University of Oxford Logo University of OxfordDepartment of Computer Science - Home
Linked in
Linked in
Follow us on twitter
Twitter
On Facebook
Facebook
Instagram
Instagram

Part C - Student Projects

Project Documents

Projects suggested by academics

Alessandro Abate

Aggregation of Photovoltaic Panels

Analysis and verification of stochastic hybrid systems

Automated verification of complex systems in the energy sector

Bayesian Reinforcement Learning: Robustness and Safe Training

Model learning and verification

Precise simulations and analysis of aggregated probabilistic models

Reinforcement Learning for Space Operations

Safe Reinforcement Learning

Safety verification for space dynamics via neural-based control barrier functions

Software development for abstractions of stochastic hybrid systems

Ioannis Agrafiotis, Louise Axon, Michael Goldsmith, Sadie Creese

AI Vulnerability Modelling

Augmented-Reality Personal Security Solutions

Chatbot Attack and Vulnerability Models

Deep Learning Models to Support Computer Network Defence

Designing Cybersecurity Test Suites for Generative AI Systems

Generating Realistic Cybersecurity Datasets and Testbeds

Insider threat detection

Low-Orbit Space Cybersecurity

Operational Security Tools for Users with Limited Cybersecurity Knowledge

Ransomware detection

Systemic-Risk Modelling

Visualising Large Cybersecurity Datasets

Sonification for detecting cyber-attacks

Threat Models for Blockchains

Michael Benedikt

Decision procedures for arithmetic with powers

Interpolation

Optimized reasoning with guarded logics

Alfonso Bueno-Orovio

Applications of Complex-Order Fractional Diffusion to Physical and Biological Processes

High Throughput, High Resolution, and High Frame-Rate Analysis of Cellular Heart Function

Interpretable Cardiac Anatomy and Electrophysiology Modelling in Paediatric Patients Using Variational Mesh Autoencoders

Modelling and Simulation of Genetic Heart Disease

Ismail Ilkan Ceylan

Frontiers in Graph Representation Learning

Vincent Cheval

Detection of cycles in the cryptographic protocol verifier ProVerif’s saturation procedure

Generation and verification of Proof Certificates for cryptographic protocols

Handling cryptographic primitives with complex algebraic properties

Reducing memory consumption of the cryptographic protocol verifier ProVerif with hash consing techniques

Verifying privacy-type properties in a probabilistic setting

Ronnie Clark

Detecting and Modelling Mirrors for 3D Scene Reconstruction

Enhanced Single Image Depth Prediction using a Percentile-based Loss

Low Rank training of Neural Fields

Unsupervised Visual Learning using Segment-Masks

Christian Coester

Topics in Online Algorithms and Learning-Augmented Algorithms

Bernardo Cuenca Grau, David Tena Cucala

Realistic Benchmarks for Explainable GNN-Based Models

Giuseppe De Giacomo

Automated Synthesis of Norms in Multi-Agent Systems

Exploring Large Language Models for Reactive Synthesis Problems

LTLf+ and PPLTL+: Extending LTLf and PPLTL to Infinite Traces

Nondeterministic Situation Calculus

Obligation Games for Reactive Synthesis

Planning for Temporally Extended Goals in Linear Time Logics of Finite Traces

Reactive Program Synthesis Under Environment Specifications in Linear Time Logics on Finite and Infinite Traces.

Reactive Program Synthesis and Planning under Multiple Environments

Reinforcement learning under safety non-Markovian Safety Specifications and Rewards expressed in Linear Temporal Logics on Finite Traces

Maximilian Doré

Topics in type theory

Economic aspects of cybersecurity

Thematic Analysis of National Cybersecurity Maturity Assessments

Seth Flaxman

Beyond MCMC -- scalable and approximate Bayesian inference for computational statistics in global health

Disease Mapping with Neural Networks

Andreas Galanis

Topics in Randomised Algorithms and Computational Complexity

Paul Goldberg

Cake-cutting with low envy

Learning probabilistic automata

Jotun Hein

Bioinformatics Projects

Matty Hoban

Quantum Information Projects

David Kay

A fast numerical solver for multiphase flow

Efficient solution of one dimensional airflow models

Andrew Ker

A theoretical investigation of the Bag Gain phenomenon in steganography

An empirical investigation of the Bag Gain phenomenon in steganography

Extensions of the square root law of steganography

Sandra Kiefer

Projects in Theoretical Computer Science: Graph Theory and Algorithms, Logic, Automata Theory

Stefan Kiefer

Bots for a Board Game

Using Virtual Reality to predict how we use memory in natural behaviour: collaborative interdisciplinary projects.

Aleks Kissinger

Quantum Software Projects

Bartek Klin

Computation Theory with Atoms

Jakub Konieczny, James Worrell

Asymptotically automatic sequences

Extensions of Presburger arithmetic by polynomial-like functions

Elias Koutsoupias

Truthful scheduling for graphs

Truthful scheduling for graphs

Marta Kwiatkowska

Probabilistic Modelling Checking

Safety Assurance for Deep Neural Networks

Harjinder Lallie

Dashcam analysis

Keyword searching audio/video files

Reasoning with Causality in Digital Forensic Cases.

Ivan Martinovic, Simon Birnbach

Detecting ship misbehaviour through SAR satellite imagery and RF signal analysis

EV Charging Testbed

Key Management: Evaluating Network Load and Storage Requirements

Key Management: Formal Verification

Securing Satellite Communication through Transmitter Fingerprinting

Securing the Electric Vehicle Charging Communication

Security Evaluation of Power-Line Communication

Security Evaluation of Power-Line Communication

Signal Injection Attacks Against Modern Sensors

SparSDR++: Wideband Monitoring and Discovery of Communication

Transport Layer Security for Satellite Networks

Tom Melham

Applied Formal Verification

Peter Minary

Developing computational tools to aid the design of CRISPR/Cas9 gene editing experiments

Developing machine learning models for off-target prediction in CRISPR/Cas9 gene editing

Andrzej Murawski

Topics in Automata Theory, Program Verification and Programming Languages (including lambda calculus and categorical semantics)

Hanno Nickau

Concurrent Algorithms and Data Structures

David Parker

Model checking of POMDPs

Model checking of stochastic games

Probabilistic Model Checking under Uncertainty

Joe Pitt-Francis

Automatic translation to GPGPU

General GPGPU and high performance computing projects

General graphics projects

Intuitive exploration through novel visualisation

Alex Rogers

A High-Level Language for Digital Fabrication

Implementing the RISC-V Vector Extension

Resurrecting Extinct Computers

Christian Rupprecht

Refinement for feed-forward SfM models

Understanding Bias in Object Detection Models

Philip Saville, Sam Staton

Category-theoretic syntactic models of programming languages

Christian Schroeder de Witt, Philip Torr, Ani Calinescu

Achieving Superalignment through Weak-to-Strong Generalization

Active Defenses against Illusory Attacks

Enhancing Worst-Case Safety in Large Language Models through Influence Functions and Backdoor Detection

Extending AI-Generated Steganography to Generative Diffusion Models

Learning Minimum-Entropy Couplings using AlphaZero and Geometric Deep Learning

Preventing Malicious Collusion between Advanced AI Systems

Supercharging Out-of-Distribution Dynamics Detection

Sergii Strelchuk

Quantum Max-Cut

Bernard Sufrin

Adapting Red to the Language Server Protocol

Modeless Structure Editing

Parallel reasoning in Sequoia

Developing a Novel Pipeline for Pose-Conditioned Image/Video Generation with Diffusion Models

Max Van Kleek

ARETHA: A Transparent and Respectful Virtual Assistant for the Home

Privopticon: A privacy-preserving mesh OS for self-observation

Irina Voiculescu

3D environment for Hand Physiotherapy

3D printing medical scan data

3D stereo display of medical scan data

Different pretraining/finetuning strategies and how they impact calibration and uncertainty

Exact Algorithms for Complex Root Isolation

Gesture recognition using Leap Motion

Identifying features in MRI scan data

Reinforcement learning techniques for games

Simple drawing analysis

Jonathan Whiteley

Efficient linear algebra for block structured matrices

Parameter recovery for models described by differential equations

Topics in Linear Dynamical Systems

Nobuko Yoshida, Dylan McDermott

An algebraic perspective on the π-calculus

Automated Verification of Multiparty Session Types in Why3

Compiling Multiparty Session Processes in Go

Complexity of Reachability Problems for Restrictions of Multiparty Session Types

Consolidation in Quantum Concurrent Processes

Distributed Programming with Distributed Protocols in Scala

Enhancing Verification of Go's Concurrency Features

Mechanisation of Distributed Protocol Specifications

Model Checking Probabilistic Bisimulation in PRISM

Model-checking Timed Session Types

Probabilistic Bisimulation in Concurrent Protocols

Probabilistic Session Types: semantics and tool development

Program Transformation of Distributed Protocol Specification

Projecting branches via decision broadcasting in multiparty session types in Rust

Rust programming language for communication and distribution.

The Go Language with Generic Types

Verified MPI with dependent types

Verifying and implementing security protocols in Rust

Topics in rapid mixing Markov chains

Standa Živný

Topics in Algorithms, Complexity, and Combinatorial Optimisation