A Conversational Crowd Computing Platform for TU Delft Campus

Supervisors: Ujwal Gadiraju, J. Yang, S. Qiu

An Exploratory Study on Conversational Agents Using Dynamic Conversation Styles

By Bar Lerer

Studying the Anthropomorphic Visual Cues in Conversational Agents

By Emilija Zlatkutė

The effect of anthropomorphism in conversational agents

By Jesse Jansen

Conversation Workflows with Micro-breaks in Conversational Crowdsourcing

By Just van der Veeken

Automatically Testing a Conversational Crowd Computing Platform

By Orestis Kanaris

AI World Cup football defensive skills

Supervisors: Kushal Prakash, Rafael Bidarra, K. Prakash

Where to Score in AI World Cup Football?

By Marius Birkhoff

Defensive Positioning Strategies For A Goalkeeper In The AI World Cup

By Rens Oude Elferink

AI Soccer: the Most Effective Methods to Dispossess the Opponent Player

By Sam Heslenfeld

Facing the ball carrier in AI World Cup soccer

By Tim Velthoven

AI soccer: covering an opponent not in possession of the ball

By Tobias van den Hurk

Attention LSTM

Supervisors: J.W. Böhmer

Improving the performance of Recurrent Neural Networks for time series prediction by combining Long Short-Term Memory and Attention Long Short-Term Memory

By Aaron van Diepen

Attention Long Short Term Memory: Evaluation of Time Series Forecasting Performance, a Comparison With LSTM and SARIMA

By Giorgio Acquati

Attention LSTM : Application in Stock Price Prediction on Single Companies

By Mingshi Wang

Attention LSTM - "A comparison of ALSTM and LSTM performance in airline passenger forecast"

By Sina Şen

Automated Validation of Definitional Interpreters

Supervisors: C.B. Poulsen, C.R. van der Rest

Validating Definitional Interpreters Using Property-Based Testing

By Alexandru Moraru

Deriving a Symbolic Executor for Definitional Interpreters Suitable for the Study of Heuristics

By Laura Pîrcălăboiu

Concolic Execution for Testing Definitional Interpreters

By Philippos Boon Alexaki

Exploring Program Equivalence as a Means of Comparing Definitional Interpreters

By Ruben Backx

Validating Type Checkers Using Property-Based Testing

By Sára Juhošová

Automatic psychological text analyses

Supervisors: W.P. Brinkman, M. Bruijnes, H.S. Hung

Automatic schema classification for Schema-Focused Therapy using k-Nearest Neighbour

By Budi Han

Active Learning To Reduce Human Labeling For Automatic Psychological Text Classification

By Jahson O'Dwyer Wha Binda

Automatic Psychological Text Analysis using Support Vector Machine Classification

By Jeongwoo Park

Generative algorithms to improve mental health issue detection

By Jimmy Lam

Automatic Psychological Text Analysis using Recurrent Neural Networks

By Mirijam Zhang

Benchmarking Deep Reinforcement Learning

Supervisors: G. Neustroev, M.M. de Weerdt

The Influence of the Size of the Search Space on Learning to Play Chess using Deep Reinforcement Learning Algorithms

By Aksel Hakim Zakuto

Comparing Deep Reinforcement Learning Approaches for Sparse Reward Settings with Discrete State-Action Spaces

By Alp Çapanoğlu

Comparing Model-Free Deep Reinforcement Learning Algorithms on Stock Market

By Murat Kaan Meral Meral

Benchmarking open-source audio fingerprinting implementations for music recognition in movies

Supervisors: Jaehun Kim, C.C.S. Liem

Indexing Music in Movies Using Audio Fingerprinting: An Audioneex Study

By Cas Wever

Analysing the performance of the OLAF framework in the context of identifying music in movies

By Casper Hildebrand

Performance of the Dejavu audio fingerprinting framework in music identification in movies

By Natália Struharová

Assessing the Suitability of Panako for Music Identification in Movies

By Ruben Nair

Evaluating the Suitability of SoundFingerprinting for Music Identification in Movies

By Tim Huisman

Benchmarks for Reinforcement Learning in Switching Control between Driver and Automated System

Supervisors: Y. Li, M.T.J. Spaan

Reinforcement Learning for Switching of Semiautomated Vehicles Under Uncomfortable Driving Situations

By Ceren Uğurlu

Optimizing driving entity switching of semi-automated vehicles under automation degradation

By Csanád Bakos

Reinforcement Learning approach for decision-making in driver control shifting for semi-autonomous driving

By Evaldas Latoškinas

Reinforcement Learning for Switching Control of Semi-automated Vehicles with Driver Fatigue

By Irem Uğurlu

Blast from the Past - Vectorization of Pixel Images

Supervisors: A.D. Parakkat, E. Eisemann

Exploring new Coloring Methods for Image Triangulations

By Daan Goossens

User Guided Image Abstraction for Vectorization

By Daglar Çoban

User-Guided Vectorisation of Pixel Art through Spring Simulation

By Marko Matušovič

Hardware accelerated ray tracing for diffusion curves

By Mika Zeilstra

Bridging socio-technical gaps for responsible and inclusive AI design

Supervisors: E. Aizenberg

Design approaches to tackle ethical issues for proficiency estimation in AI-enabled recruitment

By Lassie Lesichkov

How Can Socio-Technical Systems Design Approaches Ensure Autonomy in Hiring Practices?

By Liam Kedem

Why does the machine punish?

By Matthijs de Lange

Using Machine Learning for University Admission: Mapping the Socio-Technical Issue

By Omri Niri

Socio-technical design for clinical decision support algorithms

By Sven de Witte

Comics Illustration Synthesizer using Generative Adversarial Networks

Supervisors: Y. Chen, Z. Zhao

HaarCNN: Detection and Recognition of Comic Strip Characters with Deep Learning and Cascade Classifiers

By Bartlomiej Kotlicki

Synthesizing Comics via Conditional Generative Adversarial Networks

By Darwin Morris

DilBERT^2: Humor Detection and Sentiment Analysis of Comic Texts Using Fine-Tuned BERT Models

By Krzysztof Garbowicz

Automated Text-Image Comic Dataset Construction

By Maciej Styczeń

Comparative Study of Blockchain based IoT Frameworks

Supervisors: Z. Erkin, M. Ayşen

Blockchain-based frameworks for mitigating DDoS and Sybil attacks in the IoT

By Cemal Dikmen

Decentralized marketplaces for IoT data

By Hans Sluijter

Blockchain-based DNS and PKI to solve issues of trust, security and censorship in the context of the IoT

By Leon de Klerk

Improving data integrity and fault tolerance in IoT networks with Blockchain: on the search for suitable consensus mechanisms

By Michael Beekhuizen

Blockchain-based solutions for privacy in the Internet of Things Smart Environment

By Shubhankar Darbari

Comparative Study of Public Key Cryptography for IoT Devices

Supervisors: Z. Erkin, M. Ayşen

A Comparative Study on Signature Schemes for IoT Devices

By Dan Dan Berendsen

A Comparative Study on Pseudo Random Number Generators in IoT devices

By Efe Alkan

A Comparative Study of the TEA, XTEA, PRESENT and Simon lightweight cryptographic schemes

By Paul Adriaanse

A Comparative Study on Lightweight Authentication Protocols for IoT

By Thomas Eckhardt

Deep learning for precision agriculture

Supervisors: A. Lengyel, S. Pintea, Y. Lin, N. Tömen

Injecting prior frequency information in DETR for wheat head detection

By Alin Prundeanu

Improving the Performance of Object Counting Using Training Images in the Frequency Domain

By Dani Rogmans

Combining frequency information and the unsupervisedW-Net model for wheat head detection

By Ivo Chen

Using frequency information to improve accuracy of object detectors

By Petar Ulev


Supervisors: R. Bruintjes, A. Lengyel, J.C. van Gemert, S. Beery

Image-to-Image Translation of Synthetic Samples for Rare Classes

By Edoardo Lanzini

Transferring a Segmentation Task Between Real and Synthetic Data

By Eljo Dorrestijn

Data-Efficient GAN for Synthetic Samples of Rare Classes

By Justin Oosterbaan

Domain Adaptation for Rare Classes Augmented with Synthetic Samples

By Tuhin Das

Developer Friendly Amplified Test Cases

Supervisors: C.E. Brandt, A.E. Zaidman

Developer-Friendly Test Cases: Detection and Removalof Unnecessary Casts

By George Vegelien

Developer-Friendly Test Cases: Generating Understandable Test Names Based on Coverage Improvement

By Nienke Nijkamp

Generating Mutated Strings for Automated Tests

By Swastik Agarwal

Removing redundant statements in amplified test cases

By Wessel Oosterbroek

Effect of midpoint asymmetry on the optimal mean photon pair number of SPDC sources

Supervisors: D.J. Maier

Analysing the Effect of Asymmetry on the Performance of Atomic Ensemble Based Repeater Protocols

By Hana Jirovská

Enabling Log Recommendation Through Machine Learning on Source Code

Supervisors: Maurício Aniche, J. Barros Cândido

Automated Deep Learning based on syntactic context Features for Log Level Recommendation

By Erwin van Dam

Recommending Log Placement Based on Code Vocabulary

By Kostas Lyrakis

Enabling Log Recommendation Through Machine Learning on Source Code

By Liudas Mikalauskas

Evaluating 3D reconstruction on industrial videos of shiny and non-textured surfaces

Supervisors: J.C. van Gemert, B. Yildiz

Evaluating Structure-from-Motion on shiny and non-textured surfaces in borescope videos

By Alec Nonnemaker

Ground Truth for Evaluating 3D Reconstruction of Jet Engines

By Devin Lieuw A Soe

Synthetic data for damage assessment in aircraft turbines

By Eduard Klein Onstenk

Performance analysis of interest point detection/matching on shiny and non-textured surfaces

By Rick Huizer

Performance analysis of Simultaneous Localization and Mapping to reconstruct aircraft engines in 3D

By Thomas Markhorst

Evaluation of deep learning methods for video summarisation

Supervisors: O. Strafforello

Evaluation of Video Summarization using DSNet and Action Localization Datasets

By Daan Groenewegen

Evaluating the Supervised Video Summarization Model VASNet on an Action Localization Dataset

By Felicia Felicia Elfrida Tjhai

Evaluation of the SUM-GAN-AAE method for Video Summarization

By Georgi Trevnenski

Evaluation of Video Summarization Using Fully Convolutional Sequence Networks on Action Localization Datasets

By Paul Frolke

Fine-Grained GitHub Dependency Analyzer

Supervisors: M. Keshani, S. Proksch

Analysing the effectiveness of fine-grained dependency analysis to convince developers of updating their dependencies

By Christophe Cosse

Effectiveness of using call graphs to detect propagated vulnerabilities

By Jakub Nguyen

Improvement Analysis of Function-Level over Package-Level Vulnerability Recommendations

By Niels Mook

Method-Level Data in GitHub Pull Request Descriptions: Effects on Developers' Prioritization and Facilitation of Fixing Vulnerable Dependencies

By Tudor Popovici

Following the Scent

Supervisors: D.M. Maxwell, C. Hauff

Leveraging graphical user interfaces to facilitate selection of elements in web-pages

By Paul van Wijk

Examining Cross Browser Inconsistencies with Web Based Event Loggers

By Rahul Kochar

A generalized data dashboard to visualize user interface logging in IIR experiments

By Sam van Berkel

Fuzz Testing for Big Data Applications

Supervisors: B. Özkan, B. Ozkan

Guiding Big Data Fuzz Testing with Boosted Coverage-Based Input Selection

By Bo van den Berg

High-Level Mutations for JSON Typed Data in Big Data Fuzz Testing

By Lars Rhijnsburger

Systematically Applying High-Level Mutations for Fuzz Testing Big Data Applications

By Lars van Koetsveld van Ankeren

TabFuzz: High-level mutations for tabular data

By Martijn Smits

Stacking High-Level Fuzz Mutations in Big Data Applications

By Melchior Oudemans

GDPR, Multi-party Computation and its impact on Industry

Supervisors: Z. Erkin

Discovering health disparities: Designing a secure multiparty architecture for social health research

By Brontë Kolar

Making private GPS data available to policy makers: Investigating the feasibility of multi-party computation for smart mobility

By Marina Wiemers

A New Standard: Redesigning Autonomous Vehicle Communication Using Multi-Party Computation

By Sever Latyšov

Secure MPC-Sortition: Consolidating Innovations in Democracy and Cryptography

By Wouter Maas

Game Design for Tacit Knowledge Elicitation from Crowds

Supervisors: A.M.A. Balayn, J. Yang, Ujwal Gadiraju

FindItOut: a Crowdsourcing Discriminative Tacit Knowledge Elicitation Multiplayer Game using Pictures

By Andy Hu

Swipe for Science: a single-player game designed for collecting discriminative evidence

By Jeffrey Lim

Designing a single player textual GWAP for validating tacit knowledge elicitation from crowds

By Madalin Broscăreanu

Designing a Multiplayer Competitive Text-Based Game for Elicitation of Tacit Knowledge About Humor from Crowds of People

By Melvin Schop

SceneFinder: A collaborative game that collects tacit knowledge from crowds

By Neha Kalia

Impacts of computational algorithms on multi-omics investigations of nitrogen removal from wastewater

Powerful world of (meta-)genomics held back by lack of Standard Operating Procedures

By Nima Salami

Implementing, testing and evaluating modern search engine features

Supervisors: C. Hauff

Vertical Selection for Heterogeneous Search Engine Result Pages

By Augustas Vilčinskas

Search Assistant: Effect of Chatbot on User's Collaborative Search Behavior

By Chengrui Zhao

Expanding LogUI: Adding Screen Capturing and a Statistical Analysis Dashboard for Web-Based Experiments

By Hugo van Dijk

Search Engine Entity Cards

By Yash Kalia

Query Answerability Classifier for Direct Answer Module in Web Search Engines

By Yiran Wang

Improving the Anonymity of Blockchains

Supervisors: S. Roos, S. Prabhu Kumble

Improving the Anonymity of Blockchains: The Case of Payment Channel Networks with Length-bounded Random Walk Insertion

By Emre Özkan

Improving Anonymity of the Lightning Network using Multiple Path Segment Routing

By Joran Heemskerk

Improving the Anonymity of the Lightning Network using Sub-Optimal Routes

By Mihai Plotean

Improving the Anonymity of Layer-Two Blockchains Adding Random Hops

By Paolo Arash Kazemi Koohbanani

Improving Blockchain Anonymity Using Hop Changes with Partial Route Computation

By Rick de Boer

Increasing Memory Utilization in HighPerformance Systems for Genomics Big Data Applications

Memory-Disaggregated In-Memory Object Store Framework for Big Data Applications

By Robin Abrahamse

Investigating deep Generative Methods on a Real-life Problem

Supervisors: J.C. van Gemert, B. Yildiz

Graphic Design with Machine Learning: Fabric PatternGeneration using a Variational Autoencoder

By Just Wallage

Investigating the performance of Generative Adversarial Networks on Fabric Pattern Generation

By Luuk Haarman

Investigation on NIST post-quantum lattice-based systems and their executions on smart contract

Supervisors: K. Liang, H. Chen

Investigation on lattices- and code-based post-quantum signature cryptosystems

By Alexandra Feldman

Investigation on NIST post-quantum lattice-based encryption schemes

By Giacomo Mazzola

A Comparison of Code-Based Cryptosystems

By Lola Dekhuijzen

Learning Image Transformations with Convolutional Neural Networks

Supervisors: T.J. Viering, Z. Wang, D.M.J. Tax, M. Loog, Y. Kato, O.T. Turan

Are CNNs that Learn to Predict Image Statistics Invariant to Domain Shifts?

By Julian Biesheuvel

Is the batch size affecting the performance of Regression CNNs ?

By Julien Lamon

How does imbalanced data affect performance of regression CNNs?

By Ratish Thakoersingh

Go Deep or Go Home?

By Remco den Heijer

Malware behavior discovery using unsupervised machine learning

Supervisors: S.E. Verwer, A. Nadeem

MalPaCA: Malware behaviour analysis using unsupervised machine learning: Comparative analysis of various clustering algorithms on determining the best performance in terms of network behaviour discovery

By Hugo de Heer

The influence of sequence length on the clustering performance of MalPaCA

By Johannes Hagspiel

MalPaCa Feature Combination: Which packet header features and combination thereof are the most generalizable, private and easy to extract to cluster malicious behavior?

By Jonathan Garack

Analysis of sequential feature engineering and statistical features for malware behavior discovery

By Mikhail Epifanov

MalPaCA Feature Engineering: A comparative analysis between automated feature engineering and manual feature engineering on network traffic

By Sung kyung Park

Matching in Multi-Agent Path Finding

Supervisors: J. Mulderij, M.M. de Weerdt

Solving Multi-Agent Pathfinding with Matching using A*+ID+OD

By Ivar de Bruin

Multi-Agent Pathfinding with Matching using Enhanced Partial Expansion A*

By Jaap de Jong

Matching in Multi-Agent Pathfinding using M*

By Jonathan Dönszelmann

Adapting CBM to optimize the Sum of Costs

By Robbin Baauw

Multi-Agent Pathfinding with Matching using Increasing Cost Tree Search

By Thom van der Woude

Measuring Accessibility of Popular Websites While Using Anonymity Networks

Supervisors: S. Roos

Measuring accessibility of popular websites while using Tor

By Anant Pingle

Measuring the Accessibility of Popular Websites While Using Mullvad VPN

By Francine Biazin do Nascimento

Measuring the blocking of AN.ON users by popular websites through web scraping

By Jurgen Mulder

Measuring Accessibility of Popular Websites While Using the I2P Anonymity Network

By Paula Iacoban

Measuring Accessibility of Popular Websites when using ProtonVPN

By Willemijn Tutuarima

Modelling cancer with deep generative neural networks

Supervisors: S. Makrodimitris, T.R.M. Abdelaal, M. Charrout, M.A.M.E. Eltager

Benchmarking the hyper-parameter sensitivity of VAE models for cancer treatment

By Armin Korkić

Benchmarking VAE latent features in downstream tasks for cancer related predictions

By Boris van Groeningen

Assessing the Capability of Multimodal Variational Auto-Encoders in Combining Information From Biological Layers in Cancer Cells

By Bram Pronk

The Effect of Different Initialization Methods on VAEs for Modeling Cancer using RNA Genome Expressions

By Ivo Kroskinski

Finding disentangled representations using VAE

By Raymond d'Anjou

Multimodal learning analytics for sustained attention

Supervisors: Y. Lee, M.M. Specht

Assessing learner’s distraction in a multimodal platform for sustained attention in the remote learning context using mobile devices sensors

By Giuseppe Di Giuseppe Deininger

Multimodal learning analytics on sustained attention by measuring ambient noise

By Jeffrey Pronk

Camera-based face and infrared temperature sensing of learner's affective state in the remote learning context using machine learning

By Jurriaan Den Toonder

Tracking Sustained Attention with Webcam-Based Eye Gaze and Blink Tracking

By Sven van der Voort

Mutual human-agent trust

Supervisors: M.L. Tielman, C. Ferreira Gomes Centeio Jorge, R.S. Verhagen

The Influence of Information Sharing on the Predictability of the Human to an Agent

By Stephen van der Kruk

Influence of shared information on predictability in human-agent teams

By Timea Nagy

Directability’s influence on human-agent trust

By Yuxin Jiang

Sharing human mental model with an AI agent to achieve team effectiveness

By Ziad Ziad Ahmad Saad Soliman Nawar

NLP methods to estimate values from opinionated text

Supervisors: P.K. Murukannaiah, E. Liscio

Estimating the transferability of state-of-the-art models in predicting moral values

By Alin Dondera

Performance analysis of the state-of-the-art NLP models for predicting moral values

By Andrei Geadău

Moral Embeddings: A closer look at their Performance, Generalizability and Transferability

By Dragos Vecerdea

Evaluating catastrophic forgetting of state-of-the-art NLP models for predicting moral values

By Florentin Arsene

Evaluating interpretability of state-of-the-art NLP models for predicting moral values

By Ionut Constantinescu

New Generation Iterative Prisoner's Dilemma

Supervisors: N. Yorke-Smith

Keep your enemies closer and be loud about it

By Martin Toman

Influence of Reputation on Resistance against Bad Agents in the Iterated Prisoner’s Dilemma

By Per Knops

Unbeatable cooperative strategies under noise

By Raymond Timmermans

Spatial configurations and learning rules impact on the evolution of cooperative behaviour in the n-person iterative prisoner’s dilemma

By Roberta Gismondi

Impact of Trust in the Spatial and Evolutionary Iterated Prisoner’s Dilemma

By Tommaso Tofacchi

Optimal Decision Trees (Combinatorial Algorithms for Machine Learning)

Supervisors: E. Demirović

Devising Multivariate Splits for Optimal Decision Trees

By Abel Mălan

Exploiting multi-core parallelism on optimal decision trees

By Ayush Patandin

Building Random Forests with Optimal Decision Trees

By Jord Molhoek

Improving Existing Optimal Decision Trees Algorithmsby Redefining Their Binarisation Strategy

By Ola Wolska

PACE 2021 Challenge

Supervisors: E. Demirović

Developing efficient heuristic approaches to cluster editing, inspired by other clustering problems

By Angelos Zoumis

Cluster Editing with Diamond-free Vertices

By Damiaan Rhebergen

Solving Cluster Editing Using MaxSAT-based Techniques

By Imko Marijnissen

Fast Vertex Merging for Cluster Editing

By Lucas Holten

Parsing Performance in Practice

Supervisors: Eelco Visser, J. Denkers, D.A.A. Pelsmaeker

Optimizing SGLR Parser Performance

By Justin de Ruiter

Performance impact of the modular architecture in the incremental SGLR parsing algorithm: Research Project TU Delft

By Mara Coman

Undoing Software Engineering: Demodularization of a SGLR Parser for Performance Gains

By Nik Kapitonenko

Poetry Generation and Language Pronunciation Analysis with Neural Networks

Supervisors: T.J. Viering, S. Makrodimitris, A. Naseri Jahfari, S. MAKRODIMITRIS

Comparison of Linguistic Language Classification based on Origin and Data Driven Language Classification using the IPA and Clustering

By Isa Rethans

It sounds like Greek to me. On the classifiability of languages using their phonemes.

By Johannes IJpma

Detecting Rhyming Words

By Simran Karnani

Practical Byzantine-Resilient Communications in Partially Connected Network Topologies

Supervisors: J.E.A.P. Decouchant

Broadcasting protocol: Applying Optimizations from Bracha-Dolev Broadcast Protocol to Bracha-CPABroadcast Protocol

By Qusay Fantazia

Byzantine Reliable Broadcast on partially connected networks with signatures

By Rahim Klabér

Trusted Execution Environments in Byzantine-Tolerant Networks

By Sebastien van Tiggele

Message efficient Byzantine Reliable Broadcast protocols on known topologies

By Tim Anema

Practical Verification of Functional Libraries

Supervisors: J.G.H. Cockx, L.F.B. Escot

Verifying correctness of Haskell programs using the programming language Agda and framework agda2hs

By Dixit Sabharwal

Practical Verification of the Haskell Ranged-sets Library

By Ioana Savu

Practical Verification of QuadTrees

By Jonathan Brouwer

Practical Verification of the Inductive Graph Library

By Rico van Buren

Producing a verified implementation of sequences using agda2hs

By Shashank Anand

Preparation, Application, and Evaluation

Supervisors: P.K. Murukannaiah

Political Stance Detection using Knowledge Graphs and Sentiment Analysis

By Abel Van Steenweghen

Deep Learning for Stance Detection: A Review and Comparison of the State-of-the-Art Approaches

By Jacob Roeters van Lennep

Preparing Stance Detection: Feature Extraction Methods and Their Performance Used for Feature-Based Machine Learning Algorithms

By Kristóf Vass

Tackling the Headline Incongruity Problem using Stance Detection

By Simon Mariën

A Hybrid Approach for Sentence Similarity: Combining Semantic and Structural Similarity Metrics

By Wout Haakman

Privacy and security investigation on smart contract

Supervisors: K. Liang

Revisiting smart contract vulnerabilities in Hyperledger Fabric

By Cathrine Paulsen

Security Evaluation of GoQuorum-based Smart Contracts: A Case Study of Malfunctioning Access Control and Double-Spending

By Cheyenne Slager

Investigating Arbitrageurs and Oracle Manipulators in Ethereum

By Kevin Tjiam

Enhancing the privacy and security of Hyperledger Fabric smart contracts using different encryption methods

By Rado Stefanov

An evaluation of the reentrancy vulnerability on GoQuorum-based smartcontracts

By Sara Op den Orth

Privacy-Preserving Technologies for Supply Chain

Supervisors: T. Li, Z. Erkin

A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains

By Andrei Ştefan

Privacy-Preserving Techniques for Machine Learning Applications in Supply Chains

By Ayush Joshi

Secure multi-party computation for supply chain collaboration

By Danila Romanov

Exploring privacy challenges of blockchain-based supplychains in the pharmaceutical industry

By Jean GAL

Privacy-Preserving Techniques in Blockchain-Based Food Supply Chain

By Paul Stepanov

Privacy-preserving federated learning in practice

Supervisors: K. Liang

Privacy Preserving Vertical Federated Learning: A Literature Study

By Andrei Tĩtu

An overview of hybrid approaches in Horizontal Federated Learning

By Eduard Filip

A Survey of Two Open Problems of Privacy-Preserving Federated Learning: Vertically Partitioned Data and Verifiability

By Horia Culea

Horizontal Federated Learning Frameworks: A Literature Study

By Márton Soos

A study on Privacy-Preserving Federated Learning and enhancement through Transfer Learning

By Robert Mînea

Rebooting Mobile Learning in Higher Education

Supervisors: M.M. Specht, E.B.K. Tan

An evaluation framework for microlearning tools for designing and delivering microlearning content

By Adam Kadiev

Functionalities of Mobile Learning Apps and Potential for Data Integration in the Context of Higher Education: A Systematic Review

By Boriss Bērmans

Mobile Learning in Higher Education: A Classification Framework for Learning Applications

By Denise Toledo

Factors that Influence the Acceptance and Adoption of Mobile Learning Applications in Higher Education: A Systematic Review

By Martin Dierikx

Social media and higher education apps in higher education a literature review

By Oleksandr Fomin

Reflection Art

Supervisors: E. Eisemann, B. Usta

Determining viewing points for catoptric anamorphoses

By Casper Henkes

The Proposal of a Novel Pattern Matching Technique for Mirror Anamorphosis

By Dirk Remmelzwaal

Estimating image distortions for mirror anamorphoses using sampled point displacements

By Gees Brouwer

Reflection art: A drawing interface

By Jacky Lam

Raytracing Mirror Anamorphosis

By Riley Jense

Robust Multi-Label Learning Deep Neural Networks with Imperfect Labels

Supervisors: T. Younesian, S. Ghiassi, Y. Chen

Robust multi-label learning for weakly labeled data

By Atanas Marinov

Multi-Label Gold Asymmetric Loss Correction with Single-Label Regulators

By Cosmin Pene

Robust Multi-label Active Learning for Missing Labels

By Jonathan Rozen

Multi-AL: Robust Active learning for Multi-label Classifier

By Mark Basting

Scheduling and routing of electric vehicles at capacity-constrained charging stations

Supervisors: Valentin Robu

Evaluation and Comparison of Scheduling Strategies for the Scheduling of Electric Vehicles at Capacity-Constrained Charging Stations

By Ashkan Amouzandeh

Modelling an electricity price and journey time trade-off routing decision for electric vehicles

By Joaquin van Loon

The influence of a charging station’s location on its profitability

By Matthijs Arnoldus

Efficient Routing Decisions for Electric Vehicles in a Congested Network

By Mitchell Smit

Intention Aware Routing System with variable station pricing

By Roderick de Britto Heemskerk

Secure and accountable medical data sharing by using blockchain technologies

Supervisors: C. Lal, M. Conti, Chhagan Lal

Integrating Consent Management Techniques into Blockchain-Based Medical Data Sharing

By Ben Jacobs

A Storage Architecture for Blockchain-Based Healthcare Systems

By Diederik Heijbroek

Privacy Preservation in a Blockchain-Based Healthcare System

By Ivor Zagorac

Security and privacy in medical data sharing through blockchain

By Karim Guettache

Fine-grained Access Control for a Blockchain-based Healthcare System

By Sem Duveen

Secure data communication solutions for RPL-based Internet of Things Networks

Supervisors: C. Lal, M. Conti

Detection and mitigation technique against collusion attack in RPL-Based IoT networks

By David Essaadi

The performance of the routing protocol for low-power and lossy networks in mobile networks

By Fimme Neeleman

STIR: Preventing Routing Table Overload Attacks in RPL-based IoT Networks

By Marin Duroyon

T-TRAIL: Preventing Decreased Rank Attacks in RPL-based IoT Networks

By Pieter Tolsma

RPL Attack Analysis: Evaluation of a Cryptography-Based Sybil Defence in IEEE 802.15.4

By Ruben Stenhuis

Securing Coexistence of ICN and IP Networks

Supervisors: C. Lal, M. Conti

Security and Privacy of Overlay-based ICN/IPCoexistence Approaches

By Cesar van der Poel

Security and Privacy Features Supported by Different Overlay-based ICN/IP Coexistence Architectures

By Mihhail Sokolov

Security and privacy attacks and mitigations in Information-Centric Network

By Mohamed Rashad

Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures

By Shruti Arora

Security Analysis of Decentralized Finance (DeFi) Systems

Supervisors: O. Ersoy, Z. Erkin

Mitigating sandwich attacks in Kyber DMM

By Akif Yüksel

Mitigation of Transaction Manipulation Attacks in UniSwap

By Ana Tatabitovska

Mitigating game theoretic vulnerabilities in Chainlink

By Hans Dekker

Protecting smart contracts of Decentralized Finance systems against Reentrancy attacks

By Nafie El Coudi El Amrani

Liquidity risks in the decentralized finance protocol Aave

By Selim Cirikka

SeqClu: Real-time sequence clustering using online K-medoids algorithm

Supervisors: A. Nadeem, S.E. Verwer

Accelerating Cluster Assignment for SeqClu

By Rami Al-Obaidi

SeqClu-PV: An extension of online K-medoids to efficiently cluster sequences real-time

By Ruben te Wierik

Cold start is coming: How to approximate the optimal set of initial prototypes for clustering sequence data online

By Silviu Fucarev

Splitting Payments To Increase Blockchain Effectiveness

Supervisors: O. Ersoy, S. Roos

Comparing Lightning Routing Protocols to Routing Protocols with Splitting

By Dan Andreescu

Increase of long-term success ratio using novel splitting methods in Interdimensional SpeedyMurmurs

By Han Heijmans

Adding Redundancy To Splitting Protocols for a Better Performance

By Ivaylo Georgiev

Splitting Payments to Increase Blockchain Effectiveness

By Malina Bulină

LRFP : Extending local routing protocols in layer 2 networks with a secure fee model

By Oliver Neut

The Mandalorian is getting high...

Supervisors: R.T. Wiersma, E. Eisemann

Matting using a known background and a chroma-key minimization scheme

By Alex Simonov

Hidden in plain sight: Camera tracking markers forvirtual production setups

By Himanshu Pathak

Adding Bloom to High-Dynamic-Range Tone Mapping

By Ricardo Vogel

Capturing and grouping SDR frames containing sections of HDR from a video feed to artificially expand the dynamic range of SDR screens

By Rinke Schreuder

Time Series Synthesis using Generative Adversarial Networks

Supervisors: Y. Chen, Z. Zhao, A. Kunar

Time series synthesis using GANs - A take on DoppelGANger

By Auke Schaap

Time Series Synthesis using Generative Adversarial Networks

By Jan-Mark Dannenberg

FeTGAN: Federated Time-Series Generative Adversarial Network

By Marcus Plesner

Differentially Private GAN for Time Series

By Pepijn te Marvelde

Towards a Digital Foundational Identity

Supervisors: M.A. de Vos, J.A. Pouwelse

Introducing Self-Sovereign Identity and Identity as Collateral in Decentralized Finance

By Harmen Kroon

Towards Data Resilience for Fully Distributed Self-Sovereign Identity Managers

By Kalin Kostadinov

A Universal Framework for Claim Portability in Self-Sovereign Identity Applications

By Merel Steenbergen

UniCon: A Scalable and Universal Architecture for Content Management

By Pablo Rodrigo Valero

An Evaluation of Privacy Protection in Blockchain-Based Self-Sovereign Identity

By Remy Duijsens

What is the Best Automatic Phoneme Recognition System?

Supervisors: S. Feng, O.E. Scharenborg

Training and testing the TDNN-OPGRU acoustic model on English read and spontaneous speech

By Georgi Genkov

Assessing the performance of the TDNN-BLSTM architecture for phoneme recognition of English speech

By Irene Klom

Evaluation of phoneme recognition through TDNN-OPGRU on Mandarin speech

By Jordy van der Tang

Evaluating the performance of TDNN-BLSTM on Mandarin read and spontaneous speech

By Mihail Chiroşca

What the LOG is Happening in my System? Modelling System Behavior using AI-based Log Analysis

Supervisors: Mitchell Olsthoorn, A. Panichella

Modeling System Behaviour from Log Analysis Using Meta-Heuristic Search

By Calin Georgescu

Log-Based Behavioral System Model Inference Using Reinforcement Learning

By Pandelis Symeonidis

Inferring Log-Based Behavioural System Models using Markov Chains

By Thomas Werthenbach

Inferring DFAs from Log Traces Using Community Detection

By Tommaso Brandirali

Created by Jordi Smit