Postgraduate research students

  • Al Malwi Wajdan Abdullah A
    Testing Privacy Paradox Across Cultures: Investigating the Privacy Attitude and Behavior of SNS's Users
  • Aladwani Tahani
    Diagnosis of Diseases as Cloud Computing Service (DoDaaS)
  • Alahmari Saad Abdullah S
    Moderating Human Security Habits
  • Alghamdi Ibrahim Ahmed I
    Computation Offloading Decision Algorithm in Mobile-Edge Cloud Computing: An Optimal Stopping Theory Approach
  • Alharbi Noha Abdulkhalig M
    Assessing the feasibility and impact of introducing the Scottish Computer Science Curriculum in primary schools at Saudi Arabia with reference to its adoption in Scottish primary schools
  • AlHarbi Nouf Helal H
    The proposed title is: Optimising routing in DWSNs for latency and power-consumption.
  • Alkharashi Abdulwhab
    Exploring the Characteristics of Abusive Behaviour in Online Social Media Settings
  • Almazarqi Hatem Aied S
    Profiling IoT-based Botnets
  • AlQallaf Ali
    Robot self-adaptation
  • Aversa Marco
  • Bosman Isak
    Optimizing Natural Language Processing on Edge Devices
  • Buker Abeer Abdullah N
    Automatic analysis of conversational patterns in online chats.
  • Bumpus Benjamin
    Topological Parameter Choice for FPT Graph Algorithms
  • Charvet Valentin
    Reinforcement Learning in Closed-loop data science
  • Di Campli San Vito Patrizia
    Investigation of Thermal Feedback for In-Car Applications
  • DUAN LI
    Continuous and Interactive Visual Perception for Robotic Grasping and Manipulation
  • Evangelopoulou Maria
  • Fraser Douglas
    Assurance and Resilience of Digital Twins in Critical Systems
  • Ghanduri Fatima H M
    Deep Learning and Genetic Computing-driven Nowcasting of Credit Risk Management.
  • Gibson Perry
    Modular development of across-stack deep learning inference accelerators on heterogeneous devices
  • Hand Samuel
    Firefighting Problems on Temporal Graphs
  • Haris Jude
    Designing and Generating Efficient FPGA-Based Accelerators for Deep Neural Networks
  • Harth Natascha
    Analytics Learning and Knowledge Mining for Big Data Exploration in IoT Environments
  • Jacob Dejice
    Opportunistic Acceleration of Array-centric Python Computation in
  • Jakobsen Mathias Steen
    Aliasing Control in an Object-Oriented Programming Language with Typestate Annotations
  • Kavanagh William
    Investigation into the viability of model checking to aid video game development
  • Kelly Ethan
    Game-theoretic and probabilistic methods applied to spatial network models of contagion
  • KOEHLER Thomas
    Lift: A Performance Portable Programming Language for the Applications and Hardware of the Future
  • Kongyoung Sarawoot
    Deep Reinforcement Learning for Effective Goal-oriented Chatbot Dialogue
  • Kourtelos Praxitelis
    Levitating Displays for Multimodal Interaction
  • Liu Siwei
    Deep learning recommendations
  • Looker Nicola
    Exploring cognitive load theory and program comprehension in secondary school computer science lessons: a design-based research study
  • Ma Wei
    Scalable Efficient Multi-System Complex-Query Data Analytics
  • Macdonald Shaun
  • Mackie Iain
  • Mathis Florian
  • McKay Michael
    Algorithms for matching problems involving preferences
  • Mitton Joshua
  • Narvala Hitarth
    Learning from User Actions through the Identification of Latent Relationships in Sensitive Documents
  • Neill Oliver
    Towards all-optical neural networks
  • Owoicho Paul Ogbonoko
    Mixed initiative and feedback for Conversational Information Seeking
  • Ozimek Piotr
    Applying a Biologically Inspired Software Retina to Convolutional Neural Networks
  • Parkinson Jack
  • Perrone Francesco
    Experimental Methods for Moral Behaviour Analysis in Human-Robot Interaction
  • Pitsillos Nikos
  • Ramsingh Adrian Ravi Kishore
    Seamless Composition of Programming Frameworks
  • Raue Stefan
    Automated annotation of in-match sports events: A sensor-based model for group activity recognition
  • Ravindran Anith
    Modelling Dynamic Real-world Systems as Tactile Representations with Dexmo Haptic Force-feedback Gloves
  • Rutherford Charles
    Cyber security of SCADA networks and devices
  • Ryan Jessica
    Graph Modification Problems in Edge-Coloured Graphs
  • Sablotny Martin
    The Application of Machine Learning to Cyber Defence In Critical Applications
  • Sagkriotis Stefanos
    Containerised NFV orchestration and management
  • Shivani *
    GDPR Privacy Compliance verification in Software Systems
  • Simpson Kyle
    Securing Future Networked Infrastructures through Dynamic Normal Behaviour Profiling
  • Su Ting
    Fake News and Misinformation over Social Media
  • Taka Evdoxia
    Interactive, animated representations of probabilistic models
  • Trimble James
    Hard Graph Problems - Theory and in Practice
  • Tshukudu Ethel
    Adopting a comprehension-first pedagogy for programming in a national school system
  • Urlea Cristian
    Optimal program variant generation for heterogeneous compute platforms.
  • Wallis William
    Investigating Modelling and Simulation Techniques for Socio-Technical Systems at Scale
  • Wang Xi
    Using Deep Learning Approaches in Venue Recommendation
  • Wang Xiao
    Effective yet Efficient Information Retrieval based on Deep Reinforcement Learning
  • Xin Xin
    Formal Verification of Safety Critical Systems with Uncertainty
  • Yadav Sarthak
    Towards aural explanations for interpretable CNNs for spoken language understanding
  • Yanev Mihail
    Optimizing general-purpose operating systems for high performance networking
  • Zalakain Uma
    Machine verification of typed process calculi

Supervised elsewhere in the University