Part C - Student Projects
Project Documents
Projects suggested by academics
Alessandro Abate
Aggregation of Photovoltaic Panels
Analysis and verification of stochastic hybrid systems
Automated verification of complex systems in the energy sector
Bayesian Reinforcement Learning: Robustness and Safe Training
Model learning and verification
Precise simulations and analysis of aggregated probabilistic models
Reinforcement Learning for Space Operations
Relaxing Decisions under Uncertainty
Safety verification for space dynamics via neural-based control barrier functions
Software development for abstractions of stochastic hybrid systems
Tool for Data-driven Abstraction of Stochastic Dynamical Systems
Ioannis Agrafiotis, Louise Axon-Jones, Michael Goldsmith, Sadie Creese
Augmented-Reality Personal Security Solutions
Chatbot Attack and Vulnerability Models
Deep Learning Models to Support Computer Network Defence
Designing Cybersecurity Test Suites for Generative AI Systems
Generating Realistic Cybersecurity Datasets and Testbeds
Operational Security Tools for Users with Limited Cybersecurity Knowledge
Visualising Large Cybersecurity Datasets
Sonification for detecting cyber-attacks
Michael Benedikt
Decision procedures for arithmetic with powers
Optimized reasoning with guarded logics
Sara Bernardini
Game-theoretic Approaches to Multi-Agent Pathfinding
Leveraging Machine Learning for Multi-Agent Path Finding
Adel Bibi, Philip Torr
Safety and Robustness in Agentic Systems
Alfonso Bueno-Orovio, Abdallah Hasaballa
Computational Modelling of Disease Progression and Therapy Response in Hypertrophic Cardiomyopathy
Computational methods for identifying abnormalities from the electrocardiogram in heart disease
High Throughput, High Resolution, and High Frame-Rate Analysis of Cellular Heart Function
Integrating ECG and Myocardial Strain for Mechanistic Risk Stratification in Heart Disease
Modelling and Simulation of Genetic Heart Disease
Vincent Cheval
Detection of cycles in the cryptographic protocol verifier ProVerif’s saturation procedure
Efficient algorithm unification for union of equational theories
Generation and verification of Proof Certificates for cryptographic protocols
Handling cryptographic primitives with complex algebraic properties
Verifying privacy-type properties in a probabilistic setting
Verifying security protocols with exclusive-or using PROVERIF
Ronnie Clark
Detecting and Modelling Mirrors for 3D Scene Reconstruction
Enhanced Single Image Depth Prediction using a Percentile-based Loss
Low Rank training of Neural Fields
Unsupervised Visual Learning using Segment-Masks
Christian Coester
Topics in Online Algorithms and Learning-Augmented Algorithms
Graham Cormode
Taming PETS: Privacy-Enhancing Technologies
Bernardo Cuenca Grau
Efficient Similarity Search in RDF Knowledge Graphs
Graph Analytics in RDF Knowledge Graphs
Knowledge Extraction from Natural Language
Talking with data: Natural Language Querying of RDF Knowledge Graphs
Automated Synthesis of Norms in Multi-Agent Systems
Exploring Large Language Models for Reactive Synthesis Problems
LTLf+ and PPLTL+: Extending LTLf and PPLTL to Infinite Traces
Nondeterministic Situation Calculus
Obligation Games for Reactive Synthesis
Planning for Temporally Extended Goals in Linear Time Logics of Finite Traces
Reactive Program Synthesis and Planning under Multiple Environments
Maximilian Doré
Economic aspects of cybersecurity
Thematic Analysis of National Cybersecurity Maturity Assessments
Seth Flaxman
Disease Mapping with Neural Networks
Andreas Galanis
Topics in Randomised Algorithms and Computational Complexity
Topics in rapid mixing Markov chains
Yicheng Gao, Niki Trigoni
Few-step Distillation for Flow Matching Generative Models
Probability Path Design for Discrete Flow Matching Generative Models
Shortcut Models for Efficient Sampling in Flow-Based Generative Models
Training-Free Video Editing with Pretrained Flow-Based Generative Models
Paul Goldberg
Learning probabilistic automata
Matty Hoban
David Kay
A fast numerical solver for multiphase flow
Efficient solution of one dimensional airflow models
Andrew Ker
A theoretical investigation of the Bag Gain phenomenon in steganography
An empirical investigation of the Bag Gain phenomenon in steganography
Extensions of the square root law of steganography
Sandra Kiefer
Projects in Theoretical Computer Science: Graph Theory and Algorithms, Logic, Automata Theory
Stefan Kiefer
Aleks Kissinger, Andrey Khesin
Fault Tolerant Syndrome Extraction in Context
Morphing new Quantum Error Correcting Codes
Bartek Klin
Jakub Konieczny, James Worrell
Asymptotically automatic sequences
Extensions of Presburger arithmetic by polynomial-like functions
Elias Koutsoupias
Truthful scheduling for graphs
Andrey Kravchenko
Divide-and-Conquer Context: Do many short-context agents beat one long-prompt agent?
Do Punctuation Tokens Act as Sinks, Summaries, and Anchors in Transformers?
Graph-Memory Agents for Self-Evolving Web and SWE Tasks
Hidden Encoder in Decoder only generative models
Problem statement for the planning task
Task-Tailored Schema Agents for Reliable LLM Automation
Marta Kwiatkowska
Probabilistic Modelling Checking
Safety Assurance for Deep Neural Networks
Harjinder Lallie
Keyword searching audio/video files
Jeffrey Mak
Dataset distillation for CRISPR-Cas9 guide-target library design
Predicting protein contacts of CRISPR-Cas9 domains with factored attention
Ivan Martinovic, Edd Salkield
Covert Satellite Communications
Detecting Ship Misbehaviour through SAR Satellite Imagery and RF Signal Analysis
LEO Satellite Reconnaissance and Monitoring
Physical Layer Satellite Protocol Verification
Satellite Signal Hijacking and Interference
Securing Satellite Communication using Radio Transmitter Fingerprints
Signal Injection Attacks Against Modern Sensors
Simulating Large-Scale Satellite Networks for Security Research
SparSDR++: Using FPGAs for Wideband Satellite Reconnaissance
Transport Layer Security for Satellite Networks
Tom Melham
Developing computational tools to aid the design of CRISPR/Cas9 gene editing experiments
Developing machine learning models for off-target prediction in CRISPR/Cas9 gene editing
Andrzej Murawski
Hanno Nickau
Concurrent Algorithms and Data Structures
David Parker
Model checking of stochastic games
Probabilistic Model Checking under Uncertainty
Joe Pitt-Francis
Automatic translation to GPGPU
General GPGPU and high performance computing projects
Intuitive exploration through novel visualisation
Christopher Pulte
Separation Logic Verification and Testing for Systems Software
Alex Rogers
A High-Level Language for Digital Fabrication
Resurrecting Extinct Computers
Christian Rupprecht
Refinement for feed-forward SfM models
Understanding Bias in Object Detection Models
Philip Saville, Sam Staton
Category-theoretic syntactic models of programming languages
Christian Schroeder de Witt
Preventing Malicious Collusion between Advanced AI Systems
Sergii Strelchuk
Bernard Sufrin
Adapting Red to the Language Server Protocol
Embedded Handel for Hardware Design
Programming Language Implementation
Proof Support for a Haskell-like language
Proof by Pointing: Lean meets Jape
A Dataflow Compiler and Simulator for Heterogeneous Optical-Digital Architectures
An AI Co-Scholar for Economic History
Causal and Interpretable AI for Contemporary Art Market Analysis
Exploration vs exploitation in AI “scientist” systems; driving novel hypothesis generation
Quantizing Video Mamba: Robust Streaming Vision on Low-Precision Optical Hardware
Robust Semantic Uncertainty Estimation in Open-Ended Text Generation
The AI Historian – Teaching Machines to Understand the Past
Max Van Kleek
ARETHA: A Transparent and Respectful Virtual Assistant for the Home
Privopticon: A privacy-preserving mesh OS for self-observation
Irina Voiculescu
3D environment for Hand Physiotherapy
3D stereo display of medical scan data
Different pretraining/finetuning strategies and how they impact calibration and uncertainty
Exact Algorithms for Complex Root Isolation
Gesture recognition using Leap Motion
Identifying features in MRI scan data
Reinforcement learning techniques for games
Jonathan Whiteley
Efficient linear algebra for block structured matrices
Parameter recovery for models described by differential equations
Topics in Linear Dynamical Systems
Nobuko Yoshida, Dylan McDermott
An algebraic perspective on the π-calculus
Automated Verification of Multiparty Session Types in Why3
Compiling Multiparty Session Processes in Go
Complexity of Reachability Problems for Restrictions of Multiparty Session Types
Consolidation in Quantum Concurrent Processes
Distributed Programming with Distributed Protocols in Scala
Enhancing Verification of Go's Concurrency Features
Mechanisation of Distributed Protocol Specifications
Model Checking Probabilistic Bisimulation in PRISM
Model-checking Timed Session Types
Probabilistic Bisimulation in Concurrent Protocols
Probabilistic Session Types: semantics and tool development
Program Transformation of Distributed Protocol Specification
Projecting branches via decision broadcasting in multiparty session types in Rust
Rust programming language for communication and distribution.
The Go Language with Generic Types
Verified MPI with dependent types
Verifying and implementing security protocols in Rust
Standa Živný
Topics in Algorithms, Complexity, and Combinatorial Optimisation
