
Blockchain-Empowered Federated Learning
Blockchain-Empowered Federated Learning
About the Project Supervisory Team: Leonardo Aniello, Han Wu Project description: Blockchain and Federated Learning (FL) are two emerging technologies that, when combined, offer a powerful framework for decentralised machine … Read More Read More
Categories:
Cross-Chain Security in Web3
Cross-Chain Security in Web3
About the Project Supervisory Team : Dr Leonardo Aniello, Prof Vladi Sassone Blockchain technology is transforming digital interactions by offering decentralised solutions across diverse sectors. However, as organisations in Web3 … Read More Read More
Categories:
Transparency of data collection and sharing in Internet-connected vehicles
Transparency of data collection and sharing in Internet-connected vehicles
About the Project Co-Supervisor: Dr Erisa Karafili Vehicles are becoming sensor-rich, collecting and sharing data about the drivers and passengers. This project aims to explore the drivers' and the passengers' … Read More Read More
Categories:
Sustainability and resilience of Socio-Technical Systems
Sustainability and resilience of Socio-Technical Systems
About the Project The increasing complexity of our engineering, social, urban, and ecological systems arises from their interconnectedness, leading to necessary adaptations between the actions of the users (humans) and … Read More Read More
Categories:
Funded PhD Studentship in Integrated Photonic Systems for Distributed Quantum Computing
Funded PhD Studentship in Integrated Photonic Systems for Distributed Quantum Computing
About the Project Duration of study : Full time - 4 years fixed term Starting date : Available from May or October 2025 Application deadline : No closing date, the … Read More Read More
Categories:
A Generative Large Language Model for Encrypted Network Traffic Classification
A Generative Large Language Model for Encrypted Network Traffic Classification
About the Project Network traffic identification holds paramount importance, particularly in distinguishing various forms of encrypted traffic including protocols, applications, services, and malicious flows. Identifying encrypted traffic encompasses intricate levels … Read More Read More
Categories:
Large Language Model Powered Deception Defense Approach Approach
Large Language Model Powered Deception Defense Approach Approach
About the Project The Deception Defense strategy, such as a honeypot system, is employed to draw in malicious activities, understand the attacker community’s tactics, and proactively provide defense. However, there’s … Read More Read More
Categories: