MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
On-site and comprehensive technology for chemical weapons, toxins and drugs. This project aims to evaluate and validate broad capabilities of advanced chemical profiling using benchtop and portable gas chromatography–mass spectrometry for forensic applications. Establishing guidelines for sampling various matrices, key performance measures, and improving chemical and residue identification for drug profiling in clandestine laboratories and public venues, chemical warfare agents, and chemical tox ....On-site and comprehensive technology for chemical weapons, toxins and drugs. This project aims to evaluate and validate broad capabilities of advanced chemical profiling using benchtop and portable gas chromatography–mass spectrometry for forensic applications. Establishing guidelines for sampling various matrices, key performance measures, and improving chemical and residue identification for drug profiling in clandestine laboratories and public venues, chemical warfare agents, and chemical toxins is expected. Anticipated outcomes for project partners in defence and policing include detailed knowledge of sample and residue composition and on-site assessment of chemical risks with immediate feedback. Benefits should include improved community and security services safety by enhanced detection of harmful substances.Read moreRead less
Electrical properties of human dendrites. This project aims to determine the electrical properties of dendrites in human neurons. Dendrites are the primary site of synaptic input to neurons and their electrical properties play a key role in information processing in the brain. While we know much about the electrical properties of dendrites in other species, primarily rodents, little is known about the electrical properties of human dendrites. This project aims to address this gap in knowledge fo ....Electrical properties of human dendrites. This project aims to determine the electrical properties of dendrites in human neurons. Dendrites are the primary site of synaptic input to neurons and their electrical properties play a key role in information processing in the brain. While we know much about the electrical properties of dendrites in other species, primarily rodents, little is known about the electrical properties of human dendrites. This project aims to address this gap in knowledge for the first time. The results obtained will shed light on the mechanisms the brain uses to process information, and therefore will bring us a step closer to truly understanding ourselves.Read moreRead less
Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important effici ....Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important efficiency gains, but can introduce complex and error-prone behaviours that cannot be managed using traditional software development approaches. This project will produce better, scalable and mechanised methods for the design and verification of such software which is expected to reduce the prevalence of failures in efficient, modern software.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE200101100
Funder
Australian Research Council
Funding Amount
$425,613.00
Summary
Towards Robotic Empathy: A human centred approach to future AI machines. The project aims to equip future robots with empathy by developing computational models which can leverage from verbal and non-verbal cues. With recent advances in artificial intelligence research, robots now have better cognitive and function skills, but they lack socio-emotional skills. Since these robots are expected to provide assistance to humans across different domains including rehabilitation, education and health c ....Towards Robotic Empathy: A human centred approach to future AI machines. The project aims to equip future robots with empathy by developing computational models which can leverage from verbal and non-verbal cues. With recent advances in artificial intelligence research, robots now have better cognitive and function skills, but they lack socio-emotional skills. Since these robots are expected to provide assistance to humans across different domains including rehabilitation, education and health care, empowering them with empathetic abilities is important for their success. The project will advance fundamental research in machine learning, affective computing and artificial intelligence to model human behavior, personality traits and emotions for an empathetic human-robot interaction.Read moreRead less