Program


   9:00 am - 9:45 am Breakfast
Opening Remarks
Prof. Amir Rahmati
Adaptive Volume Visualizations for AR
Matthew Castellana
EyeCanDo
Rui Liu
Backdoor Cleansing with Unlabeled Data
Lu Pang
Learned representation-guided diffusion models for large-image generation
Srikar Yellapragada
Transparent Object Tracking with Enhanced Fusion Module
Kalyan Garigapati
  11:15 am - 11:30 am Break
Title: From Theory to Practice: Cybersecurity in Today’s Industry
Cybersecurity Analyst at Jane Street Capital

Abstract:

Transitioning from academia to industry can bring both excitement and challenges. This talk aims to provide guidance for this journey by exploring the work environment disparities between grad school and industry positions. Drawing from firsthand experiences, we will discuss practical strategies for current students to prepare themselves effectively for industry roles. Furthermore, we will delve into the dynamic landscape of the cybersecurity industry, shedding light on prevalent challenges and emerging trends. From combating ransomware to addressing social engineering threats, we will examine the pressing issues cybersecurity professionals encounter daily. Finally, we will illustrate the practical applications of academic research within the professional world.


About the Speaker:

Brian Kondracki is a Cybersecurity Analyst at Jane Street Capital. He earned his Ph.D. in Computer Science in May 2023 from Stony Brook University. There, he worked in the Pragsec lab under the guidance of Professor Nick Nikiforakis. His research focuses on web and network security; specifically, on developing techniques to identify networked entities using characteristics of their behavior. During his Ph.D., Brian was an author on nine published works in the cybersecurity space, winning awards such as third place in the 2021 CSAW Applied Research competition, as well as the 11th annual NSA Best Scientific Cybersecurity Paper competition.

Poster Presenters
Binary Analysis Framework
Huan Nguyen
Polynomial Neural Representation for Videos
Snehal Singh Tomar
Exfoil: Uncovering APT Campaigns Through Effective Detection of Data Gathering and Exfiltration
Hanke Kimm
The More Things Change, the More They Stay the Same: Integrity of Modern JavaScript
Johnny So
Fast American Option Pricing using Nonlinear Stencils
Yimin Zhu
Diffusion is All You Need for Image Classification
Hritam Basak
BioForge: Attacking Biosignal Authentication
Veena Krish
eReduce: Inline audit data reduction
Soundarya Venkatesh
3DGraphX: Explaining 3D Molecular Graph Models via Incorporating Chemical Priors
Xufeng Liu
Screw Geometry Meets Bandits: Incremental Acquisition of Demonstrations for Generating Manipulation Plans
Dibyendu Das
Knock knock. Who’s there? Cyber deception for web applications.
Billy Tsouvalas
EZPIT: Real-time X-ray Data Processing and ML Structure Modeling for Disordered Materials
Yichen Liu
ITSC: Iterative Box Slicing For Object Part Segmentation
Khiem Phi
Integrative Graph Transformer Framework for Whole Slide Image Representation and Classification
Zhan shi
Representing Human-lives as Embeddings
Tanzir Pial
Word Definitions from Large Language Models
Yunting Yin
Visualizing GDP, Total Population and Population holding a degree in Education
Sucharita Inapanuri
Plugging the Leaks in Secure Archival Systems
Christopher Smith
An Embarrassingly Simple Backdoor Attack on Self-supervised Learning
Changjiang Li
Jawthenticate: Microphone-free Speech-based Authentication using Jaw Motion and Facial Vibrations
Tanmay Srivastava
FairPlay: A Collaborative Approach to Mitigate Bias in Datasets for Improved AI Fairness
Mithilesh Singh
Expression-Guided NeRF-based Talking Face Generation
Sai Tanmay Reddy Chakkera
Balancing Costs and Durability for Serverless Data
Alex Merenstein
OVIDA: Orchestrator for Video analytics on Disaggregated Architecture
Manavjeet Singh
Hand Gesture Recognition for Blind Users by Tracking 3D Gesture Trajectory
Prerna Khanna
What about MINA? Mined Attention to Detect Whataboutism Deception in Social Media
Khiem Phi
LeakLess: Selective Data Protection against Memory Disclosure and Transient Execution Attacks for Serverless Architectures
Maryam Rostamipoor
Constant-Factor Approximation Algorithms for Convex Cover and Hidden Set in a Simple Polygon
Reilly Browne
  3:15 pm - 3:30 pm Break
Binary instrumentation: Can we modify a program without source code?
Soumyakant Priyadarshan
Metis: File System Model Checking via Versatile Input and State Exploration
Yifei Liu
Towards Universal Authentication in IoT Ecosystem
Sanket Goutam
The Times They Are A-Changin'
Chris Tsoukaladelis
Speeding up Stencil Computation using Gaussian Approximations
Yimin Zhu
   4:45 - 5:00 pm Break
Panel:
Prof. Samir Das, Department Chair; Prof. Steve Skiena; Prof. Mike Ferdman
  6:00 pm - 6:30 pm Awards and Closing Ceremony