Reading Group

For Spring 2020, we will be meeting in EE 118 on Wednesdays 12:30 – 2:00 PM.

The papers are samples and the discussion will go beyond them or may use other papers altogether.

Feb 12Paper writing analysis & Own workHeng Zhang, Michael A. Roth, Rajesh K. Panta, He Wang, Saurabh Bagchi. CrowdBind: Fairness Enhanced Late Binding Task Scheduling in
Mobile Crowdsensing, EWSN '20, Best Paper Finalist
Saurabh, Heng
Feb 19, 26Distributed Machine Learning under AttacksReza Shokri and Vitaly Shmatikov. 2015. Privacy-Preserving Deep Learning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security ( CCS ’15). Association for Computing Machinery, New York, NY, USA, 1310–1321.

Bhagoji, Arjun Nitin, Supriyo Chakraborty, P. Mittal, and S. Calo. "Model Poisoning Attacks in Federated Learning." In In Workshop on Security in Machine Learning (SecML), collocated with the 32nd Conference on Neural Information Processing Systems (NeurIPS’18). 2018.
Atul, ManishAtul Slides
Mar 4Own workApproximate ML for embedded systems with reliability and performance guaranteesRan
Mar 11Symbolic execution for verification of systemsNelson L, Bornholt J, Gu R, Baumann A, Torlak E, Wang X. Scaling symbolic evaluation for automated verification of systems code with Serval. InProceedings of the 27th ACM Symposium on Operating Systems Principles 2019 Oct 27 (SOSP '19) (pp. 225-242).

KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, Cristian Cadar, Daniel Dunbar, and Dawson Engler (Stanford University) (OSDI '08)
Mar 25Own workServerless computing: reliability and performance guaranteesAshraf
Apr 1Attacks and Defenses against Cyber Physical Systems Choi, Hongjun, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, and Xinyan Deng. "Detecting attacks against robotic vehicles: A control invariant approach." In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18), pp. 801-816. 2018.

Sun, Pengfei, Luis Garcia, and Saman Zonouz. "Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries." In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '19), pp. 349-361. IEEE, 2019.
Apr 8Own work"Anomaly detection through sensing data with missing data values"Sean
Apr 15Big-Data Programming Models & FrameworksFang, Minghong, Xiaoyu Cao, Jinyuan Jia, and Neil Zhenqiang Gong. "Local model poisoning attacks to Byzantine-robust federated learning." pp. 1--18, Usenix Security 2020.

J. E. Gonzalez, Y. Low, H. Gu, D. Bickson, and C. Guestrin. PowerGraph: Distributed graph-parallel computation on natural graphs. In (OSDI '12), pages 17–30, 2012.
AtulAtul Slides
Apr 22Own workPrivacy preserving inferencing from distributed sensor data in a battlefield environmentShams
Apr 29Approximation for ML Algorithms Belabbas, M.A. and Wolfe, P.J., 2009. Spectral methods in machine learning and new strategies for very large datasets. Proceedings of the National Academy of Sciences, 106(2), pp.369-374.Pengcheng

History of DCSL Reading group

2016-20, 2015, 2014, 2013, 2012, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002

Last modified: January 2, 2021