| Author | Title |
| Wang, Linxinyi | A Case Study in Data Engineering on the Companies House |
| Vupparapalli, Nithya | Accelerating an HTTP Benchmark Tool with io_uring |
| Mao, Renjie | Acceleration of Training for Mixture-of-Experts Models |
| Low, Ian | A Comparative Study of Audio Compression Algorithms and |
| Gupta, Umer | Adapting Sequential Recommender Systems to Predict User |
| Weiss, Paulina | Adaptive Learning and Control in Dynamic Environments |
| Hebbar, Athmika | A Data-Driven Approach to Understanding User Behaviour for |
| Zheng, Jiyuan | Adversarial synchronization with collusion amongst |
| Govindarajan Saravanarajan, Nikila | Aerial Mapping of Renewables |
| Brea Carreras, Manuel | A Framework for Modular Syntax and Proofs in Agda |
| Teh, Minsuan | Algorithms for Computing Clearing Payments in Financial |
| Zhou, Yaru | A Neural Network Model for Multisensory Integration and |
| Doran, James | An Investigation into the Distillation of Code Intelligence |
| Zhang, Qiuyun | Artistic Visualisation of Trends in the VIS Arts Program |
| Chen, Aidi | A study of the adoption of encrypted SNI solutions on the |
| Yang, Yijun | A Unified Adapted-based Framework towards Unbiased and |
| Alsalman, Safa | A User-Centric Tool for Generating Academic Profiles using |
| Wong, Thomas | Automating Theory Repair in First Order Logic |
| Ary, Johanes | Benchmarking Datalog System for Recursive Data Analytics |
| Jabrane, Wassim | Benchmarking Large Language AI Models for Machine |
| McCreadie, Callum | Beyond Association: Short-Term Causal Effects of |
| Ari, Andi | Building Cyber Security Datasets and Tools for Anomaly |
| Hu, Zhanghao | Causal and Temporal Inference in Visual Question Generation |
| Domínguez Sanz, Rodrigo | Census-Independent Population Estimation with Low |
| Milad, Laura | Comparison of Deep Learning mutual information estimators |
| Sanni, Mardhiyah | Computationally Efficient Methods for Jointly Generating |
| Scholes, Jeffrey | Computational Modelling of Childhood Trauma (cPTSD) |
| Zhou, Yuxuan | Data Orchestration in Connection to Stock Fundamentals |
| Miao, Shuren | Decentralization Analysis on Cardano by Parsing Full-nodes |
| Yi, Josh | Deep Learning-Driven Approaches for Uncertainty-Aware WiFi |
| Li, Yantong | Detecting Go Concurrency Bugs: Which Tool Performs Best? |
| Wong, Kin Hei | Distortion in Real World Settings |
| You, Jin | Educational Game Helping Hearing-Impaired People Improve |
| Chakravarty, Abhirup | Empirical Analysis of the Effect of Context in the Task of |
| Speggiorin, Alessandro | Empowering Search Engines: Exploring Transformer-Based |
| Al Marzooqi, Suhail | Enhancing Cryptographic Performance on Raspberry Pi 4: |
| Davidson, Kiera | Evaluating inverse reinforcement learning methods in |
| Wu, Chenzhi | Evaluating Java Parallel Libraries on Divide and Conquer |
| Desblancs, Mika | Evaluating the Effects of Temporary Twitter Suspensions of |
| Chrysopoulos, Miltiadis | Explaining AuctionGym Policies with Gradient Based |
| Jain, Radhikesh | Explaining the auction gym doubly robust bidding estimator |
| Chen, Junhan | Extending Tcpdump To Support The Homa Transport Layer |
| Sebire, Izzy | Faithfulness and Content Selection in Long-Input |
| Provan-Bessell, Benjamin | Fault Classification in 3D Objects with Missing Parts using |
| Xu, Junjie | Fine-tuning Large Language Models for Non-autoregressive |
| Cardona Polo, Miguel | Forecasting Spanish Elections by predicting the Political |
| Chen, Jingxuan | From Kernel to Permutation Estimator: Applying SHAP to |
| Zhao, Junyin | From Standalone to Combined: Optimizing PEFT Methods for |
| Walker, Blair | Graph-Driven Security: An Interpreter for an Account Access |
| Alblooshi, Shamma | Harnessing Raspberry Pi's Potential for Mathematical |
| Lee, Yu Chen | Human Activity Recognition/Monitoring and Anomaly Detection |
yy decays with the -->| Hey, Nathaniel | Identification of highly boosted H-->yy decays with the |
| Sahay, Amiyesh | Identifying cases of drug-harm from electronic patient |
| Sui, Yumiao | Implementing and Evaluating Prism in the NS3 Network |
| Liu, Chenling | Individual Animal Identification in Wildlife Images Using |
| Wang, Li | Indoor Wi-Fi Localisation with Noisy Dataset |
| Dolman, Samuel | Latent Diffusion Language Models |
| Züfle, Maike | Latent Feature-Based Data Splits to Improve Generalisation |
| Prabhakar, Ilakya | Leveraging Metadata in Ischaemic Stroke MRI Segmentation |
| Nedelcheva, Boyana | Linking Police and Ambulance Data: Where are the Gaps? |
| Surana, Tanish | Mirror detection in videos with unsupervised fine-tuning |
| Li, Zeping | Modeling object co-occurrences in images |
| Kaltenberger, Franziska | Modelling spatial modulation in the visual cortex: An |
| Lewis, Stefan | Mood State Classification Using Time Series Data From |
| Zhang, Zhenyu | Network analysis of cross-border banking exposures |
| Wang, Juan | Network analysis of famous investors' portfolio - finding |
| Yang, Jichao | NILM with Low Carbon Technologies |
| Zhang, Linshuo | Non Intrusive Load Monitoring with Low Carbon Technologies |
| Raje, Meghna | Object Detection in Low-Visibility Firefighting Scenarios |
| Chobanov, Ivalin | Out-of-Distribution Dynamics Detection in Deep |
| Li, Xiaozhou | Parallel Algorithmic Patterns in Java |
| Liao, Xiyang | Pixel-based Auto-Regressive Language Modeling |
| Yang, Yige | Potential benefits of explicitly preserving the locations |
| Lam, Jonathan | Prediction of Early-Stage Start-Up Success Using Network |
| Kyriakou, Kyriakos | Recommender Systems: looking further into the future |
| Lin, Yunlong | Recommender Systems: looking further into the future |
| Anandan, Kriti | Self-label correction for noisy labels in Speech Emotion |
| Lamb, Tom | Self-Supervised Learning of Tractable Generative Models |
| Georgiou, Gregoris | Semi-Autolabeling, Model Training and Uncertainty |
| Sharma, Shivaz | Serving Large Mixture of Experts (MoE) models using Edge |
| Lu, Xinyue | Simulation Engine for ML-enhanced Pairs Trading Strategies |
| Welsh, Jamie | Spatio-Temporal Estimation of PM2.5 With Transfer Learning |
| Rawal, Sparsh | Spoken Language Identification of Low-Resource Languages |
| Chen, Jalen | The Application of Survival Analysis in Stock Market – A |
| Xia, Youning | Towards Translating Graph Query Language |
| Santosa, Rizzatama | Unveiling Decentralisation in the Algorand Blockchain: A |
| Wang, Meitong | User Study of Tor Relay Operators' Attitudes Towards |
| Yuan, Richard | Use the Apple M1 GPU to accelerate weather/climate/health |
| Shen, Yaowen | Using Contrastive Generative Learning to Find Salient |
| Zhang, Yunfei | Using Contrastive Variational Autoencoders to Disentangle |
| Tian, Xiangyu | Using Non-parametric Stochastic Block Models to Analyze |
| Zhang, Juekai | Visualization of Zero-Knowledge proofs that A "Child" can |
| Tai, Yintao | Vocabulary-Free Visual Language Models |