The Australian Research Data Commons (ARDC) invites you to participate in a short survey about your
interaction with the ARDC and use of our national research infrastructure and services. The survey will take
approximately 5 minutes and is anonymous. It’s open to anyone who uses our digital research infrastructure
services including Reasearch Link Australia.
We will use the information you provide to improve the national research infrastructure and services we
deliver and to report on user satisfaction to the Australian Government’s National Collaborative Research
Infrastructure Strategy (NCRIS) program.
Please take a few minutes to provide your input. The survey closes COB Friday 29 May 2026.
Complete the 5 min survey now by clicking on the link below.
Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptiv ....Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptive trust and integrity preserving methods, and reliable distributed data processing mechanisms to mitigate vulnerabilities in real-time IoT-enabled critical surveillance. This should provide significant benefits to Australia's economy, one of which is the enhanced consumer-centric adoption of IoT for sensitive operations.Read moreRead less
Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and wo ....Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and worldwide to reliably identify potential privacy risks and issues on their applications. The intended outcomes should endow data controllers with the capability of evidencing their compliance of data protection legislations such as Australia Privacy Act 1988 and EU General Data Protection Regulation (GDPR).Read moreRead less
Deep Learning Attacks and Active Defences: A Cybersecurity Perspective. The belief that deep learning technology is imperative for economic development, military control, and strategic competitiveness has accelerated its development across the globe. However, experience has revealed the disappointing fact that deep learning models are vulnerable to a range of security attacks. Hence, a series of methodologies and defence strategies will be devised that make deep learning systems robust to these ....Deep Learning Attacks and Active Defences: A Cybersecurity Perspective. The belief that deep learning technology is imperative for economic development, military control, and strategic competitiveness has accelerated its development across the globe. However, experience has revealed the disappointing fact that deep learning models are vulnerable to a range of security attacks. Hence, a series of methodologies and defence strategies will be devised that make deep learning systems robust to these attacks. The methodologies require analysing attack lifecycles to identify them in their early stages. With this knowledge, active defence methods and forensic strategies can be developed to ensure efficient defences and prevent further attacks. Moreover, the outputs will be generalisable to most deep learning services.Read moreRead less
Robust Defences against Adversarial Machine Learning for UAV Systems. This project aims to investigate robust defences for Unmanned Aerial Vehicle (UAV) systems to protect them against adversarial Machine Learning (ML) attacks. This project expects to generate new knowledge in the area of cybersecurity using innovative approaches to safeguard UAV systems from attacks that exploit vulnerabilities in ML models. The expected outcomes of this project include improve techniques for understanding and ....Robust Defences against Adversarial Machine Learning for UAV Systems. This project aims to investigate robust defences for Unmanned Aerial Vehicle (UAV) systems to protect them against adversarial Machine Learning (ML) attacks. This project expects to generate new knowledge in the area of cybersecurity using innovative approaches to safeguard UAV systems from attacks that exploit vulnerabilities in ML models. The expected outcomes of this project include improve techniques for understanding and developing robust ML models and enhanced capacity to design secure UAV systems. This should provide significant benefits, such as improving the security of UAV technology and increasing the reliable use of UAVs for transport and logistics services to support urban and regional communities in Australia.Read moreRead less
Improved security and privacy for online platforms. Online platforms provide goods and services to people all over the world in a flexible way. Due to COVID-19, the number of online platforms increased significantly. As more and more business activities are conducted in a virtual environment, there is a corresponding increase in major privacy and security challenges. This project aims to work in the online education industry to provide a revolutionary secure environment for both business owners ....Improved security and privacy for online platforms. Online platforms provide goods and services to people all over the world in a flexible way. Due to COVID-19, the number of online platforms increased significantly. As more and more business activities are conducted in a virtual environment, there is a corresponding increase in major privacy and security challenges. This project aims to work in the online education industry to provide a revolutionary secure environment for both business owners and users. This secure online environment will enable privacy and security guarantees that will be first implemented on our Partner Organisation’s education platform. The developed technologies can be easily adapted to most online-service industries and can be commercialised immediately.Read moreRead less
Bridging the gap between Key-Evolving Signatures and Their Applications. This project aims to address the gap between cryptography primitives and their applications. Key-evolution signatures are effective in resolving secret key compromises. Theoretically, they can be adopted to secure Proof-of-Stake in blockchain against long-range attacks. Unfortunately, there are many remaining issues to address that make adoption insecure. This project is significant since it will enrich theoretical cryptogr ....Bridging the gap between Key-Evolving Signatures and Their Applications. This project aims to address the gap between cryptography primitives and their applications. Key-evolution signatures are effective in resolving secret key compromises. Theoretically, they can be adopted to secure Proof-of-Stake in blockchain against long-range attacks. Unfortunately, there are many remaining issues to address that make adoption insecure. This project is significant since it will enrich theoretical cryptography contributions and ensure their practical and secure applications. The expected outcomes are innovative technologies, guaranteeing security whilst solving real-life problems. The project will deliver significant and innovative technology for enabling effective and secure blockchain systems. Read moreRead less
Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramat ....Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramatically benefit Australian people and government, especially for the Australian ICT industry for commercializing the research outputs. Read moreRead less
Data Privacy Protection in Wireless Sensor Networks. This project aims to explore a comprehensive solution for the protection of privacy-sensitive data in wireless sensor networks (WSNs) that are vulnerable to hacking. The project expects to use an innovative approach involving multiple data servers to protect sensor data privacy from data collection to data access and analysis. Expected outcomes of this project include new security and privacy models for WSNs in the setting of multiple servers, ....Data Privacy Protection in Wireless Sensor Networks. This project aims to explore a comprehensive solution for the protection of privacy-sensitive data in wireless sensor networks (WSNs) that are vulnerable to hacking. The project expects to use an innovative approach involving multiple data servers to protect sensor data privacy from data collection to data access and analysis. Expected outcomes of this project include new security and privacy models for WSNs in the setting of multiple servers, new secure protocols, privacy-preserving access control and data analysis protocols, and a prototype of a privacy-preserving WSN system. This should provide significant benefits, such as improved security of sensitive data in the healthcare system, military, utilities and telecommunications.
Read moreRead less
Securing Web-based Services by Policy Coherence and Proof-checking. This project aims to develop a provably correct cybersecurity system for workflows, which enables organizations to provide flexible and more secure web-based services and business communication. The project expects to generate new knowledge, theoretic advancement and result in new technologies in the areas of internet of things and cybersecurity. The expected outcomes include a software tool with documentation, which helps organ ....Securing Web-based Services by Policy Coherence and Proof-checking. This project aims to develop a provably correct cybersecurity system for workflows, which enables organizations to provide flexible and more secure web-based services and business communication. The project expects to generate new knowledge, theoretic advancement and result in new technologies in the areas of internet of things and cybersecurity. The expected outcomes include a software tool with documentation, which helps organisations achieve operational excellence and security, and maintain a trusted environment for end users. This system will provide significant economic and commercial benefits to business and end users with highly secured web-services and improved productivity through a coherent framework and proof-checked workflows.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE240100282
Funder
Australian Research Council
Funding Amount
$432,000.00
Summary
New Frontiers for Anonymous Authentication. The project aims to investigate the new concepts and constructions of anonymous authentication protocols, which can both fill existing research gap and address new challenges raised by new computing technologies. The expected outcomes are novel concepts and methods in constructing anonymous authentication protocols with enhanced functionalities and better efficiency. The project will contribute to safeguard cybersecurity for all Australians and provide ....New Frontiers for Anonymous Authentication. The project aims to investigate the new concepts and constructions of anonymous authentication protocols, which can both fill existing research gap and address new challenges raised by new computing technologies. The expected outcomes are novel concepts and methods in constructing anonymous authentication protocols with enhanced functionalities and better efficiency. The project will contribute to safeguard cybersecurity for all Australians and provide significant benefits, such as advancing theoretical knowledge in the research field and enhancing privacy and security of all Australian online services.Read moreRead less