Looking to list your PhD opportunities? Log in here.
This project is no longer listed on FindAPhD.com and may not be available.
Click here to search FindAPhD.com for PhD studentship opportunitiesAbout the Project
Internet of Things (IoT) consists of things, services, and networks, it connects interrelated smart devices, objects, animals or people to transfer data over a network to serve people better. The amount of data transferred with IoT systems is continuous, heterogenous and huge, which make IoT systems vulnerable than traditional network to malicious activities from attackers, so security and privacy of this highly automated network is a key challenge for the deployment of Internet of Things (IoT). It is constantly subject to adversarial attacks including denial of service, jamming, spoofing, eavesdropping, malware and privacy leakage. The limited resources (computation, battery, and memory) on IoT devices and the amount of data generated and communicated severely constrains the applicability of existing security measures to IoT systems. Even if a security system is effective at the time of deployment, it is prone to fail soon as attackers adapt more smarter strategies to foil the system and to avoid detection. Machine learning is a major tool for detecting adversarial attacks, human level explainability of detection results remain an open research in the security of IoT.
This project aims to address these key challenges to secure future IoT systems with creative machine learning methods:
• Investigating data streaming classification methods for effectively detecting known types of attacks and their variants in the future;
• Developing computationally cheaper machine learning algorithms as well as robustness against eavesdropping attacks;
• Optimising the offloading policy in dynamic radio environments to optimally distribute computational load over cloud, device and edge;
• Investigating adversarial machine learning techniques to tackle attackers’ changing strategies.
• Interpretating prediction results to support human to take trustworthy actions.
Keywords: explainable machine learning, deep learning, edge computing, Internet of Things.
Contact Yuhua Li ([Email Address Removed]) for information on the project.
Academic criteria: A 2:1 Honours undergraduate degree or a master's degree, in computing or a related subject. Applicants with appropriate professional experience are also considered. Degree-level mathematics (or equivalent) is required for research in some project areas.
Applicants for whom English is not their first language must demonstrate proficiency by obtaining an IELTS score of at least 6.5 overall, with a minimum of 6.0 in each skills component.
How to apply:
Please contact the supervisors of the project prior to submitting your application to discuss and develop an individual research proposal that builds on the information provided in this advert. Once you have developed the proposal with support from the supervisors, please submit your application following the instructions provided below
Please submit your application before the application deadline 29th April 2022 via Computer Science and Informatics - Study - Cardiff University
In order to be considered candidates must submit the following information:
- Supporting statement
- CV
- In the ‘Research Proposal’ section of the application enter the name of the project you are applying to and upload your Individual research proposal, as mentioned above in BOLD
- In the funding field of your application, insert “I am applying for 2022 PhD Scholarship in Computer Science and Informatics”, and specify the project title and supervisors of this project in the text box provided.
- Qualification certificates and Transcripts
- References x 2
- Proof of English language (if applicable)
Interview - If the application meets the entrance requirements, you will be invited to an interview
If you have any questions or need more information, please contact [Email Address Removed]
Funding Notes
In the Funding field of your application, insert "I am applying for 2022 PhD Scholarship" and specify the project title and supervisor of this project in the fields provided.
This project is also open to Self-Funded students worldwide. If you are interested in applying for a Self-Funded PhD, please search FindAPhD for this specific project title, supervisor or School within its Scholarships category.
References
L Xiao et al. (2019) “IoT Security Techniques Based on Machine Learning,” IEEE Signal Processing Magazine. https://doi.org/10.1109/MSP.2018.2825478
How good is research at Cardiff University in Computer Science and Informatics?
Research output data provided by the Research Excellence Framework (REF)
Click here to see the results for all UK universities
Search suggestions
Based on your current searches we recommend the following search filters.
Check out our other PhDs in Cardiff, United Kingdom
Check out our other PhDs in United Kingdom
Start a New search with our database of over 4,000 PhDs

PhD suggestions
Based on your current search criteria we thought you might be interested in these.
A decentralized, data driven health monitoring and diagnostics platform based on Artificial Intelligence (AI) and wearable/portable Internet of Medical Things (IoMT) sensors
Anglia Ruskin University ARU
Internet of Things (IoT), Artificial Intelligence (AI), and Climate Change
University of Hull
Internet of Things (IoT), Artificial Intelligence (AI), and Climate Change
University of Hull