For Spring 2020, we will be meeting in EE 118 on Wednesdays 12:30 – 2:00 PM.
The papers are samples and the discussion will go beyond them or may use other papers altogether.
|Feb 12||Paper writing analysis & Own work||Heng Zhang, Michael A. Roth, Rajesh K. Panta, He Wang, Saurabh Bagchi. CrowdBind: Fairness Enhanced Late Binding Task Scheduling in|
Mobile Crowdsensing, EWSN '20, Best Paper Finalist
|Feb 19, 26||Distributed Machine Learning under Attacks||Reza Shokri and Vitaly Shmatikov. 2015. Privacy-Preserving Deep Learning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security ( CCS ’15). Association for Computing Machinery, New York, NY, USA, 1310–1321. |
Bhagoji, Arjun Nitin, Supriyo Chakraborty, P. Mittal, and S. Calo. "Model Poisoning Attacks in Federated Learning." In In Workshop on Security in Machine Learning (SecML), collocated with the 32nd Conference on Neural Information Processing Systems (NeurIPS’18). 2018.
|Mar 4||Own work||Approximate ML for embedded systems with reliability and performance guarantees||Ran|
|Mar 11||Symbolic execution for verification of systems||Nelson L, Bornholt J, Gu R, Baumann A, Torlak E, Wang X. Scaling symbolic evaluation for automated verification of systems code with Serval. InProceedings of the 27th ACM Symposium on Operating Systems Principles 2019 Oct 27 (SOSP '19) (pp. 225-242).|
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, Cristian Cadar, Daniel Dunbar, and Dawson Engler (Stanford University) (OSDI '08)
|Mar 25||Own work||Serverless computing: reliability and performance guarantees||Ashraf|
|Apr 1||Attacks and Defenses against Cyber Physical Systems||Choi, Hongjun, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, and Xinyan Deng. "Detecting attacks against robotic vehicles: A control invariant approach." In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18), pp. 801-816. 2018.|
Sun, Pengfei, Luis Garcia, and Saman Zonouz. "Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries." In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '19), pp. 349-361. IEEE, 2019.
|Apr 8||Own work||"Anomaly detection through sensing data with missing data values"||Sean|
|Apr 15||Big-Data Programming Models & Frameworks||Huang, Yuzhen, Xiao Yan, Guanxian Jiang, Tatiana Jin, James Cheng, An Xu, Zhanhao Liu, and Shuo Tu. "Tangram: bridging immutable and mutable abstractions for distributed data analytics." In 2019 USENIX Annual Technical Conference (USENIX ATC '19), pp. 191-206. 2019.|
J. E. Gonzalez, Y. Low, H. Gu, D. Bickson, and C. Guestrin. PowerGraph: Distributed graph-parallel computation on natural graphs. In (OSDI '12), pages 17–30, 2012.
|Apr 22||Own work||Privacy preserving inferencing from distributed sensor data in a battlefield environment||Shams|
|Apr 29||Approximation for ML Algorithms||Belabbas, M.A. and Wolfe, P.J., 2009. Spectral methods in machine learning and new strategies for very large datasets. Proceedings of the National Academy of Sciences, 106(2), pp.369-374.|