Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
Semantic Vectorisation: From Bitmaps to Intelligent Representations. The objective of this innovative project is to provide a solution to the open question of representing natural images by semantically rich vector graphics. The challenges are to identify key visual and temporal elements for images and videos, and efficiently decompose the visual data into semantic vector representations that are faithful to original data, compact and editable. The project aims to investigate new bitmap-to-vecto ....Semantic Vectorisation: From Bitmaps to Intelligent Representations. The objective of this innovative project is to provide a solution to the open question of representing natural images by semantically rich vector graphics. The challenges are to identify key visual and temporal elements for images and videos, and efficiently decompose the visual data into semantic vector representations that are faithful to original data, compact and editable. The project aims to investigate new bitmap-to-vector conversion methods. It is expected to develop a framework where semantic labels and hyperlinks can be embedded in visual data automatically. It hopes to pioneer the creation of a web of images where the links are on image/video regions. New image simplification, stylisation, and non-photorealistic rendering methods are expected to be provided.Read moreRead less
Whistling While They Work: Enhancing the Theory and Practice of Internal Witness Management in Public Sector Organisations. The protection of whistleblowers and other internal witnesses to corruption, misconduct and maladministration is a great unsolved problem in public sector governance. Involving 11 integrity institutions, this first national study of internal witness management will describe and compare organisational experience under varying public interest disclosure regimes across the Au ....Whistling While They Work: Enhancing the Theory and Practice of Internal Witness Management in Public Sector Organisations. The protection of whistleblowers and other internal witnesses to corruption, misconduct and maladministration is a great unsolved problem in public sector governance. Involving 11 integrity institutions, this first national study of internal witness management will describe and compare organisational experience under varying public interest disclosure regimes across the Australian public sector. By identifying and promoting current best practice in workplace responses to public interest whistleblowing, the project will use the experience and perceptions of internal witnesses and first- and second-level managers to identify more routine strategies for preventing, reducing and addressing reprisals and other whistleblowing-related conflicts.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE150100015
Funder
Australian Research Council
Funding Amount
$430,000.00
Summary
Australian Facility for Taphonomic Experimental Research . Australian facility for taphonomic experimental research: The aim of this project is to establish a unique Australian research facility dedicated to studying the physical, chemical, and biological processes of human decomposition. This facility will be the first of its kind in Australia and the Southern Hemisphere, drawing together a collaborative team of experts in a broad range of taphonomy disciplines. The results of the research are ....Australian Facility for Taphonomic Experimental Research . Australian facility for taphonomic experimental research: The aim of this project is to establish a unique Australian research facility dedicated to studying the physical, chemical, and biological processes of human decomposition. This facility will be the first of its kind in Australia and the Southern Hemisphere, drawing together a collaborative team of experts in a broad range of taphonomy disciplines. The results of the research are expected to advance our limited understanding of the taphonomic processes acting on remains in a natural Australian environment. The outcomes will assist police and forensic services to improve their procedures for searching, locating, recovering, and identifying missing persons, victims of homicide, and victims of disaster on both a national and international scale.Read moreRead less
Reducing The Greatest Uncertainty In Radiotherapy.
Funder
National Health and Medical Research Council
Funding Amount
$594,197.00
Summary
The weakest link in radiotherapy is defining treatment volumes (contouring). Lack of accuracy and consistency in clinical trial contouring has been shown to result in reduced patient outcomes. Manual review of contouring is resource intensive, expensive and for advanced treatments unachievable in a timely fashion. We will assess an automated approach to contouring assessment using 4 clinical trial datasets, changing practice for future studies and enabling consistent assessment in the clinic.
Identifying genes that influence clinical course and susceptibility in multiple sclerosis. This project aims to identify the genetic basis of multiple sclerosis (MS), the most common neurologic disease in young Australian adults. MS urgently needs research to identify predisposition, aid early diagnosis and provide bona fide molecular targets for new therapies. This will benefit people with MS and those susceptible to it. Crucial new knowledge identified will benefit other major areas of MS rese ....Identifying genes that influence clinical course and susceptibility in multiple sclerosis. This project aims to identify the genetic basis of multiple sclerosis (MS), the most common neurologic disease in young Australian adults. MS urgently needs research to identify predisposition, aid early diagnosis and provide bona fide molecular targets for new therapies. This will benefit people with MS and those susceptible to it. Crucial new knowledge identified will benefit other major areas of MS research including epidemiology, immunology and neurobiology. Collaboration of 8 major Australian institutions is also important for this project and future studies. The team will have access to a new national MS GeneBank (platform) with samples from 2240 patients that should generate findings important to world-wide MS genetic knowledge.Read moreRead less
A theoretical framework for practical partial fingerprint identification. Fingerprints captured from a crime scene are often partial and poor quality which makes it difficult to identify the criminal suspects from large databases. This project will find mathematical models which can estimate the missing information located in the blank areas of a partial fingerprint and effectively identify it.