PhD offers
All our offers
-
Cyber security : hardware and sofware
Dynamic Assurance Cases for Autonomous Adaptive Systems
Providing assurances that autonomous systems will operate in a safe and secure manner is a prerequisite for their deployment in mission-critical and safety-critical application domains. Typically, assurances are provided in the form of assurance cases, which are auditable and reasoned arguments that a high-level claim (usually concerning safety or other critical properties) is satisfied given...
-
Cyber security : hardware and sofware
Integrity, availability and confidentiality of embedded AI in post-training stages
With a strong context of regulation of AI at the European scale, several requirements have been proposed for the "cybersecurity of AI" and more particularly to increase the security of complex modern AI systems. Indeed, we are experience an impressive development of large models (so-called “Foundation” models) that are deployed at large-scale to be adapted...
-
Communication networks, IOT, radiofrequencies and antennas
Super-gain miniature antennas with circular polarization and electronic beam steering
Antenna radiation control in terms of shape and polarization is a key element for future communication systems. Directive compact antennas offer new opportunities for wireless applications in terms of spatial selectivity and filtering. This leads to a reduction in electromagnetic pollution by mitigating interferences with other communication systems and reducing battery consumption in compact smart...
-
Communication networks, IOT, radiofrequencies and antennas
Enhancing Communication Security Through Faster-than-Nyquist Transceiver Design
In light of the growing demand for transmission capacity in communication networks, it is essential to explore innovative techniques that enhance spectral efficiency while maintaining the reliability and security of transmission links. This project proposes a comprehensive theoretical modeling of Faster-Than-Nyquist (FTN) systems, accompanied by simulations and numerical analyses to evaluate their performance in various...
-
Energy efficiency for smart buildings, electrical mobility and industrial processes
High-isolation power supply
With the rapid evolution of technologies and the growing challenges of miniaturization and resource management, power converters are facing ever more stringent performance requirements. To meet these needs, the use of wide-bandgap semiconductors such as SiC (silicon carbide) and GaN (gallium nitride) is becoming increasingly common. These materials significantly increase the switching speed of converters,...
-
Cyber security : hardware and sofware
Laser Fault Injection Physical Modelling in FD-SOI technologies: toward security at standard cells level on FD-SOI 10 nm node
The cybersecurity of our infrastructures is at the very heart in the digital transition on-going, and security must be ensured throughout the entire chain. At the root of trust lies the hardware, integrated circuits providing essential functions for the integrity, confidentiality and availability of processed information. But hardware is vulnerable to physical attacks, and defence...
-
Communication networks, IOT, radiofrequencies and antennas
Advancing Semantic Representation, Alignment, and Reasoning in Multi-Agent 6G Communication Systems
Semantic communications is an emerging and transformative research area, where the focus shifts from transmitting raw data to conveying meaningful information. While initial models and design solutions have laid foundational principles, they often rest on strong assumptions regarding the extraction, representation, and interpretation of semantic content. The advent of 6G networks introduces new challenges, particularly...
-
Cyber security : hardware and sofware
Code-Reuse Attacks : Automated Exploitation and Defense
Software vulnerabilities due to memory management errors are among the easiest to exploit. To prevent an attacker from injecting its own arbitrary code (shellcode), modern systems commonly enforce a Data Execution Prevention (DEP), often implemented as segment permissions (Write xor Execute – W^E). Yet, Code-Reuse Attacks have emerged to circumvent the DEP protections. Thanks to...
-
Factory of the future incl. robotics and non destructive testing
3D ultrasound imaging using orthogonal row and column addressing of the matrix array for ultrasonic NDT
This thesis is part of the activities of the Digital Instrumentation Department (DIN) in Non-Destructive Testing (NDT), and aims to design a new, fast and advanced 3D ultrasound imaging method using matrix arrays. The aim will be to produce three-dimensional ultrasound images of the internal volume of a structure that may contain defects (e.g. cracks),...
-
Energy efficiency for smart buildings, electrical mobility and industrial processes
Advanced functions for monitoring power transistors (towards greater reliability and increased lifespan of power converters for energy)
In order to increase the power of electronic systems, a common approach is to parallelize components within modules. However, this parallelization is complicated by the dispersion of transistor parameters, both initial and post-aging. Fast switching of Wide Bandgap (WBG) semiconductors components often requires slowdowns to avoid over-oscillation and destruction. An intelligent driving scheme, including adjusted...
-
Cyber security : hardware and sofware
Identification versus anonymisation from an embedded client operating on a blockchain
The first worldwide deployment of a blockchain dates back to 2010 with Bitcoin, which introduced a completely digital monetary system and a crypto-currency, bitcoin. Within Bitcoin, all transactions are publicly accessible and traceable, which should generate trust between stakeholders. However, the traceability of transactions, and ultimately of the crypto-currency, does not imply the traceability of...
-
Communication networks, IOT, radiofrequencies and antennas
Foundations of Semantic Reasoning for Enhanced AI Cooperation in 6G Multi-Agent Communications
This PhD research project focuses on pioneering foundational theories in semantic communications, specifically by advancing the compositional learning and reasoning capabilities of AI agents within multi-agent environments. The goal is to enable AI-driven systems to selectively extract, interpret, and exchange semantically meaningful information in a goal-oriented and context-sensitive manner, moving beyond traditional data-oriented communications. Integrated...
-
Communication networks, IOT, radiofrequencies and antennas
Enhanced Quantum-Radiofrequency Sensor
In the last decade, sensor systems using Rydberg atoms have been seen as a breakthrough solution to the problems of receiving radio frequency (RF) electromagnetic waves. The characteristics of this type of receiver are promising: extreme sensitivity, very wide bandwidth, miniature size independent of wavelength and no coupling to the immediate environment. All these advantages...
-
Cyber security : hardware and sofware
Embedded local blockchain on secure physical devices
The blockchain is based on a consensus protocol, the aim of which is to share and replicate ordered data between peers in a distributed network. The protocol stack, embedded in the network's peer devices, relies on a proof mechanism that certifies the timestamp and ensures a degree of fairness within the network. The consensus protocols...
-
Emerging materials and processes for nanotechnologies and microelectronics
Design and fabrication of neuromorphic circuit based on lithium-iontronics devices
Neural Networks (NNs) are inspired by the brain’s computational and communication processes to efficiently address tasks such as data analytics, real time adaptive signal processing, and biological system modelling. However, hardware limitations are currently the primary obstacle to widespread adoption. To address this, a new type of circuit architecture called "neuromorphic circuit" is emerging. These...