study programme
Information Technology
Original title in Czech: Informační technologieFaculty: FITAbbreviation: DITAcad. year: 2025/2026
Type of study programme: Doctoral
Study programme code: P0613D140028
Degree awarded: Ph.D.
Language of instruction: Czech
Accreditation: 8.12.2020 - 8.12.2030
Profile of the programme
Academically oriented
Mode of study
Full-time study
Standard study length
4 years
Programme supervisor
Doctoral Board
Chairman :
prof. Ing. Lukáš Sekanina, Ph.D.
Councillor internal :
prof. Dr. Ing. Pavel Zemčík, dr. h. c.
prof. Dr. Ing. Zbyněk Raida
prof. RNDr. Josef Šlapal, CSc.
prof. Ing. Pavel Václavek, Ph.D.
prof. Ing. Tomáš Hruška, CSc.
prof. RNDr. Alexandr Meduna, CSc.
doc. Dr. Ing. Petr Hanáček
prof. Dr. Ing. Jan Černocký
prof. Ing. Adam Herout, Ph.D.
doc. Ing. Jan Kořenek, Ph.D.
prof. Ing. Tomáš Vojnar, Ph.D.
Councillor external :
prof.,RNDr. Jiří Barnat, Ph.D.
Fields of education
Area | Topic | Share [%] |
---|---|---|
Informatics | Without thematic area | 100 |
Study aims
The goal of the doctoral degree programme is to provide outstanding graduates from the master degree programme with a specialised university education of the highest level in certain fields of computer science and information technology, including especially the areas of information systems, computer-based systems and computer networks, computer graphics and multimedia, and intelligent systems. The education obtained within this degree programme also comprises a training and attestation for scientific work.
Graduate profile
- Graduates from the doctoral study programme are trained to independently work in research, development, or management.
- They are able to solve and/or to lead teams solving advanced conceptual, research, development, or production problems in the area of contemporary information technology and its applications.
- They can be engaged to work on creative tasks, to lead research and development teams, or to work in management of companies or organizations whenever there are required abilities to work in an independent and creative way, to analyze complex problems, and to propose and realize new and original solutions. Graduates from the doctoral study programme can also teach and/or scientifically work at universities.
Profession characteristics
FIT graduates in general and FIT doctoral graduates in particular do not have a problem finding employment at scientific, pedagogical or management positions both in Czech Republic and abroad.
- FIT graduates of the doctoral study are capable of independent scientific, research and management work in the field of Informatics, Computer Technology and Information Technologies. Graduates are ready to solve challenging conceptual, research and development problems. They can independently conduct research, development and production in the field of modern information technology.
- Typically, they work as creative workers at top scientific research workplaces, as leaders of research and development teams and in scientific and pedagogical work at universities. Graduates of this program are also employed in higher functional positions of larger institutions and companies, where the ability to work independently, analyze complex problems and design and implement new, original solutions is required.
- And, last but not least, graduates typically continue as so-called "postdoc" in their academic careers in Czech Republic or abroad.
Fulfilment criteria
The requirements that the doctoral students have to fulfil are given by their individual study plans, which specify the courses that they have to complete, their presupposed study visits and active participation at scientific conferences, and their minimum pedagogical activities within the bachelor and master degree programmes of the faculty. A successful completion of the doctoral studies is conditional on the following:
- The student has to pass a doctoral state examination within which he/she has to prove a deep knowledge of methodologies, theories, and their applications in accordance with the state of the art in the areas of science that are given by the courses included in his/her individual study plan and by the theme of his/her future dissertation thesis. The doctoral state examination also encompasses an evaluation of the presumed goals of the future dissertation thesis of the student, of the chosen solution method, and of the so far obtained original results.
- The student has further to prepare and defend his dissertation thesis.
Study plan creation
The rules are determined by the directions of the dean for preparing the individual study plan of a doctoral student. The plan is to be based on the theme of his/her future dissertation thesis and it is to be approved by the board of the branch.
- obligatory doctoral study programme Courses, the total number of courses a student has to complete and their mapping into particular semesters.
- a Research Plan Content (brief descrition of research content - focuse at the intended research area and the doctoral thesis topic
- a Research Plan ( list of research activities focused at the intended research area and the doctoral thesis topic - conferences and seminars to be attended , work to be published)
- teaching duty according to BUT study rules and regulations
- doctoral study schedule
https://www.fit.vut.cz/fit/info/smernice/sm2018-13-en.pdf
Availability for the disabled
Brno university of technology provides studies for persons with health disabilities according to section 21 par. 1 e) of the Act no. 111/1998, about universities and about the change and supplementing other laws (Higher Education Act) as amended, and according to the requirements in this field arising from Government Regulation No. 274/2016 Coll., on standards for accreditation in higher education, provides services for study applicants and students with specific needs within the scope and in form corresponding with the specification stated in Annex III to Rules for allocation of a financial contribution and funding for public universities by the Ministry of Education, Youth and Sports, specifying financing additional costs of studies for students with specific needs.
Services for students with specific needs at BUT are carried out through the activities of specialized workplace - Alfons counselling center, which is a part of BUT Lifelong Learning Institute - Student counselling section.
Counselling center activities and rules for making studies accessible are guaranteed by the university through a valid Rector's directive 11/2017 concerning the status of study applicants and students with specific needs at BUT. This internal standard guarantees minimal stadards of provided services.
Services of the counselling center are offered to all study applicants and students with any and all types of health disabilities stated in the Methodological standard of the Ministry of Education, Youth and Sports.
What degree programme types may have preceded
The study programme builds on both the ongoing follow-up Master's programme in Information Technology and the new follow-up Master's programme in Information Technology and Artificial Intelligence.
Students can also, according to their needs and outside their formalized studies, take courses and trainings related to the methodology of scientific work, publishing and citation skills, ethics, pedagogy and soft skills organized by BUT or other institutions.
Issued topics of Doctoral Study Program
- Acceleration of Magnetic Resonance using distributed GPU toolbox k-Wave
Cílem této disertační práce je tvorba řešiče Maxewllových rovnic pro aplikace v medicínských zobrazovacích technikách (MR). Numerické řešení Maxwellových rovnic bude založeno na technice k-Wave (korigovaná pseudospektrální metoda). Vzhledem k rozsahu řešený domén a akceptovatelnému času výpočtu je jedinou možností využití rozsáhlých superpočítačových systémů.
Výzkum bude zahájen tvorbou prototypu řešiče v jazyce MATLAB. Po ověření funkčnosti algoritmu dojde k jeho převodu na heterogenní masivně paralelní systémy. Zde očekáváme především multi-GPU systémy Karolina v IT4Innovations a LUMI ve Finsku.
Základní výzkumnou otázku je zde dosažení maximální rychlosti při zachování akceptovatelné přesnosti.Tutor: Jaroš Jiří, doc. Ing., Ph.D.
- Advanced algorithms of Video, Image, and Signal processing
The topic concerns algorithms of image, video, and/or signal processing. Its main goal is to research and in-depth analyze existing algorithms and discover new ones so that they have desirable features and so that they are possible to efficiently implement. Such efficient implementation can be but does not necessarily have to be part of the work but it is important to prepare the algorithms so that they can be efficiently implemented e.g. in CPU, in CPU with acceleration through SSE instructions, in embeded systems, even in combination with FPGA, in Intel Xeon PHI, in extremely low power systems, or in other environments. It is possible to exploit algorithms of artificial intelligence, such as neural networks, especially CNNs The application possibilities of the algorithms are also important and the application can be but does not have to be part of the work. The algorithms/applications of interest include:
- recognition of scene contents, events, and general semantics of video sequences (such as identification of traffic situations, identification in scenes in moview, action identification, etc.),
- classification of video sequences using machine learning (AI)through deep convolution networks neural network or similar approaches (e.g. for industrial quality inspection, object of scene characteristics search, etc.), possibly in combination with object tracking in video using modern methods,
- parallel analysis of video and signal (e.g. for detection of coincidence of occurrence of object in video and characteristic signal shape in surveillance applications), fusion of video and sognals,
- modern algorithms of video, image, and/or signal exploiting "client/server" or "cloud" approaches suitable e.g. for mobile technology and/or embedded systems,
- algorithms of video compression and analysis through frequency or wavelet transforms or similar methods...
After mutual agreement, individually selected algorithms can be considered as well as soon as they do belong to the general topic.
Collaboration on grant projects, such as TACR, MPO, H2020, ECSEL (possible employment or scholarship).
- Advanced Methods of Computational Photography
The project is concerned with advanced methods of computational photography. The aim is to research new computational photography methods. Our interest is on HDR image and video processing, color-to-grayscale conversions, spectral imaging, generative AI and others.
- Further information: http://cadik.posvete.cz/tmo/
- Contact: http://cadik.posvete.cz/
- Cooperation and research visits with leading research labs are possible (Adobe Research, USA, MPII Saarbrücken, Germany, Disney Research Zurich, Switzerland, INRIA Bordeaux, France)
- Advanced Rendering Methods
The project is concerned with advanced rendering and global illumination methods. The aim is to research new photorealistic (physically accurate) as well as non-photorealistic (NPR) simulations of interaction of light with the 3D scene. Cooperation and research visits with leading research labs are possible (Adobe, USA, MPII Saarbrücken, Německo, Disney Curych, Švýcarsko, INRIA Bordeaux, Francie).
- More information: http://cadik.posvete.cz/
- Advanced user interfaces to reduce the mental load of the drone pilot
This work aims to research and develop automated tools and user interfaces that will reduce the mental load of the drone pilot. The solution will use modern methods for sensor data processing and statistical models. The research may also aim to use multiple drones working together in one group. The aim is not to replace the pilot but to facilitate orientation in the environment and actual piloting and to focus on meeting mission objectives rather than piloting itself. The work includes the collection of user tasks and processes and user needs in their execution, analysis, evaluation, and implications for designing new user interfaces. Experiments will be conducted in both simulated and real environments.
- Analysis and usage of microscopic details in images captures by a common camera
- Acquiring of high-quality images by a smartphone or by other cameras
- Composition of multiple captured images into a high-quality image, with detailed characteristics of the material
- Compression, storage, transfer of high-quality images
- Registration, search, comparison of high-quality images
- Analysis of points of interest in high-quality images
- Comparison of high-quality images: identification, verification
- Search based on features from high-quality images
- Machine learning on high-quality images
- Analysis of Anonymisation Networks Security
The thematic focus of this dissertation is on the security of various systems designed to ensure anonymity or pseudonymity of Internet users (e.g. TOR-type networks). The thesis should include:
A study of the theory of anonymization systems, their properties and the possibility of performing attacks.
Testing the basic types of attacks.
Designing a new method of protection.
Experimentation, evaluation of results and proposal of further research direction.Participation in relevant international conferences and publication in professional or scientific journals are expected.
Tutor: Hanáček Petr, doc. Dr. Ing.
- Analysis of attacks on wireless networks
The dissertation focuses on the security of wireless local area networks. The student should become familiar with selected wireless networks and their security as part of the solution. This work aims to study the theory of wireless networks, their properties, and possibilities of attacks, test the basic types of attacks, design new protection methods, conduct experiments, evaluate the results, and propose the direction of further research.
Participation in relevant international conferences and publication in scientific journals are expected.
Co-supervised by Dr. Kamil Malinka.Tutor: Hanáček Petr, doc. Dr. Ing.
- Analysis of programs with dynamic data structures
- Assessment of mental stress, anxiety and depression from analysis of brain signals
Problem Statement: Mental stress, anxiety and depression are mental health conditions that often occur together. In such a case, the person is stressed and is not able to control the worry, and it correspondingly affects his/her social and occupational activities. Hence, proper assessment and diagnosis for mental stress, anxiety and depression is required in order for a person to effectively keep taking part in his/her normal daily tasks and activities.
Issues with Current Solutions: Unfortunately, conventional assessment and diagnostic measures are subjective in nature and are used only when the symptoms are already evident due to advanced stages of mental stress, anxiety and depression. However, mental stress, anxiety and depression do not occur overnight, rather it is a long process. Hence, detection of symptoms is required at early stages of mental stress, anxiety and depression because that may result in a cure or at least it will delay the onset of serious mental health issues associated with them.
Challenges: Unlike other diseases where the symptoms like fever and cough allow people to seek help, symptoms at early stages of mental stress and anxiety are not easily identifiable. Hence, the brain needs to be continuously monitored for any sign of change or deterioration in order to detect the symptoms at early stage.
Solution: The solution lies in the development of an objective and quantitative method that can detect mental stress, anxiety and depression at an early stage. Perception of mental stress, anxiety and depression originates in the brain; therefore, this research investigates the neurophysiological features extracted from brain electroencephalogram (EEG) signal to measure mental stress, anxiety and depression at early stage. This will require development of method for extraction of features as well as pattern recognition approach to provide a solution. The EEG dataset is already available for this project.
Few Words About Supervision: I have extensive experience of working in the field of neuro-signal and neuroimage processing and I am currently head of a research group in this area. This is a multidisciplinary project and it will involve working with clinicians. However, the core of the project is related to IT in terms of development of a new method. Please feel free to contact me at malik@fit.vutbr.cz
- Automated Complexity Analysis of programs with (not only) Complex Data Structures
- Autotuning in High Performance Applications.
.
Tutor: Jaroš Jiří, doc. Ing., Ph.D.
- Computer-aided Creativity
Cílem disertační práce je výzkum v oblasti tzv. generativní umělé inteligence - ať už se jedná o difusní a adversiální modely pro generování videa, generativní textové modely pro vytváření příběhů, automatické generování počítačového kódu, hudby, reprezentaci znalostí fyziky a chemie a podporu vědecké kreativity, případně kombinace všech těchto přístupů. Práce se zaměří na řešení problémů interakce člověka s generovanými mezivýsledky, přirozeného označování jednotlivých částí a konceptů tak, aby bylo možné na průběžné výsledky navazovat, a na vývoj metod úpravy datových sad a postupů učení, aby bylo možné řešit společenské problémy, spojené s vytvářenými kreativními modely - otázky spravedlivosti modelů, předpojatosti a začlenění konceptů tzv. zodpovědné umělé inteligence.
- Conversational Agents Combining Structural Knowledge and Learning from Text
Konverzační agenti se pomalu stávají běžnou součástí rozhraní pro (prvotní) komunikaci se zákazníkem a odpovídání na jeho otázky. Výzkum v oblasti počítačového zpracování přirozeného jazyka se zaměřuje na vytvoření automatické klasifikace prvotní komunikace a, zejména, otázky uživatele, do předem daných tříd, k nimž existují konkrétní texty. Není však uspokojivě vyřešeno rozšiřování "znalostí" komunikačních agentů při aktualizaci strukturovaných dat, případně při přidání dalších textových materiálů.
Cílem disertační práce je rozvinout existující přístupy využívající obrovské kolekce neanotovaných textových dat a způsoby kombinování strukturované a nestrukturované znalosti a optimalizace procesů při rozšiřování funkcionality stávajících i nových konverzačních agentů. Součástí práce bude i aplikace zkoumaných metod v rámci evropských projektů, na jejichž řešení se školitel podílí. - Cybersecurity aspects of the Internet of Things
The dissertation focuses on the security of IoT systems. This work aims to study the theory of IoT systems, their properties, and possibilities of attacks, test the basic types of attacks, design a new method of protection, conduct experiments, evaluate results, and design further research.
Participation in relevant international conferences and publication in scientific journals are expected.
Co-supervised by Dr. Kamil Malinka.
Tutor: Hanáček Petr, doc. Dr. Ing.
- Decentralized Finance and System Security
First, this thesis aims to investigate the current state-of-the-art decentralized finance with an emphasis on system security and privacy. The examples of considered applications would involve watchtowers, and various market makers, such as liquidity swaps, decentralized sets and exchanges, lending platforms, balancers, etc. The thesis will propose novel decentralized finance approaches and empirically evaluate the results. The focus will be put on the security and privacy analysis of proposed approaches.
- Detecting Network Applications in Encrypted Traffic
With the development of encryption of network communications, the problem of monitoring applications transmitted over an encrypted channel such as TLS arises. Detecting communication in encrypted traffic is essential for network monitoring, detecting cyber-attacks or malware transmission.
Current approaches to detecting network application communication in encrypted traffic include TLS fingerprinting methods, modelling statistical properties of communication using machine learning or neural networks.
The project will investigate existing approaches and describe their properties, in particular accuracy, stability and extensibility with respect to TLS library development and application updates. Based on this study, the student should propose a method that extends or combines existing techniques to refine application detection and automate the creation of detection models. The prototype detector should be evaluated on real traffic, e.g. in CESNET.
- Development of neuromarker(s) for assessment of alcohol addiction
Problem Statement: Alcohol addiction is a chronic and complex brain disorder causing devastating individual and social problems. Additionally, alcohol causes 3.3 million deaths a year worldwide, close to 6% of all deaths. Many of these deaths are associated with alcohol addiction. Therefore, it's important to look into methods for the diagnosis as well as the treatment of alcohol addiction.
Issues with Current Solutions: Conventionally, screening and assessment of alcohol-related problems are mainly based on self-test reports. However, the accuracy of self-test reports has been questioned, especially for heavy drinkers, because the self-test reports may misguide the diagnosis due to the patient's memory loss (the patients cannot measure their alcohol consumption) and/ or dishonest behavior. Therefore, this research proposes to develop an objective and quantitative method for the detection of alcohol addiction.
Challenges: As alcohol addiction results in changes in brain dynamics, hence, it is vital to investigate and develop a method based on brain activity. However, the main challenge in developing such an objective and quantitative method lies in its implementation for screening in smaller clinical setups. This limits the investigation to electroencephalogram (EEG) which is low cost, highly mobile and has good temporal resolution. Other modalities like MRI, PET etc are not feasible to be employed in smaller clinical settings.
Solution: With current innovations in brain EEG signals, the brain pathways involved in addiction can be investigated. In the last few decades, EEG research has been used to understand the complex underlying processes associated with the pathophysiology of addiction. Interpreting such processes using brain networks using EEG can not only help in diagnosing addiction but also assist in treating addiction. This research aims to develop neuromarker(s) based on brain network interpretation using EEG. The neuromarker will involve the features extraction and corresponding development of the machine learning model.
Few Words About Supervision: I have recently moved to FIT at Brno University of Technology. I have decade long experience of working in the field of neuro-signal and neuroimage processing and I am currently in the process of setting up a research group in this area. This is a multidisciplinary project and it will involve working with clinicians. However, the core of the project is related to IT in terms of development of a new method. Please feel free to contact me at malik@fit.vutbr.cz
- Efficient finite automata for automated reasoning
We will develop techniques for working with finite automata with applications in automatic reasoning, verification and decision procedures for logics.
Although automata an old and fundamental concept of computer science with a huge number of applications, and very well understood at a basic theoretical level, techniques for their use in practice are a very rich and lively field of research.The field has very strong practical motivation in areas such as verification and testing, regular pattern search, artificial intelligence and automatic inference, decision procedures for logics and SMT-solving, system design and analysis, and automated synthesis.
For example, the most efficient algorithms for regular pattern search are based on automata, but it is still not clear how to generalize these algorithms to backreferences, repetition counters, or so-called look-arounds. Deciding logics over strings, aka string-solving, has applications in verification of programs with strings, especially in security analysis of web applications (susceptibility to SQL-injection, cross-site-scripting attacks), analysis of cloud access policies, or of models of critical systems in avionics. An open problem is the efficient implementation of automatic decision procedures for integer arithmetic and other logics. Regular model-checking is an automatic method applicable to the verification of a wide range of systems with infinite state space, such as programs with dynamic data structures or communication protocols. Automated techniques can be used to automatically synthesize programs such as communication interfaces and drivers.In these and other areas, there are a number of deep theoretical questions about decidability and problem complexity.
For example, how to model back-reference using finite automata? What is decidable about programs that manipulate strings, such as web applications, or programs with dynamic data structures? At what cost?Practical questions concern the efficient implementation of existing automata algorithms and theoretical knowledge.
How to avoid state explosion in complex automata manipulations? How to represent them compactly, using techniques of minimization, syntactic extensions, abstraction, approximation?
How to work efficiently with compact representations of automata, such as alternating automata, symbolic automata, automata with counters and registers? What are the theoretical properties of these extensions? How to efficiently implement the developed techniques so that they really work on concrete practical problems?In addition to Doc. Holík, part of the VeriFIT research group, Dr. Lengál, Doc. Rogalewicz, Doc. Češka, Prof. Vojnar. The group reaches the top international level, with hundreds of publications in the most prestigious forums, dozens of software tools, numerous international awards, and intensive international cooperation with prestigious research institutions (Microsofr research, Redmond; Academia Sinica, Taipei, Uppsala Univerisy, Univeristy of Braunschweig, University of Edinburgh, Univeristy of Kaserslautern, University of Paris, Université Grenoble Alpes, Chinese Academy of Sciences).
We collaborate with industry (Red Hat, Honeywell). Our PhD graduates thus have opportunities to obtain interesting specialized positions in industry or pursue careers in academia.
The group has been successful in obtaining grants, so PhD students can be rewarded financially. - Efficient Technology for Dealing with Logics and Automata (Not Only) for Formal Analysis and Verification -- co-supervised by dr. O. Lengal
Different types of logics and automata are among the most fundamental objects studied and applied in computer science for decades. Nevertheless, there are many unsatisfactorily solved problems in this area, and new, exciting problems related to ever new applications of logics and automata are constantly emerging (e.g., in the formal verification of finite and infinite state systems with various advanced control or data structures, in decision procedures, in program or hardware synthesis, in quantum program verification, or even in methods for efficient search in various types of data or network traffic).
The subject of the dissertation will primarily be the development of the state of the art in efficient work with various logics (e.g. over pointer structures, strings, various arithmetic, temporal logics, etc.). To this end, approaches based on different types of decision diagrams, automata, but also e.g. approaches based on the existence of a model of bounded size or on efficient reductions between different types of logical theories will be investigated. In connection with this, methods for efficient work with decision diagrams and different types of automata (automata over words, trees, infinite words, automata with counters, etc.) will be developed. The work will include theoretical research as well as prototype implementation of the proposed techniques and their experimental evaluation.
The work will be solved in collaboration with the VeriFIT team working on the development of techniques for working with logics and automata and their applications at FIT BUT. In particular, Dr. O. Lengal will act as a specialist trainer. After the completion of Dr. Lengal's habilitation, it is expected that he will move to the role of principal supervisor, while T. Vojnar may continue to remain in the role of specialist supervisor. There is also the possibility of close cooperation with various foreign partners of VeriFIT: Academia Sinica, Taiwan (Prof. Y.- F. Chen); TU Vienna, Austria (Assoc. F. Zuleger); LSV, ENS Paris-Saclay (Assoc. M. Sighireanu); IRIF, Paris, France (Assoc. A. Bouajjani, Assoc. P. Habermehl, Assoc. C. Enea), Verimag, Grenoble, France (Assoc. R. Iosif); Uppsala University, Sweden (prof. P.A. Abdulla, prof. B. Jonsson); or School of Informatics, University of Edinburgh, UK (prof. R. Mayr).
Within the framework of the topic, the student can also actively participate in various grant projects, such as. Representation of Boolean Functions using Adaptive Data Structure", GA23-06506S "AIDE: Advanced Analysis and Verification for Advanced Software", the newly accepted GA project 25-18318S "QUAK: Quantum Program Analysis using Automata Toolkit", or the Horizon Europe project SEP-210979090 "VASSAL: Verification and Analysis for Safety and Security of Applications in Life".
- Embedded Systems for Video/Signal Processing
The topic focuses embedded image, video and/or signal processing. Its main goal is to research capabilities of "smart" and "small" units that have such features that allow for their applications requiring smyll, hidden, distributed, low power, mechanically or climatically stressed systems suitable of processing of some signal input. Exploitation of such systems is perspective and wide and also client/server and/or cloud systems. The units themselves can be based on CPU/DSP/GPU, programmable hardware, or their combination. Smart cameras can be considered as well. Applications of interest include:
- classification of images or objects using machine learning (AI) using traditional methods or through deep convolution networks neural network or similar approaches (e.g. for industrial quality inspection, etc.),
- parallel analysis of signal(s) and video (e.g. for robust detection of occurrence of object in industrial or surveillance applications),
- modern algorithms of video, image, and/or signal exploiting "client/server" or "cloud" (with focus on the technlogy) suitable e.g. for mobile technology and/or embedded systems,
- other similar topics can be individually consulted and considered.
A possibility exists in collaboration on grant projects, especially the newly submitted TAČR, H2020, ECSEL ones (potentially employment or scholarship possible).
- End-to-end systems for speaker diarization
Speaker diarization (SD, determining who spoke when) is a crucial part of speech data mining and artificial intelligence (AI). It is crucial for down-stream algorithms, e. g. automatic speech recognition (ASR). Current SD performs well on many conditions but fails to handle overlapped speech. more than two speakers and realistic recordings (diverse acoustic conditions and speaking styles). Moreover, most current SD characterize speakers only using the acoustic information. Future SD will use an amalgam of inputs to enhance performance using all possible information resources, and this PhD topic proposes significant advances towards this goal. We will develop new architectures that extend the end-to-end SD paradigm to different multi-task scenarios. We also propose to integrate the processing of multi-stream inputs exploiting complementary information. The ultimate goal of the project is to combine all such systems into a unified framework that will substantially improve the performance of SD.
- Energy-aware Embedded Inteligence
Cílem disertační práce je výzkum modelů vestavěné inteligence, která explicitně pracuje s energetickou náročností konkrétních operací a optimalizuje svoji činnost na základě konkrétních omezení na straně jednotlivých zařízení, případně celého systému. Součástí bude i realizace vybraných modelů na vhodném typu hardware, který bude možné využít v mezinárodních projektech, na jejichž řešení se vedoucí podílí.
- Explainable Artificial Intelligence
Použití některých metod strojového učení, například v poslední době populárních hlubokých neuronových sítí, přináší problémy architektury tzv. černé skříňky, která sice může v některých případech správně rozhodovat, ale není možné snadno interpretovat způsob rozhodování, ověřovat, v jakém kontextu jsou závěry ještě věrohodné a nakolik mohou vést drobné změny vstupu ke zcela jiným závěrům.
Cílem disertační práce je rozvinout existující přístupy k měření "dokazatelně správných" modelů umělých neuronových sítí a propojit je s technikami generování konfliktních (adversarial) příkladů, aby bylo možné kontrolovat a revidovat existující řešení, využívaná v praxi. Součástí práce bude i aplikace zkoumaných metod v rámci evropských projektů, na jejichž řešení se školitel podílí. - Generative AI and Image Processing using Neural Networks
The project is concerned with advanced methods of image processing and generative AI. The aim is to research new methods using machine learning, in particular deep neural networks.
- Contact: http://cadik.posvete.cz/
- Cooperation and research visits with leading research labs are possible (Adobe Research, USA, MPII Saarbrücken, Germany, Disney Research Zurich, Switzerland, INRIA Bordeaux, France)
- Genetic programming for interpretable machine learning
- Genetic programming utilizing machine learning
- Hardware Trojans Protection Using Digital Circuits Authentisation
Zvyšující se náklady na výrobu čipů a tlak na technologický vývoj spočívající zejména v neustálém zmenšování prvků vedou ve stále větší míře a u většího počtu producentů k přesunu výroby do levnějších lokalit, zpravidla k externím subjektům. Jen málokterý výrobce si může dovolit mít vlastní výrobu polovodičů. Odvrácenou stranou úspor prostřednictvím outsourcingu jsou zvýšená rizika modifikací návrhu s cílem zajistit přístup (k datům, k řízení), vypnutí či možnosti ovlivnění funkce cizích vyrobených čipů nasazených do aplikací, aniž by to zákazník poznal. Již jsou známy případy úspěšného využití takových technik. V této souvislosti se mluví o tzv. hardwarových trojských koních. Vyvíjí se proto techniky detekce takových modifikací, případně obrany proti nim. Jednou z možností detekce hardwarových trojských koní je například tzv. IP watermarking.
Cílem práce bude
- experimentovat s technikami nekonvenční implementace číslicových obvodů, zejména na úrovni hradel a v takovém provedení, aby mohly být integrovány na křemíkové čipy,
- nalézt vhodná řešení a aplikace, kde by využití nekonvenční implementace vedlo ke zvýšení odolnosti číslicových obvodů vůči záměrným modifikacím třetí stranou,
- nalézt techniky umožňující detekci takových modifikací obvodu s využitím nekonvenční implementace číslicových prvků.
- Hardware-aware neural architecture search
- Image and video quality assessment
The project deals with image and video quality assessment metrics (IQM). The aim is to explore new ways how to incorporate human visual system properties into IQM. In particular, we will consider perception of HDR images, and utilization of additional knowledge (in form of metadata, 3D information, etc.) about the tested scenes using machine learning (e.g. neural networks).
- Further information: http://cadik.posvete.cz/iqm/
- Contact: http://cadik.posvete.cz/
- Cooperation and research visits with leading research labs are possible (MPII Saarbrücken, Germany, Disney Research Zurich, Switzerland)
- Interacting with collaborative robots in mixed reality
This work aims to explore and create a mixed reality user environment for natural interaction with collaborative robots. The research will focus on the visualization of automatic tasks and intentions of the robotic system and their revision and adaptation. The aim is to make the management and control of collaborative robotic systems accessible to less experienced users in the industry. The solution will use modern methods for sensor data processing and statistical models. The work includes the collection of user tasks and processes and user needs in their execution, analysis, evaluation, and implications for designing new user interfaces. The experiments will be primarily conducted in a laboratory environment.
- Interoperability of Blockchains
First, this thesis aims to investigate the current state-of-the-art of the interoperability of various decentralized ledgers. Second, the thesis will deeply analyze the pros and cons of the considered solutions with an emphasis on system security. Third, the thesis will propose new approaches to interoperability. Proposed approaches will be empirically evaluated and their security and privacy will be analyzed.
- Log File Analysis using Machine Learning and Artificial Intelligence
Topic description:
Today's computer systems and network elements record hundreds or thousands of events in log files that describe standard and non-standard device behavior or ongoing communications. By analyzing these events, it is possible to describe the typical behavior of a given device and detect anomalies caused, for example, by cyber-attacks.
Research includes the use of advanced machine learning and artificial intelligence techniques to detect anomalies based on log data. The topic includes designing a behavioral model for processing log events, representing events using features, and building a behavioral model based on the training data. Machine learning methods, time series or AI models can be used for anomaly detection.
The goal of the research is to propose efficient methods for automated analysis and anomaly detection of log information and to demonstrate how this method can be used to ensure the cybersecurity of computer systems.
References:
- Henriques, J.; Caldeira, F.; Cruz, T.; Simões, P. Combining K-Means and XGBoost Models for Anomaly Detection Using Log Datasets. Electronics, 2020, 9, 1164.
- Catillo, M., Pecchia, A., Villano, U.: AutoLog: Anomaly detection by deep autoencoding of system logs, Expert Systems with Applications, Volume 191, 2022, 116263, ISSN 0957-4174.
- Mehta, S., Kothuri, P., Garcia, D.L.: Anomaly Detection for Network Connection Logs, 2018, 1812.01941, arXiv.
- Logic synthesis employing machine learning
Tutor: Mrázek Vojtěch, Ing., Ph.D.
- Machine Learning Models that Reason
V poslední době se stává čím dál patrnější, že k překlenutí propasti mezi současnými nejlepšími modely strojového učení a lidským učením nestačí jen zvyšovat počty parametrů a čekat na výkonnější hardware, který zvládne zpracování bilionů parametrů. Zdá se, že je třeba hledat nové modely, schopné objevovat a uvažovat na úrovni vysokoúrovňových pojmů a vztahů mezi nimi.
Cílem disertační práce je výzkum nových modelů strojového učení, které překonají potřebu enormního množství příkladů, které jsou potřeba pro naučení chování, zvládnutelného lidmi velmi rychle (například počítač potřebuje sehrát velké množství her ke zvládnutí jednoduché videohry, zatímco člověk to zvládne velmi rychle, lidé ze sady proměnných rychle určí, jaká je příčinná souvislost mezi nimi, dokáží argumentovat sledem úvah atd.), a omezí problém sebejistého chybování (overconfident incorrectness) současných modelů. Budou zkoumány postupy učení, přidávající iterativně nové relevantní informace a také metody, podporující přímé pravděpodobnostní odvozování. Výsledky budou demonstrovány na vybraných problémech, zahrnujících mj. vysvětlování videa či tvorbu inferenčních grafů, operujících nad pojmy a vztahy mezi nimi. - Modern Algorithms of Computer Graphics
The topic concerns algorithms of computer graphics and image synthesis. Its main goal is to research new algorithms so that their features and application possibilities are better understood so that they are improved or newly created. If suitable, it is possible to work on various platforms, includeing parallel CPUs, such as x86/64, ARM, Xeon PHI, GPU, etc. or other cores in CUDA, OpenCl, VHDL, etc. Algorithms of interest include:
- rendering using selected computer graphics methods (such as ray tracing, photon mapping, direct rendering of "point clouds", etc.),
- modeling of scenes and redering using artificial intelligence, including image synthesis using neural netowrks (especially CNNs),
- processing and rendering of "lightfield" images, their acquisition, or possibly compression, reconstruction of 3D scenes from images and/or video, eventually also fusing with other sensors, such as LIDAR or RADAR,
- modern algorithms of geometry suitable for applications in cpmputer graphics and perhaps also 3D printing,
- emerging algorithms of 3D synthesis, holography, wavelet transform, frequency transform, etc.
After mutual agreement, individually selected algorithms can be considered as well as soon as they do belong to the general topic.
Collaboration on grant projects, such as TACR, H2020, ECSEL possible (employment or scholarship).
- Modern and non-traditional approaches to biometrics
- Modern Methods of Computer Vision
- Use of modern and promising approaches to computer vision, especially methods of machine learning and convolutional neural networks
- Identification of promising open problems
- Design and development of non-traditional modifications of existing approaches
- Experimental evaluation, use of existing data sets and collection of new ones
- Multimodal analysis for assessment of mental health
Problem Statement: The importance of mental health has increased significantly over the past decade. However, the methods for the assessment of mental health issues at early stages are still in their infancy compared to the availability of corresponding methods for early assessment of physical health issues. Hence, it is required that due research is done to develop methods for early assessment of abnormalities leading to mental health problems.
Issues with Current Solutions: Unlike physical health parameters, the mental health is assessed through a number of subjective parameters. Hence, there is lack of objective and quantitative methods for mental health assessments. In addition, the patients seek help when their mental health problem is at advanced stage. So, there is lack of continuous monitoring for mental health issues.
Challenges: Many of the abnormalities related to mental health issues are subtle in nature and are related to behavior and other changes in facial expressions, speech and handwriting. In addition, there are changes in cortisol levels, skin conductance, heart rate variability and breathing rate. Hence, there are multiple modalities that should be included for measuring and quantifying any abnormalities related to mental health.
Solution: Every modality has its pros and cons. For example, in neuroimaging, functional magnetic resonance imaging has high spatial resolution (in mm) and low temporal resolution (in seconds) while electroencephalogram has low spatial resolution (in cm) and high temporal resolution (in milliseconds). Combining both of them will result in high spatial as well as high temporal resolution. This research deals with the assessment of abnormalities leading to mental health problems by utilizing multimodal approach. The various modalities may include, but not limited to, electroencephalogram (EEG) brain signals, facial videos, speech audios, handwriting and text from social media. The physiological parameters from various modalities include, but not limited to, the heart rate, breathing rate, dominant emotion, fatigue and stress. Dominant emotion can be classified as positive or negative and then sub-classified as sad, happy, angry etc. Data mining and data fusion techniques will be developed for this multimodal analysis. The corresponding multimodal data is available for this project.
Few Words About Supervision: I have extensive experience of working in the field of neuro-signal and neuroimage processing and I am currently head of a research group in this area. This is a multidisciplinary project and it will involve working with clinicians. However, the core of the project is related to IT in terms of development of a new method. Please feel free to contact me at malik@fit.vutbr.cz
- Multi-Talker ASR System Leveraging Large Pre-Trained Models with Discrete Hidden Representations
This PhD research will explore the development of next-generation multi-talker automatic speech recognition (ASR) systems by leveraging large pre-trained models and discrete hidden representations. A key challenge in multi-talker ASR is effectively handling overlapping speech, traditionally addressed through pipelines involving speaker diarization, source separation, and single-speaker ASR. This PhD will investigate how recent advances in Neural Audio Codecs and self-supervised learning can contribute to a more integrated and efficient approach. The research will encompass understanding existing methodologies, designing novel architectures, and evaluating their performance on standard datasets, with the overarching goal of improving the robustness and scalability of multi-talker ASR in real-world scenarios.
- Non-Traditional Visal Computing Algorithms
The topic of the work includes algorithms of comptuer graphics, image, and video, i.e. "Visual Computing", such as HDR (High Dynamic Range) image, multispectral image, stereoimage, possibly also image augmented with material features, temperature, etc. The goal is to understand the features and possibilites but also applications, to analyze the algorithms in-depth, prepare new and improve them. The possible algorithms include:
- Acquisition of HDR image and video, its compression, assembling from several standard images, videos, etc.,
- acquisition, processing, and visualization of mutispectral images (images with more than three spectral components),
- processing of stereo images and other images containing the depth information using both structural light illumination or no structural light,
- algorithms suitable for mobile technology and/or embedded systems focusing the above types of iamges, or images acquired from drones,
- metods of visualization of HDR images and video, tone-mapping, real-time tone mapping,
- algorithms and applications exploiting Wavelet, frequency, and/or other similar transformations.
After mutual agreement, individually selected algorithms can be considered as well as soon as they do belong to the general topic.
Collaboration on grant projects, such as TACR, MPO, H2020, ECSEL possible (employment or scholarship).
- Performance of voice deepfake detection by humans and machines
The work will start with getting familiar with the basics of the problem of voice deep fake detection (DFD), terminology, available techniques, data and challenges (especially AVSpoof), with the history and state of the art techniques and tools for speaker recognition (wespeaker toolkit), with state of the art techniques and tools for personalized text to speech (pTTS) synthesis and voice conversion. The topic will then concentrate on the evaluation of human and machine performance in DFD, while concentrating on the motivation aspect of human subjects to simulate true attacks on people. The PhD will then progress in both (1) technical (advances in deepfake generation and detection technology) and (2) human-aspects. The work counts on collaboration with specialists from psychology and sociology.
Tutor: Černocký Jan, prof. Dr. Ing.
- Planning under uncertainty using formal methods and reinforcement learning
Předmětem disertační práce bude zejména vývoj teoretických základů pro nové škálovatelné metody řízení systémů pracujících v pravděpodobnostním prostředí. Zaměříme se na syntézu konečně stavových kontrolérů pro stochastické procesy s částečným pozorováním s využitím pokročilých metod formální kvantitativní analýzy, technikami induktivní syntézy a strojového učení. Práce se rovněž zaměří na využití těchto metod v oblasti řízeních prakticky relevantních pravděpodobnostních systémů, a na důkladné vyhodnocení aplikovatelnosti těchto metod. Výsledky této práce přispějí k pokroku v oblasti automatizace návrhu systémů.
Výzkumu efektivních metod pro syntézu kontrolérů je v současnosti věnována značná pozornost v oblastech formální verifikace, návrhu a implementace programovacích jazyků, umělé inteligence a systémové biologie, o čemž svědčí zaměření řady špičkových konferencí (např. CAV, TACAS, PLDI či CMSB). Syntézou programů a modelů se rovněž zabývá řada velkých projektů na špičkových universitách a výzkumných institucích (např. Berkeley University či Microsoft Research).
Práce bude řešena ve spolupráci s týmem VeriFIT pod vedením doc. M. Češky. Dále se počítá s úzkou spoluprací se skupinou prof. J.P. Katoena (řešitel ERC Advanced grantu) z RWTH Aachen University (Německo) a se skupinou assoc. prof. N. Jansena (řešitel ERC Starting grantu) z Radboud University Nijmegen (Nizozemí).
V případě zodpovědného přístupu a kvalitních výsledků je zde možnost zapojení do grantových projektů (např. české projekty GAČR či evropské projekty Horizone Europe).
- Pre-onset detection of Alzheimer's Disease (AD) by investigating brain dynamics
Problem Statement: Among all the types of dementia, Alzheimer's disease (AD) is the most common form with 70 % of those affected by dementia having AD. As the prevalence of AD increases with age, the number of people living with AD is expected to rise over the next decades due to better quality of life that results in increase in age across many countries. All this has resulted in an increased focus on ensuring pre-onset detection of AD and the corresponding intervention, which can lead to slowing the progression of the disease by providing adequate diagnostics.
Issues with Current Solutions: Preclinical AD happens 10 to 15 years before the onset of the disease resulting in changes in the brain without showing any actual symptoms of the disease like memory loss etc. Pre-onset means detecting AD in or before the preclinical stage. The existing state-of-the-art methods mainly focus on the detection of later stages of AD, and the detection of preclinical AD is still an open research problem. Hence, this research targets pre-onset detection of AD (that is, early detection of Preclinical AD) because that will have huge impact on the lives of people. This can lead to early intervention and may result in further slowing the progression of the disease.
Challenges: At the stage of preclinical AD, the related signs and symptoms are not clear, and hence people at this stage do not seek any help. Therefore, a method for pre-onset detection of AD should be part of the regular health screening process and hence should be available in small clinical setups.
Solution: Method for detection of preclinical AD will involve investigating underlying brain mechanisms to monitor and track changes related to pre-onset detection of AD. Magnetic resonance imaging (MRI) will be used as a reference to investigate the brain dynamics however it cannot be used in practice due to its high-cost and specialized setup environment which limits its usage at the screening stage. Electroencephalogram (EEG) will be used in this research which is widely available, is low cost, has a good temporal resolution, and has high mobility. Therefore, this project aims to investigate the changes in underlying brain mechanisms using EEG to develop EEG-based neuromarker for pre-onset detection of AD. The neuromarker will involve the features extraction and corresponding development of the machine learning model.
Few Words About Supervision: I have recently moved to FIT at Brno University of Technology. I have decade long experience of working in the field of neuro-signal and neuroimage processing and I am currently in the process of setting up a research group in this area. This is a multidisciplinary project and it will involve working with clinicians. However, the core of the project is related to IT in terms of development of a new method. Please feel free to contact me at malik@fit.vutbr.cz
- Research and advancement of the visualization and interaction technique Malleable Glyph
- Scalable Elections and Electronic Voting based on Blockchains
One goal of this thesis is to propose a scalable decentralized e-voting system based on smart contracts, with maximum voter privacy, fault tolerance, and coercion resistance. The first challenge is to optimize costs for running expensive zero-knowledge proof verification at smart contracts by off-chain constructs. The second challenge is the scalability w.r.t. to the number of participants and vote choices, which depends on the convenient type of the blockchain and its consensus mechanism, such as semi-permissionless blockchains (PoS) and permissioned blockchains (PoA). Another topic of this direction is partial tally-hiding protocols and their application in the context of public blockchains. The last topic is the eligibility of participants and its public verifiability/guarantees.
- Security and Usability of Authentication Methods in Web2 and Web3
This thesis is aimed at investigating the evolving landscape of authentication methods, examining their security, usability, and suitability for both traditional web2 and the emerging web3 ecosystem.
Web2 Methods:
The thesis critically analyzes the security vulnerabilities and usability limitations of conventional methods like passwords, OTPs (One-Time Passwords), and social logins. It delves into the advancements offered by passkeys, FIDO (Fast Identity Online) standards, and protocols like OAuth and OpenID Connect, evaluating their strengths in enhancing user experience and mitigating security risks.
Web3 Methods:
The research explores the unique challenges and opportunities presented by the decentralized nature of web3. It investigates innovative authentication mechanisms such as:
- ERC 4337: Analyzing its potential to improve user experience and address the limitations of current account abstraction solutions.
- Threshold Signature Schemes: Examining their role in enhancing security and enabling secure key management in decentralized environments.
- Shamir Secret Sharing: Evaluating its applicability for secure key distribution and recovery in web3 applications.
- Multi-Party Computation: Investigating its potential for privacy-preserving authentication protocols in decentralized systems.
- Smart Contract-Based Wallets: Analyzing the security implications and usability considerations of different smart contract wallet designs.
- OTPs for Smart Contract Wallets: Exploring the feasibility and security of integrating traditional OTP mechanisms with smart contract wallets.
- Multi-Factor Key Derivation Functions: Investigating their suitability for enhancing the security and usability of authentication in web3 environments.
The thesis should conduct a comparative analysis of web2 and web3 authentication methods, highlighting their respective strengths and weaknesses in terms of security, usability, privacy, and decentralization. In particular, embedded cryptocurrency wallets is a trending topic that is focused on the usability of web3 wallets. The thesis should design new approaches or improve the existing ones.
- Sharing Machine Learning Models IoC for Cyber Threats Mitigation
Topic Description:
Research begins with the collection and analysis of indicators of compromise (IoC) from monitored network systems, which are then used to build a threat model of detected attacks. The model will then be shared and distributed to other networks to proactively improve the security of the network environment against detected threats.
The research includes the collection and analysis of threat data from anomaly detection systems. This data will be used to build a threat model using machine learning techniques or large language models (LLM). The created threat model will be distributed to other networks to proactively adapt the security of the networks against the detected threats.
Since the system shares sensitive data retrieved from detection systems, the solution requires ensuring the privacy of this data using federated learning.
References:
- R. -H. Hsu et al., "A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing," 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), Taipei, Taiwan, 2020, pp. 128-136.
- Preuveneers, Davy, and Wouter Joosen. 2021. "Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence" Journal of Cybersecurity and Privacy 1, no. 1: 140-163.
- Xiong, Wenjun, et al. "Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix." Software and Systems Modeling 21.1 (2022): 157-177.
- Synthesis of probabilistic programs
Předmětem disertační práce bude zejména vývoj teoretických základů pro nové škálovatelné metody syntézy pravděpodobnostních programů. Zaměříme se na využití syntézy řízené syntaxí a na dosud neprozkoumanou oblast spojení pokročilých metod formální kvantitativní analýzy s přístupy založenými na SAT/SMT, prohledávání stavového prostoru a technikami induktivní syntézy. Práce se rovněž zaměří na využití těchto metod v procesu návrhu prakticky relevantních pravděpodobnostních systémů, a na důkladné vyhodnocení aplikovatelnosti těchto metod. Výsledky této práce přispějí k pokroku v oblasti automatizace návrhu systémů.
Výzkumu efektivních metod syntézy je v současnosti věnována značná pozornost v oblastech formální verifikace, návrhu a implementace programovacích jazyků, umělé inteligence a systémové biologie, o čemž svědčí zaměření řady špičkových konferencí (např. CAV, TACAS, PLDI či CMSB). Syntézou programů a modelů se rovněž zabývá řada velkých projektů na špičkových universitách a výzkumných institucích (např. Berkeley University či Microsoft Research).
Práce bude řešena ve spolupráci s týmem VeriFIT pod vedením doc. M. Češky. Dále se počítá s úzkou spoluprací se skupinou prof. J.P. Katoena (řešitel ERC Advanced grantu) z RWTH Aachen University (Německo) a se skupinou assoc. prof. N. Jansena (řešitel ERC Starting grantu) z Radboud University Nijmegen (Nizozemí).
V případě zodpovědného přístupu a kvalitních výsledků je zde možnost zapojení do grantových projektů (např. české projekty GAČR či evropské projekty Horizone Europe).
- System Security in Blockchains and Consensus Protocols
The goal of this thesis is to theoretically and practically analyze selected categories of consensus protocols in terms of throughput and security. The thesis should contain the evaluation of consensus protocols by simulations enabling to test the response of protocols under different network conditions and honest/adversarial consensus power. New scenarios of attacks should be investigated -- e.g., assuming violation of the protocol assumptions or incentives. The work should also leverage principles from game theory and statistical analysis. Examples of attacks to investigate are selfish mining attacks, pool-specific attacks, double spending attacks, attacks on shards, posterior corruption attacks, denial of service on the leader committee, long-range attacks, nothing-at-stake attacks, grinding attacks, etc. This topic is broad and can be further subdivided to multiple PhD students.
- The impact of the life cycle of large language models on cybersecurity
In recent years, there has been an increase in the use of neural networks for generating synthetic content, which goes hand in hand with the rise of new cybersecurity challenges. Generative models can have various impacts on cybersecurity, ranging from positive to negative.A significant area is the security of deployment and operation of generative models, primarily large language models.
The goal of this thesis is to identify problem areas in a selected field of LLM deployment and operation (e.g., model inference attacks, model theft, or information theft) and analyze new trends, approaches, defenses, and their characteristics, impacts, and potential applications. The work should then propose new protection methods based on the analysis and research on the state of security for the selected areas.
Recommended areas of work focus:
Attacks and defenses in the side channel domain of large language models
Attacks and defenses in the inference domain of large language models
Defences in the area of adversarial attacks on large language modelsParticipation in relevant international conferences and publication in peer-reviewed or scientific journals are expected.
Tutor: Malinka Kamil, Mgr., Ph.D.
- Unconventional Wave Propagation Models
Tutor: Jaroš Jiří, doc. Ing., Ph.D.
- User Experience and Modern User Interfaces
- Study and design of advanced web and mobile user interfaces.
- Validation, optimization, and user testing of web and mobile user interfaces.
- Statistical processing of data collected from human respondents / users.
- Design, development, and deployment of practically usable web/mobile system / user interface.
- Visual Geo-Localization and Augmented Reality
The project deals with geo-localization of images and videos in unknown environments using computer vision and computer graphics methods. The aim is to investigate and develop new image registration techniques (with geo-localized image database or 3D terrain model). The goal is an efficient implementation of proposed methods on mobile devices as well as search for additional applications in the area of image processing, computational photography, and augmented reality.
- Further information: http://cadik.posvete.cz/locate/
- Contact: http://cadik.posvete.cz/
- Cooperation and research visits with leading research labs are possible (Adobe Research, USA, MPII Saarbrücken, Germany, Disney Research Zurich, Switzerland, INRIA Bordeaux, France)
- Zero-knowledge constructs in the context of system security and the public blockchains
This thesis is intended to explore the possible applications of ZK constructs in the context of system security and/or public blockchains. ZK constructs are used to provide public verification of the correctness of a certain computation or operation without revealing any private data related to the computation/operation. In this way, it is possible to implement, for example, public voting or auction protocols that preserve the privacy of data publicly produced by distributed participants. The most common ZK constructs are often instantiated by schemes that provide homomorphic encryption, such as ElGammal encryption or integer arithmetic fields over modulo N. However, the feasibility of these constructs in the domain of the public blockchain may vary due to possible high costs, or security aspects. The goal of this thesis is to analyze and quantify these existing options and implement the most meaningful (and novel) applications in the system security and or decentralized blockchains.
Course structure diagram with ECTS credits
Abbreviation | Title | L. | Cr. | Com. | Compl. | Hr. range | Gr. | Op. |
---|---|---|---|---|---|---|---|---|
JAD | Ph.D. Test of English | cs, en | 0 | Compulsory-optional | DrEx | S - 13 | English exam | yes |
Abbreviation | Title | L. | Cr. | Com. | Compl. | Hr. range | Gr. | Op. |
---|---|---|---|---|---|---|---|---|
JAD | Ph.D. Test of English | cs, en | 0 | Compulsory-optional | DrEx | S - 13 | yes |
Abbreviation | Title | L. | Cr. | Com. | Compl. | Hr. range | Gr. | Op. |
---|---|---|---|---|---|---|---|---|
JA6D | English for PhD Students | cs, en | 0 | Compulsory-optional | DrEx | P - 13 / S - 26 / Cj - 13 | English exam | yes |
PDD | Applications of Parallel Computers | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 | Professional course | yes |
IV108 | Bioinformatics | cs, en | 0 | Compulsory-optional | DrEx | P - 13 / KK - 26 / COZ - 13 | Professional course | yes |
FAD | Formal Program Analysis | cs, en | 0 | Compulsory-optional | DrEx | P - 26 / KK - 26 | Professional course | yes |
MSD | Modelling and Simulation | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 | Professional course | yes |
MZD | Modern Methods of Speech Processing | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 | Professional course | yes |
SWD | cs, en | 0 | Compulsory-optional | DrEx | P - 26 | Professional course | yes | |
DPC-TK1 | Optimization Methods and Queuing Theory | cs | 0 | Compulsory-optional | DrEx | S - 39 | Professional course | yes |
ORID | Optimal Control and Identification | cs, en | 0 | Compulsory-optional | DrEx | P - 26 / KK - 26 / PR - 13 | Professional course | yes |
PGD | Computer Graphics | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 | Professional course | yes |
PBD | Advanced Biometric Systems | cs, en | 0 | Compulsory-optional | DrEx | P - 26 / KK - 26 / PR - 4 | Professional course | no |
PND | Advanced Techniques in Digital Design | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 | Professional course | yes |
TJD | Programming Language Theory | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 | Professional course | yes |
VDD | Scientific Publishing A to Z | cs, en | 0 | Compulsory-optional | DrEx | KK - 26 / S - 8 | Professional course | yes |
ZPD | Natural Language Processing | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 | Professional course | yes |
ASD | Audio and Speech Processing by Humans and Machines | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 | Professional course | yes |
MID | Modern Mathematical Methods in Informatics | cs, en | 0 | Compulsory-optional | DrEx | P - 26 / KK - 26 | Theoretical course | yes |
MMD | Advanced Methods of 3D Scene Visualisation | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 | Theoretical course | yes |
TID | Modern Theoretical Computer Science | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 / PR - 13 | Theoretical course | yes |
OPD | Optics | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 / PR - 13 | Theoretical course | yes |
RGD | Regulated Grammars and Automata | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 / PR - 13 | Theoretical course | yes |
DPC-MA1 | Statistics, Stochastic Processes, Operations Research | cs | 0 | Compulsory-optional | DrEx | S - 39 | Theoretical course | yes |
APD | Selected Topics on Language Parsing and Translation | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 / PR - 13 | Theoretical course | yes |
Abbreviation | Title | L. | Cr. | Com. | Compl. | Hr. range | Gr. | Op. |
---|---|---|---|---|---|---|---|---|
BID | Information System Security and Cryptography | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 / PR - 4 | Professional course | yes |
EUD | Evolutionary and neural hardware | cs, en | 0 | Compulsory-optional | DrEx | P - 26 / KK - 26 | Professional course | yes |
EVD | Evolutionary Computation | cs, en | 0 | Compulsory-optional | DrEx | P - 26 / KK - 26 | Professional course | yes |
ISD | Intelligent Systems | cs, en | 0 | Compulsory-optional | DrEx | P - 26 / KK - 26 / PR - 26 | Professional course | yes |
ATND | Advanced Topics in Neuroimaging | en | 0 | Compulsory-optional | DrEx | Professional course | yes | |
SOD | Fault Tolerant Systems | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 | Professional course | yes |
MAD | Selected Chapters on Mathematics | cs, en | 0 | Compulsory-optional | DrEx | P - 26 / KK - 26 | Professional course | yes |
VPD | Selected Topics of Information Systems | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 | Professional course | yes |
KRD | Classification and recognition | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 | Theoretical course | yes |
MLD | Mathematical Logic | cs, en | 0 | Compulsory-optional | DrEx | P - 26 / KK - 26 | Theoretical course | yes |
TAD | Theory and Applications of Petri Nets | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 / Cp - 8 | Theoretical course | yes |
TKD | Category Theory in Computer Science | cs, en | 0 | Compulsory-optional | DrEx | P - 26 / KK - 26 | Theoretical course | yes |
VND | Higly Sophisticated Computations | cs, en | 0 | Compulsory-optional | DrEx | P - 39 / KK - 26 / Cp - 26 | Theoretical course | yes |
All the groups of optional courses | ||
---|---|---|
Gr. | Number of courses | Courses |
English exam | 1 - 9 | JAD, JA6D |
Theoretical course | 1 - 9 | MID, MMD, TID, OPD, RGD, DPC-MA1, APD, KRD, MLD, TAD, TKD, VND |