Defense Notices


All students and faculty are welcome to attend the final defense of EECS graduate students completing their M.S. or Ph.D. degrees. Defense notices for M.S./Ph.D. presentations for this year and several previous years are listed below in reverse chronological order.

Students who are nearing the completion of their M.S./Ph.D. research should schedule their final defenses through the EECS graduate office at least THREE WEEKS PRIOR to their presentation date so that there is time to complete the degree requirements check, and post the presentation announcement online.

Upcoming Defense Notices

Md Abu Saeed

Comparative Analysis of Deep Learning Models for Guava Leaf Disease Diagnosis

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Sumaiya Shomaji, Chair
David Johnson
Hongyang Sun


Abstract

Guava leaf diseases significantly affect crop yield and quality, making timely detection essential for effective disease management. This project presents an end-to-end software system for automated guava leaf disease detection using deep learning and transfer learning techniques. Multiple pretrained convolutional neural network (CNN) architectures, including ResNet, AlexNet, VGG, SqueezeNet, DenseNet, Inception-v3, and EfficientNet, were adapted through feature extraction and trained on a guava leaf image dataset.

The system allows users to either capture an image using a camera or upload an existing leaf image through a software interface. The input image is processed and classified by the trained deep learning model, and the predicted disease class is displayed to the user. The dataset was divided into training, validation, and test sets to ensure robust performance evaluation, and final test accuracy was used to measure generalization on unseen data.

Experimental results demonstrate that transfer learning enables accurate and efficient guava leaf disease classification. Among the evaluated models, the best-performing architecture achieved an accuracy between 97% to 99%. Overall, the developed software provides a practical and user-friendly solution for real-world agricultural disease diagnosis.


Zhaohui Wang

Detection and Mitigation of Cross-App Privacy Leakage and Interaction Threats in IoT Automation

When & Where:


Nichols Hall, Room 250 (Gemini Conference Room)

Committee Members:

Fengjun Li, Chair
Alex Bardas
Drew Davidson
Bo Luo
Haiyang Chao

Abstract

The rapid growth of Internet of Things (IoT) technology has brought unprecedented convenience to everyday life, enabling users to deploy automation rules and develop IoT apps tailored to their specific needs. However, modern IoT ecosystems consist of numerous devices, applications, and platforms that interact continuously. As a result, users are increasingly exposed to complex and subtle security and privacy risks that are difficult to fully comprehend. Even interactions among seemingly harmless apps can introduce unforeseen security and privacy threats. In addition, violations of memory integrity can undermine the security guarantees on which IoT apps rely.

The first approach investigates hidden cross-app privacy leakage risks in IoT apps. These risks arise from cross-app interaction chains formed among multiple seemingly benign IoT apps. Our analysis reveals that interactions between apps can expose sensitive information such as user identity, location, tracking data, and activity patterns. We quantify these privacy leaks by assigning probability scores to evaluate risk levels based on inferences. In addition, we provide a fine-grained categorization of privacy threats to generate detailed alerts, enabling users to better understand and address specific privacy risks.

The second approach addresses cross-app interaction threats in IoT automation systems by leveraging a logic-based analysis model grounded in event relations. We formalize event relationships, detect event interferences, and classify rule conflicts, then generate risk scores and conflict rankings to enable comprehensive conflict detection and risk assessment. To mitigate the identified interaction threats, an optimization-based approach is employed to reduce risks while preserving system functionality. This approach ensures comprehensive coverage of cross-app interaction threats and provides a robust solution for detecting and resolving rule conflicts in IoT environments.

To support the development and rigorous evaluation of these security analyses, we further developed a large-scale, manually verified, and comprehensive dataset of real-world IoT apps. This clean and diverse benchmark dataset supports the development and validation of IoT security and privacy solutions. All proposed approaches are evaluated using this dataset of real-world apps, collectively offering valuable insights and practical tools for enhancing IoT security and privacy against cross-app threats. Furthermore, we examine the integrity of the execution environment that supports IoT apps. We show that, even under non-privileged execution, carefully crafted memory access patterns can induce bit flips in physical memory, allowing attackers to corrupt data and compromise system integrity without requiring elevated privileges.


Shawn Robertson

A Low-Power Low-Throughput Communications Solution for At-Risk Populations in Resource Constrained Contested Environments

When & Where:


Nichols Hall, Room 246 (Executive Conference Room)

Committee Members:

Alex Bardas, Chair
Drew Davidson
Fengjun Li
Bo Luo
Shawn Keshmiri

Abstract

In resource‑constrained contested environments (RCCEs), communications are routinely censored, surveilled, or disrupted by nation‑state adversaries, leaving at‑risk populations—including protesters, dissidents, disaster‑affected communities, and military units—without secure connectivity. This dissertation introduces MeshBLanket, a Bluetooth Mesh‑based framework designed for low‑power, low‑throughput messaging with minimal electromagnetic spectrum exposure. Built on commercial off‑the‑shelf hardware, MeshBLanket extends the Bluetooth Mesh specification with automated provisioning and network‑wide key refresh to enhance scalability and resilience.

We evaluated MeshBLanket through field experimentation (range, throughput, battery life, and security enhancements) and qualitative interviews with ten senior U.S. Army communications experts. Thematic analysis revealed priorities of availability, EMS footprint reduction, and simplicity of use, alongside adoption challenges and institutional skepticism. Results demonstrate that MeshBLanket maintains secure messaging under load, supports autonomous key refresh, and offers operational relevance at the forward edge of battlefields.

Beyond military contexts, parallels with protest environments highlight MeshBLanket’s broader applicability for civilian populations facing censorship and surveillance. By unifying technical experimentation with expert perspectives, this work contributes a proof‑of‑concept communications architecture that advances secure, resilient, and user‑centric connectivity in environments where traditional infrastructure is compromised or weaponized.


Past Defense Notices

Dates

DEEPAK CHELLAMANI

A Novel DHT Routing Protocol for Manets

When & Where:


1 Eaton Hall

Committee Members:

Joseph Evans, Chair
Arvin Agah
Gunes Ercal-Ozkaya


Abstract


ROBERT TYSON THEDINGER

Store and Haul: Improving Mobile Ad-Hoc Network Connectivity through Repeated Controlled Flooding

When & Where:


246 Nichols Hall

Committee Members:

James Sterbenz, Chair
Arvin Agah
Joseph Evans


Abstract


ASHWINI SHIKARIPUR NADIG

Improving Face Recognition Performance Using a Hierarchical Bayesian Model

When & Where:


2001B Eaton Hall

Committee Members:

Brian Potetz, Chair
Luke Huan
Prasad Kulkarni


Abstract


JASON KROGE

Content-Based Image Retrieval Using Deep Belief Networks

When & Where:


2001B Eaton Hall

Committee Members:

Brian Potetz, Chair
Xue-Wen Chen
Bo Luo


Abstract


Dipen Shah

Multimedia Mobile Unit

When & Where:


2001B Eaton Hall

Committee Members:

Arvin Agah, Chair
Swapan Chakrabarti
Man Kong


Abstract


MATTHEW COOK

CPM-Based Radar Waveforms for Efficiently Bandlimiting a Transmitted Spectrum

When & Where:


246 Nichols Hall

Committee Members:

Shannon Blunt, Chair
Erik Perrins
Jim Stiles


Abstract


KEVIN PLAYER

Linearization using Digital Predistortion of a High-Speed, Pulsed, Radio Frequency Power Amplifier for VHF Radar Depth-Sounder Systems

When & Where:


2001B Eaton Hall

Committee Members:

Prasad Gogineni, Chair
Fernando Rodriguez-Morales
Sarah Seguin


Abstract


WILLIAM BLAKE

InSAR for Fine-resolution Basal Ice Sheet Imaging

When & Where:


317 Nichols Hall

Committee Members:

Chris Allen, Chair
Shannon Blunt
Carl Leuschen
Glenn Prescott
David Braaten*

Abstract


HEATHER OWEN

Design and Development of an Amplitude Leveling Subsystem for FM Radar

When & Where:


317 Nichols Hall

Committee Members:

Prasad Gogineni, Chair
Chris Allen
Sarah Seguin


Abstract


JOHN GIBBONS

Friend Lens: Novel Web Content Sharing through Strategic Manipulation of Cached HTML

When & Where:


2001B Eaton Hall

Committee Members:

Arvin Agah, Chair
Jim Miller
Brian Potetz


Abstract