{"id":31350,"date":"2021-03-11T13:39:57","date_gmt":"2021-03-11T18:39:57","guid":{"rendered":"https:\/\/www.bu.edu\/cise\/?page_id=31350"},"modified":"2025-04-16T16:43:35","modified_gmt":"2025-04-16T20:43:35","slug":"cise-best-student-paper-award","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/cise\/programs\/student-programs\/best-paper\/cise-best-student-paper-award\/","title":{"rendered":"CISE Best Student Paper Award Competition"},"content":{"rendered":"<p style=\"text-align: left;\"><img loading=\"lazy\" src=\"\/cise\/files\/2022\/02\/best-student-paper-sm-f.png\" alt=\"\" width=\"359\" height=\"239\" class=\" wp-image-35828 alignleft\" \/>The CISE Best Student Paper Award competition was established to promote student research and recognize the scientific quality of research being conducted by CISE students. <span>The opportunity is open to all students <\/span><span>currently enrolled at Boston University who are <\/span><span>advised by a CISE faculty affiliate at the time of paper submission.\u00a0<\/span><\/p>\n<p>On April 4th, 2025 the Best Student Paper Award winner and finalist were announced and presented their papers to the CISE community.<br \/>\n<strong>Event Information: Friday, April 4, 3-4PM at 8 St. Mary&#8217;s St, PHO 210.<\/strong><\/p>\n<h3>1st PLACE AWARD<\/h3>\n<p><a href=\"https:\/\/openreview.net\/pdf?id=nrRkAAAufl\" target=\"_blank\" rel=\"noopener noreferrer\">Constraint-Conditioned Actor-Critic for Offline Safe Reinforcement Learning<\/a><br \/>\nLead author:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/zijian-guo\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Zijian Guo<\/strong><\/a>,<span>\u00a0<\/span>PhD candidate of Systems Engineering<br \/>\n(Advisor: <a href=\"https:\/\/www.linkedin.com\/in\/wenchao-li-b3b13016\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wenchao Li<\/a>)<\/p>\n<h3>2nd PLACE AWARD<\/h3>\n<p><a href=\"https:\/\/www.bu.edu\/peaclab\/files\/2024\/05\/saad_ullah_llm_final.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks<\/a><br \/>\nLead author: <strong><a href=\"https:\/\/www.linkedin.com\/in\/saadullah01\/\" target=\"_blank\" rel=\"noopener noreferrer\">Saad Ullah<\/a><\/strong>, PhD candidate of Electrical and Computer Engineering<br \/>\n(Advisor: <a href=\"https:\/\/www.linkedin.com\/in\/gianlucastringhini\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gianluca Stringhini<\/a>)<\/p>\n<hr \/>\n<div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">2024 Winners<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/p>\n<p><div class=\"cise-callout-box profile\"><\/p>\n<p><\/div><\/p>\n<p><strong>Finalists: <\/strong><\/p>\n<p>Hoang Tran \u201cBetter SGD using Second-order Momentum\u201d (NeurIPS 2022) (Advisor: Ashok Cutkosky), Jimuyang Zhang \u201cCoaching a Teachable Student\u201d (CVPR 2023) (Advisor: Eshed Ohn-Bar)<\/p>\n<p>Mohammad Hammas Saeed \u201cT<span data-sheets-root=\"1\" data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;TUBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to their Source Communities*&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:15233,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:2,&quot;11&quot;:0,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;LinBiolinumTB&quot;,&quot;16&quot;:14}\">UBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to their Source Communities\u201d (ICWSM 2024) <\/span>(Advisor: Gianluca Stringhini)<\/p>\n<p>Haoxing Tian \u201c<span data-sheets-root=\"1\" data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Convergence of Actor-Critic Methods with Multi-Layer Neural Networks&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:15233,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:2,&quot;11&quot;:0,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;LinBiolinumTB&quot;,&quot;16&quot;:14}\">Convergence of Actor-Critic Methods with Multi-Layer Neural Networks\u201d (NeurIPS 2023) <\/span>(Advisors: Yannis Paschalidis &amp; Alex Olshevsky).<\/p>\n<p><\/div>\n<\/div>\n\n<hr \/>\n<div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">2022 Winners<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/p>\n<p><div class=\"cise-callout-box profile\"><\/p>\n<p><\/div><\/p>\n<h3><b>First Place\u00a0<\/b><\/h3>\n<p><b><span>Rui Liu, PhD Candidate of Systems Engineering. <\/span><\/b>(Advisor: <span>Alex <\/span><span>Olshevsky<\/span><span><\/span>). \u201c<span>Temporal Difference Learning as Gradient Splitting<\/span>.&#8221; <span>International Conference on Machine Learning, 2021 <\/span>doi: <a href=\"https:\/\/proceedings.mlr.press\/v139\/liu21q\/liu21q.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/proceedings.mlr.press\/v139\/liu21q\/liu21q.pdf<\/a><\/p>\n<h3><b>Second Place\u00a0<\/b><\/h3>\n<p><b><span>Anthony Byrne, PhD Candidate of Computer Engineering.<\/span><\/b><span> (Advisor, Ayse Coskun). \u201cMicroFaaS: Energy-efficient Serverless on Bare-metal Single-board Computers.&#8221; 2022 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE) doi: <a append-to-href=\"?src=document\" target=\"_blank\" href=\"https:\/\/doi.org\/10.23919\/DATE54114.2022.9774688\" rel=\"noopener noreferrer\">10.23919\/DATE54114.2022.9774688<\/a><\/span><\/p>\n<h3><b>Finalists<\/b><\/h3>\n<p><b><span>Salom\u00f3n Wollenstein-Betech, PhD Candidate of Systems Engineering.<\/span><\/b><span> (Advisors: Christos Cassandras and Yannis Paschalidis). \u201cRouting and Rebalancing Intermodal Autonomous Mobility-on-Demand Systems in Mixed Traf\ufb01c.&#8221; <\/span>IEEE Transactions On Intelligent Transportation Systems, Vol. 23, No. 8, August 2022 12263 <span>doi: <a append-to-href=\"?src=document\" target=\"_blank\" href=\"https:\/\/doi.org\/10.1109\/TITS.2021.3112106\" rel=\"noopener noreferrer\">10.1109\/TITS.2021.3112106<\/a><\/span><\/p>\n<p><b><span>Alexander Bulekov, PhD Candidate of Computer Engineering. <\/span><\/b><span>(Advisor: Manuel Egele)\u00a0 \u201cMORPHUZZ: Bending (Input) Space to Fuzz Virtual Devices.\u201d Proceedings of the 31st USENIX Security Symposium, <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/bulekov\" target=\"_blank\" rel=\"noopener noreferrer\">doi: https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/bulekov<\/a><\/span><\/p>\n<p><b><span>James Queeney, PhD Candidate of Systems Engineering. <\/span><\/b><span>(Advisors: Yannis Paschalidis and Christos Cassandras) \u201cGeneralized Proximal Policy Optimization with Sample Reuse.&#8221; 35th Conference on Neural Information Processing Systems (NeurIPS 2021),<a href=\"https:\/\/arxiv.org\/pdf\/2111.00072.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> doi: https:\/\/arxiv.org\/pdf\/2111.00072.pdf<\/a><\/span><\/p>\n<p><\/div>\n<\/div>\n\n<hr \/>\n<div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">2021 Winners<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/p>\n<p><div class=\"cise-callout-box profile\"><\/p>\n<p><\/div><\/p>\n<h3><b>First Place (tie)<\/b><\/h3>\n<p><b><span>Sheila Seidel, PhD Candidate, ECE.\u00a0<\/span><\/b>(Advisor: Vivek Goyal). \u201cTwo-Dimensional Non-Line-of-Sight Scene Estimation from a Single Edge Occluder.\u201d<em><span>\u00a0<\/span>IEEE Transactions on Computational Imaging<\/em>, vol. 7, pp. 58-72, 2021,<span>\u00a0<\/span><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9257185\" target=\"_blank\" rel=\"noopener noreferrer\">doi: 10.1109\/TCI.2020.3037405<\/a>.<\/p>\n<p><b><span>Ali Siahkamari, PhD Candidate, ECE.<\/span><\/b><span>\u00a0(Advisor, Brian Kulis). \u201cPiecewise Linear Regression via a Difference of Convex Functions.\u201d\u00a0<\/span><em>Proceedings of the 37th International Conference on Machine Learning.<\/em>\u00a0<a href=\"http:\/\/proceedings.mlr.press\/v119\/siahkamari20a.html\" target=\"_blank\" rel=\"noopener noreferrer\">PMLR 119:8895-8904,\u00a02020<span>\u00a0<\/span><\/a>119:8895-8904,\u00a02020.<\/p>\n<h3><b>Finalists<\/b><\/h3>\n<p><b><span>Beliz Kaleli, PhD Candidate, ECE.<\/span><\/b><span>\u00a0(Advisors: Gianluca Stringhini, Manuel Egele). \u201cTo Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media.\u201d\u00a0<em>Network and Distributed System Security Symposium (<\/em><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/to-err-is-human-characterizing-the-threat-of-unintended-urls-in-social-media\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>NDSS)<\/em>\u00a02021. Session 3A-4<\/a>.<\/span><\/p>\n<p><b><span>James Queeney, PhD Candidate, SE.\u00a0<\/span><\/b><span>(Advisors: Yannis Paschalidis, Christos Cassandras) \u201cUncertainty-Aware Policy Optimization: A Robust, Adaptive Trust Region Approach.\u201d\u00a0<em>Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence\u00a0<a href=\"https:\/\/www.catalyzex.com\/paper\/arxiv:2012.10791\" target=\"_blank\" rel=\"noopener noreferrer\">(AAAI-21) 5930<\/a><\/em>.<\/span><i><span><\/span><\/i><\/p>\n<p><b><span>Artin Spiridonoff, PhD Candidate, SE.<\/span><\/b><span>\u00a0(Advisors: Yannis Paschalidis, Alex Olshevsky)\u00a0 \u201cRobust Asynchronous Stochastic Gradient-Push: Asymptotically Optimal and Network-Independent Performance for Strongly Convex Functions.\u201d\u00a0<\/span><em>Journal of Machine Learning Research<\/em>\u00a0<span>\u00a0<\/span><a href=\"https:\/\/arxiv.org\/pdf\/1811.03982.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">JMLR. 21(58):1\u221247, 2020<\/a>.<\/p>\n<p><\/div>\n<\/div>\n\n<hr \/>\n<div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">2020 Winners<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/p>\n<p><div class=\"cise-callout-box profile\"><\/p>\n<p><\/div><\/p>\n<p><strong>First Place \u2013 Zachary Serlin\u00a0<\/strong>(Advisor: Calin Belta)\u00a0<em>Li, X., Serlin, Z.,Yang, G., &amp; Belta, C. (2019). <\/em>\u201cA formal methods approach to interpretable reinforcement learning for robotic planning.\u201d <em>Science Robotics. <span>Dec 2019: <\/span><span>Vol. 4, Issue 37, eaay6276 <\/span><\/em><a href=\"https:\/\/robotics.sciencemag.org\/content\/4\/37\/eaay6276\" target=\"_blank\" rel=\"noopener noreferrer\"><span>DOI: 10.1126\/scirobotics.aay6276<\/span><\/a><\/p>\n<p><strong>Second Place \u2013Charles\u00a0Saunders<\/strong>\u00a0(Advisor: Vivek Goyal) Saunders, C., Murray-Bruce, J. &amp; Goyal, V.K. \u201cComputational periscopy with an ordinary digital camera.\u201d\u00a0<em>Nature<\/em>\u00a0565,<strong>\u00a0<\/strong>472\u2013475 (2019) <a href=\"https:\/\/www.nature.com\/articles\/s41586-018-0868-6\" target=\"_blank\" rel=\"noopener noreferrer\">doi:10.1038\/s41586-018-0868-6<\/a><\/p>\n<p><strong>Third Place (tie) \u2013<\/strong>\u00a0<strong>Leila Delshadtehrani\u00a0<\/strong>(Advisors: Manuel Egele &amp; Ajay Joshi) Delshadtehrani, L., Canakci, S., Zhou, B., Eldridge, S., Joshi, A., &amp; Egele, M. \u201cPHMon: A Programmable Hardware Monitor and Its Security Use Cases\u201d,\u00a0<em>29th USENIX Security Symposium<\/em>, Boston, MA, August 2020. <a href=\"https:\/\/www.usenix.org\/system\/files\/sec20-delshadtehrani.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">USENIX paper\u00a0<\/a><\/p>\n<p><strong>Third Place (tie)<\/strong>\u00a0<strong>Taiyao Wang<\/strong>\u00a0(Advisor: Yannis\u00a0Paschalidis)\u00a0<em>Convergence of Parameter Estimates for Regularized Mixed Linear Regression Models, <\/em>Wang, T., &amp; Paschalidis, I.C. Presented at the\u00a0<em>CDC 2019<\/em>, Nice, France Dec. 11-19, 2019<\/p>\n<hr \/>\n<p><\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>The CISE Best Student Paper Award competition was established to promote student research and recognize the scientific quality of research being conducted by CISE students. The opportunity is open to all students currently enrolled at Boston University who are advised by a CISE faculty affiliate at the time of paper submission.\u00a0 On April 4th, 2025 [&hellip;]<\/p>\n","protected":false},"author":15670,"featured_media":35828,"parent":32408,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"page-templates\/no-sidebars.php","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/cise\/wp-json\/wp\/v2\/pages\/31350"}],"collection":[{"href":"https:\/\/www.bu.edu\/cise\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/cise\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/cise\/wp-json\/wp\/v2\/users\/15670"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/cise\/wp-json\/wp\/v2\/comments?post=31350"}],"version-history":[{"count":51,"href":"https:\/\/www.bu.edu\/cise\/wp-json\/wp\/v2\/pages\/31350\/revisions"}],"predecessor-version":[{"id":42121,"href":"https:\/\/www.bu.edu\/cise\/wp-json\/wp\/v2\/pages\/31350\/revisions\/42121"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/cise\/wp-json\/wp\/v2\/pages\/32408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/cise\/wp-json\/wp\/v2\/media\/35828"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/cise\/wp-json\/wp\/v2\/media?parent=31350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}