Defense Notices


All students and faculty are welcome to attend the final defense of EECS graduate students completing their M.S. or Ph.D. degrees. Defense notices for M.S./Ph.D. presentations for this year and several previous years are listed below in reverse chronological order.

Students who are nearing the completion of their M.S./Ph.D. research should schedule their final defenses through the EECS graduate office at least THREE WEEKS PRIOR to their presentation date so that there is time to complete the degree requirements check, and post the presentation announcement online.

Upcoming Defense Notices

Zhaohui Wang

Detection and Mitigation of Cross-App Privacy Leakage and Interaction Threats in IoT Automation

When & Where:


Nichols Hall, Room 250 (Gemini Conference Room)

Committee Members:

Fengjun Li, Chair
Alex Bardas
Drew Davidson
Bo Luo
Haiyang Chao

Abstract

The rapid growth of Internet of Things (IoT) technology has brought unprecedented convenience to everyday life, enabling users to deploy automation rules and develop IoT apps tailored to their specific needs. However, modern IoT ecosystems consist of numerous devices, applications, and platforms that interact continuously. As a result, users are increasingly exposed to complex and subtle security and privacy risks that are difficult to fully comprehend. Even interactions among seemingly harmless apps can introduce unforeseen security and privacy threats. In addition, violations of memory integrity can undermine the security guarantees on which IoT apps rely.

The first approach investigates hidden cross-app privacy leakage risks in IoT apps. These risks arise from cross-app interaction chains formed among multiple seemingly benign IoT apps. Our analysis reveals that interactions between apps can expose sensitive information such as user identity, location, tracking data, and activity patterns. We quantify these privacy leaks by assigning probability scores to evaluate risk levels based on inferences. In addition, we provide a fine-grained categorization of privacy threats to generate detailed alerts, enabling users to better understand and address specific privacy risks.

The second approach addresses cross-app interaction threats in IoT automation systems by leveraging a logic-based analysis model grounded in event relations. We formalize event relationships, detect event interferences, and classify rule conflicts, then generate risk scores and conflict rankings to enable comprehensive conflict detection and risk assessment. To mitigate the identified interaction threats, an optimization-based approach is employed to reduce risks while preserving system functionality. This approach ensures comprehensive coverage of cross-app interaction threats and provides a robust solution for detecting and resolving rule conflicts in IoT environments.

To support the development and rigorous evaluation of these security analyses, we further developed a large-scale, manually verified, and comprehensive dataset of real-world IoT apps. This clean and diverse benchmark dataset supports the development and validation of IoT security and privacy solutions. All proposed approaches are evaluated using this dataset of real-world apps, collectively offering valuable insights and practical tools for enhancing IoT security and privacy against cross-app threats. Furthermore, we examine the integrity of the execution environment that supports IoT apps. We show that, even under non-privileged execution, carefully crafted memory access patterns can induce bit flips in physical memory, allowing attackers to corrupt data and compromise system integrity without requiring elevated privileges.


Shawn Robertson

A Low-Power Low-Throughput Communications Solution for At-Risk Populations in Resource Constrained Contested Environments

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Alex Bardas, Chair
Drew Davidson
Fengjun Li
Bo Luo
Shawn Keshmiri

Abstract

In resource‑constrained contested environments (RCCEs), communications are routinely censored, surveilled, or disrupted by nation‑state adversaries, leaving at‑risk populations—including protesters, dissidents, disaster‑affected communities, and military units—without secure connectivity. This dissertation introduces MeshBLanket, a Bluetooth Mesh‑based framework designed for low‑power, low‑throughput messaging with minimal electromagnetic spectrum exposure. Built on commercial off‑the‑shelf hardware, MeshBLanket extends the Bluetooth Mesh specification with automated provisioning and network‑wide key refresh to enhance scalability and resilience.

We evaluated MeshBLanket through field experimentation (range, throughput, battery life, and security enhancements) and qualitative interviews with ten senior U.S. Army communications experts. Thematic analysis revealed priorities of availability, EMS footprint reduction, and simplicity of use, alongside adoption challenges and institutional skepticism. Results demonstrate that MeshBLanket maintains secure messaging under load, supports autonomous key refresh, and offers operational relevance at the forward edge of battlefields.

Beyond military contexts, parallels with protest environments highlight MeshBLanket’s broader applicability for civilian populations facing censorship and surveillance. By unifying technical experimentation with expert perspectives, this work contributes a proof‑of‑concept communications architecture that advances secure, resilient, and user‑centric connectivity in environments where traditional infrastructure is compromised or weaponized.


Past Defense Notices

Dates

Arman Ghasemi

Task-Oriented Communication and Distributed Control in Smart Grids with Time-Series Forecasting

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Morteza Hashemi, Chair
Alexandru Bardas
Taejoon Kim
Prasad Kulkarni
Zsolt Talata

Abstract

Smart grids face challenges in maintaining the balance between generation and consumption at the residential and grid scales with the integration of renewable energy resources. Decentralized, dynamic, and distributed control algorithms are necessary for smart grids to function effectively. The inherent variability and uncertainty of renewables, especially wind and solar energy, complicate the deployment of distributed control algorithms in smart grids. In addition, smart grid systems must handle real-time data collected from interconnected devices and sensors while maintaining reliable and secure communication regardless of network failures. To address these challenges, our research models the integration of renewable energy resources into the smart grid and evaluates how predictive analytics can improve distributed control and energy management, while recognizing the limitations of communication channels and networks.

In the first thrust of this research, we develop a model of a smart grid with renewable energy integration and evaluate how forecasting affects distributed control and energy management. In particular, we investigate how contextual weather information and renewable energy time-series forecasting affect smart grid energy management. In addition to modeling the smart grid system and integrating renewable energy resources, we further explore the use of deep learning methods, such as the Long Short-Term Memory (LSTM) and Transformer models, for time-series forecasting. Time-series forecasting techniques are applied within Reinforcement Learning (RL) frameworks to enhance decision-making processes.

In the second thrust, we note that data collection and sharing across the smart grids require considering the impact of network and communication channel limitations in our forecasting models. As renewable energy sources and advanced sensors are integrated into smart grids, communication channels on wireless networks are overflowed with data, requiring a shift from transmitting raw data to processing only useful information to maximize efficiency and reliability. To this end, we develop a task-oriented communication model that integrates data compression and the effects of data packet queuing with considering limitation of communication channels, within a remote time-series forecasting framework. Furthermore, we jointly integrate data compression technique with age of information metric to enhance both relevance and timeliness of data used in time-series forecasting.


Neel Patel

Near-Memory Acceleration of Compressed Far Memory

When & Where:


Nichols Hall, Room 250 (Gemini Room)

Committee Members:

Mohammad Alian, Chair
David Johnson
Prasad Kulkarni


Abstract

DRAM constitutes over 50% of server cost and 75% of the embodied carbon footprint of a server. To mitigate DRAM cost, far memory architectures have emerged. They can be separated into two broad categories: software-defined far memory (SFM) and disaggregated far memory (DFM). In this work, we compare the cost of SFM and DFM in terms of their required capital investment, operational expense, and carbon footprint. We show that, for applications whose data sets are compressible and have predictable memory access patterns, it takes several years for a DFM to break even with an equivalent capacity SFM in terms of cost and sustainability. We then introduce XFM, a near-memory accelerated SFM architecture, which exploits the coldness of data during SFM-initiated swap ins and outs. XFM leverages refresh cycles to seamlessly switch the access control of DRAM between the CPU and near-memory accelerator. XFM parallelizes near-memory accelerator accesses with row refreshes and removes the memory interference caused by SFM swap ins and outs. We modify an open source far memory implementation to implement a full-stack, user-level XFM. Our experimental results use a combination of an FPGA implementation, simulation, and analytical modeling to show that XFM eliminates memory bandwidth utilization when performing compression and decompression operations with SFMs of capacities up to 1TB. The memory and cache utilization reductions translate to 5∼27% improvement in the combined performance of co-running applications.


Dang Qua Nguyen

Hybrid Precoding Optimization and Private Federated Learning for Future Wireless Systems

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Taejoon Kim, Chair
Morteza Hashemi
Erik Perrins
Zijun Yao
KC Kong

Abstract

This PhD research addresses two challenges in future wireless systems: hybrid precoder design for sub-Terahertz (sub-THz) massive multiple-input multiple-output (MIMO) communications and private federated learning (FL) over wireless channels. The first part of the research introduces a novel hybrid precoding framework that combines true-time delay (TTD) and phase shifters (PS) precoders to counteract the beam squint effect - a significant challenge in sub-THz massive MIMO systems that leads to considerable loss in array gain. Our research presents a novel joint optimization framework for the TTD and PS precoder design, incorporating realistic time delay constraints for each TTD device. We first derive a lower bound on the achievable rate of the system and show that, in the asymptotic regime, the optimal analog precoder that fully compensates for the beam squint is equivalent to the one that maximizes this lower bound. Unlike previous methods, our framework does not rely on the unbounded time delay assumption and optimizes the TTD and PS values jointly to cope with the practical limitations. Furthermore, we determine the minimum number of TTD devices needed to reach a target array gain using our proposed approach. Simulations validate that the proposed approach demonstrates performance enhancement, ensures array gain, and achieves computational efficiency. In the second part, the research devises a differentially private FL algorithm that employs time-varying noise perturbation and optimizes transmit power to counteract privacy risks, particularly those stemming from engineering-inversion attacks. This method harnesses inherent wireless channel noise to strike a balance between privacy protection and learning utility. By strategically designing noise perturbation and power control, our approach not only safeguards user privacy but also upholds the quality of the learned FL model. Additionally, the number of FL iterations is optimized by minimizing the upper bound on the learning error. We conduct simulations to showcase the effectiveness of our approach in terms of DP guarantee and learning utility.


Durga Venkata Suraj Tedla

Block chain based inter organization file sharing system

When & Where:


Eaton Hall, Room 2001B

Committee Members:

David Johnson, Chair
Drew Davidson
Sankha Guria


Abstract

A coalition of companies collaborates collectively and shares information to improve their operations together. Distributed trust and transparency cannot be obtained with centralized file-sharing platforms. File sharing may be done transparently and securely with blockchain technology. This project suggests an inter-organizational secure file-sharing system based on blockchain technology. The group can use it to securely share files in a distributed manner. The creation of smart contracts and the configuration of blockchain networks are carried out by Hyperledger Fabric, an enterprise blockchain platform. Distributed file storage is accomplished through the usage of the Inter Planetary File System (IPFS). The workflow for file-sharing and identity management procedures is provided in the paper. Using blockchain technology, the recommended approach enables a group of businesses to share files with availability, integrity, and confidentiality. The suggested method uses blockchain to enable safe file exchange amongst a group of enterprises. It offers shared file availability, confidentiality, and integrity. It guarantees complete file encryption. The blockchain provides tamper-resistant storage for the shared file's content ID. On the distributed storage and blockchain ledger, respectively, the encrypted file and file metadata are stored.


Sai Narendra Koganti

Real-time Object Detection for Safer Driving Experience in Urban Environment: Leveraging YOLO Algorithm

When & Where:


Nichols Hall, Room 250 (Gemini Room)

Committee Members:

Sumaiya Shomaji, Chair
David Johnson
Prasad Kulkarni


Abstract

This project offers a hands-on investigation of object identification utilizing the YOLO method, Python, and OpenCV. It begins by explaining the YOLO architecture, focusing on the single-stage detection process for bounding box prediction and class probability calculation. The setup phase includes library installation and model configuration, resulting in a smooth implementation procedure. Using OpenCV, the project includes preparatory processes required for object detection in images. The YOLO model is seamlessly integrated into the OpenCV framework, enabling object detection. Post-processing techniques, such as non-maximum suppression, are used to modify detection results and improve accuracy. Visualizations, such as bounding boxes and labels, are used to help interpret the discovered items. The project finishes by investigating potential expansions and optimizations, such as custom dataset training and deployment on edge devices, opening up new paths for further investigation and development. This project provides developers with the tools and knowledge they need to build effective object detection systems for a wide range of applications, from surveillance and security to autonomous vehicles and augmented reality.


Vijay Verma

Binary Segmentation of PCB Components Using U-Net Model

When & Where:


Zoom Defense, please email jgrisafe@ku.edu for defense link.

Committee Members:

Sumaiya Shomaji, Chair
Tamzidul Hoque
Zijun Yao


Abstract

This project explores the adaptation of the U-Net convolutional neural network, renowned for its medical image segmentation prowess, to the analysis of Printed Circuit Boards (PCBs). By utilizing the Fine-Printed Circuit Board Image Collection (FPIC) dataset, we address key challenges in PCB inspection, such as the precise segmentation of complex components, handling class imbalances, and capturing minute details. The U-Net model has been finely tuned with an encoding-decoding architecture, enhanced by convolutional layers, batch normalization, and dropout techniques to extract and reconstruct high-quality features from PCB images effectively. The Dice coefficient, used as the loss function, significantly improves boundary accuracy, and manages class diversity. Throughout extensive training and validation phases, the model has demonstrated superior performance metrics compared to traditional methods, making substantial advancements in automated PCB inspection. During the rigorous training and validation stages, the U-Net model demonstrated excellent performance metrics, eclipsing traditional inspection methods. For capacitors, the model achieved a training accuracy of 95.03% and a validation accuracy of 95.92%. For resistors, training using transfer learning techniques resulted in even more remarkable performance, with training accuracy reaching 98% and validation accuracy hitting 98.23%. These metrics highlight the model's robustness and accuracy, marking a significant advancement in automated PCB inspection and suggesting the model's potential for wider industrial applications in multiclass component segmentation within complex PCB.


Ruturaj Vaidya

Exploring binary analysis techniques for security

When & Where:


Zoom Defense, please email jgrisafe@ku.edu for defense link.

Committee Members:

Prasad Kulkarni, Chair
Alex Bardas
Drew Davidson
Esam El-Araby
Michael Vitevitch

Abstract

In this dissertation our goal is to evaluate how the loss of information at binary-level affects the performance of existing compiler-level techniques in terms of both efficiency and effectiveness. Binary analysis is difficult, as most of semantic and syntactic information available at source-level gets lost during the compilation process. If the binary is stripped and/ or optimized, then it negatively affects the efficacy of binary analysis frameworks. Moreover, handwritten assembly, obfuscation, excessive indirect calls or jumps, etc. further degrade the accuracy of binary analysis. Challenges to precise binary analysis have implications on the effectiveness, accuracy, and performance, of security and program hardening techniques implemented at the binary level. While these challenges are well-known, their respective impacts on the effectiveness and performance of program hardening techniques are less well-studied.

In this dissertation, we employ classes of defense mechanisms to protect software from the most common software attacks, like buffer overflows and control flow attacks, to determine how this loss of program information at the binary-level affects the effectiveness and performance of defense mechanisms. Additionally, we aim to tackle an important problem of type recovery from binary executables that in turn help bolster the software protection mechanisms.


Jianpeng Li

BlackLitNetwork: Advancing Black Literature Discovery Through Modern Web Technologies

When & Where:


LEEP2, Room 1420

Committee Members:

Drew Davidson, Chair
Sumaiya Shomaji
Han Wang


Abstract

Advancements in web technologies have significantly expanded access to diverse cultural narratives, yet black literature remains underrepresented in digital domains. The BlackLitNetwork addresses this oversight by harnessing Elasticsearch, MongoDB, React, Python, CSS, HTML, and Node.js, to enhance the discoverability and engagement with black novels. A major component of the platform is a novel generator built with Elasticsearch, which employs powerful full-text search capabilities, essential for users to navigate an extensive literary database effectively.

MongoDB supports the archives platform with a flexible data schema for managing varied literary content efficiently, while Python facilitates robust data cleaning and preprocessing to ensure data integrity and usability. The user interface, created using React, transforms Figma designs from our design team into a dynamic web presence, integrating HTML and CSS to ensure both aesthetic appeal and accessibility.

To further enhance security and manageability, we've implemented a Node.js backend. This layer acts as a middleware, managing and processing requests between our frontend and Elasticsearch. This not only secures our data interactions but also allows for request handling before querying Elasticsearch. This architecture ensures that BlackLitNetwork remains scalable and maintainable.

BlackLitNetwork also features specialized pages for podcasts, briefs, and interactive data visualizations, each designed to highlight historical, and contextual elements of black literature. These components aid in fostering a deeper understanding, establishing BlackLitNetwork as a tool for scholars. This project not only enriches the field of humanities but also promotes a broader understanding of the black literary heritage, making it a resource for researchers, educators, and readers keen on exploring the richness of black literature.


Aiden Liang

Enhancing Healthcare Resource Demand Forecasting Using Machine Learning: An Integrated Approach to Addressing Temporal Dynamics and External Influences

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Prasad Kulkarni, Chair
Fengjun Li
Zijun Yao


Abstract

This project aims to enhance predictive models for forecasting healthcare resource demand, particularly focusing on hospital bed occupancy and emergency room visits while considering external factors such as disease outbreaks and weather conditions. Utilizing a range of machine learning techniques, the research seeks to improve the accuracy and reliability of these forecasts, essential for optimizing healthcare resource management. The project involves multiple phases, starting with the collection and preparation of historical data from public health databases and hospital records, enriched with external variables such as weather patterns and epidemiological data. Advanced feature engineering is key, transforming raw data into a machine learning-friendly format, including temporal and lag features to identify patterns and trends. The study explores various machine learning methods, from traditional models like ARIMA to advanced techniques such as LSTM networks and GRU models, incorporating rigorous training and validation protocols to ensure robust performance. Model effectiveness is evaluated using metrics like MAE, RMSE, and MAPE, with a strong focus on model interpretability and explainability through techniques like SHAP and LIME. The project also addresses practical implementation challenges and ethical considerations, aiming to bridge academic research with practical healthcare applications. Findings are intended for dissemination through academic papers and conferences, ensuring that the models developed meet both the ethical standards and practical needs of the healthcare industry.


Thomas Atkins

Secure and Auditable Academic Collections Storage via Hyperledger Fabric-Based Smart Contracts

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Drew Davidson, Chair
Fengjun Li
Bo Luo


Abstract

This paper introduces a novel approach to manage collections of artifacts through smart contract access control, rooted in on-chain role-based property-level access control. This smart contract facilitates the lifecycle of these artifacts including allowing for the creation, modification, removal, and historical auditing of the artifacts through both direct and suggested actions. This method introduces a collection object designed to store role privileges concerning state object properties. User roles are defined within an on-chain entity that maps users' signed identities to roles across different collections, enabling a single user to assume varying roles in distinct collections. Unlike existing key-level endorsement mechanisms, this approach offers finer-grained privileges by defining them on a per-property basis, not at the key level. The outcome is a more flexible and fine-grained access control system seamlessly integrated into the smart contract itself, empowering administrators to manage access with precision and adaptability across diverse organizational contexts. This has the added benefit of allowing for the auditing of not only the history of the artifacts, but also for the permissions granted to the users.