Přístupnostní navigace
E-application
Search Search Close
study programme
Faculty: FITAbbreviation: DIT-ENAcad. year: 2021/2022
Type of study programme: Doctoral
Study programme code: P0613D140029
Degree awarded: Ph.D.
Language of instruction: English
Tuition Fees: 4000 EUR/academic year for EU students, 4000 EUR/academic year for non-EU students
Accreditation: 8.12.2020 - 8.12.2030
Profile of the programme
Academically oriented
Mode of study
Full-time study
Standard study length
4 years
Programme supervisor
prof. Ing. Lukáš Sekanina, Ph.D.
Doctoral Board
Chairman :prof. Ing. Lukáš Sekanina, Ph.D.Councillor internal :prof. Dr. Ing. Jan Černockýprof. Ing. Tomáš Vojnar, Ph.D.prof. Dr. Ing. Pavel Zemčík, dr. h. c.prof. RNDr. Milan Češka, CSc.prof. Ing. Martin Drahanský, Ph.D.prof. Ing. Adam Herout, Ph.D.prof. Ing. Jan M. Honzík, CSc.prof. Ing. Tomáš Hruška, CSc.doc. Ing. Jan Kořenek, Ph.D.prof. RNDr. Alexandr Meduna, CSc.prof. Dr. Ing. Zbyněk Raidaprof. RNDr. Josef Šlapal, CSc.prof. Ing. Pavel Václavek, Ph.D.Councillor external :prof.,RNDr. Jiří Barnat, Ph.D. (FI MUNI)prof. Ing. Jiří Sochor, CSc. (FI MUNI)
Fields of education
Study aims
The goal of the doctoral degree programme is to provide outstanding graduates from the master degree programme with a specialised university education of the highest level in certain fields of computer science and information technology, including especially the areas of information systems, computer-based systems and computer networks, computer graphics and multimedia, and intelligent systems. The education obtained within this degree programme also comprises a training and attestation for scientific work.
Graduate profile
Profession characteristics
FIT graduates in general and FIT doctoral graduates in particular do not have a problem finding employment at scientific, pedagogical or management positions both in Czech Republic and abroad.
Fulfilment criteria
The requirements that the doctoral students have to fulfil are given by their individual study plans, which specify the courses that they have to complete, their presupposed study visits and active participation at scientific conferences, and their minimum pedagogical activities within the bachelor and master degree programmes of the faculty. A successful completion of the doctoral studies is conditional on the following:
Study plan creation
The rules are determined by the directions of the dean for preparing the individual study plan of a doctoral student. The plan is to be based on the theme of his/her future dissertation thesis and it is to be approved by the board of the branch.
https://www.fit.vut.cz/fit/info/smernice/sm2018-13-en.pdf
Availability for the disabled
Brno university of technology provides studies for persons with health disabilities according to section 21 par. 1 e) of the Act no. 111/1998, about universities and about the change and supplementing other laws (Higher Education Act) as amended, and according to the requirements in this field arising from Government Regulation No. 274/2016 Coll., on standards for accreditation in higher education, provides services for study applicants and students with specific needs within the scope and in form corresponding with the specification stated in Annex III to Rules for allocation of a financial contribution and funding for public universities by the Ministry of Education, Youth and Sports, specifying financing additional costs of studies for students with specific needs.Services for students with specific needs at BUT are carried out through the activities of specialized workplace - Alfons counselling center, which is a part of BUT Lifelong Learning Institute - Student counselling section.Counselling center activities and rules for making studies accessible are guaranteed by the university through a valid Rector's directive 11/2017 concerning the status of study applicants and students with specific needs at BUT. This internal standard guarantees minimal stadards of provided services.Services of the counselling center are offered to all study applicants and students with any and all types of health disabilities stated in the Methodological standard of the Ministry of Education, Youth and Sports.
What degree programme types may have preceded
The study programme builds on both the ongoing follow-up Master's programme in Information Technology and the new follow-up Master's programme in Information Technology and Artificial Intelligence.Students can also, according to their needs and outside their formalized studies, take courses and trainings related to the methodology of scientific work, publishing and citation skills, ethics, pedagogy and soft skills organized by BUT or other institutions.
Issued topics of Doctoral Study Program
The topic concerns algorithms of image, video, and/or signal processing. Its main goal is to research and in-depth analyze existing algorithms and discover new ones so that they have desirable features and so that they are possible to efficiently implement. Such efficient implementation can be but does not necessarily have to be part of the work but it is important to prepare the algorithms so that they can be efficiently implemented e.g. in CPU, in CPU with acceleration through SSE instructions, in embeded systems, even in combination with FPGA, in Intel Xeon PHI, in extremely low power systems, or in other environments. It is possible to exploit algorithms of artificial intelligence, such as neural networks, especially CNNs The application possibilities of the algorithms are also important and the application can be but does not have to be part of the work. The algorithms/applications of interest include:
After mutual agreement, individually selected algorithms can be considered as well as soon as they do belong to the general topic.
Collaboration on grant projects, such as TACR, MPO, H2020, ECSEL (possible employment or scholarship).
Tutor: Zemčík Pavel, prof. Dr. Ing., dr. h. c.
Today's increasing requirements on data processing and visualization emphasize the importance of developing high-quality, quick, and user-friendly tools used for this purpose. Common types of visualization media (charts) are usually not sufficient to visualize complex multidimensional data. An example of such data is the geospatial data representing the relation of data with a geographical location (such as occurrences of some effects on the Earth's surface). The need to visualize such data goes beyond the academic areas of interest. We can meet with the geospatial visualization in the industry (distribution of bureaus, network topologies), public sector (public transport schemes), media (spread of disease, economic and demographic indicators), but also among ordinary users (private routes tracking). Those visualizations are usually arranged in advanced screens (e. g., dashboards).
Users can choose between two types of tools for geospatial visualization:
Both approaches have advantages and disadvantages. A prototype of a compromise solution-Geovisto library-was developed during the TACR project (19/20) in cooperation with the Brno University of Technology, Masaryk University, and the Flowmon company. The library is based on the Leaflet library. However, it tries to provide a higher level of abstraction by offering a set of thematic maps (e. g., cartogram, connection map). Those thematic maps can be configured either programmatically or by using controls known from popular authoring systems. The library targets programmers who want to use a ready solution, and they do not want to be limited by the need to deeply study the framework and the requirements of proprietary authoring systems.
The doctoral thesis's goal will be to study existing approaches to geospatial data visualization and look for new ones. Particularly:
Tutor: Hruška Tomáš, prof. Ing., CSc.
The project is concerned with advanced methods of computational photography. The aim is to research new computational photography methods, which comprises software solutions potentially supported by new optics and/or hardware. Our interest is on HDR image and video processing, color-to-grayscale conversions, spectral imaging, and others.
Tutor: Čadík Martin, doc. Ing., Ph.D.
Internet of Things is a communication platform that interconnects different types of devices in smart homes, smart buildings, or smart hospitals. IoT end nodes (things) are usually connected via L2 technology like Zigbee, Z-Wave, WiFi, or Bluetooth to the IoT controller (gateway, hub) that transmit data from IoT end devices the cloud for processing and visualization. This proprietary solution does not support integration with standardized systems for network management (SIEM, SOC). IoT devices can be integrated into the central monitoring system using SNMP proxy agents that analyze IoT traffic and creates special MIB objects for specific IoT endpoints. These MIB objects can be managed using SNMP network monitoring and management system. A large amount of monitoring data from IoT devices requires advanced processing and control. The research aims to propose and implement methods for the integration of IoT devices into the centralized network monitoring and management system. Having the data, it is necessary to apply advanced methods for their analysis and processing to be used for network management as defined by the FCAPS model. The topic is a part of the research project IGA Application of AI methods to cybersecurity and control systems and national center of competence for cybersecurity. Co-supervisor: Matoušek Petr, Ing., Ph.D., M.A.
Tutor: Ryšavý Ondřej, doc. Ing., Ph.D.
The project is concerned with advanced rendering and global illumination methods. The aim is to research new photorealistic (physically accurate) as well as non-photorealistic (NPR) simulations of interaction of light with the 3D scene. Cooperation and research visits with leading research labs are possible (Adobe, USA, MPII Saarbrücken, Německo, Disney Curych, Švýcarsko, INRIA Bordeaux, Francie).
Dissertation focuses on the security of wireless local area networks. As part of the solution, student should become familiar with selected wireless networks and their security. The goals of this work: studying the theory of wireless networks, their properties and possibilities of attacks, testing the basic types of attacks, designing a new method of protection, experiments, evaluating the results and proposing the direction of further research.Co-supervised by dr. Kamil Malinka.
Tutor: Hanáček Petr, doc. Dr. Ing.
Photoacoustic Tomography (PAT) is an emerging 3D biomedical imaging modality for both clinical and pre-clinical imaging that has gained increasing attention in the last decade. In principle, PAT can achieve as high spatial and temporal resolution as ultrasound images, but, because it depends on optical absorption for contrast, it also has the potential to provide functional, molecular and genetic imaging capabilities. However, realising these advantages requires high quality image reconstruction algorithms.
Several approaches to PAT image reconstruction are currently used, including time reversal, series constructions, and filtered backprojection algorithms. However, there are several aspects that cannot be taken into account in these classical approaches and therefore result in image artefacts, including (1) patient movement, (2) incomplete coverage of the object with ultrasound sensors, (3) angle and frequency variability of the sensor's sensitivity, (4) unstable environment, e.g., variations in temperature, (5) sound speed variations with the object eg. breast, and (6) measurement noise. In addition, large-scale 3D images take time to reconstruct, limiting the imaging frame rate; increasing the frame rate would open up many more potential applications.
Currently, the reconstruction of photoacoustic images takes several hours on high-end servers and subsequently artefacts are detected and removed. The goal of this thesis is to overcome some of these limitations, by improving reconstruction speed and quality of photoacoustic images using artificial intelligence.
We can identify three essential approaches for this task. First, use AI to correct or complement the measured data to form a complete and clean data set then use a classical reconstruction algorithm. Second, use AI to complement the image reconstruction task, by intertwining learnable components with classical reconstruction approaches. Third, use a classical reconstruction algorithm to form an image and then use AI to remove the artefacts.
These topic cover several areas, from the experimental acquisition of photoacoustic data, techniques for image reconstruction and high performance computing, to deep learning and artificial intelligence.
Tutor: Jaroš Jiří, doc. Ing., Ph.D.
The rising trend in artificial intelligence usage brings novel cybersecurity approaches on both sides - attacker and defender. The most prominent examples are deepfake usage to counterfeit biometric systems or security analytics, using deep learning for cyber-attacks detection. The goal of this work is to analyze all existing approaches, their properties, and potential applications. The work should then propose novel applications of AI for the problems that were not resolved before while also implementing the most interesting application.
Co-supervised by dr. Kamil Malinka.
The goal of the work is to research and create algorithms that will allow for running augmented reality on mobile (ultramobile) devices. It mainly concerns algorithms of pose estimation in the space by the means of computer vision and by using sensors embedded in the device. Furthermore, the work will elaborate on algorithms of rendering of virtual elements into the real-world scene and on applications of augmented reality on mobile devices.
Tutor: Herout Adam, prof. Ing., Ph.D.
The aim of the work is the detection and recognition of pathologies in retinal images (retina of the eye). The work will consist of:
Tutor: Drahanský Martin, prof. Ing., Ph.D.
The aim of the thesis is to create 3D face model from 2D photos of diverse origins, namely:
Deep convolution networks have been a clear trend of machine learning for image analysis in recent years. However, in tasks with a very small and specific data set, where it is not enough to use data augmentation or GAN concepts, their usage is still problematic.The goal of the dissertation thesis is to explore, analyze and design new architectures of deep convolutional networks and approaches to their learning for image analysis tasks in which the size of the annotated data set is extremely small or is gradually growing. For learning neural networks it is possible to use unannotated data or partially annotated data in the form of a limited user input.Proposed methods will be applied in the projects on which the supervisor participates.
Tutor: Španěl Michal, Ing., Ph.D.
Current internet traffic is mostly encrypted. This is also true for mobile apps that communicate over TLS or DTLS. Detection of mobile apps communicating over the local network is important for network monitoring and cybersecurity. There are several approaches to how mobile apps can be detected in the network traffic. One approach is based on mobile apps fingerprinting using the JA3/JA3S method. Another approach includes statistical analysis of encrypted traffic or the application of machine learning. This topic is research and evaluation of current methods for detecting applications in encrypted traffic, their extension, and proposal of advanced methods. The research is focused on mobile apps and automated detection. The topic is a part of the research project IGA Application of AI methods to cybersecurity and control systems.Co-supervisor: Matoušek Petr, Ing., Ph.D., M.A.
The topic focuses embedded image, video and/or signal processing. Its main goal is to research capabilities of "smart" and "small" units that have such features that allow for their applications requiring smyll, hidden, distributed, low power, mechanically or climatically stressed systems suitable of processing of some signal input. Exploitation of such systems is perspective and wide and also client/server and/or cloud systems. The units themselves can be based on CPU/DSP/GPU, programmable hardware, or their combination. Smart cameras can be considered as well. Applications of interest include:
A possibility exists in collaboration on grant projects, especially the newly submitted TAČR, H2020, ECSEL ones (potentially employment or scholarship possible).
The aim of this work is to generate various damages into synthetic fingerprints and analysis of their quality. The work will consist of:
Generative adversarial networks (GANs) introduced by Goodfellow et al. in 2014 found many interesting applications across various domains. GANs enable to improve the performance of neural network-based classifiers as well as to enrich sample set of hard-to-obtain datasets. Moreover, a combination of two GANs (a.k.a., dual-GANs) enables to perform the unsupervised mapping between two different dataset domains. Such an extension can be further applied as a filter of noise in the datasets.The goal of this thesis is to investigate existing application domains and suitable scenarios of GANs, while focusing on security aspects. For example, the application of GANs for extracting privacy-sensitive data might be analyzed. Next, the thesis should explore new approaches to attacks utilizing GANs and evaluate their success. Finally, the thesis should propose novel defense techniques and discuss their assumptions and limitations.Co-supervised by dr. Ivan Homoliak.
The goal of this thesis is to analyze side-channels and software vulnerabilities in hardware wallets, which are currently considered as a most secure way of storing private keys of users. These hardware wallets are connected to the client machine by a USB, Bluetooth, or other connection. Therefore, we assume two attacker models, one has the physical access to the wallet and another one tampers with the client interface and thus can influence the execution of the client protocol.Examples of wallets that we want to analyze are Trezor One/T, CoolBitX, Ellipal, Ledger Nano S, etc. Hardware skills (oscilloscope) are advantage for the PhD student.
Co-supervised by dr. Ivan Homoliak.
The trend of the manufacturing industry is the introduction of collaborative robots into production, which allows for closer human-robot cooperation. The aim is to streamline production by using robots for repetitive activities and workers for complex activities, their robotization would be too expensive and not very scalable. This trend brings new problems in how to communicate effectively with robots: to have an idea of the state of the robot and its understanding of the situation, and to control and program the robot easily and naturally.The aim of this work is to explore new possibilities of human-robot communication using modern technologies and devices. The solution requires:
Tutor: Beran Vítězslav, doc. Ing., Ph.D.
There are many ways to represent and store 3D data. The most commonly used is the polygonal surface mesh, due to its simplicity and versatility. Volumetric representation is often used for some specific tasks because it can significantly reduce complexity of their implementation when compared to polygonal meshes. The emerging trend is hybrid representations, which try to combine the advantages of both of these representations and possibly eliminate the need to change from one representation to another.The goal of the dissertation thesis is to explore methods of storing and representing 3D data and to design new algorithms for 3D data processing with regard to typical problems such as numerical stability, robustness, open and non-manifold 3D models.Proposed methods will be applied in the projects on which the supervisor participates.
The project deals with image and video quality assessment metrics (IQM). The aim is to explore new ways how to incorporate human visual system properties into IQM. In particular, we will consider perception of HDR images, and utilization of additional knowledge (in form of metadata, 3D information, etc.) about the tested scenes using machine learning (e.g. neural networks).
The project is concerned with advanced methods of image processing. The aim is to research new methods using machine learning, in particular deep convolutional neural networks.
This topic focuses on the process and techniques used for cyberthreat detection, obtaining and representation of threat data. The goal of this dissertation thesis is to study the current techniques and propose a solution that effectively improves the process and its results usable for malware detection and threat intelligence, e.g. a multicriterial clustering with focus on explainability.
The topic of identifying and extracting specific information from documents on the Web has been the subject of intensive research for quite a long time. The basic obstacles that make this problem difficult are the loose structure of HTML documents and absence of meta-information (annotations) useful for recognizing the content semantics. This missing information is therefore compensated by the analysis of various aspects of web documents that include especially the following:
A background knowledge about the target domain and the commonly used presentation patterns is also necessary for successful information extraction. This knowledge allows a more precise recognition of the individual information fields in the document body.
Current approaches to information extraction from web documents focus mainly modeling and analyzing the documents themselves; modeling the target information for more precise recognition has not yet been examined in detail in this context. The assumed goals of the dissertation are therefore the following:
Experimental implementation of the proposed methods using existing tools and experimental evaluation on real-world documents available on the WWW is also an integral part of the solution.
Tutor: Burget Radek, doc. Ing., Ph.D.
Dissertation focuses on the security of IoT systems. The goals of this work: studying the theory of IoT systems, their properties and possibilities of attacks, testing the basic types of attacks, designing a new method of protection, experiments, evaluation of results and design of further research.Co-supervised by dr. Kamil Malinka.
SCADA (Supervisory Control And Data Acquisition) and Industrial Control Systems (ICS) communication is intended to control and monitor industrial processes in smart factories, smart grids, etc. Disruption of communication may interrupt important industrial processes or cause a blackout of critical supplies like water or energy. To protect SCADA/ICS communication, we can apply advanced SCADA/ICS monitoring that creates normal behavior profiles and detects deviations (anomalies). Communication profiles can be described using statistical methods. We can model communication using automata or create models using machine learning. The research aims to describe the behavior of industrial communication and propose a suitable representation using multidimensional profiles. It is then necessary to verify what types of anomalies are covered by these profiles and how the accuracy of detection can be increased. The topic is a part of the research project Security monitoring of ICS communication in the smart grid (Bonnet). Co-supervisor: Matoušek Petr, Ing., Ph.D., M.A.
The goal of the research is to design a new method for analysis, development and implementation of software systems for Big data processing. The method should support an easy transformation of domain and platform independent models into various platform specific models of the Big data processing systems in accordance with the principle of Model Driven Architecture (MDA), as well as their subsequent implementation using different technologies, and consequently also easier development, deployment and evaluation of such systems.
Individual objectives are to explore, evaluate and categorize various big data processing technologies; to create their platform specific and general meta-models; to find and design a common platform independent meta-model of such systems; to integrate the support for these models into existing or new modeling tools; to design and implement source code generators from the models including tools to generate the models from the source code (round-trip engineering); to create automatic validation and performance tests; to support agile development of such systems including their deployment (CI/CD); etc.
Supervisor-specialist: RNDr. Marek Rychlý, Ph.D.
The topic concerns algorithms of computer graphics and image synthesis. Its main goal is to research new algorithms so that their features and application possibilities are better understood so that they are improved or newly created. If suitable, it is possible to work on various platforms, includeing parallel CPUs, such as x86/64, ARM, Xeon PHI, GPU, etc. or other cores in CUDA, OpenCl, VHDL, etc. Algorithms of interest include:
Collaboration on grant projects, such as TACR, H2020, ECSEL possible (employment or scholarship).
The topic deals with joint training of signal processing and speech data mining architectures, by end-to-end approaches. The topic requires interest in mathematics, statistics, machine learning and signal processing, skills in Python and its machine learning libraries are a plus.
BUT Speech@FIT is a top international research group dealing with speech data mining. It advocates equal opportunities, currently includes 10 nationalities and (within IT) significant share of women.
More information: https://speech.fit.vutbr.cz
Tutor: Černocký Jan, prof. Dr. Ing.
The aim of the thesis is reconstruction of damaged CD/DVD/BR/HDD surfaces, consisting of:
The aim of this work is to create a reliable matching of 2D face with 3D face projection, namely:
The goal of the thesis is to propose a scalable decentralized e-voting system based on smart contracts, with maximum voter privacy, fault tolerance, and coercion resistance. Such an approach should be convenient and robust enough for national elections. The first challenge is to optimize costs the for running expensive zero-knowledge proof verification at smart contract by off-chain constructs. The second challenge is the scalability w.r.t. to the number of participants and vote choices, which depends on the convenient type of the blockchain and its consensus mechanism, such as permissioned blockchains (Proof-of/Stake) and permissioned blockchains (Proof-of-Authority).Co-supervised by dr. Ivan Homoliak.
Dissertation focuses on the security of various systems that are intended to ensure the anonymity or pseudonymity of Internet users (for example, TOR networks). The goals of this work: studying the theory of anonymization systems, their properties and possibilities of attacks, testing the basic types of attacks, designing a new method of protection. Experiments, evaluation of results and proposal of further research direction.Co-supervised by dr. Kamil Malinka.
Semantic web technology allows the representation of information and knowledge for the purpose of its further sharing, for example, in computer applications. Available knowledge databases, such as DBPedia, contain a great amount of useful information and facts. On the current web, however, most of the new information is published in the form of documents most often in HTML, whose further processing is problematic mainly due to their free structure and the absence of explicit information about the meaning of individual parts of the content. There exist two ways to overcome this gap between the classical and the semantic web:
To achieve both these goals, it is necessary to analyze the capabilities of existing ontological models regarding the modelling of the target domains and mapping these descriptions on the content of real-world web pages and documents. Possible applications include, but are not limited to:
Experimental implementation of the proposed methods using the existing tools and experimental evaluation on real-world data and documents is also an integral part of the solution.
The topic of the work is focused on speech recognition and data processing for ATC-pilot communication in aviation. It will cover all components of automatic speech recognition (ASR), i.e. data processing, acoustic model, vocabulary (including special aviation terminology) and language model.The topic is related to the European project Horizon 2020 ATCO2, and will be elaborated in cooperation with project partners. The assignment requires an interest in mathematics, statistics, machine learning and speech processing, the advantage is proficiency in Python and its libraries for machine learning.
The project deals with geo-localization of mobile devices in unknown environments using computer vision and computer graphics methods. The aim is to investigate and develop new image registration techniques (with geo-localized image database or 3D terrain model). The goal is an efficient implementation of proposed methods on mobile devices as well as search for additional applications in the area of image processing, computational photography, and augmented reality.