Graduate Researchers

Computer Science Graduate Researchers

Given Family nameProfile Thesis Title
Siddharth Agarwal Profile Serverless computing optimization: reducing cold starts
KasunAmarasingheProfileLearning index structure for multi-dimensional spatial data
MarjanAzimiProfileHierarchical Topics-Specific Expert Identification
Philip Cervenjak Profile Approximation algorithms for submodular optimisation
Ming Chen Profile A heterogeneous stream processing system based on online learning and blockchain in IoT
Zhuo (Zoey)ChenProfileA Verified Cost Model for Call-By-Push-Value Lambda Calculus
Louis Cheung Profile Formally Verified Data Compression Algorithms
QifanDengProfileAn Energy-Efficient Distributed System for Integration of Heterogeneous Resources
Luxin Fang Profile Estimation of distribution power network topology from smart meter measurements
DuneeshaFernandoProfilePerformance Anomaly-aware Management of Serverless Applications deployed in CaaS (Container as a Service) platforms
WentaoGaoProfileHuman-in-the-loop fuzzing for effective vulnerability discovery
ReyhanehGoliProfileUser Search Modelling in Complex Querying Environments
Shuzhi Gong Profile Social Media Fake News Detection Through Graph Based Deep Learning
Zifeng (Peaker) Guo Profile Efficient structures for recency and string-searching queries in data streams
Yulun Huang Profile Resource Management and Application Scheduling in Big Data Cloud
Zuo Huang Profile Real-time hot-spot detection for the environmental sciences through deep learning, sensor networks and data fusion
Vincent Jackson Profile Mechanised High-Level Verification for Concurrent Low-level Programs
Jiankai Jin Profile Analysing utility and tradeoffs of multi-party machine learning
Vinay Kabadi ProfileAutomated software regression bug fixing
ZhenzhiLaiProfileSecurity of Post-Quantum Algorithms for IoT
Rabindra Lamsal Profile Social media analytics: a real-time machine learning approach
Cong ThanhLeProfileAutomated Software Bug Fixing
Alex Jacey Ligthart-Smith Profile Preserving data privacy with semi-trusted adversaries
Pilar SeleneLinares ArévaloProfileRefinement types to simplify verification
XingLiProfileType-Based Complexity Analysis for Higher-Order Functional Programs
StephenLuanProfileThe application of Large Language Models in Cyber Security
Anupama Ruwanthika Mampage Profile Context-aware dynamic resource management in fog/edge computing environments
Saeed NasehibasharzadProfileA high performance and near real-time integrated driving navigation and traffic controlling system
HuyNguyenProfileEncoding additional natural language artefacts for better code representation
Thanh-Dat Nguyen Profile Machine learning for program synthesis
Thanh Hoa Nguyen Profile Serverless Quantum Cloud Computing
Lianglu Pan Profile Automated vulnerability and flaw detection in network communications
Kalyani Penyala Profile Machine learning-based Management of Data Centre Resources for Green Cloud Computing
TianyuQiProfileOptimization of Data Processing and Resource Management for Distributed Stream Processing Systems
LandadineeRathuwaduProfileSelf-Driving Databases: Statistical Sampling for Efficient Cost Estimation
Larissa Salerno Profile Software installation in third-party software ecosystems
Tharindu Bandara Saryakara Hewage Profile Learning-centric Resource Management in Energy-efficient Cloud Computing
ElisaShiojiProfileRules as code: Can privacy be automated?
Kwangsuk Song ProfileStorage systems management in cloud computing environments
Kanwal Aslam Syed Profile Hash based post quantum cryptography on FPGA
SamuelThomasProfileDesigning Efficient Algorithms for Big Data
Chenhao Tong Profile Multi-agent Distributed Autonomous System Optimisation using Reinforcement Learning
Faxing Wang ProfileRemoving trust assumptions for distributed zero-knowledge proofs
Lingfei Wang Profile High performance event detection and tracking in social media
Peiyong Wang Profile Quantum Computing
Zhe Wang Profile Privacy-oriented Deployment of Health Application in Distributed Clouds
Zhiyu Wang Profile A New Approach for Efficient Deployment of Applications in Edge Cloud
Ziren Xiao Profile Runtime optimisation of distributed systems using reinforcement learning
Pengbo Yan Profile Scalable, Principled Vulnerability Detection via Insecurity Logics
WenqiYanProfileTowards Effective and Efficient Parallel Fuzzing
HongweiYinProfileReal-time Action Recognition in Sports Games through Deep Learning on Mobile Devices
ZhiyuanZhangProfileInvestigating and mitigating performance interference of shared execution in browsers
Zhuo Zhang Profile Efficient algorithms for solving problems on massive data
Jie Zhao Profile Autonomous workload management in federated cloud computing environments
Zihan Yang Profile Deep learning in applications with limited data and computation resources
Zhuowei Zhao Profile Learning-based algorithms with non-trivial theoretical guarantees for solving problems on massive data
MikeZhuangProfileDoes the law make sense? Behavioral-Psychological tests of the Social Media Addiction Reduction (SMART) Act