Quantum Communication

This course will provide an introduction to fundamental principles underlying quantum communication, including quantum repeaters, entanglement, and other tools needed for the implementation of distributed quantum protocols. Topics include: basics of quantum computation and information; modeling and coping with noise in quantum systems; entanglement generation schemes; quantum Internet and its applications. Meets with and is similar to COMPSCI 690QC, with the exception that the final project requires students to read a research paper and compose a detailed summary of it.

Quantum Communication

This course will provide an introduction to fundamental principles underlying quantum communication, including quantum repeaters, entanglement, and other tools needed for the implementation of distributed quantum protocols. Topics include: basics of quantum computation and information; modeling and coping with noise in quantum systems; entanglement generation schemes; quantum Internet and its applications. Meets with and is similar to COMPSCI 690QC, with the exception that the final project requires students to read a research paper and compose a detailed summary of it.

Reverse Engin & Exploit Dev

Software is everywhere and many developers aren't aware of how to properly write secure code. We will cover practical skills in reverse engineering and binary exploitation and delve into the techniques used by adversaries for some of the largest security incidents of the century. With a strong understanding of attack patterns, students will be able to implement more secure coding practices into their own code and defend against these attacks.

Reverse Engin & Exploit Dev

Software is everywhere and many developers aren't aware of how to properly write secure code. We will cover practical skills in reverse engineering and binary exploitation and delve into the techniques used by adversaries for some of the largest security incidents of the century. With a strong understanding of attack patterns, students will be able to implement more secure coding practices into their own code and defend against these attacks.

Mobile and Wireless Networks

This course covers both the principles and the practice of mobile and wireless networks. Topics will include application use cases, the unique aspects of the wireless (as opposed to wireline) links, and approaches for handling mobility, authentication, security and privacy, energy management, user localization, and virtualization in mobile and wireless networks. The focus of 'practice' will cover the overall architectures (both control plane and data plane) of 802.11 (WiFi) networks and 4G/5G cellular systems; Bluetooth, satellite, and IoT networks will also be briefly covered.

Mobile and Wireless Networks

This course covers both the principles and the practice of mobile and wireless networks. Topics will include application use cases, the unique aspects of the wireless (as opposed to wireline) links, and approaches for handling mobility, authentication, security and privacy, energy management, user localization, and virtualization in mobile and wireless networks. The focus of 'practice' will cover the overall architectures (both control plane and data plane) of 802.11 (WiFi) networks and 4G/5G cellular systems; Bluetooth, satellite, and IoT networks will also be briefly covered.
Subscribe to