research paper presentation will be given online.

John Bostanci, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Richard Cleve

Please note: This master’s thesis presentation will be given online.

Zeinab El-Rewini, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Yousra Aafer

Android’s permission model is used to regulate access to the Application Program Interfaces (APIs) within the Android system services, which provide access to sensitive system resources, such as the camera and microphone. To successfully invoke sensitive APIs, a caller must hold one or more Android permissions.