Siddharth
|
Agarwal
| Profile |
Serverless computing optimization: reducing cold starts
|
Daghash | Alqahtani | Profile | Container Orchestration for AI-driven IoT Applications in Heterogeneous Computing Continuum Environments |
Unaiza | Alvi | Profile | Enhance Robustness and Reliability of Large Language Models for Software Engineering |
Kasun | Amarasinghe | Profile | Learning index structure for multi-dimensional spatial data |
Marjan | Azimi | Profile | Hierarchical Topics-Specific Expert Identification |
Peerachai | Banyongrakkul | Profile | Exploring bug reports in AI-based software applications |
Adam | Caldwell | Profile | Cyber defence challenges in developing island nations |
Philip
|
Cervenjak
| Profile |
Approximation algorithms for submodular optimisation
|
Ming
|
Chen
| Profile |
A heterogeneous stream processing system based on online learning and blockchain in IoT
|
Zhuo (Zoey) | Chen | Profile | A Verified Cost Model for Call-By-Push-Value Lambda Calculus |
Louis
|
Cheung
| Profile |
Formally Verified Data Compression Algorithms
|
Qifan | Deng | Profile | An Energy-Efficient Distributed System for Integration of Heterogeneous Resources |
Chen | Exton | Profile | Reliable Information Systems |
Luxin
|
Fang
| Profile |
Estimation of distribution power network topology from smart meter measurements
|
Duneesha | Fernando | Profile | Performance Anomaly-aware Management of Serverless Applications deployed in CaaS (Container as a Service) platforms |
Wentao | Gao | Profile | Human-in-the-loop fuzzing for effective vulnerability discovery |
Reyhaneh | Goli | Profile | User Search Modelling in Complex Querying Environments |
Shuzhi
|
Gong
| Profile |
Social Media Fake News Detection Through Graph Based Deep Learning
|
Zifeng (Peaker)
|
Guo
| Profile |
Efficient structures for recency and string-searching queries in data streams
|
Anh | Ho | Profile | Automated Bug Fixing Using Program Analysis and AI |
Gerald | Huang | Profile | TBA |
Yujin | Huang | Profile | Towards Secure and Robust On-device Deep Learning Models |
Zuo
|
Huang
| Profile |
Real-time hot-spot detection for the environmental sciences through deep learning, sensor networks and data fusion
|
Vincent
|
Jackson
| Profile |
Mechanised High-Level Verification for Concurrent Low-level Programs
|
Weijia | Jia | Profile | Causal Reinforcement Learning-Based Autonomous Intersection Management Optimization |
Jiankai
|
Jin
| Profile |
Analysing utility and tradeoffs of multi-party machine learning
|
Vinay
|
Kabadi
| Profile | Automated software regression bug fixing |
Zhenzhi | Lai | Profile | Security of Post-Quantum Algorithms for IoT |
Zhonghong | Lai | Profile | IP Protection for On-device Machine Learning |
Cong Thanh | Le | Profile | Automated Software Bug Fixing |
Pilar Selene | Linares Arévalo | Profile | Refinement types to simplify verification |
Xing | Li | Profile | Type-Based Complexity Analysis for Higher-Order Functional Programs |
Stephen | Luan | Profile | The application of Large Language Models in Cyber Security |
Luca | Morandini | Profile | Applicaiton of Large Language Models to the Geospatial Domain |
Saeed
| Nasehibasharzad | Profile | A high performance and near real-time integrated driving navigation and traffic controlling system |
Huy | Nguyen | Profile | Encoding additional natural language artefacts for better code representation |
Thanh-Dat
|
Nguyen
| Profile |
Machine learning for program synthesis
|
Thanh Hoa
|
Nguyen
| Profile |
Serverless Quantum Cloud Computing
|
Lianglu
|
Pan
| Profile |
Automated vulnerability and flaw detection in network communications
|
Kalyani
|
Penyala
| Profile |
Machine learning-based Management of Data Centre Resources for Green Cloud Computing
|
Tianyu | Qi | Profile | Optimization of Data Processing and Resource Management for Distributed Stream Processing Systems |
Tian | Qiu | Profile | Automated Program Synthesis for Security Testing |
Murtaza | Rangwala | Profile | Blockchain-based Decentralized Data Storage for Secure Microservices in Fog Computing |
Landadinee | Rathuwadu | Profile | Self-Driving Databases: Statistical Sampling for Efficient Cost Estimation |
Larissa
|
Salerno
| Profile |
Software installation in third-party software ecosystems
|
Tharindu Bandara
|
Saryakara Hewage
| Profile |
Learning-centric Resource Management in Energy-efficient Cloud Computing
|
Elisa | Shioji | Profile | Rules as code: Can privacy be automated? |
Kwangsuk
|
Song
| Profile | Storage systems management in cloud computing environments |
Xiao | Sun | Profile | TBA |
Kanwal Aslam
|
Syed
| Profile |
Hash based post quantum cryptography on FPGA
|
Samuel | Thomas | Profile | Designing Efficient Algorithms for Big Data |
Chenhao
|
Tong
| Profile |
Multi-agent Distributed Autonomous System Optimisation using Reinforcement Learning
|
Faxing
|
Wang
| Profile | Removing trust assumptions for distributed zero-knowledge proofs |
Lingfei
|
Wang
| Profile |
High performance event detection and tracking in social media
|
Peiyong
|
Wang
| Profile |
Quantum Computing
|
Zhe
|
Wang
| Profile |
Privacy-oriented Deployment of Health Application in Distributed Clouds
|
Zhiyu
|
Wang
| Profile |
A New Approach for Efficient Deployment of Applications in Edge Cloud
|
Ziren
|
Xiao
| Profile |
Runtime optimisation of distributed systems using reinforcement learning
|
Zhibo | Xu | Profile | Towards Efficient and Privacy-preserving Deep Graph Learning |
Pengbo
|
Yan
| Profile |
Scalable, Principled Vulnerability Detection via Insecurity Logics
|
Wenqi | Yan | Profile | Towards Effective and Efficient Parallel Fuzzing |
Hongwei | Yin | Profile | Real-time Action Recognition in Sports Games through Deep Learning on Mobile Devices |
Shen | Zhan | Profile | Enhancing Employability Assessment for Engineering Students and Graduates: A Multi-Stakeholder Perspective |
Zhiyuan | Zhang | Profile | Investigating and mitigating performance interference of shared execution in browsers |
Zhuo
|
Zhang
| Profile |
Efficient algorithms for solving problems on massive data
|
Jie
|
Zhao
| Profile |
Autonomous workload management in federated cloud computing environments
|
Zihan
|
Yang
| Profile |
Deep learning in applications with limited data and computation resources
|
Zhuowei
|
Zhao
| Profile |
Learning-based algorithms with non-trivial theoretical guarantees for solving problems on massive data |
Mike | Zhuang | Profile | Does the law make sense? Behavioral-Psychological tests of the Social Media Addiction Reduction (SMART) Act |