QUT offers a diverse range of student topics for Honours, Masters and PhD study. Search to find a topic that interests you or propose your own research topic to a prospective QUT supervisor. You may also ask a prospective supervisor to help you identify or refine a research topic.
Found 12 matching student topics
Displaying 1–12 of 12 results
Basic aircraft collision risk modelling and visualisation
Aircraft collision risk modelling is complex yet key to ensuring safe air transport (both crewed and uncrewed aircraft). Different collision risk models are better suited to different airspace environments which means model comparison and evaluation is an important research problem. This project takes a deeper look into a specific collision risk modelling approach: gas models.
- Study level
- Honours
- Faculty
- Faculty of Engineering
- School
- School of Electrical Engineering and Robotics
- Research centre(s)
- Centre for Robotics
Praeclarus process-data quality framework
Praeclarus is an open-source software framework that aims to facilitate data pre-processing for process mining. Process mining is specialised data mining focusing on process-data. It is of high interest to industry, with the market doubling every two years (e.g., increasing from $550M in 2020 to $1B in 2022). This market increase has meant that big companies like Microsoft, SAP, and IBM are acquiring process mining vendors such is Minit, Signavio, and myInvenio.Recent process mining surveys show that more than 60% …
- Study level
- PhD, Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Information Systems
Automatic Generation of Software Vulnerability Datasets for Machine Learning
In recent years, machine learning has enjoyed profound success in a range of interesting applications such as natural language processing, computer vision and speech recognition. It has been possible mainly due to, in addition to better computing resources, the availability of large amounts of training datasets to these applications. However, in software security research, the lack of large datasets is an open problem that makes it challenging for machine learning to reason about security vulnerabilities found in real-world software. The …
- Study level
- PhD, Master of Philosophy
- Faculty
- Faculty of Science
- School
- School of Computer Science
Unified def-site and use-site security policies for component-based software systems
Securing the information manipulated by computer systems, such as privacy and integrity in social software, is a challenge. Traditional methods to impose limits on the information disclosure, such as access control lists, firewalls, and cryptography, provide no guarantees about information propagation. For instance, cryptography provides no guarantees about the confidentiality of the data are given once it is decrypted.Information flow control (IFC) is the problem of ensuring secure information flow according to specified policies within computer systems. Modern applications are …
- Study level
- PhD, Master of Philosophy
- Faculty
- Faculty of Science
- School
- School of Computer Science
Productive reproducible workflows for deep learning-enabled large-scale industry systems
Deep learning is a mainstream to increase the capability of industry systems, particularly for those with massive data input and output. It is seen that many tools are now claimed to be freely available and could facilitate such process of development and deployment significantly with scalability and quality.However, limited attention has been on developing reproducible and productive workflows to identify the tools and their values towards large-scale industry systems. In this project, we will explore how to design such a …
- Study level
- PhD, Master of Philosophy
- Faculty
- Faculty of Science
- School
- School of Computer Science
Systematic evaluation towards the analysis of open-source supply chain on ML4SE tasks
Applying machine learning algorithms to source code related SE task is rapidly developing and attracts the attention from both researchers and industry engineers. While there are many program languages available, applying such techniques, i.e., the representation learning models, for different languages may achieve different performance. Particularly, they all have their own strict syntax, which determines the abstract syntax tree. Thus, a lot of different open-source supply chain are available, for example the parsing tools are used to build AST from …
- Study level
- PhD, Master of Philosophy
- Faculty
- Faculty of Science
- School
- School of Computer Science
Fine-grained software vulnerability detection using deep learning techniques
Software vulnerability is a major threat to the security of software systems. Thus, the successful prediction of security vulnerability is one of the most effective attack mitigation solutions. Existing approaches for software vulnerability detection (SVD) can be classified into static and dynamic methods. Powered by AI capabilities, especially with the advancement of machine learning techniques, current software has been produced with more sophisticated methodologies and components. This has made the automatic vulnerability proneness prediction even more challenging. Recent research efforts …
- Study level
- PhD, Master of Philosophy
- Faculty
- Faculty of Science
- School
- School of Computer Science
Security analysis of open-source software
Several open-source projects drive modern-day IT applications. However, some open-source projects get compromised by malicious attackers, who include malware to the code to compromise the security of the application users.This project will investigate approaches for securing the open-source software.
- Study level
- Honours
- Faculty
- Faculty of Science
- School
- School of Computer Science
Scalable software solutions for improving the CRISPR gene editing system
The CRISPR-Cas9 technology allows the modification of virtually any gene in any organism of interest. It has generated a lot of interest, both in the research community and the general population.One of the crucial components of CRISPR experiments is the design of the 'guide RNAs' that will control where modifications occur. We have developed a software pipeline, named Crackling, to identify safe and effective guide RNAs across entire genomes.We are seeking to expand and improve various aspects of our current …
- Study level
- Honours
- Faculty
- Faculty of Science
- School
- School of Computer Science
- Research centre(s)
- Centre for Data Science
Interpretable software vulnerability detection using deep learning techniques
Software vulnerabilities have been considered as significant reliability threats to the general public, especially critical infrastructures. Many approaches have been proposed to detect vulnerabilities in source code to avoid any damages they pose when exploited. Conventional approaches include static analysis and dynamic analysis. Static analysis uses pre-defined patterns or vulnerability dataset to scan and examine software source code to identify potential vulnerable code snippets. These patterns are manually crafted or identified by software developers or security experts, which are time-consuming. …
- Study level
- PhD, Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Computer Science
- Research centre(s)
- Centre for Data Science
Semantic-based source code embeddings for software vulnerability discovery
Operational Technology (OT) is a field of computing which is becoming increasingly prominent in modern society. It is responsible for a variety of critical services, especially in industrial contexts, including power generation, manufacturing, transport, and many others. This important role makes OT an especially tempting target for malicious attackers. In order to counter this, tools must be developed to locate vulnerabilities and flaws in OT software systems before attacks can be launched. Vulnerability discovery in computer software systems including OT …
- Study level
- Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Computer Science
- Research centre(s)
- Centre for Data Science
Cybersecurity for open-source software using machine learning and AI
People are increasingly using open-source software in businesses and industries. These software programs are made by a community of developers and are managed by platforms like PyPI and npm. However, there is a worry about the safety of these programs because hackers add harmful code to compromise security and steal important data. This project explores approaches to detect harmful open-source projects using machine learning and AI.
- Study level
- Honours
- Faculty
- Faculty of Science
- School
- School of Computer Science
Contact us
If you have questions about the best options for you, the application process, your research topic, finding a supervisor or anything else, get in touch with us today.