Defense Notices


All students and faculty are welcome to attend the final defense of EECS graduate students completing their M.S. or Ph.D. degrees. Defense notices for M.S./Ph.D. presentations for this year and several previous years are listed below in reverse chronological order.

Students who are nearing the completion of their M.S./Ph.D. research should schedule their final defenses through the EECS graduate office at least THREE WEEKS PRIOR to their presentation date so that there is time to complete the degree requirements check, and post the presentation announcement online.

Upcoming Defense Notices

Md Abu Saeed

Comparative Analysis of Deep Learning Models for Guava Leaf Disease Diagnosis

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Sumaiya Shomaji, Chair
David Johnson
Hongyang Sun


Abstract

Guava leaf diseases significantly affect crop yield and quality, making timely detection essential for effective disease management. This project presents an end-to-end software system for automated guava leaf disease detection using deep learning and transfer learning techniques. Multiple pretrained convolutional neural network (CNN) architectures, including ResNet, AlexNet, VGG, SqueezeNet, DenseNet, Inception-v3, and EfficientNet, were adapted through feature extraction and trained on a guava leaf image dataset.

The system allows users to either capture an image using a camera or upload an existing leaf image through a software interface. The input image is processed and classified by the trained deep learning model, and the predicted disease class is displayed to the user. The dataset was divided into training, validation, and test sets to ensure robust performance evaluation, and final test accuracy was used to measure generalization on unseen data.

Experimental results demonstrate that transfer learning enables accurate and efficient guava leaf disease classification. Among the evaluated models, the best-performing architecture achieved an accuracy between 97% to 99%. Overall, the developed software provides a practical and user-friendly solution for real-world agricultural disease diagnosis.


Zhaohui Wang

Detection and Mitigation of Cross-App Privacy Leakage and Interaction Threats in IoT Automation

When & Where:


Nichols Hall, Room 250 (Gemini Conference Room)

Committee Members:

Fengjun Li, Chair
Alex Bardas
Drew Davidson
Bo Luo
Haiyang Chao

Abstract

The rapid growth of Internet of Things (IoT) technology has brought unprecedented convenience to everyday life, enabling users to deploy automation rules and develop IoT apps tailored to their specific needs. However, modern IoT ecosystems consist of numerous devices, applications, and platforms that interact continuously. As a result, users are increasingly exposed to complex and subtle security and privacy risks that are difficult to fully comprehend. Even interactions among seemingly harmless apps can introduce unforeseen security and privacy threats. In addition, violations of memory integrity can undermine the security guarantees on which IoT apps rely.

The first approach investigates hidden cross-app privacy leakage risks in IoT apps. These risks arise from cross-app interaction chains formed among multiple seemingly benign IoT apps. Our analysis reveals that interactions between apps can expose sensitive information such as user identity, location, tracking data, and activity patterns. We quantify these privacy leaks by assigning probability scores to evaluate risk levels based on inferences. In addition, we provide a fine-grained categorization of privacy threats to generate detailed alerts, enabling users to better understand and address specific privacy risks.

The second approach addresses cross-app interaction threats in IoT automation systems by leveraging a logic-based analysis model grounded in event relations. We formalize event relationships, detect event interferences, and classify rule conflicts, then generate risk scores and conflict rankings to enable comprehensive conflict detection and risk assessment. To mitigate the identified interaction threats, an optimization-based approach is employed to reduce risks while preserving system functionality. This approach ensures comprehensive coverage of cross-app interaction threats and provides a robust solution for detecting and resolving rule conflicts in IoT environments.

To support the development and rigorous evaluation of these security analyses, we further developed a large-scale, manually verified, and comprehensive dataset of real-world IoT apps. This clean and diverse benchmark dataset supports the development and validation of IoT security and privacy solutions. All proposed approaches are evaluated using this dataset of real-world apps, collectively offering valuable insights and practical tools for enhancing IoT security and privacy against cross-app threats. Furthermore, we examine the integrity of the execution environment that supports IoT apps. We show that, even under non-privileged execution, carefully crafted memory access patterns can induce bit flips in physical memory, allowing attackers to corrupt data and compromise system integrity without requiring elevated privileges.


Shawn Robertson

A Low-Power Low-Throughput Communications Solution for At-Risk Populations in Resource Constrained Contested Environments

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Alex Bardas, Chair
Drew Davidson
Fengjun Li
Bo Luo
Shawn Keshmiri

Abstract

In resource‑constrained contested environments (RCCEs), communications are routinely censored, surveilled, or disrupted by nation‑state adversaries, leaving at‑risk populations—including protesters, dissidents, disaster‑affected communities, and military units—without secure connectivity. This dissertation introduces MeshBLanket, a Bluetooth Mesh‑based framework designed for low‑power, low‑throughput messaging with minimal electromagnetic spectrum exposure. Built on commercial off‑the‑shelf hardware, MeshBLanket extends the Bluetooth Mesh specification with automated provisioning and network‑wide key refresh to enhance scalability and resilience.

We evaluated MeshBLanket through field experimentation (range, throughput, battery life, and security enhancements) and qualitative interviews with ten senior U.S. Army communications experts. Thematic analysis revealed priorities of availability, EMS footprint reduction, and simplicity of use, alongside adoption challenges and institutional skepticism. Results demonstrate that MeshBLanket maintains secure messaging under load, supports autonomous key refresh, and offers operational relevance at the forward edge of battlefields.

Beyond military contexts, parallels with protest environments highlight MeshBLanket’s broader applicability for civilian populations facing censorship and surveillance. By unifying technical experimentation with expert perspectives, this work contributes a proof‑of‑concept communications architecture that advances secure, resilient, and user‑centric connectivity in environments where traditional infrastructure is compromised or weaponized.


Past Defense Notices

Dates

BRETT WERLING

A Hardware Implementation of the Soft Output Viterbi Algorithm for Serially Concatenated Convolutional Codes

When & Where:


246 Nichols Hall

Committee Members:

Erik Perrins, Chair
Perry Alexander
Andy Gill


Abstract


KEVIN PETERS

Design and Performance Analysis of a Geographic Routing Protocol for Highly Dynamic MANETs

When & Where:


246 Nichols Hall

Committee Members:

James Sterbenz, Chair
Gary Minden
Hossein Saiedian


Abstract


ABDUL JABBAR MOHAMMAD

A Framework to Quantify Network Resilience and Survivability

When & Where:


235 Nichols Hall

Committee Members:

James Sterbenz, Chair
Victor Frost
David Hutchison
Gary Minden
Tyrone Duncan*

Abstract


YUANYUAN ZHANG

Advanced Modulation Techniques for High Speed Fiber-Optic Transmission

When & Where:


2001B Eaton Hall

Committee Members:

Ron Hui, Chair
Chris Allen
Victor Frost
Erik Perrins
Hui Zhao*

Abstract


MATTHEW CASPER

Radar Testbed Characterization for Evaluation of Modulated Scatterer Concepts

When & Where:


250 Nichols Hall

Committee Members:

Chris Allen, Chair
Shannon Blunt
Carl Leuschen


Abstract


ARVIND MADHAVAN

Improving the Bandwidth of a UHF RFID Tag Using a Capacitor

When & Where:


246 Nichols Hall

Committee Members:

Dan Deavours, Chair
Erik Perrins
Jim Stiles


Abstract


JUSTIN EHRLICH

The Effect of Desktop Illumination Realism on Presence in a Virtual Learning Environment

When & Where:


2001B Eaton Hall

Committee Members:

James Miller, Chair
Perry Alexander
Gunes Ercal
Man Kong
Sean Smith*

Abstract


ZAID HAYYEH

Exploiting OFDM Systems for Covert Communication

When & Where:


246 Nichols Hall

Committee Members:

Victor Frost, Chair
Dave Petr
Erik Perrins


Abstract


JUSTIN ROHRER

End-to-End Resilience Mechanisms for Network Transport Protocols

When & Where:


246 Nichols Hall

Committee Members:

James Sterbenz, Chair
Joseph Evans
Victor Frost
David Bonner
Tyrone Duncan*

Abstract


MARK SNYDER

Type-Driven Specification Analysis

When & Where:


2001B Eaton Hall

Committee Members:

Perry Alexander, Chair
Gunes Ercal-Ozkaya
Andy Gill
Nancy Kinnersley
Jeremy Martin*

Abstract