Seminar Assignment Winter 2024/2025

The central registration for all computer science seminars will open on September 11th.

This system is used to distribute students among the available seminars offered by the CS department. To register for any of the seminars, you have to register here until October 16th, 23:59 CET. You can select which seminar you would like to take, and will then be automatically assigned to one of them on October 18th.

Please note the following:

  • We aim to provide a fair mapping that respects your wishes, but at the same time also respects the preferences of your fellow students.
  • Experience has shown that particular seminars are more popular than others, yet these seminars cannot fit all students.
  • Please only select seminars if you are certain that you actually do want to complete a seminar this semester. If you have already obtained sufficient seminar credits, or plan to take other courses this semester, feel free not to choose any seminars. Students who drop out of seminars take away places from those, who might urgently need a space or are strongly interested in the topic.
  • We encourage those students who wish to take a seminar this semester, to select their preferences for all available seminars, which eases the process to assign students that do not fit the overly popular seminars to another, less crowded one. So if you are serious about taking a seminar this semester, please select at least three seminars (with priority from "High" to "Low").
  • If you urgently need to be assigned to a seminar in the upcoming semester, choose at least five seminars (with priority from "High" to "Low"). We will then guarantee that you will be assigned to a seminar (yet not necessarily one of your choice).
  • If you are really dedicated to one particular seminar, and you do not want any other seminar, please select the "No seminar" as second and third positive option. However, this may ultimately lead to the situation that you are not assigned to any seminar. Also, choosing "No seminar" as second/third option does not increase your chances of getting your first choice.

The assignment will be performed by a constraint solver on October 18th, 2024. You will be added to the respective seminars automatically and be notified about this shortly thereafter. Please note that the assignment cannot be optimal for all students if you drop the assigned seminar, i.e., make only serious choices to avoid penalty to others.


Seminars

Advanced topics in complexity theory by Markus Bläser

In this seminar, we will study recent topics in complexity theory. The seminar builds upon the core lecture "Complexity Theory" held in the last semester. This seminar will be a block course during the semester break.

Requirements: Core lecture "Complexity Theory" or equivalent

Places: 8

Advances in AI for Autonomous Driving by Matthias Klusch, Andreas Nonnengart, André Meyer-Vitali

This seminar (AI4AD) is concerned with advances in autonomous driving research from the perspective of AI. In particular, we will take a closer look at techniques and systems of AI for autonomous driving with focus on predicting the behavior of pedestrians and vehicles as well as collision-free navigation of self-driving cars in various traffic scenarios, and discuss their strengths and weaknesses. The selected approaches are based on deep learning, neuro-explicit and large language models.

The seminar type is classic in the sense that registered participants will present and discuss assigned topics. In addition, there will be two dedicated opponents for each presentation of an assigned topic.

The seminar takes place on Wednesdays, 4:15pm - 6pm, at DFKI Saarbrücken (SIC Bldg. D3.2), in room "Turing II" (DFKI NB +2.31). Please ask at the DFKI reception for direction to room "Turing II".

First seminar session (introduction and topic assignments) is on Wednesday 23.10.2024 at 4:15pm

For more information, please visit the seminar website: https://www.dfki.de/~klusch/AI4AD-seminar-ws24

Requirements: This seminar aims primarily at advanced bachelor and master students in Computer Science and DSAI. Solid knowledge in AI (ideally, taken introductory courses on AI, ML, genAI, or sufficient knowledge on these areas from other sources) is required. Participants should be very interested in the domain of autonomous driving research and development. Selected background papers for the seminar are referenced on the seminar website (topics).

Places: 10

Algorithms with Predictions by Kurt Mehlhorn, Nidhi Rathi, Golnoosh Shahkarami

Learning-augmented algorithms is a recent line of research that seeks to blend the strengths of machine learning with classical algorithms, aiming for both practical efficiency and robustness. In this framework, we are provided with predictions about missing data—such as future data in online algorithms or private data in truthful mechanisms—though the accuracy of these predictions is uncertain. The objective is to improve the performance guarantees when predictions are accurate and to incur only a constant loss when predictions are poor.

Some initial lectures will be taken by the instructors to explain the basics that will help students to select their paper/topic. The seminar is open for all interested students and postdocs. Students aiming to get credit points must give a regular presentation (of the chosen research paper) and write a short summary about it. The presentation needs to be discussed with us at least one week before your scheduled talk.

See the seminar website for more information (https://www.mpi-inf.mpg.de/departments/algorithms-complexity/teaching/winter-2024/25/algorithms-with-predictions) or contact us (nrathi@mpi-inf.mpg.de, gshahkar@mpi-inf.mpg.de) in case there are any questions!

Requirements: This is a theoretical seminar that will require mathematical maturity (in particular, the ability to understand and write formal mathematical proofs) and a good background in algorithms. A proper preparation of your talk will require non-trivial effort. The target audience of this seminar are master students, PhD students, as well as postdocs.

Places: 10

Aspects of Quantitative Program Verification by Benjamin Kaminski, Tobias Gürtler, Anran Wang

Are you passionate about logic, verification, semantics, and alike? Are you tired of thinking black-and-white, true-or-false? Then come and study the more nuanced quantitative formal program verification! In quantitative verification, properties are not just true or false. Instead, we verify quantities like runtimes, error probabilities, beliefs, etc.

Topics which we will cover include:

- Probabilistic programming (a currently trending modeling paradigm in machine learning),

- The geometry of neural networks

- Incorrectness logic (the latest creation of the former chief formal methods researcher at Facebook)

- The flow of quantitative information through programs

- Worst-case execution times

- Verification of heap-manipulating programs

- and many more

The seminar website can be found here:

https://quave.cs.uni-saarland.de/teaching/aspects-of-quantitative-program-verification-ws-24-25/

Requirements: The most important requirement: You should really really like math and/or logic. This seminar covers very theoretical work.

The following courses are mandatory and/or recommended.

Mandatory: Programmierung 1, Programmierung 2, Grundzüge der Theoretischen Informatik

Recommended: Semantics; Introduction to Computational Logic; Automata, Games and Verification;

Ideal: Verification

Places: 6

Aspects of Sustainable Computer Systems by Andreas Schmidt, Robin Ohs, BOSS Team Ruhr-Universität Bochum

A multi-site seminar on "how to make computer systems sustainable".

As the world struggles with climate change, the computing sector's role as a source of greenhouse emissions (and other bad environmental impact) is steadily increasing. This seminar, co-located and co-hosted with the BOSS Team at Ruhr-Universität Bochum (RUB), explores the intersection of computer technology and sustainability - identifying the key challenges of and innovative solutions for a sustainable future with computers.

We begin by looking at the origins of carbon emissions and learning to understand where emissions are caused. We then focus on known and new methods for measuring and modeling emissions in computer systems. Finally, we show ways in which systems and software can be adapted to become more sustainable.

More details here: https://dcms.cs.uni-saarland.de/ascs_2425/

Requirements: - Open for advanced Bachelor and any Master students.
- Ideally, you have taken courses from the "systems & software" domain: e.g. Data Networks, Operating Systems, Distributed Systems, Software Engineering.

Places: 8

Augmenting Language Models with Tools and Knowledge by Xinting Huang, Michael Hahn

Large Language Models such as ChatGPT or Claude Sonnet have transformed natural language processing, and AI more broadly. However, language models on their own cannot be easily updated with new knowledge, and their abilities at complex reasoning are limited. This seminar looks into ongoing research on augmenting language models with external knowledge, updating their knowledge, and allowing them to draw on external tools to boost their reasoning abilities.

Website: https://lacoco-lab.github.io/courses/knowledge-2024/

Requirements: Background in machine learning, particularly NLP, will be helpful.

Places: 15

Cognitive Models of Human Language Understanding by Alexandra Mayn, John Duff & Vera Demberg

In this seminar, we will take a look at how psycholinguistic theories can be formalized as computational models and how these models can help specify and improve those theories and generate predictions. The first two sessions will give participants an overview of the modeling frameworks – the cognitive modeling framework Adaptive Control of Thought – Rational (ACT-R) and Bayesian probabilistic models, including the Rational Speech Act (RSA) framework. Each participant will present a paper on a seminar-relevant topic, such as modeling the role of working memory and processing speed in language comprehension and production, eye movements and sentence comprehension, listener adaptation and rational overspecification.

The goal of the seminar is to take stock of the range of approaches used in computational cognitive modeling and the recent applications of cognitive modeling to psycholinguistic and pragmatic phenomena. At the end of the course, participants may choose between a more traditional term paper and a project modeling a psycholinguistic phenomenon of their choice in one of the frameworks discussed in the seminar, after consultation with the instructors.

Places: 12

Computational Optimal Transport by Peter Ochs

Optimal transport, originally introduced by Monge and further developed by Kantorovich, has broad applications in fields like economics, fluid mechanics, machine learning, computer vision, and data science. In this seminar, we will study a lecture note called "Computational Optimal Transport" by Gabriel Peyré with several related papers, covering topics from the classic "Wasserstein GAN" to more recent works on the applications of optimal transport in machine learning. By the end of the seminar, students will have a solid understanding of optimal transport theory and an overview of its recent use in machine learning.

Time slot: Tuesdays 2 - 4 pm.

See https://www.mop.uni-saarland.de/teaching/sCOT24/index.shtml for some more details.

Requirements: - basics of mathematics (e.g. MFI 1-3)

Places: 9

Computer-Assisted Proofs in LEAN by Laurent Bartholdi, Leon Pernak

As mathematical research advances, researchers become more and more specialized, and the mathematics they produce becomes more and more complicated to verify.
The possibility to formalize and check proofs thanks to computer programs is thus more relevant than ever. What’s more, tremendous progress in recent years make it so that formalizing actual research level mathematics is possible, and formalizing student level mathematics is accessible to students.
In this seminar, students will practice with the LEAN proof assistant (https://leanprover-community.github.io/).
We meet weekly on Zoom, and discuss informally: each student gets a chance to speak, to explain the work they have done in previous weeks, and to plan ahead.
See the course's page to obtain the zoom link.
https://www.math.uni-sb.de/ag/bartholdi/cap/

IMPORTANT: If you have taken the seminar before, we are very happy to have you participate again, giving you advanced topics and further material depending on your experience.

Requirements: Students may obtain up to 8 credit points, by formalizing a theorem or new definitions, thus contributing to mathlib, the library which gathers all mathematics that has already been formalized in LEAN.
Topics suitable to both MSc and BSc students will be offered, no prior knowledge is required.

Places: 10

Current Topics in Bacterial Identification from Genomic Data by Gregoire Siekaniec, Sven Rahmann

The study of bacterial genomics has evolved dramatically, driven by advances in sequencing technologies and bioinformatics. Today's methods aim to precisely identify and quantify bacterial species and strains within a sample by directly analyzing their genomic sequences. This capability is crucial in various fields, including clinical diagnostics, epidemiology, environmental microbiology, and the agro-food industry.

This seminar in Bioinformatics will explore the latest developments in bacterial identification software, with a focus on the algorithms and data structures that underpin these tools. Topics will be selected from current and recent research literature (articles in English). You may also suggest a different research paper that you find interesting and would like to present, provided it aligns with the general topic of bacterial identification and has a strong focus on methodology.

The goal is to develop a comprehensive understanding of how the latest bacterial identification tools are applied in research and how complex sequence algorithms and data structures are implemented to address the challenges associated with bacterial identification. This seminar is designed for students aiming to deepen their expertise in the field of bacterial genomics and its computational methodologies.

Requirements: - For Master's (or higher) students only.
- Students must be proficient in speaking and writing English, as the seminar will be conducted entirely in English.
- Familiarity with genomic sequence algorithms (e.g., alignment, indexing) is required. Some knowledge of bacterial genomics is also preferable, though not essential.
- You will receive a research document at the beginning of the semester.
- You will have several weeks to familiarize yourself with the material and prepare a written summary. During this time, a consultation with the instructor is optional but strongly recommended. The summary should emphasize the methodological aspects of the work, with less focus on evaluation or results. It will be necessary to deepen your understanding by consulting additional bibliography to better grasp the methods used.
- The summary will be read and commented, and revisions may be required.
- Once the summary has been accepted, you will present the research work in a talk lasting approximately 45 minutes, including questions and discussion. The presentations will take the form of a block seminar.

Places: 15

Data and Society by Prof. Dr. Ingmar Weber, Dr. Annika Hass, Dr. Till Koebe

From finding a mate, to booking a holiday, our lives are increasingly mediated by online platforms. Digital traces left by these interactions provide opportunities to study societal phenomena while creating challenges around the responsible use of data. In this seminar, students will learn how computational methods and machine learning can be applied to study society through such data.

The first part of the seminar will familiarize students with existing work in computational social science. Each week, we will focus on a different topic such as “Digital Democracy” or “Gender Gaps” and explore methods to quantify these phenomena. The second part of the seminar will be about projects in which students are asked to quantify a societal phenomenon of their choice using computational methods. Here, students can both propose topics or choose from topics defined by the lecturers.

The overall course performance will be based on (i) overall course participation, (ii) assigned paper presentations, (iii) a project pitch and (iv) the written project report.

Apart from learning about interdisciplinary research and applications of machine learning, students will also learn research skills such as how to read and discuss papers, how to plan a project, how to present their work, how to write a scientific paper, and how to work in teams.

Students can take this course as a seminar.

Future details at  https://cms.sic.saarland/das_2425/. Timing is Fridays, 10am-12am.

Requirements: Msc students only – the project-based element of the seminar will require some Python programming and data analysis experience. 
An interest beyond the foundations of CS, and caring about societal problems is a must.

Places: 12

Decision Procedures for Specific Theories by Thomas Sturm, Christoph Weidenbach

We study state-of-the-art articles on algorithmic decision procedures for specific theories such as arithmetic, bit vectors, or theories defined by first-order fragments.

Requirements: Successful participation in the lectures Automated Reasoning and Algorithmic Quantifier Elimination.

Places: 5

Differential Privacy in the Era of Foundation Models by Franziska Boenisch, Ben Stock

In recent years, foundation models, such as GPT, LLaMA, Dall-E, or Stable Diffusion, have transformed the field of machine learning, particularly in large-scale tasks like natural language processing and computer vision. These models, trained on vast datasets, are capable of transferring their learned knowledge to a wide range of applications, making them incredibly powerful and versatile. However, this also raises significant privacy concerns when sensitive data is involved.

This seminar will explore how differential privacy (DP), the leading standard for privacy protection, can be applied to foundation models to mitigate these risks. DP ensures that changes in individual data points in a model’s training data minimally affect the overall model predictions, providing a safeguard for privacy even in the most data-intensive models. We will dive into the fundamentals of both DP and foundation models, study how they intersect, and explore strategies for integrating privacy guarantees into these cutting-edge systems. Key topics will include the theory behind DP, practical privacy-preserving mechanisms, and case studies of DP implementation in advanced foundation models.

Requirements: This seminar is open to senior Bachelor, Masters, and doctoral students. Ideally, students should have a solid background in mathematics and machine learning through the base lectures, and a strong interest in deep learning.

Each student will present a topic during the seminar hours in the form of an oral presentation. In addition, each student will read the relevant papers for the other students’ presentations, and hand in a seminar paper at the end of the semester.

Places: 20

Exploring Explainability in Machine Learning by Holger Hermanns, Hanwei Zhang

This seminar course delves into the crucial and evolving field of explainability in machine learning (ML). As ML models become increasingly complex and integral to various domains, understanding how these models make decisions is essential. This course will explore different methodologies for interpreting ML models, including rule-based, attribution-based, example-based, prototype-based, hidden semantics-based, and counterfactual-based approaches. Through a combination of paper readings, discussions, and presentations, students will gain a comprehensive understanding of the challenges and advancements in making ML models transparent and interpretable.

More details will be released at https://dcms.cs.uni-saarland.de/explainingml_2425/

Requirements: The student should take a course in machine learning or have sufficient knowledge from other courses; The student should speak English and understand that the seminar will be conducted entirely in English

Places: 8

Hands-on Graph Neural Networks by Verena Wolf, Joschka Groß

Graphs have long proven to be a powerful data representation across a wide range of applications. Prominent examples include social and transportation networks, as well as small molecules and proteins. Recently, graph neural networks (GNNs) have emerged as a powerful tool for extending the success of deep learning to the graph domain.

In this seminar we aim to cover both the foundations of GNNs as well as more advanced topics such as their limitations and expressiveness, relation to transformers, extensions to geometric graphs and graph generative models.

During the seminar, participants will create talktorials, i.e., self-contained IPython notebooks that explain (teach) a select topic both from a theoretic point of view and in terms of a practical demonstration. The mandatory part of the seminar will conclude with final talks where participants present their talktorials to their fellow students.

Further details will be published on the course website: https://cms.sic.saarland/hognn2024/.

Requirements: Succesful participation in a machine/deep learning course, preferably the machine learning core lecture or "Neural Networks: Theory and Implementation".
Practical deep learning experience, preferably with the PyTorch framework.

Places: 6

Hardware Security: Testing and Verification by Jan Reineke

Spectre, Meltdown, and other microarchitectural attacks have been in the limelight in recent years. These attacks exploit subtle timing and behavioral differences of processors that are caused by microarchitectural optimizations such as caches and speculative execution to gain access to secret information.

The vulnerabilities exploited by microarchitectural attacks are not captured by today's hardware-software contracts, i.e. instruction-set architectures (ISAs). Traditionally, ISAs only capture the "functional" behavior of a system and thus have a blind spot when it comes to side channels. Recently, there has been a push to augment conventional ISAs with a formal specification of information leakage, resulting in more general hardware-software contracts. Such contracts enable writing secure code, e.g. implementing cryptographic algorithms, in a rigorous manner.

In this course we will study recent advances to prove the security of hardware designs or find vulnerabilities in them. We will focus on two main techniques: formal verification to and fuzzing.

For more details get in touch with Jan Reineke (reineke@cs.uni-saarland.de) or consult the seminar page: https://cms.sic.saarland/securehardware24

Requirements: Basic knowledge of computer architecture (e.g. due to System Architecture) is required.
Knowledge of security and formal methods is a plus, but not required.

Places: 9

Hot Topics in Data Networks by Anja Feldmann

While the Internet has started as a research effort, it has consistently evolved throughout the decades into the largest commercial network. Today, many research efforts focus on understanding the Internet's structural trends, optimizing its packet delivery, and laying the foundations for its future developments. In this seminar, you will receive a closer look at bleeding-edge research published at the top conferences in our domain. Discussing state-of-the-art approaches and recent findings from a broad range of network-related topics with your peers and instructors will provide you with a deep understanding of your assigned topic. Preparing the accompanying research survey and topic presentation will not only strengthen your academic reading and writing skills but also help you to present your future work in a more accessible and structured way.

Requirements: Participants should have successfully participated in "Data Networks" or an equivalent course.

Places: 12

Impossibility Results for Local Algorithms by Sebastian Brandt

In algorithmic research, many works focus on obtaining faster, simpler, or otherwise improved algorithms. But how do we know when to stop searching for better algorithms, how do we know that we have exhausted all possibilities for improvement and reached the optimum?

In this seminar, we will take a look into the wonderful world of impossibility results, i.e., results that tell us that obtaining a certain algorithmic objective is provably impossible. While, in general, impossibility results come in many different flavors, the impossibility results that we will study are, to a large extent, runtime lower bounds that rule out the existence of algorithms (for a fixed problem or problem class) that are faster than a certain runtime threshold. Moreover, our focus will be on impossibility results for distributed (and related) algorithms for graph problems. More specifically, the computational model that we will most frequently encounter in this seminar will be the LOCAL model of distributed computation. Note that this is a theory seminar, i.e., we will focus on lower bound proofs, algorithm analysis, and the like.

In this seminar, each student has to present one or two assigned paper(s). Each presentation is followed by a discussion lead by the presenter. Besides presentation and participation in the discussion, the grade will depend on written deliverables. More information will be available on the seminar webpage: https://cms.cispa.saarland/irla2425/

In particular, please check there whether the weekly slot fixed for the seminar works for you. It might be possible to change the dates later if everyone involved agrees, but we cannot guarantee that.

The required language for the presentations is English.

Requirements: There are no formal prerequisites for this seminar, but a general interest in graph theory and designing/analyzing algorithms as well as a basic understanding of probabilities and algorithmic analysis (e.g., O-notation) will be helpful.

Places: 10

Information-Theoretic Machine Learning by Vreeken Jilles

In this seminar, we will discuss information theoretic approaches to machine learning. We will investigate, among others, the following questions:
What is interesting and meaningful structure? How can we identify this from data without overfitting? What is a good model when we don't have a decent prior, target, or even know what we're looking for? What is the ultimate model, and how can we approximate it in practice? We'll explore these in light of Algorithmic Information Theory, and its practical variant, the Minimum Description Length (MDL) principle. We will consider the relevance and application of these to a wide range of problems, from description and prediction to genearlization, from neural to symbolic, from associative to causal, and so on.

We will generally meet once a week. The first part of the course will feature regular lectures covering the basic topics of the course, and discussion sessions in which we will discuss scientific articles in light of the lectures. During the second part students will have to write an essay based on scientific articles assigned to them by the lecturer and give a presentation. The presentations will be scheduled in a block-seminar style, that is in one or two days near the end of the semester, the exact date is to be announced.

Requirements: Students should have a strong mathematical background and a basic working knowledge of machine learning, data analysis and/or statistics, e.g. by successfully having taken courses related to machine learning, data mining, and/or statistics, such as Topics in Algorithmic Data Analysis, Machine Learning, Elements of Machine Learning, Optimization for Machine Learning, Probabilistic Graphical Models, Information Retrieval and Data Mining, etc.

As this seminar works best with a small and active group, I will give preference to highly motivated students. Hence, please write a short (1 or 2 paragraphs) motivation for why you want to take part.

Places: 10

Inpainting: Foundations and Recent Advances by Pascal Peter, Kristina Schaefer

Inpainting has been introduced as a technique to restore missing or deteriorated regions by using information from within the image. There are various ways to fill these missing parts such as simple interpolation, diffusion-based methods, or by comparing image patches. Nowadays, specialised inpainting methods can remove objects seamlessly or can even reconstruct an image using only a tiny fraction of the original information. In this seminar, we cover both the foundations of the field as well as forefront research in the field of inpainting.

For more information: https://www.mia.uni-saarland.de/Teaching/ifa24.shtml

Requirements: The seminar is for advanced bachelor or master students in Visual Computing, Mathematics, or Computer Science. Basic mathematical knowledge (e.g. Mathematik für Informatiker I-III), some knowledge in image processing and computer vision as well as basic knowledge in neural networks is required.

Places: 12

Let’s Role Play in the Deep: Do we really need overparameterization in deep learning? by Rebekka Burkholz

It's time to connect to your inner kid in this fun and engaging seminar format (https://colinraffel.com/blog/role-playing-seminar.md.html): Several students read the same paper, but each student takes on a specific role, which defines the lens through which they contribute to the discussion. Students cycle through roles throughout the course of this seminar on overparameterization in deep learning.

Content:
Deep learning continues to impress us with breakthroughs across disciplines and is a major driving force behind a multitude of industry innovations like ChatGPT. Most of its successes are achieved by increasingly large neural networks that are trained on massive data sets and still achieve zero training loss. This recent trend to overparameterize neural networks defies classic concepts of statistical learning theory that suggest to avoid overfitting by reducing the number of trainable parameters. We will look into recent explanations of this puzzling phenomenon, discuss related insights, and challenge the modern belief that scaling up neural networks is always the best way to move forward. Are the simplest models always the best choice? And is counting parameters really the best way to measure model complexity? Please join the seminar if you enjoy thinking about this kind of questions.

More information can be found here:
https://cms.cispa.saarland/overparam_24/

Requirements: The course has no formal requirements but preference will be given to Master students in Computer Science and related fields with prior knowledge in deep learning and a convincing motivation.

Places: 14

Living "AI-ducation" Dashboard by Tomohiro Nagashima; Sarah Malone

The rise of artificial intelligence (AI) is transforming everyday lives, including education, and it requires us a deep understanding of and research insights into its applications and implications in the field. This seminar aims to equip students with the knowledge and skills needed to critically analyze AI in education and contribute to this evolving field. The seminar is jointly taught by Prof. Tomohiro Nagashima in the CS department (https://tomonag.org/) and Dr. Sarah Malone in the Education Science department (https://www.uni-saarland.de/lehrstuhl/bruenken/personen/dr-sarah-malone.html), and it targets students in both departments.

During the seminar, students will collaboratively design and develop a "Living AI-education Dashboard," a dynamic resource that summarizes and visualizes current research, trends, and data on AI in education. Through project-based learning, students will gain hands-on experience in data visualization, dashboard creation, dashboard design, and research methods (e.g., how to conduct systematic literature review). They will also develop interdisciplinary thinking by integrating concepts from both computer science and education science and through collaborations across the domains. The course is taught by an interdisciplinary team that encourages collaboration between departments and prepares students to tackle complex, real-world problems.

The seminar will be offered on Mondays 10-12:00 (location TBD). Feel free to contact nagashima@cs.uni-saarland.de for any questions.

Find out more about the seminar here: https://tomonag.org/aiducation/

Requirements: Students in the Computer Science degree programs are expected to have past experiences and skills in data visualization

Places: 10

Machine Learning for Natural Language Processing by Dietrich Klakow

Deep learning is the predominant machine learning paradigm in natural language processing (NLP). This approach not only gave huge performance improvements across a large variety of natural language processing tasks. In this seminar the topics will be based on recent papers from ICLR/ICML/Neurips/ACL/EMNLP or similar.

The seminar will be a block seminar in the spring break 2025

For more information see: https://www.lsv.uni-saarland.de/block-seminar-machine-learning-for-natural-language-processing-spring-2025/

Places: 8

Monte Carlo Ray Tracing by Philipp Slusallek, Qingqin Hua, Pascal Grittmann

Monte Carlo ray tracing is a popular technique to render realistic images. It is used for movies, architecture, video games, and product design. This seminar looks at a broad range of methods to make rendering via Monte Carlo ray tracing more efficient. We will look at rendering algorithms, from a basic path tracer to photon mapping, at sampling and material models, Markov chains and path guiding, and more. Each student will implement the assigned paper in a simplified setting, present the paper, and write a short summary of it.

Additional information can be found at https://graphics.cg.uni-saarland.de/courses/ray-2024/index.html

Feel free to contact hua@cg.uni-saarland.de for any questions.

Requirements: The student should have passed either Computer Graphics or Realistic Image Synthesis. The student should care about rendering.

Places: 10

Multimodal Language Understanding by Varsha Suresh, Vera Demberg

Multimodal Language Understanding aims to use information from different sources such as text, speech, images, and gestures, to enhance language processing tasks. As we naturally use multiple forms of communication in our daily interactions, enabling machines to do the same enhances their understanding of human communication. For example, sentiment analysis can be improved by incorporating tone of voice or facial expressions alongside text. In this class, we will explore techniques for modeling multiple modalities, identify tasks that benefit from multi modal input, and discuss the challenges when handling multiple modalities.

First meeting will be on 17.10.2024 at 8:30 am.

More info can be found here: https://www.uni-saarland.de/lehrstuhl/demberg/teaching/ws24/25-multimodal-language-understanding.html

Requirements: This course will include reading, writing, and discussion and is intended for students from Computer Science, Linguistics, and related areas. Knowledge in AI is required, including having taken introductory courses in AI, ML or NLP.

Places: 12

Neuro-symbolic General Policy Learning by Timo P. Gros, Daniel Höller, Nicola Müller, Jörg Hoffmann, Verena Wolf

Symbolic AI relies on explicit, human-readable symbols and rules to represent knowledge and solve problems. This approach contrasts with modern, data-driven methods like machine learning, which rely on statistical patterns rather than explicit rules. Recently, both approaches have been combined, leading to the development of neuro-symbolic methods.
For instance, heuristic search, as a very successful part of symbolic AI, must be applied individually to each instance of a domain/problem. In contrast, neuro-symbolic general policy learning focuses on neural network-based policies that can solve all instances within a specific domain, combining symbolic and data-driven AI benefits.

In this seminar, titled Neuro-symbolic General Policy Learning, we will explore the emerging trend of learning neuro-symbolic general policies where the underlying architecture is based on Graph Neural Networks or Transformers.

The seminar will cover reading and preparing scientific publications, giving a talk, writing a summary, and reviewing other write-ups.

Requirements: This seminar will build upon several lectures/concepts:
- Machine Learning
- Neural Networks
- Graph Neural Networks/Transformers
- AI Planning
While we do not expect you to have knowledge about all these areas, a solid background in some of them will help you to understand the scientific papers that we will discuss in the seminar. Please state in your motivation what prerequisites you bring in order to participate.

Places: 11

New Developments in PETs by Wouter Lueks, Sajin Sasy, Sylvain Chatel

Everyday more and more of our interactions move to the digital realm. Digitization brings forth incredible convenience. On the flip side, however, it also makes us vulnerable to privacy intrusions. For instance, data breaches and consequent loss of ones private information are commonplace today; similarly, mass surveillance of populations have never been easier.

Over the duration of this course, students will read, learn, and conduct hands-on research on cutting-edge privacy-preserving solutions for a variety of topics. Examples of topics include building blocks for privacy-friendly systems such as (i) techniques to retrieve a file from a server(s) without the server learning which file was retrieved, (ii) computing statistics over users' data without making users' data vulnerable to data breaches, and (iii) communication systems that protect sensitive metadata of conversations (such as who is communicating with whom, when, etc.). As well as topics that use existing building blocks to solve real-world problems in a privacy-friendly way such as: (i) accountability in humanitarian aid distribution; (ii) collaboration systems for journalists; and (iii) systems for personalized health.

Course Structure:
- Each student will choose a topic. Topics will have a curated set of papers introducing them to an interesting direction in PETs.
- Students will propose a research direction they want to explore in their topic and present their proposal.
- Finally, students present their progress on their research at the end of the semester, and submit a short research paper on the research conducted during the course of the seminar.

This seminar will provide students ample opportunity to work closely with the course instructors in learning about PETs and conducting novel research in improving the current state-of-the-art PETs.

Timeslot: Wednesday 10am - 12am

More: https://cms.cispa.saarland/newpets2425/

Requirements: At least have attended one of: Security, Cryptography, PETS.

Places: 14

Passwordless Authentication on the Web by Maximilian Golla, Ben Stock

The seminar will give students a deep understanding of typical passwordless user authentication schemes enabling them to reason about their usability, deployability, and security properties.

Starting with how passwords are used, why they are not secure, and how one can reinforce them, the seminar will shed light on secure and usable alternatives to passwords on the Web. We will review papers that study usability issues, misconceptions, security guarantees, or report about real-world deployments of passwordless authentication solutions like passkeys, hardware security keys, and legacy solutions like single sign-on or magic links.

Students will read and summarize various recent scientific publications on passwordless user authentication solutions. During a hands-on experience students are asked to present one passwordless authentication system, reason about its usability benefits and need to explain how this authentication system might fail in practice.

Requirements: Master students only! Many key concepts in computer security come up in user authentication, from cryptography, over usability, to Web standardization processes. This seminar aims at master students in Cybersecurity or related fields, as it requires an understanding of the full stack of how security is built in real systems.

Date: Wednesdays, 10am-12am (attendance is mandatory). If you cannot attend on Wednesdays, please do not sign up.

More: https://cms.cispa.saarland/passwordless_2425/

Places: 10

Privacy of Machine Learning by Yang Zhang

Machine learning has witnessed tremendous progress during the past decade, and data is the key to such success. However, in many cases, machine learning models are trained on sensitive data, e.g., biomedical records, and such data can be leaked from trained machine learning models. In this seminar, we will cover the newest research papers in this direction.

Requirements: Students are required to have basic knowledge of machine learning.

Places: 15

Processing morphology by Kate McCurdy, Michael Hahn

Morphology concerns linguistic structure within words; for example, "Handschuhe" can be broken down into the morphemes "hand", "shoe" and plural (-e). There is significant variation in morphological structure across languages: some have rich systems of inflection and derivation, while other languages barely use morphology. In light of this, we might ask why some languages have complex morphology at all - what is it good for? This seminar reviews how complex morphology is processed by humans and machines, with special attention to functional and information-theoretic accounts.

More info: https://lacoco-lab.github.io/courses/morphology-2025/

Places: 10

Router lab by Tobias Fiebig,

In this seminar, we take a hands-on approach to explore the workings of internet components and provide a deep understanding of the underlying protocols. Specifically, we examine how routers and switches can be configured and connected to a working IP network.

The seminar consists of a series of activities starting with setting up the hardware and introducing basic configuration for VLANs and IPv4/IPv6 networks and gradually moving to more advanced topics, including but not limited to, routing protocols, virtual private networks, security, network monitoring, and troubleshooting.

Requirements: Participants should have sufficient knowledge of computer networks and how the Internet works, e.g., by having successfully participated in "Data Networks", an equivalent course, or by demonstrating relevant prior practical experience.

Places: 12

Secure multi-party computation (MPC) protocols by Deepak Garg (professor), Pierfrancesco Ingo (doctoral student)

The field of secure multi-party computation (MPC) studies algorithms and systems that allow several parties to *securely* compute joint functions over their individually-held private data. *Securely* means several things here: (1) Confidentiality: Parties learn nothing about other parties' data, except what can be inferred from the result of the function they compute, (2) Integrity: Any deviation from the protocol by a subset of the parties is detected by honest parties, and (3) Liveness (in some contexts): The protocol can be executed even if a subset of parties refuse to participate. Security holds as long as a certain number of parties depending on the MPC protocol remain honest.

Potential applications of MPC include scientific studies over the union of private datasets of several parties (e.g., studying rare diseases by combining data from several hospitals) and the training of machine learning models over proprietary data held by different stakeholders.

In theory, MPC is general: Any function representable as a finite circuit can be computed with confidentiality and integrity as long as at least one party remains honest. In practice, MPC is expensive, imposing orders of magnitude of compute and bandwidth overhead on the parties, relative to cleartext communication. Over the past four decades, many different *kinds* of MPC protocols have been discovered, with very different security and performance tradeoffs. The field has advanced to the point that MPC can be deployed widely for specific applications.

This seminar will systematically study key results in secure MPC. Specific topics we intend to cover are landmark MPC protocols based on garbled circuits, oblivious transfer and arithmetic circuits (particularly in rings, which is a recent landmark result in MPC); fundamental MPC techniques like cut-and-choose, Beaver triples + sacrifice, and different kinds of distributed MACs for integrity; fundamental optimizations like free-XORs, dabits and edabits, and post-sacrifice; and, some specific results on related topics.

The *core* learning component of the seminar will be based on reading papers, in-class discussions and student presentations. The *advanced* learning component of the seminar will be a self-driven, in-depth study of specific topics in small groups, either by reading advanced papers or by executing a mini-project, followed by a brief assessment.

Requirements: (1) Experience with security and/or distributed protocols through either the introductory computer security lecture or the distributed systems lecture, or equivalent project experience.

(2) An understanding of basic cryptography: What asymmetric and symmetric cryptography, MACs and encryption, randomness and pseudorandomness are, and an idea of how these are constructed mathematically.

(3) Basic knowledge of discrete mathematics and algebra: Polynomials, matrices, modular arithmetic (addition and multiplication of n-bit integers), boolean algebra and boolean circuits, and discrete probability distributions. Knowledge of abstract algebra (finite fields and rings) will be beneficial but this is not a pre-requisite for taking the seminar.

When applying for the seminar, please explain your previous knowledge of these three areas. List specific courses you have completed and/or relevant project experience.

A motivation statement is optional. If you do not wish to provide a motivation statement, just say "Not applicable" in the relevant field. An informative statement will increase your chances of getting accepted. Use the statement to explain/clarify your background better. Limit the statement to three paragraphs.

Places: 12

Seminar Legal Tech und eJustice by Prof. Dr. Sorge

Das Seminar „Legal Tech und eJustice” ist ein interdisziplinäres Seminar für Informatiker und Juristen.
Die Veranstaltung wird dieses Jahr hybrid angeboten.
Dozenten: Prof. Dr. Christoph Sorge, Dr. Stephanie Vogelgesang, Dr. Jochen Krüger
Zeit/Ort: Blockveranstaltung (Hybrid)

Die Vorbesprechung wird am 23.10.2024 um 18.00 Uhr s.t. hybrid stattfinden.

Bitte beachten Sie, dass Sie sich bis zum 13.11.24 im LSF für das Seminar anmelden müssen (bzw. abmelden können).

Weitere Informationen werden auf der Homepage des Lehrstuhls sowie in Moodle veröffentlicht.

Ablauf des Seminars
Studierende erhalten während der Vorbesprechung ein Thema und müssen eine Seminararbeit hierzu anfertigen. Innerhalb des gewählten Themas sind die Studierenden in der Schwerpunktsetzung grundsätzlich frei.
Vor der Abgabe der fertigen Seminararbeit ist die Einreichung eines Abstracts nebst einer vorläufigen Gliederung vorgeschrieben. Die Besprechung der Abstracts findet verpflichtend statt, um inhaltlichen Missverständnissen entgegenzuwirken und den Studierenden bereits ein Feedback durch die Betreuer zu ermöglichen.
Danach ist die Abgabe eines „Preprints“ der Seminararbeit erforderlich. Daraufhin findet ein Peer Review der abgegebenen Preprints durch die weiteren Teilnehmer des Seminars statt. Jedem Studierenden werden hierfür 3-4 Paper anderer Studierender zugeteilt, welche von ihm/ihr begutachtet werden. Schließlich finden – in der Regel kurz vor Ende der Vorlesungszeit – die Vorträge statt. Abschließend werden die fertigen Seminararbeiten abgegeben.

Allgemeines: Es gilt der Grundsatz „Tiefe vor Breite“. In der Regel werden breit formulierte Seminarthemen gestellt. Teil Ihrer Aufgabe ist es, selbständig die Literatur zu sichten, sich einen Überblick über das Thema zu verschaffen und sodann einen Schwerpunkt (oder ggf. auch zwei, falls es sich im Einzelfall anbietet) zu setzen. Sie sollen zeigen, dass Sie sich in ein Forschungsthema aus Ihrem Fachgebiet einarbeiten und Sachverhalte aus diesem Forschungsthema vollständig durchdringen können. Das zwingt Sie, viele ebenfalls interessante, angrenzende Aspekte wegzulassen. Ein wesentlicher Teil der Schwierigkeit der Aufgabe ist die Entscheidung, was Sie weglassen können (oder müssen) und welche Aspekte für das Verständnis Ihres Themas wesentlich sind.
In der Einleitung geben Sie eine Motivation und ordnen ihr Thema ein; ggf. bietet sich ein weiterer Abschnitt zu verwandten Arbeiten an, um den Stand der Forschung darzustellen. Dann sollten Sie aber in die Tiefe des von Ihnen gewählten Schwerpunkts gehen. Den Abschluss bildet ein kurzes Fazit.

Abstract: Einarbeitung in das Themengebiet, Literaturrecherche und Studium erster wissenschaftlicher Veröffentlichungen. Auf dieser Grundlage Konkretisierung des gewählten Themas bzw. Wahl des Schwerpunkts innerhalb des Themas sowie die Entscheidung über einen sinnvollen Aufbau. Das Abstract ist eine kurze und aussagekräftige Beschreibung des konkretisierten Themas auf mindestens einer Seite (aber nicht mehr als 1,5 Seiten). Eine erste Gliederung sollte mit dem Abstract eingereicht werden.
Preprint: „Vorversion“ der Seminararbeit, wobei der aktuelle Stand ersichtlich sein muss. Hierbei muss es sich um keine bereits vollumfänglich fertige Arbeit handeln, jedoch muss der Inhalt und das Ziel der Arbeit sowie die Auseinandersetzung mit der einschlägigen Literatur erkennbar sein. Literaturverzeichnis, Gliederung und Schwerpunkt sind notwendige Bestandteile.

(Peer) Review: Feedback, welches sich inhaltlich auf das gesamte Paper erstrecken muss (Quellen, Aufbau/Gliederung, inhaltliche Nachvollziehbarkeit, klare Schwerpunktsetzung sprachliche/grammatikalische Schwächen etc.). Dieses muss aus mind. 400 Zeichen bestehen und soll die Möglichkeit einer ersten Einschätzung der Arbeit geben. Unschädlich ist, dass Juristen Themen der Informatik oder umgekehrt bewerten.

Vortrag: 20 Minuten mit anschließender Diskussion (30 Minuten bei Vorträgen von Zweier-Teams). Die Vorträge sollten sich an ein Publikum aus dem eigenen Fach (also Informatik bzw. Jura) richten, aber ohne spezielle Kenntnisse im Thema des Seminars verständlich sein. Idealerweise sind die Vorträge so gestaltet, dass Fachfremde (also z.B. Juristen bei Informatikvorträgen) die grundlegende Problemstellung erfassen können; eine Verständlichkeit des ganzen Vortrags für Fachfremde ist aber nicht erwartet.

Die Gesamtnote ergibt sich aus dem Preprint, den verfassten Reviews zu den Ausarbeitungen der anderen Studierenden, dem Vortrag und der finalen Seminararbeit.

Die Nichtabgabe des Abstracts, des Preprints, der Reviews oder der finalen Seminararbeit sowie ein Nichterscheinen zum Vortragstermin bzw. den Vortragsterminen führt zum Nichtbestehen des Seminars.

Requirements: Es wird erwartet, dass die Teilnehmer in der Lage sind, Vorträgen in deutscher Sprache zu folgen und Ausarbeitungen in deutscher Sprache im Rahmen des Peer Reviews zu lesen (eigene Vorträge und Ausarbeitungen können aber in deutscher oder englischer Sprache angefertigt werden).

Places: 7

Technology and Self-care by Anna Maria Feit, Laura Pissani, Mirella Hladký

This seminar is for all computer science students interested in self-care and mental health. Together we will explore what technology can do to support people in taking care of their mental health from different perspectives:
== HCI literature ==
In the first part of the seminar, you will read scientific papers from Human-Computer Interaction and related areas, research relevant concepts and research papers and give a presentation
== Practice self-care ==
Each week you will practice techniques from positive psychology yourself
== Peer-support ==
In addition to our weekly meetings, you will meet in small groups to reflect on your self-care exercises, give each other feedback on presentations and discuss the literature.
== Design thinking and research ==
In the second part of the course you will have the opportunity to develop your own concept idea related to technology and mental health. You will engage in design thinking sessions with your peer group and explore your idea from a technical, human-centred and ethical perspective. Similar to a bachelor or master seminar, you will develop a concept, become familiar with the literature, and write an introduction and related work chapter. Note that this course will not include an implementation of your idea.

This seminar offers an opportunity to collaborate in small groups, connect with like-minded peers, and discover how technology can positively impact mental health.

The teachers who support you in this seminar are
- Anna Maria Feit, Professor in Human-Computer Interaction and leader of the computational interaction group.
- Laura Pissani, postdoctoral researcher in the Department of Language Science and Technology working with Vera Demberg
- Mirella Hladký, Doctoral student in Psychology working in Tomohiro Nagashima's Technology-enhanced learning group.

Note that we are no professional coaches or psychotherapists but researchers and personally interested in topics related to mental health and self-care. If you suffer from any mental health issues, please reach out to get professional help, for example through the counselling service of the Studierendenwerk https://www.stw-saarland.de/en/Beratung

The seminar will take place on Mondays from 2:15 - 4 PM in E1.7 R3.09. In-person presence is mandatory.
Kick-off: 28th of October.

Requirements: Important: joining the kick-off on 28th of October in-person is mandatory for participating in the seminar.

There is no pre-requisite for this seminar. However, we require that you write a brief motivation why you are interested in this seminar in which you also confirm that you commit to regular meetings in small peer-groups, which are mandatory for this seminar.

Places: 24

The Eye of the Beholder: What Can Eye-Tracking Data Reveal about Code? by Sven Apel, Norman Peitek, Marvin Wyrich, Annabelle Bergum, Tobias Dick, Christian Hechtl, Anna-Maria Maurer, Kallistos Weis, Alisa Welter

The pivotal role of software in our modern world imposes strong requirements on quality, correctness, and reliability of software systems. The ability to understand program code plays a key role for programmers to fulfill these requirements. Despite significant progress, research on program comprehension has had a fundamental limitation: program comprehension is a cognitive process that cannot be directly observed, which leaves considerable room for (mis)interpretation, uncertainty, and confounding factors. Thus, central questions such as “What makes a good programmer?” and “How should we program?” are surprisingly difficult to answer based on the state of the art.

Recently, researchers began to lift research on program comprehension to a new level. The key idea is to leverage recent methods from cognitive neuroscience to obtain insights into the cognitive processes involved in program comprehension. Opening the “black box” of human cognition will lead to a breakthrough in understanding the why and how of program comprehension and to a completely new perspective and methodology of measuring program comprehension, with direct implications for programming methodology, language design, and education.
One of these novel methods is eye tracking, a small device observing the focus of a programmer’s eyes as x and y coordinates on the screen over time. Using this method we can answer research questions on visual attention, comprehension strategy, and differences between programmers (such as expertise).

In this seminar, you will be able to experience major steps of an eye-tracking study. You will review eyetracking literature and pose your own research questions based on existing study. Next, you can exploratively answer your research question by analyzing an existing set of eye tracking data. Specifically, each participant has to perform a literature search and propose a set of research questions targeting code comprehension measured with eye tracking. In the next step, we will provide you with real world eye-tracking data from our prior experiments. Subsequently, the research questions, the results of the analysis, and the interpretation of the results have to be incorporated into a presentation and a written thesis.

To aid the literature search, the analysis, and the presentation, this seminar includes multiple preparatory sessions at the beginning of the semester. The student presentations will be held on-site on two days in March (10. and 11.03.2025). All other sessions will take place on-site at the university on Thursdays 12:15 PM - 2:00 PM. Participation in all sessions is mandatory.
The first meeting will take place on Thursday November 07, at 12:15 PM. Further information will be provided via e-mail after registration.

Requirements: Basic knowledge on software engineering and programming.

Places: 12

The Web Security Seminar by Aurore Fass, Giancarlo Pellegrino, Cristian-Alexandru Staicu, Ben Stock

The Web Security Seminar will teach students to present, analyze, discuss, and summarize papers in different areas of Web security. The seminar combines a reading group with (almost) weekly meetings and a regular seminar, where students will write a seminar paper.

Each student will get a topic assigned, consisting of a lead and a follow-up paper. The student will present the follow-up paper in a 20-minute presentation followed by a 10-minute Q&A. Afterwards we will all discuss the lead paper as a reading group. All students must read the lead paper and, before each session, must submit a summary with strengths and weaknesses.

Finally, each student will write a seminar paper on the topic assigned to them, for which the two papers serve as the starting point.

The student will take place Mondays at 10am and the kickoff will be on 21.10.2024.

More information can be found here: https://cms.cispa.saarland/websecsem_ws2425/

New this years: Any use of LLMs/GenAI is strictly forbidden for producing or polishing the text of the seminar papers. We will thoroughly investigate any suspicious text we find in the submitted manuscripts, e.g., via an oral exam in which the student is invited to explain the text. Moreover, the students must write all their text via Overleaf in a project monitored by the organizers of the seminar.

Requirements: We expect all students of this seminar to already be familiar with most important web security topics, e.g., XSS, CSP. Moreover, we require students to write a short motivation statement to show their interest in talking this seminar.

Places: 11

Topics in Optimization for Machine Learning by Sebastian Stich

Optimization lies at the heart of many machine learning algorithms. This seminar teaches an overview of modern mathematical optimization methods, for applications in machine learning and data science. In particular, we will discuss the theoretical basics of stochastic optimization, scalability of algorithms to large datasets, and challenges in distributed optimization, such as for instance in decentralized or federated machine learning. We will cover a set of foundational papers, but also a selection of recent publications.

Organization:
- There is no weekly meeting. The presentations will be clustered into 2-4 slots (dates be decided) roughly between end of November - January.
- A kick-off meeting will be held virtually during the second week of the semester.
Note that - besides the block format - there are some written deliverables due during the semester, as well as a (mandatory) meeting with the tutor to get feedback on your report and presentation slides.

Additional information can be found at https://cms.cispa.saarland/optml_seminar_24/.

Requirements: This seminar aims primarily at master students in Computer Science or related fields. Previous experience in machine learning, data analysis, or optimization is beneficial.

Places: 12

Training Large-Scale Machine Learning Models by Wolfgang Maaß

In recent years, large-scale machine learning models, including large language models (LLMs) and vision transformers, have significantly advanced the fields of natural language processing and computer vision. This seminar will provide an in-depth exploration of the challenges and strategies involved in training these massive models, which require enormous computational resources, data, and expertise.

Key topics include:
- Scaling Up Neural Architectures: Understanding the evolution from traditional neural networks to large-scale models, including transformer models, such as GPT, Llama, and Mistral.
- Data Requirements and Preprocessing: Techniques for managing vast amounts of training data, addressing biases, and ensuring quality.
- Training Infrastructure: Insights into the hardware and software requirements for training, including the use of distributed computing, GPUs, TPUs, and large-scale parallelization strategies.
- Optimization Techniques: Advanced methods for optimizing training, such as gradient accumulation, mixed precision training, and addressing issues like vanishing gradients and overfitting.
- Fine-Tuning and Transfer Learning: How to efficiently adapt large models for specific tasks with limited data and resources.
- Cost Management: Detailed analysis of the costs associated with training large-scale models, including computational, storage, and maintenance expenses, and strategies to optimize budgets.
- Business Model Development: Exploring how large-scale ML models can drive value creation, including use cases, market analysis, monetization strategies, and integrating AI into existing business models to generate sustainable revenue.

This seminar is aimed at computer science students majoring in data science, AI, and machine learning who want to scale their models to meet the growing demands of real-world applications. Each student will conduct a thorough study of a specific model by reviewing its documentation, research papers, and performance metrics. They will present their findings in the seminar presentation and write a short report. Participants will leave with a solid understanding of current best practices and future directions in training large-scale machine learning models.

Organization: The kick-off date will be announced soon. Information about the seminar, important dates and further specifications will be available in Moodle: https://moodle.uni-saarland.de/course/index.php?categoryid=448

Requirements: Computer Science master students with successful participation in the “Data Science” lecture. Familiarity with neural networks, basic knowledge of deep learning, and an understanding of machine learning workflows.

Places: 6

Trustworthy Machine Learning by Adam Dziedzic, Christian Rossow

Deploying machine learning in real-world systems necessitates methods to ensure trustworthy AI. This course explores research at the intersection of machine learning, privacy, and security. This course provides a comprehensive overview of techniques to build robust and trustworthy machine learning models, focusing on neural networks. We will examine seminal work on privacy-preserving machine learning methods. Our primary focus will be on Large Language Models (LLMs) and Diffusion Models (DMs). Throughout the course, we will discuss outstanding challenges and future research directions to make machine learning more robust, private, and trustworthy.

Requirements: The course presumes a good understanding of machine learning. The students should have taken and passed a machine learning course. This seminar is open to senior Bachelor, Master, and Doctoral students. Through seminal and recent papers, students will survey the emerging literature across research communities investigating these issues. The class aims to inspire new research directions and applications. Lectures, slides, and research papers comprise the course materials - no textbook is required. By engaging with the latest work in this rapidly evolving field, students will be prepared to advance trustworthy machine learning. Each student will present a paper during the seminar hours in the form of an oral presentation. In addition, each student will read the relevant papers for the other students’ presentations, and hand in a seminar paper summarizing their project at the end of the semester.

Places: 20

Van Horn to Fuchsia: Capability-based Access Control by Sven Bugiel and Noah Mauthe

Capabilities as an access control paradigm have been around for nearly six decades. Still, until recently, they were a little-known access control primitive and not deployed in end-user devices. However, with the advent of CHERI and Google Fuchsia, they recently re-emerged. In this seminar, we will discuss how capability systems evolved over the decades and which properties could benefit modern systems. Specifically, mobile, appified systems like Android and iOS.

Since capabilities are a long-established area of research, the selected papers include current and historical works.

CISPA CMS: https://cms.cispa.saarland/capac2425/

Requirements: Basics of access control and operating system security are required (e.g., passed the Foundations of Cybersecurity Lectures or the Core Lecture Security.)

Places: 8