Affective sensing technology for the detection and monitoring of depression and melancholia. This project will develop reliable and affective sensing technology and evaluate it as an objective measure of depressive disorders; a leading cause of disability worldwide. Outcomes will significantly support and aid clinicians in their diagnosis and treatment, thus providing a major breakthrough with significant research, healthcare and commercial possibilities.
Robust Preference Inference from Spatial-Temporal Interaction Networks. This project aims to develop innovative techniques for effectively and efficiently managing user preference profiles from less labelled, sparse and noisy interaction data. A unified novel learning framework along with a set of data analysis techniques are expected to be developed from this project, which will provide a non-intrusive way of conducting predictive analysis on user preference profiling via discovering human expl ....Robust Preference Inference from Spatial-Temporal Interaction Networks. This project aims to develop innovative techniques for effectively and efficiently managing user preference profiles from less labelled, sparse and noisy interaction data. A unified novel learning framework along with a set of data analysis techniques are expected to be developed from this project, which will provide a non-intrusive way of conducting predictive analysis on user preference profiling via discovering human explicit and implicit interest domains. The expected results of this application will not only maintain Australia's leadership in this frontier research area, but also support many important applications that safeguard Australian people and economy such as cyber security, healthcare, and e-Commerce.Read moreRead less
Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important effici ....Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important efficiency gains, but can introduce complex and error-prone behaviours that cannot be managed using traditional software development approaches. This project will produce better, scalable and mechanised methods for the design and verification of such software which is expected to reduce the prevalence of failures in efficient, modern software.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
SenShaMart: A Trusted Internet of Things Marketplace for Sensor Sharing. This project aims to devise a novel Internet of Things (IoT) sensor sharing marketplace that permits IoT applications to discover, integrate, and pay for any IoT sensor data that is made available by other parties. The project will devise highly-scalable sensor classification, query processing, and transactions solutions and incorporate them in a pair of novel blockchains that work in tandem to securely manage all the infor ....SenShaMart: A Trusted Internet of Things Marketplace for Sensor Sharing. This project aims to devise a novel Internet of Things (IoT) sensor sharing marketplace that permits IoT applications to discover, integrate, and pay for any IoT sensor data that is made available by other parties. The project will devise highly-scalable sensor classification, query processing, and transactions solutions and incorporate them in a pair of novel blockchains that work in tandem to securely manage all the information and contracts needed by IoT applications to discover, integrate, pay, and use sensors provided by another parties. These IoT advancements will provide significant economic, environmental, and social benefits via making low-cost and immediate sensing available across the world.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Advancing Genocide Forecasting: New Definition, Methods, and Forecasts. The project intends to develop a new method of forecasting to improve the international community’s and Australia's ability to anticipate and prevent genocide. The project is designed to build on work in the Atrocity Forecasting Project since 2009, and to bring together political science and computer science. To address well-known problems the project plans to reconceptualise genocide as extreme targeted mass killing, increa ....Advancing Genocide Forecasting: New Definition, Methods, and Forecasts. The project intends to develop a new method of forecasting to improve the international community’s and Australia's ability to anticipate and prevent genocide. The project is designed to build on work in the Atrocity Forecasting Project since 2009, and to bring together political science and computer science. To address well-known problems the project plans to reconceptualise genocide as extreme targeted mass killing, increasing definitional clarity and data reliability. Combining a better concept with cutting-edge computer science forecasting approaches, the project aims to produce new annual forecasts, pushing accuracy further. Expected project outcomes will provide new understanding and a better tool for genocide prevention.Read moreRead less
Semantic Vectorisation: From Bitmaps to Intelligent Representations. The objective of this innovative project is to provide a solution to the open question of representing natural images by semantically rich vector graphics. The challenges are to identify key visual and temporal elements for images and videos, and efficiently decompose the visual data into semantic vector representations that are faithful to original data, compact and editable. The project aims to investigate new bitmap-to-vecto ....Semantic Vectorisation: From Bitmaps to Intelligent Representations. The objective of this innovative project is to provide a solution to the open question of representing natural images by semantically rich vector graphics. The challenges are to identify key visual and temporal elements for images and videos, and efficiently decompose the visual data into semantic vector representations that are faithful to original data, compact and editable. The project aims to investigate new bitmap-to-vector conversion methods. It is expected to develop a framework where semantic labels and hyperlinks can be embedded in visual data automatically. It hopes to pioneer the creation of a web of images where the links are on image/video regions. New image simplification, stylisation, and non-photorealistic rendering methods are expected to be provided.Read moreRead less
Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance provid ....Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance providers can place on health data from wearable devices, and showcase Australian innovation in developing world-class security solutions. The outcome of this project is expected to be the development and demonstration of ultra-lightweight algorithms and mechanisms that execute in wearable devices to safeguard the integrity of the data.Read moreRead less
User-task co-adaptation for effective interactive simulation environments. This project aims to deliver smart interactive simulation environments in which users and simulation tasks work together. This project aims to create novel adaptive algorithms to automatically discover those user and task features that vary together to smartly adapt users and simulation tasks to work together harmoniously, seamlessly and effectively. Interactive simulation environments are the backbone for evaluating conc ....User-task co-adaptation for effective interactive simulation environments. This project aims to deliver smart interactive simulation environments in which users and simulation tasks work together. This project aims to create novel adaptive algorithms to automatically discover those user and task features that vary together to smartly adapt users and simulation tasks to work together harmoniously, seamlessly and effectively. Interactive simulation environments are the backbone for evaluating concepts, designs, products and advanced training systems in industry and government organisations. By bringing the user naturally inside the simulation as a task's component, users can improve their experience while task performance is simultaneously optimised. Intended outcomes include novel dynamic user-task profiling algorithms and new adaptive algorithms for user-task co-adaptation. Practical outcomes may include robust and highly effective simulation environments.Read moreRead less