Finding and exploiting interesting paths in multidimensional information spaces. This project will invent a new approach for searching within a large complex information space, finding interesting paths between points within the space, visualising the results, and supporting rich, human-centric user interaction with queries and results. This project will embody these techniques in a novel, internet-scale framework to support rapid development of large path search and visualisation applications. ....Finding and exploiting interesting paths in multidimensional information spaces. This project will invent a new approach for searching within a large complex information space, finding interesting paths between points within the space, visualising the results, and supporting rich, human-centric user interaction with queries and results. This project will embody these techniques in a novel, internet-scale framework to support rapid development of large path search and visualisation applications. Evaluation will be via development of several exemplar applications. The techniques and framework will be applicable to a broad range of economically important problems in areas as diverse as health, travel, scientific publication search, product marketing and software engineering.Read moreRead less
Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. ....Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. This project tackles new and urgent challenges in edge data storage, manipulation, maintenance, and protection with optimisation, distributed consensus, graph analytics, and cryptography techniques. The outcomes should build the pillars of edge caching systems and promote Australia's 5G software innovations.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This pr ....Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This project aims to develop a continuous authentication approach based on user behaviour - typical interactions plus biometrics (for example, keystroke dynamics) - combined with a risk adaptive assessment of the resources being accessed, resulting in re-authentication requests in the event of a suspected compromise.Read moreRead less
Deep correction of DNA sequencing errors by data mining algorithms. This project aims to investigate the many layers of error correction problems in the terabytes of genomic sequence data, and aims to solve these problems by novel data mining algorithms. High-throughput sequencing platforms have generated massive amounts of useful raw data, but also made widespread errors. The new algorithms are capable of correcting errors at deeper layers to further enhance data quality. Expected outcome inclu ....Deep correction of DNA sequencing errors by data mining algorithms. This project aims to investigate the many layers of error correction problems in the terabytes of genomic sequence data, and aims to solve these problems by novel data mining algorithms. High-throughput sequencing platforms have generated massive amounts of useful raw data, but also made widespread errors. The new algorithms are capable of correcting errors at deeper layers to further enhance data quality. Expected outcome includes the knowledge advancement of genomic data industry and interdisciplinary collaboration between biotechnology and data mining. This also provides significant benefit for genomic decisions in forensics and personalised medicine which demand accurate genomic information.Read moreRead less
Efficient data mining methods for evidence-based decision making. This project aims to develop efficient data mining methods for causal predictions. Evidence-based decision making (EBD), such as evidence-based medicine and policy, is always preferable. To support EBD, causal predictions forecast how outcomes change when conditions are manipulated. Progress has been made in theoretical research on causal inference based on observational data, but few methods can automatically mine causal signals ....Efficient data mining methods for evidence-based decision making. This project aims to develop efficient data mining methods for causal predictions. Evidence-based decision making (EBD), such as evidence-based medicine and policy, is always preferable. To support EBD, causal predictions forecast how outcomes change when conditions are manipulated. Progress has been made in theoretical research on causal inference based on observational data, but few methods can automatically mine causal signals from the data and methods for efficient causal predictions based on data are even fewer. This project will apply its methods to biomedical problems. The outcomes could support smart and data-driven evidence based decision making in many areas, such as therapeutics and government policy making.Read moreRead less
Carrier-scale defence against distributed denial-of-service attacks. Distributed Denial-of-Service (DDoS) attacks are one of the most persistent and damaging threats to services on the Internet. In recent years, there has been widespread use of DDoS attacks for both financial and political advantage by attackers. The challenge for our Australian industry partner (PowerGuard Pty Ltd) is to continue to scale their DDoS defence platform so that it can be used in much higher bandwidth environments, ....Carrier-scale defence against distributed denial-of-service attacks. Distributed Denial-of-Service (DDoS) attacks are one of the most persistent and damaging threats to services on the Internet. In recent years, there has been widespread use of DDoS attacks for both financial and political advantage by attackers. The challenge for our Australian industry partner (PowerGuard Pty Ltd) is to continue to scale their DDoS defence platform so that it can be used in much higher bandwidth environments, such as carriers’ backbone networks, or large government and commercial networks that have multiple high-speed links to the Internet. The results of this project will provide an Australian company with a leading position in this important and growing market. Read moreRead less
Constraint-based Privacy Preserving BioSignal Data Management on Blockchain. This project aims to address the issue of user privacy in Bio-Signal data analysis by utilizing the capabilities of differential privacy, smart contracts and blockchain technologies. This project expects to generate new knowledge in the area of privacy to develop an advanced privacy-preserving Bio-Signal data analytic framework. The expected outcomes of this project include increased privacy of user data, and the unifi ....Constraint-based Privacy Preserving BioSignal Data Management on Blockchain. This project aims to address the issue of user privacy in Bio-Signal data analysis by utilizing the capabilities of differential privacy, smart contracts and blockchain technologies. This project expects to generate new knowledge in the area of privacy to develop an advanced privacy-preserving Bio-Signal data analytic framework. The expected outcomes of this project include increased privacy of user data, and the unification of standards on human-specific data analysis, saving time and money spent on privacy breaches. This should provide significant benefits in preserving the quality and integrity of the healthcare services provided by the Australian government and private sector.Read moreRead less
Fusion of digital microscopy and plain text reports for automated analysis. The project aims to develop advanced computer-aided analytics systems with the goal to improve the workflow and automation in the pathology industry. Improvements will be achieved by fusing information from both digital images and plain text medical reports. In collaboration with a partner organisation, the project team will field trial the new analytics systems against traditional pathology tests to evaluate both effica ....Fusion of digital microscopy and plain text reports for automated analysis. The project aims to develop advanced computer-aided analytics systems with the goal to improve the workflow and automation in the pathology industry. Improvements will be achieved by fusing information from both digital images and plain text medical reports. In collaboration with a partner organisation, the project team will field trial the new analytics systems against traditional pathology tests to evaluate both efficacy and reliability. In addition, the project is also aimed to construct a large digital slide databank which will aid training and education. The expected outcome of the project is to perform existing tasks cheaper and more efficiently. Read moreRead less
Enhancing the Australian theme park experience by harnessing virtual-physical play. This project will deliver methodologies for designing games enriched by virtual-physical play. The project will contribute to furthering Australia's lead in the production of compelling theme park experiences, computer games and interactive training systems. The entertainment, digital media and information and communications technology industries will all benefit as a result.