Project Supervision

MSc Project Supervision

Automated Identification of Connected Autonomous Vehicle Risk Scenarios

  • Build a sensor data processing algorithm to identify scenarios and extract key parameters describing risk, make use of these identified scenarios to improve safety in autonomous driving.
  • Students with different skills and interests can tailor the potential project scopes accordingly (ML, Safety, Security)
  • This is considered a High difficulty project with a large programming component
  • There is scope to collaborate with industry partners for this!
  • Potential Steps May Include:
    • using object identification from sensor video data to automatically identify one or more scenarios of interest
    • identify key safety parameters describing automated vehicle performance from already identified scenarios, and statistical methods to describe safety,
    • Processing parameters to improve road driving safety.

Automatic Generation of Cryptographic Protocols Source Code

  • Automatically generate running protocol code from a standard protocol specification (such as MetaCP)
  • Students with different skills and interests can tailor the potential project scopes accordingly (Formal Methods, Crytography, Security)
  • This is considered a Very High difficulty project with a large programming component
  • Potential Options
    • Generate source code from that specification to multiple target languages (this must consider the semantics of both the specification language and the target language).
    • Draw conclusions about the implementation and the security results.
    • Implement a graphical interface that allows for no-code implementation of (one category of) cryptographic protocols, e.g., key exchange protocols. Show some ability to generate code for several protocols. The automatically generated code must compile and run in real world environments (desktop/laptop computers or embedded systems).
    • All the above will be building ontop of existing apporaches

Robustness and Verification of IDS Networks

  • It has become apparent in recent years that our Machine Learning Algorithms are vulnerable to attacks. Your task it to make machine learning algorithms for intrusion detection more robust and resilient
  • Students with different skills and interests can tailor the potential project scopes accordingly (ML, Formal Verification, Security)
  • This is considered a High difficulty project with a large programming component
  • Potential Options
    • Apply adverserial training on existing/newly designed Intrusion Detection Systems to thwart attackers
    • Formally verify an Intrusion Detection System to be robust against attackers
    • Attack an Intrusion Detection System to find ways to bypass it

Federated Learning for Optimum Decision Making in Cryptocurrency Trading

  • Build a distributed trading system operating on different currencies/exchanges to profitably trade and make group decisions optimizing for profitability
  • Students with different skills and interests can tailor the potential project scopes accordingly (ML, Finance)
  • This is considered a VERY High difficulty project with a large programming component
  • There is scope to collaborate with industry partners for this!
  • Potential Steps May Include:
    • optimize for number of agents and exchanges
    • try different optimization strategies e.g. local vs global
    • implement paper trading system to evaluate effectiveness of strategies