Part C - Student Projects
Project Documents
Projects suggested by academics
Alessandro Abate
Aggregation of Photovoltaic Panels
Analysis and verification of stochastic hybrid systems
Automated verification of complex systems in the energy sector
Bayesian Reinforcement Learning: Robustness and Safe Training
Model learning and verification
Precise simulations and analysis of aggregated probabilistic models
Reinforcement Learning for Space Operations
Safety verification for space dynamics via neural-based control barrier functions
Software development for abstractions of stochastic hybrid systems
Ioannis Agrafiotis, Louise Axon, Michael Goldsmith, Sadie Creese
Augmented-Reality Personal Security Solutions
Chatbot Attack and Vulnerability Models
Deep Learning Models to Support Computer Network Defence
Designing Cybersecurity Test Suites for Generative AI Systems
Generating Realistic Cybersecurity Datasets and Testbeds
Operational Security Tools for Users with Limited Cybersecurity Knowledge
Visualising Large Cybersecurity Datasets
Sonification for detecting cyber-attacks
Michael Benedikt
Decision procedures for arithmetic with powers
Optimized reasoning with guarded logics
Alfonso Bueno-Orovio
Applications of Complex-Order Fractional Diffusion to Physical and Biological Processes
High Throughput, High Resolution, and High Frame-Rate Analysis of Cellular Heart Function
Modelling and Simulation of Genetic Heart Disease
Ismail Ilkan Ceylan
Frontiers in Graph Representation Learning
Vincent Cheval
Detection of cycles in the cryptographic protocol verifier ProVerif’s saturation procedure
Generation and verification of Proof Certificates for cryptographic protocols
Handling cryptographic primitives with complex algebraic properties
Verifying privacy-type properties in a probabilistic setting
Ronnie Clark
Detecting and Modelling Mirrors for 3D Scene Reconstruction
Enhanced Single Image Depth Prediction using a Percentile-based Loss
Low Rank training of Neural Fields
Unsupervised Visual Learning using Segment-Masks
Christian Coester
Topics in Online Algorithms and Learning-Augmented Algorithms
Bernardo Cuenca Grau, David Tena Cucala
Realistic Benchmarks for Explainable GNN-Based Models
Giuseppe De Giacomo
Automated Synthesis of Norms in Multi-Agent Systems
Exploring Large Language Models for Reactive Synthesis Problems
LTLf+ and PPLTL+: Extending LTLf and PPLTL to Infinite Traces
Nondeterministic Situation Calculus
Obligation Games for Reactive Synthesis
Planning for Temporally Extended Goals in Linear Time Logics of Finite Traces
Reactive Program Synthesis and Planning under Multiple Environments
Maximilian Doré
Economic aspects of cybersecurity
Thematic Analysis of National Cybersecurity Maturity Assessments
Seth Flaxman
Disease Mapping with Neural Networks
Andreas Galanis
Topics in Randomised Algorithms and Computational Complexity
Paul Goldberg
Learning probabilistic automata
Jotun Hein
Matty Hoban
David Kay
A fast numerical solver for multiphase flow
Efficient solution of one dimensional airflow models
Andrew Ker
A theoretical investigation of the Bag Gain phenomenon in steganography
An empirical investigation of the Bag Gain phenomenon in steganography
Extensions of the square root law of steganography
Sandra Kiefer
Projects in Theoretical Computer Science: Graph Theory and Algorithms, Logic, Automata Theory
Stefan Kiefer
Aleks Kissinger
Bartek Klin
Jakub Konieczny, James Worrell
Asymptotically automatic sequences
Extensions of Presburger arithmetic by polynomial-like functions
Elias Koutsoupias
Truthful scheduling for graphs
Truthful scheduling for graphs
Marta Kwiatkowska
Probabilistic Modelling Checking
Safety Assurance for Deep Neural Networks
Harjinder Lallie
Keyword searching audio/video files
Reasoning with Causality in Digital Forensic Cases.
Ivan Martinovic, Simon Birnbach
Detecting ship misbehaviour through SAR satellite imagery and RF signal analysis
Key Management: Evaluating Network Load and Storage Requirements
Key Management: Formal Verification
Securing Satellite Communication through Transmitter Fingerprinting
Securing the Electric Vehicle Charging Communication
Security Evaluation of Power-Line Communication
Security Evaluation of Power-Line Communication
Signal Injection Attacks Against Modern Sensors
SparSDR++: Wideband Monitoring and Discovery of Communication
Transport Layer Security for Satellite Networks
Tom Melham
Peter Minary
Developing computational tools to aid the design of CRISPR/Cas9 gene editing experiments
Developing machine learning models for off-target prediction in CRISPR/Cas9 gene editing
Andrzej Murawski
Hanno Nickau
Concurrent Algorithms and Data Structures
David Parker
Model checking of stochastic games
Probabilistic Model Checking under Uncertainty
Joe Pitt-Francis
Automatic translation to GPGPU
General GPGPU and high performance computing projects
Intuitive exploration through novel visualisation
Alex Rogers
A High-Level Language for Digital Fabrication
Implementing the RISC-V Vector Extension
Resurrecting Extinct Computers
Christian Rupprecht
Refinement for feed-forward SfM models
Understanding Bias in Object Detection Models
Philip Saville, Sam Staton
Category-theoretic syntactic models of programming languages
Christian Schroeder de Witt, Philip Torr, Ani Calinescu
Achieving Superalignment through Weak-to-Strong Generalization
Active Defenses against Illusory Attacks
Extending AI-Generated Steganography to Generative Diffusion Models
Learning Minimum-Entropy Couplings using AlphaZero and Geometric Deep Learning
Preventing Malicious Collusion between Advanced AI Systems
Supercharging Out-of-Distribution Dynamics Detection
Sergii Strelchuk
Bernard Sufrin
Adapting Red to the Language Server Protocol
Developing a Novel Pipeline for Pose-Conditioned Image/Video Generation with Diffusion Models
Max Van Kleek
ARETHA: A Transparent and Respectful Virtual Assistant for the Home
Privopticon: A privacy-preserving mesh OS for self-observation
Irina Voiculescu
3D environment for Hand Physiotherapy
3D stereo display of medical scan data
Different pretraining/finetuning strategies and how they impact calibration and uncertainty
Exact Algorithms for Complex Root Isolation
Gesture recognition using Leap Motion
Identifying features in MRI scan data
Reinforcement learning techniques for games
Jonathan Whiteley
Efficient linear algebra for block structured matrices
Parameter recovery for models described by differential equations
Topics in Linear Dynamical Systems
Nobuko Yoshida, Dylan McDermott
An algebraic perspective on the π-calculus
Automated Verification of Multiparty Session Types in Why3
Compiling Multiparty Session Processes in Go
Complexity of Reachability Problems for Restrictions of Multiparty Session Types
Consolidation in Quantum Concurrent Processes
Distributed Programming with Distributed Protocols in Scala
Enhancing Verification of Go's Concurrency Features
Mechanisation of Distributed Protocol Specifications
Model Checking Probabilistic Bisimulation in PRISM
Model-checking Timed Session Types
Probabilistic Bisimulation in Concurrent Protocols
Probabilistic Session Types: semantics and tool development
Program Transformation of Distributed Protocol Specification
Projecting branches via decision broadcasting in multiparty session types in Rust
Rust programming language for communication and distribution.
The Go Language with Generic Types
Verified MPI with dependent types
Verifying and implementing security protocols in Rust
Topics in rapid mixing Markov chains
Standa Živný
Topics in Algorithms, Complexity, and Combinatorial Optimisation