PhD students who plan on defending and graduating must follow all of the instructions as detailed by GRS.
This page serves as a compilation of upcoming and past PhD final dissertation defenses. BU Libraries offers resources for finding past dissertations.
Upcoming
- Dina Bashkirova, “Domain Invariance for Semantically Consistent Image Manipulation” (Monday, November 20, 2023, 11:00 AM in CDS 548)
- Andrea Burns, “Learning and Evaluating Multimodal Representations for Digital Domains” (Monday, November 27, 2023, 10:00 AM in CDS 1101)
AY2022-2023
- Han Dong, “A Data-Driven Study of Operating System Energy-Performance Trade-Offs Towards System Self Optimization”
- Ahmad (Sasan) Golchin, “TOWARDS A USB CONTROL AREA NETWORK”
- Ping Hu, “Pixel-Level Video Understanding with Efficient Deep Models”
- Hieu Le, “ON ROBUSTNESS AND EXPLAINABILITY OF DEEP LEARNING”
- Andrew Wood, “Accelerating Machine Learning with Memory Management and Persistent Memory”
- Yida Xin, “Disambiguating Natural Language via Aligning Meaningful Descriptions”
- Esmail (Showan) Asyabi, “Resource-efficient, performant in-memory KV stores for at-scale data centers”
- William Blair, “Detecting and Mitigating Software Security Vulnerabilities Through Secure Environment Programming”
- Jiawen Liu, “Program Analysis for Quantitative-reachability Properties”
- Ali Raza, “SPECIALIZING A GENERAL-PURPOSE OPERATING SYSTEM”
- Nataniel Ruiz Gutierrez, “Simulating to Learn: Using Adaptive Simulation to Train, Test and Understand Neural Networks”
- Kuniaki Saito, “Towards Open-World Image Recognition”
- Gavin Brown, “Memorization and Private Inference in Machine Learning”
- Nathan Cordner, “Scalable Algorithms for Correlation Clustering on Large Graphs”
- Ali Raza, “Orchestrating Cloud Resources To Optimize Performance and Cost”
- Konstantinos Sotiropoulos, “Methods, Algorithms and Impossibility Results for Machine Learning on Graphs”
- Pratik Sarkar, “Enhancing Security of Cryptographic Protocols through Better Modularization”
AY2021-2022
- Ethan Heilman, “Mirror worlds, eclipse attacks and the security of Bitcoin and the RPKI”
- Weihao Qu, “Program-Based Analysis for Quantitative Properties”
- Jiayu Zhang, “Delegation of Quantum Computation Using a Random Oracle”
- Xiao Zhou, “NON-COMPETITIVE AND COMPETITIVE DEEP LEARNING FOR APPLICATIONS”
- Dmytro Bogatov, “Secure and Efficient Query Processing In Outsourced Databases”
- Qi Feng, “TELL ME WHAT TO TRACK: VISUAL OBJECT TRACKING AND RETRIEVAL BY NATURAL LANGUAGE DESCRIPTIONS”
- Emine Ugur Kaynar, “COOPERATIVE CACHING FOR OBJECT STORAGE”
- Donghyun Kim, “Learning Generalizable and Transferable Representations Across Domains and Modalities”
- Tomislav Petrovic, “Some Results on Kolmogorov-Loveland Randomness”
- Ben Usman, “Manipulating Natural Images by Learning Relationships Between Visual Domains”
- Laura Greige, “Anomaly Detection in Competitive Multiplayer Games”
- Rawane Issa, “Towards Secure Computation for People”
- Mark Lemay, “A Dependently Typed Programming Language with Dynamic Equality”
- Siddharth Mysore Sthaneshwar, “Conditioning Behavior Styles of Reinforcement Learning Policies”
- Soham Sinha, “Towards a Centralized Multicore Automotive System”
- Zhenxun Zhuang, “Adaptive Strategies in Non-convex Optimization”