Algorithmic Game Theory and Computational Social Choice (completed)

This project will be co-supervised with Eduard Eiben. We will study a topic arising from Algorithmic Game Theory and/or Computational Social Choice. The specific topic/area will be defined during an inital meeting with Eduard and myself. Some examples of such topics are (this list is by no means exhaustive):– Computation of Nash Equilibria;– Fair Division … full description “Algorithmic Game Theory and Computational Social Choice (completed)”

Attacking Large Pre-trained Programming Language Models (PLMs) via Backdoors (completed)

Project Description: Backdoors refer to a class of Machine Learning (ML) attacks where an adversary trains an ML model to intentionally misclassify any input to a specific label [1]. This is typically achieved by poisoning the training data, such that inputs are misclassified to a target label when the backdoor trigger is present. For instance, … full description “Attacking Large Pre-trained Programming Language Models (PLMs) via Backdoors (completed)”

Corporate Transparency – Enabling Consumers Track and Vet their Data Usage (available)

Project Description Data, primarily related to consumers is a crucial part of the modern tech-companies like Google, Facebook, Instagram, and non-tech-companies (superstores, insurance companies, etc.) alike have now started to rely heavily on consumer data for various commercial activities. Although the General Data Protection Regulation (GDPR) enhances the rights of the consumers from a technical … full description “Corporate Transparency – Enabling Consumers Track and Vet their Data Usage (available)”

COVID-19 – Mobile phone based passport applications (available)

Project Description We have all been affected by COVID19. Amongst the main driving forces for reopening international borders and enabling traveling is the existence of COVID19 immunity passports. However, there are serious considerations around the overall trust, security, privacy but also ethical dimensions of such proposals. This project aims to take into account the views … full description “COVID-19 – Mobile phone based passport applications (available)”

Increasing the Efficiency of Low-land Natural Disaster Search and Rescue through ‘Supervised Hybrid Animal-UAV Interactions’ (completed)

Search and Rescue (SAR) is a time-critical event: after a finite period of time the chances of recovering individuals who have become lost, or trapped in the wake of a disaster, trend towards zero. As a result, management of search and rescue resources is paramount. Travel time, planning and executing search grids, are pivotal tasks … full description “Increasing the Efficiency of Low-land Natural Disaster Search and Rescue through ‘Supervised Hybrid Animal-UAV Interactions’ (completed)”

Natural Language Understanding: Measuring the Semantic Similarity between Sentences (ongoing)

Overview To implement and design various deep neural networks for measuring the semantic similarities between sentence pairs. Background Natural language understanding (NLU) is widely viewed as a grand challenge in Artificial Intelligence (AI). An important sub-task in NLU is to measure the semantic similarity between sentence pairs, also known as the Semantic Textual Similarity (STS) task. A … full description “Natural Language Understanding: Measuring the Semantic Similarity between Sentences (ongoing)”

Penetration Testing of Autonomous Vehicle Sensor Arrays (completed)

Project Description The adoption of autonomous vehicles is a matter of when and how, rather than if it will happen. Domestic (private) and commercial (freight) autonomous vehicles are a proven concept, with most remaining questions regarding adoption hanging on the reliability and security of said vehicles. It is well-known that side-channel attacks exploiting peripheral systems, … full description “Penetration Testing of Autonomous Vehicle Sensor Arrays (completed)”

Personality Identification Using Online Social Media Networks (completed)

Project Description Personality is a combination of all the attributes—behavioural, temperamental, emotional, and mental—that characterise a unique individual. Ability to identify the personalities of people has always been of great interest to the researchers due to its importance. Owing to the increasing popularity of online social networks there is a possibility of predicting a user’s … full description “Personality Identification Using Online Social Media Networks (completed)”

Prototyping access to FAIR digital objects (available)

Open data drives much of research. The FAIR principles are a set of general principles on how to enable sharing of open data. The workflow for programmatic access of such data requires developing an understanding of the API (usually with RESTful interface) of the relevant data set even if one has the relevant Persistent Identifier … full description “Prototyping access to FAIR digital objects (available)”

Software framework implementation for air quality monitoring system (available)

The project requires the installation and use of commercially developed Python based software packages on a Raspberry Pi 3 board which access commercial sensors to measure air quality. The software has calibration, data acquisition and data storage functions. The hardware platform is based around 4 air contaminants Alphasense sensors mounted on an Alphasense AFE (analogue … full description “Software framework implementation for air quality monitoring system (available)”

Speak to Pay – Voice and Chip Payment Framework (available)

Project Description Payment architectures are in constant evolution, from Chip&Pin to contactless to facial-recognition based transactions. Also, with the advent of smart assistants like Siri, Amazon Alexa, and Google Assistant takes a cue from their respective users through voice commands. This project will explore the potential of using voice recognition/control as an authorisation of an … full description “Speak to Pay – Voice and Chip Payment Framework (available)”

The Security Theory Map (completed)

Description of the project: Real world security is a multi-dimensional problem and therefore needs multiple theoretical lenses and analyses to understand and positively impact the application of security. This digital tool presents to the user a large range of the underpinning theories about security (and their constituent parts). These theories condition the outputs of security … full description “The Security Theory Map (completed)”

Visualising global accessibility of open data resources via traceroute (available)

Research depends on data that is openly available. Recently, it has become clear that access to repositories that store these data sets is variable across the country that accesses the data. This can be due to poor connectivity for Lower income countries to countries that are actively blocked from accessing specific sites. A set of … full description “Visualising global accessibility of open data resources via traceroute (available)”