DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
In search of relevant things: A novel approach for image analysis. This project aims to investigate how experts’ cognitive processes may be transferred to computers for the automatic recognition of visual features. By merging computer and brain sciences, the project will characterise the way the brains of experts understand what is seen, in order to translate such a process in a new computer vision tool. This should provide significant benefits, such as automatic detection of threats or diseases ....In search of relevant things: A novel approach for image analysis. This project aims to investigate how experts’ cognitive processes may be transferred to computers for the automatic recognition of visual features. By merging computer and brain sciences, the project will characterise the way the brains of experts understand what is seen, in order to translate such a process in a new computer vision tool. This should provide significant benefits, such as automatic detection of threats or diseases in satellite and diagnostic imaging, respectively, among other applications. For the first time, the combination of how a computer analyses an image and how an expert interprets it will be used as a common language to enable machines to process visual information in a manner that mimics the way human brains do.Read moreRead less
A Unified Framework for Resource Management in Edge-Cloud Data Centres. Edge Computing (EC) is an emerging paradigm with a great promise for advancing Information and Communications Technologies. This project aims to investigate and provide solutions for the realization of a seemingly integrated Edge Data Centres (EDCs) with cloud environments. Using theoretical and system development approaches, the project expects to generate new knowledge for managing the resources of an EDC ecosystem. Outcom ....A Unified Framework for Resource Management in Edge-Cloud Data Centres. Edge Computing (EC) is an emerging paradigm with a great promise for advancing Information and Communications Technologies. This project aims to investigate and provide solutions for the realization of a seemingly integrated Edge Data Centres (EDCs) with cloud environments. Using theoretical and system development approaches, the project expects to generate new knowledge for managing the resources of an EDC ecosystem. Outcome of this project includes practical solutions through building novel mathematical frameworks and resource management objectives accompanied by system implementations. These outcomes will benefit both scientific and industrial communities, and mark Australian scientists as pioneers in this emerging area of research.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Intelligent Incident Management for Software-Intensive Systems. This project aims to develop intelligent incident management methods for software-intensive systems. Incidents are unplanned system interruptions or outages that could affect the normal operations of an organization and cause huge economic loss. This project expects to develop innovative, Artificial Intelligence (AI) based methods for automated incident management, including incident detection, incident identification, and incident ....Intelligent Incident Management for Software-Intensive Systems. This project aims to develop intelligent incident management methods for software-intensive systems. Incidents are unplanned system interruptions or outages that could affect the normal operations of an organization and cause huge economic loss. This project expects to develop innovative, Artificial Intelligence (AI) based methods for automated incident management, including incident detection, incident identification, and incident triage. Expected outcomes of the project include a set of novel methods and tools that can facilitate incident diagnosis and resolution. This project will provide significant benefits, such as improving the availability of software-intensive systems and reducing the economic loss caused by the incidents. Read moreRead less
Industrial Transformation Research Hubs - Grant ID: IH200100009
Funder
Australian Research Council
Funding Amount
$5,000,000.00
Summary
ARC Research Hub for Transforming Energy Infrastructure Through Digital Engineering. This Research Hub will harness the strengths of data-based and physics-based sciences to transform the operation of Australia’s offshore energy infrastructure. This essential research will create, use and embed observations of past and ongoing activity to engineer tools and approaches necessary to enhance our understanding of the offshore environment, optimise critical operations for existing facilities (includi ....ARC Research Hub for Transforming Energy Infrastructure Through Digital Engineering. This Research Hub will harness the strengths of data-based and physics-based sciences to transform the operation of Australia’s offshore energy infrastructure. This essential research will create, use and embed observations of past and ongoing activity to engineer tools and approaches necessary to enhance our understanding of the offshore environment, optimise critical operations for existing facilities (including installation and maintenance), and efficiently design future infrastructure. The integrated multidisciplinary approach will not only help Operators achieve high productivity through low downtime and optimised maintenance, but also demonstrate, in research and industry, the transformative potential of digital engineering.Read moreRead less
Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory an ....Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory and informed decision-making. This provides significant benefits of not only placing Australia in the forefront of exploiting multimodal user behaviour big data in dynamic e-commerce but also transforming Australian government and businesses to intelligent and contextual services adaptive to complex situations.Read moreRead less
Context-aware verification and validation framework for autonomous driving. This project aims to enhance the reliability and safety of emerging self-driving vehicles, through a framework that supports the validation and verification of autonomous driving systems. This project expects to generate new knowledge in areas of software engineering, intelligent transport, and machine learning, using a multi-disciplinary research combining expertise from various fields. Expected outcomes of this project ....Context-aware verification and validation framework for autonomous driving. This project aims to enhance the reliability and safety of emerging self-driving vehicles, through a framework that supports the validation and verification of autonomous driving systems. This project expects to generate new knowledge in areas of software engineering, intelligent transport, and machine learning, using a multi-disciplinary research combining expertise from various fields. Expected outcomes of this project are a family of new context-aware techniques to verify and validate complex behaviours in autonomous driving. This should provide significant benefits, such as safe autonomous driving systems and the improved journey experience and security for road users.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
What Can You Trust in the Large and Noisy Web? This project will develop innovative techniques to efficiently and effectively distill truthful information from the inherently unreliable and large-scale Web environment, where misinformation has been widely regarded as a grand challenge for the next decade. The results of this project will not only maintain Australia’s leadership in this frontier research area, but also support many important applications that safeguard Australian people and econo ....What Can You Trust in the Large and Noisy Web? This project will develop innovative techniques to efficiently and effectively distill truthful information from the inherently unreliable and large-scale Web environment, where misinformation has been widely regarded as a grand challenge for the next decade. The results of this project will not only maintain Australia’s leadership in this frontier research area, but also support many important applications that safeguard Australian people and economy such as emergency and disaster management and online healthcare. This project also serves as an excellent vehicle for the education and training of Australia’s next generation of scholars and engineers.Read moreRead less