Building a chatbot for student queries (available)

It is important that student queries are replied to quickly and accurately. Many of the requests for information are fully explained in resources such as the student handbook. These include questions such as where students request extensions on coursework or how shuold they inform College if they are absent from a lecture. Frequently these questions … full description “Building a chatbot for student queries (available)”

Entry into the PACE Parameterized Algorithms and Computational Experiments Challenge (completed)

Parameterized Complexity is a research field that, by its own self-description, strives to provide practical, yet theoretically well-founded ways to deal with computationally hard problems (e.g., so-called NP-hard problems). However, the vast majority of the work in the field is purely theoretical — there is a great toolbox of interesting and powerful algorithmic methods, which have been proven to have … full description “Entry into the PACE Parameterized Algorithms and Computational Experiments Challenge (completed)”

Machine Learning for Crystal Structure Prediction (available)

Crystal Structure Prediction (CSP) is one of the major problems in computational chemistry with numerous applications in real life. This is essentially the (global) minimisation of a continuous, high-dimensional, complicated function. Many heuristic methods have been proposed for CSP and recently new methods based on Machine Learning were introduced. The goal of this project is … full description “Machine Learning for Crystal Structure Prediction (available)”

Machine Learning vs Machine Learning in Malware Evasion (available)

Machine learning is a popular approach to signature-less malware detection because it can generalize to new (unseen) malware families. Some recent works have proposed the use of AI/ML-powered malware to bypass machine learning anti-malware systems. The goal of the project is to model the system of malware vs anti-malware systems as two opponents using various … full description “Machine Learning vs Machine Learning in Malware Evasion (available)”

Mitigating Anti-Sandboxing Tricks used by Malware (available)

Aims: Detecting and Mitigating some Evasion Techniques used by Malware Background: Several malware samples exploit advanced tactics to detect whether they are run in a sandboxed/virtual analysis environment. In such cases, malware samples do not perform any malicious actions to evade analysis and detection by security researchers. The goal of the project is to analyse … full description “Mitigating Anti-Sandboxing Tricks used by Malware (available)”

Mixed Nash Equilibria in Net Coordination Games (available)

Net Coordination Games form a special class of many-player games with several applications in Theoretical Computer Sciene, Multi Agent Systems, and Semi Supervised Learning.  Nash equilibria correspond to the stable outcomes and they are the prominent solution concept in games. It is known that Net Coordination Games possess a pure Nash equilibrium, but unfortunately, it … full description “Mixed Nash Equilibria in Net Coordination Games (available)”

Stable Marriage of Students (available)

Constraint Satisfaction and the final year projects system Prof Cohen is a world leading researcher in the theory and practice of constraints and has written some tools for the department that need to be improved. At Royal Holloway, we allocate students to projects and staff as supervisors of those projects using a semi-automated process, using … full description “Stable Marriage of Students (available)”

Virtual Trusted Platform Module (vTPM) Migration in Cloud Environments (completed)

TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to authenticate a computer platform. For instance, a TPM can be used to store platform measurements that help ensure that the platform remains trustworthy. Authentication (ensuring that the platform can prove that it is what it claims to be) and … full description “Virtual Trusted Platform Module (vTPM) Migration in Cloud Environments (completed)”