Defense Notices


All students and faculty are welcome to attend the final defense of EECS graduate students completing their M.S. or Ph.D. degrees. Defense notices for M.S./Ph.D. presentations for this year and several previous years are listed below in reverse chronological order.

Students who are nearing the completion of their M.S./Ph.D. research should schedule their final defenses through the EECS graduate office at least THREE WEEKS PRIOR to their presentation date so that there is time to complete the degree requirements check, and post the presentation announcement online.

Upcoming Defense Notices

Zhaohui Wang

Detection and Mitigation of Cross-App Privacy Leakage and Interaction Threats in IoT Automation

When & Where:


Nichols Hall, Room 250 (Gemini Conference Room)

Committee Members:

Fengjun Li, Chair
Alex Bardas
Drew Davidson
Bo Luo
Haiyang Chao

Abstract

The rapid growth of Internet of Things (IoT) technology has brought unprecedented convenience to everyday life, enabling users to deploy automation rules and develop IoT apps tailored to their specific needs. However, modern IoT ecosystems consist of numerous devices, applications, and platforms that interact continuously. As a result, users are increasingly exposed to complex and subtle security and privacy risks that are difficult to fully comprehend. Even interactions among seemingly harmless apps can introduce unforeseen security and privacy threats. In addition, violations of memory integrity can undermine the security guarantees on which IoT apps rely.

The first approach investigates hidden cross-app privacy leakage risks in IoT apps. These risks arise from cross-app interaction chains formed among multiple seemingly benign IoT apps. Our analysis reveals that interactions between apps can expose sensitive information such as user identity, location, tracking data, and activity patterns. We quantify these privacy leaks by assigning probability scores to evaluate risk levels based on inferences. In addition, we provide a fine-grained categorization of privacy threats to generate detailed alerts, enabling users to better understand and address specific privacy risks.

The second approach addresses cross-app interaction threats in IoT automation systems by leveraging a logic-based analysis model grounded in event relations. We formalize event relationships, detect event interferences, and classify rule conflicts, then generate risk scores and conflict rankings to enable comprehensive conflict detection and risk assessment. To mitigate the identified interaction threats, an optimization-based approach is employed to reduce risks while preserving system functionality. This approach ensures comprehensive coverage of cross-app interaction threats and provides a robust solution for detecting and resolving rule conflicts in IoT environments.

To support the development and rigorous evaluation of these security analyses, we further developed a large-scale, manually verified, and comprehensive dataset of real-world IoT apps. This clean and diverse benchmark dataset supports the development and validation of IoT security and privacy solutions. All proposed approaches are evaluated using this dataset of real-world apps, collectively offering valuable insights and practical tools for enhancing IoT security and privacy against cross-app threats. Furthermore, we examine the integrity of the execution environment that supports IoT apps. We show that, even under non-privileged execution, carefully crafted memory access patterns can induce bit flips in physical memory, allowing attackers to corrupt data and compromise system integrity without requiring elevated privileges.


Shawn Robertson

A Low-Power Low-Throughput Communications Solution for At-Risk Populations in Resource Constrained Contested Environments

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Alex Bardas, Chair
Drew Davidson
Fengjun Li
Bo Luo
Shawn Keshmiri

Abstract

In resource‑constrained contested environments (RCCEs), communications are routinely censored, surveilled, or disrupted by nation‑state adversaries, leaving at‑risk populations—including protesters, dissidents, disaster‑affected communities, and military units—without secure connectivity. This dissertation introduces MeshBLanket, a Bluetooth Mesh‑based framework designed for low‑power, low‑throughput messaging with minimal electromagnetic spectrum exposure. Built on commercial off‑the‑shelf hardware, MeshBLanket extends the Bluetooth Mesh specification with automated provisioning and network‑wide key refresh to enhance scalability and resilience.

We evaluated MeshBLanket through field experimentation (range, throughput, battery life, and security enhancements) and qualitative interviews with ten senior U.S. Army communications experts. Thematic analysis revealed priorities of availability, EMS footprint reduction, and simplicity of use, alongside adoption challenges and institutional skepticism. Results demonstrate that MeshBLanket maintains secure messaging under load, supports autonomous key refresh, and offers operational relevance at the forward edge of battlefields.

Beyond military contexts, parallels with protest environments highlight MeshBLanket’s broader applicability for civilian populations facing censorship and surveillance. By unifying technical experimentation with expert perspectives, this work contributes a proof‑of‑concept communications architecture that advances secure, resilient, and user‑centric connectivity in environments where traditional infrastructure is compromised or weaponized.


Past Defense Notices

Dates

Sameera Katamaneni

Revolutionizing Forensic Identification: A Dual-Method Facial Recognition Paradigm for Enhanced Criminal Identification

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Prasad Kulkarni, Chair
Hongyang Sun



Abstract

In response to the challenges posed by increasingly sophisticated criminal behaviour that strategically evades conventional identification methods, this research advocates for a paradigm shift in forensic practices. Departing from reliance on traditional biometric techniques such as DNA matching, eyewitness accounts, and fingerprint analysis, the study introduces a pioneering biometric approach centered on facial recognition systems. Addressing the limitations of established methods, the proposed methodology integrates two key components. Firstly, facial features are meticulously extracted using the Histogram of Oriented Gradients (HOG) methodology, providing a robust representation of individualized facial characteristics. Subsequently, a face recognition system is implemented, harnessing the power of the K-Nearest Neighbours machine learning classifier. This innovative dual-method approach aims to significantly enhance the accuracy and reliability of criminal identification, particularly in scenarios where conventional methods prove inadequate. By capitalizing on the inherent uniqueness of facial features, this research strives to introduce a formidable tool for forensic practitioners, offering a more effective means of addressing the evolving landscape of criminal tactics and safeguarding the integrity of justice systems. 


Thomas Atkins

Secure and Auditable Academic Collections Storage via Hyperledger Fabric-Based Smart Contracts

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Drew Davidson, Chair
Fengjun Li
Bo Luo


Abstract

This paper introduces a novel approach to manage collections of artifacts through smart contract access control, rooted in on-chain role-based property-level access control. This smart contract facilitates the lifecycle of these artifacts including allowing for the creation,  modification, removal, and historical auditing of the artifacts through both direct and suggested actions. This method introduces a collection object designed to store role privileges concerning state object properties. User roles are defined within an on-chain entity that maps users' signed identities to roles across different collections, enabling a single user to assume varying roles in distinct collections. Unlike existing key-level endorsement mechanisms, this approach offers finer-grained privileges by defining them on a per-property basis, not at the key level. The outcome is a more flexible and fine-grained access control system seamlessly integrated into the smart contract itself, empowering administrators to manage access with precision and adaptability across diverse organizational contexts.  This has the added benefit of allowing for the auditing of not only the history of the artifacts, but also for the permissions granted to the users.  


Christian Jones

Robust and Efficient Structure-Based Radar Receive Processing

When & Where:


Nichols Hall, Room 129 (Apollo Auditorium)

Committee Members:

Shannon Blunt, Chair
Chris Allen
Suzanne Shontz
James Stiles
Zsolt Talata

Abstract

Legacy radar systems largely rely on repeated emission of a linear frequency modulated (LFM) or chirp waveform to ascertain scattering information from an environment. The prevalence of these chirp waveforms largely stems from their simplicity to generate, process, and the general robustness they provide towards hardware effects. However, this traditional design philosophy often lacks the flexibility and dimensionality needed to address the dynamic “complexification” of the modern radio frequency (RF) environment or achieve current operational requirements where unprecedented degrees of sensitivity, maneuverability, and adaptability are necessary.

Over the last couple of decades analog-to-digital and digital-to-analog technologies have advanced exponentially, resulting in tremendous design degrees of freedom and arbitrary waveform generation (AWG) capabilities that enable sophisticated design of emissions to better suit operational requirements. However, radar systems typically require high powered amplifiers (HPA) to contend with the two-way propagation. Thus, transmitter-amenable waveforms are effectively constrained to be both spectrally contained and constant amplitude, resulting in a non-convex NP-hard design problem.

While determining the global optimal waveform can be intractable for even modest time-bandwidth products (TB), locally optimal transmitter-amenable solutions that are “good enough” are often readily available. However, traditional matched filtering may not satisfy operational requirements for these sub-optimal emissions. Using knowledge of the transmitter-receiver chain, a discrete linear model can be formed to express the relationship between observed measurements and the complex scattering of the environment. This structured representation then enables more sophisticated least-square and adaptive estimation techniques to better satisfy operational needs, improve estimate fidelity, and extend dynamic range.

However, radar dimensionality can be enormous and brute force implementations of these techniques may have unwieldy computational burden on even cutting-edge hardware. Additionally, a discrete linear representation is fundamentally an approximation of the dynamic continuous physical reality and model errors may induce bias, create false detections, and limit dynamic range. As such, these structure-based approaches must be both computationally efficient and robust to reality.

Here several generalized discrete radar receive models and structure-based estimation schemes are introduced. Modifications and alternative solutions are then proposed to improve estimate fidelity, reduce computational complexity, and provide further robustness to model uncertainty.


Shawn Robertson

A secure framework for at risk populations in austere environments utilizing Bluetooth Mesh communications

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Alex Bardas, Chair
Drew Davidson
Fengjun Li
Bo Luo
Huazhen Fang

Abstract

Austere environments are defined by the US Military as those regularly experiencing significant environmental hazards, have limited access to reliable electricity, or require prolonged use of body armor or chemical protection equipment.  We propose that in modern society, this definition can extend also to telecommunications infrastructure, areas where an active adversary controls the telecommunications infrastructure and works against the people such as protest areas in Iran, Russia, and China or areas experiencing conflict and war such as Eastern Ukraine.  People in these austere environments need basic text communications and the ability to share simple media like low resolution pictures.  This communication is complicated by the adversaries’ capabilities as a potential nation-state actor. To address this, Low Earth Orbit satellite clusters, like Starlink, can be used to exfiltrate communications completely independent of local infrastructure.  This, however, creates another issue as these satellite ground terminals are not inherently designed to support many users over a large area.  Traditional means of extending this connectivity create both power and security concerns.  We propose that Bluetooth Mesh can be used to extend connectivity and provide communications. 

Bluetooth Mesh provides a low signal footprint to reduce the risk of detection, blends into existent signals within the 2.4ghz spectrum, has security aspects in the specification, and devices can utilize small batteries maintaining a covert form factor.  To realize this security enhancements must be made to both the provisioning process of the Bluetooth Mesh network and a key management scheme that ensures the regular and secure changing of keys either in response to an adversary’s action or as a prevention of an adversary’s action must be implemented.  We propose a provisioning process using whitelists on both provisioner and device and uses attestation for passwords allowing devices to be provisioned on deployment to protect the at-risk population and prevent BlueMirror attacks.  We also propose, implement, and measure the impact of an automated key exchange that meets the Bluetooth Mesh 3 phase specification.  Our experimentation, in a field environment, shows that Bluetooth Mesh has the throughput, reliability and security to meet the requirements of at-risk populations in austere environments. 


Venkata Mounika Keerthi

Evaluating Dynamic Resource Management for Bulk Synchronous Parallel Applications

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Hongyang Sun, Chair
David Johnson
Prasad Kulkarni


Abstract

Bulk Synchronous Parallel (BSP) applications comprise distributed tasks that synchronize at periodic intervals, known as supersteps. Efficient resource management is critical for the performance of BSP applications, especially when deployed on multi-tenant cloud platforms. This project evaluates and extends some existing resource management algorithms for BSP applications, while focusing on dynamic schedulers to mitigate stragglers under variable workloads. In particular, a Dynamic Window algorithm is implemented to compute resource configurations optimized over a customizable timeframe by considering workload variability. The algorithm applies a discount factor prioritizing improvements in earlier supersteps to account for increasing prediction errors in future supersteps. It represents a more flexible approach compared to the Static Window algorithm that recomputes the resource configuration after a fixed number of supersteps. A comparative evaluation of the Dynamic Window algorithm against existing techniques, including the Static Window algorithm, a Dynamic Model Predictive Control (MPC) algorithm, and a Reinforcement Learning (RL) based algorithm, is performed to quantify potential reductions in application duration resulting from enhanced superstep-level customization. Further evaluations also show the impacts of window size and checkpoint (reconfiguration) cost on these algorithms, gaining insights into their dynamics and performance trade-offs.

Degree: MS Project Defense (CS)


Sohan Chandra

Predicting inorganic nitrogen content in the soil using Machine Learning

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Taejoon Kim, Chair
Prasad Kulkarni
Cuncong Zhong


Abstract

This ground-breaking project addresses a critical issue in crop production: precisely determining plant-available inorganic nitrogen (IN) in soil to optimize fertilization strategies. Current methodologies frequently struggle with the complexities of determining a soil's nitrogen content, resorting to approximations and labor-intensive soil testing procedures that can lead to the pitfalls of under or over-fertilization, endangering agricultural productivity. Recognizing the scarcity of historical inorganic nitrogen (IN) data, this solution employs a novel approach that employs Generative Adversarial Networks (GANs) to generate statistically similar inorganic nitrogen (IN) data. 

 

This synthetic data set works in tandem with data from the Decision Support System for Agrotechnology Transfer (DSSAT). To address the data's inherent time-series nature, we use the power of Long Short-Term Memory (LSTM) neural networks in our predictive model. The resulting model is a sophisticated and accurate tool that can provide reliable estimates without extensive soil testing. This not only ensures precision in nutrient management but is also a cost-effective and dependable solution for crop production optimization. 


Thomas Woodruff

Model Predictive Control of Nonlinear Latent Force Models

When & Where:


M2SEC, Room G535

Committee Members:

Jim Stiles, Chair
Michael Branicky
Heechul Yun


Abstract

Model Predictive Control (MPC) has emerged as a potent approach for controlling nonlinear systems in the robotics field and various other engineering domains. Its efficacy lies in its capacity to predictively optimize system behavior while accommodating state and input constraints. Although MPC typically relies on precise dynamic models to be effective, real-world dynamic systems often harbor uncertainties. Ignoring these uncertainties can lead to performance degradation or even failure in MPC.

Nonlinear latent force models, integrating latent uncertainties characterized as Gaussian processes, hold promise for effectively representing nonlinear uncertain systems. Specifically, these models incorporate the state-space representation of a Gaussian process into known nonlinear dynamics, providing the ability to simultaneously predict future states and uncertainties.

This thesis delves into the application of MPC to nonlinear latent force models, aiming to control nonlinear uncertain systems. We formulate a stochastic MPC problem and, to address the ensuing receding-horizon stochastic optimization problem, introduce a scenario-based approach for a deterministic approximation. The resulting scenario-based approach is assessed through simulation studies centered on the motion planning of an autonomous vehicle. The simulations demonstrate the controller's adeptness in managing constraints and consistently mitigating the effects of disturbances. This proposed approach holds promise for various robotics applications and beyond.


Sai Soujanya Ambati

BERT-NEXT: Exploring Contextual Sentence Understanding

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Prasad Kulkarni, Chair
Hongyang Sun



Abstract

The advent of advanced natural language processing (NLP) techniques has revolutionized the way we handle textual data. This project presents the implementation of exploring contextual sentence understanding on the Quora Insincere Questions dataset using the pretrained BERT architecture. In this study, we explore the application of BERT, a bidirectional transformer model, for text classification tasks. The goal is to classify if a question contains hateful, disrespectful or toxic content. BERT represents the state-of-the-art in language representation models and has shown strong performance on various natural language processing tasks. In this project, the pretrained BERT base model is fine-tuned on a sample of the Quora dataset for next sentence prediction. Results show that with just 1% of the data (around 13,000 examples), the fine-tuned model achieves over 90% validation accuracy in identifying insincere questions after 4 epochs of training. This demonstrates the effectiveness of leveraging BERT for text classification tasks with minimal labeled data requirements. Being able to automatically detect toxic, hateful or disrespectful content is important to maintain healthy online discussions. However, the nuances of human language make this a challenging natural language processing problem. Insincere questions may contain offensive language, hate speech, or misinformation, making their identification crucial for maintaining a positive and safe online environment. In this project, we explore using the pretrained Bidirectional Encoder Representations from Transformers (BERT) model for next sentence prediction on the task of identifying insincere questions.


Swathi Koyada

Feature balancing of demographic data using SMOTE

When & Where:


Zoom Meeting, please email jgrisafe@ku.edu for defense link.

Committee Members:

Prasad Kulkarni, Chair
Cuncong Zhong



Abstract

The research investigates the utilization of Synthetic Minority Oversampling Techniques (SMOTE) in the context of machine learning models applied to biomedical datasets, particularly focusing on mitigating demographic data disparities. The study is most relevant to underrepresented demographic data. The primary objective is to enhance the SMOTE methodology, traditionally designed for addressing class imbalances, to specifically tackle ethnic imbalances within feature representation. In contrast to conventional approaches that merely exclude race as a fundamental or additive factor without rectifying misrepresentation, this work advocates an innovative modification of the original SMOTE framework, emphasizing dataset augmentation based on participants' demographic backgrounds. The predominant aim of the project is to enhance and reshape the distribution to optimize model performance for unspecified demographic subgroups during training. However, the outcomes indicate that despite the application of feature balancing in this adapted SMOTE method, no statistically significant enhancement in accuracy was discerned. This observation implies that while rectifying imbalances is crucial, it may not independently suffice to overcome challenges associated with heterogeneity in species representation within machine learning models applied to biomedical databases. Consequently, further research endeavors are necessary to identify novel methodologies aimed at enhancing sampling accuracy and fairness within diverse populations.


Jessica Jeng

Exploiting Data Locality for Improving Multidimensional Variational Quantum Classification

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Esam El-Araby, Chair
Drew Davidson
Prasad Kulkarni


Abstract

Quantum computing presents an opportunity to accelerate machine learning (ML) tasks on quantum processors in a similar vein to existing classical accelerators, such as graphical processing units (GPUs). In the classical domain, convolutional neural networks (CNNs) effectively exploit data locality using the convolution operation to reduce the number of fully-connected operations in multi-layer perceptrons (MLPs). Preserving data locality enables the pruning of training parameters, which results in reduced memory requirements and shorter training time without compromising classification accuracy. However, contemporary quantum machine learning (QML) algorithms do not leverage the data locality of input features in classification workloads, particularly for multidimensional data. This work presents a multidimensional quantum convolutional classifier (MQCC) that adapts the CNN structure to a variational quantum algorithm (VQA). The proposed MQCC uses quantum implementations of multidimensional convolution, pooling based on the quantum Haar transform (QHT) and partial measurement, and fully-connected operations. Time-complexity analysis will be presented to demonstrate the speedup of the proposed techniques in comparison to classical convolution and pooling operations on modern CPUs and/or GPUs. Experimental work is conducted on state-of-the-art quantum simulators from IBM Quantum and Xanadu modeling noise-free and noisy quantum devices. High-resolution multidimensional images are used to demonstrate the correctness and scalability of the convolution and pooling operations. Furthermore, the proposed MQCC model is tested on a variety of common datasets against multiple configurations of related ML and QML techniques. Based on standard metrics such as log loss, classification accuracy, number of training parameters, circuit depth, and gate count, it will be shown that MQCC can deliver a faithful implementation of CNNs on quantum machines. Additionally, it will be shown that by exploiting data locality MQCC can achieve improved classification over contemporary QML methods.