Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. ....Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. This project tackles new and urgent challenges in edge data storage, manipulation, maintenance, and protection with optimisation, distributed consensus, graph analytics, and cryptography techniques. The outcomes should build the pillars of edge caching systems and promote Australia's 5G software innovations.Read moreRead less
Developing an effective defence to cyber-reputation manipulation attacks. This project will develop new technologies for businesses to accurately identify fake internet reviews. Fake reviews, paid for and/or written with malicious intent, can cause irreparable damage to businesses resulting in revenue loss, consumer dissatisfaction or even closure of businesses. However they are difficult to identify, as they continuously evolve to avoid detection and the volume of Internet reviews makes analysi ....Developing an effective defence to cyber-reputation manipulation attacks. This project will develop new technologies for businesses to accurately identify fake internet reviews. Fake reviews, paid for and/or written with malicious intent, can cause irreparable damage to businesses resulting in revenue loss, consumer dissatisfaction or even closure of businesses. However they are difficult to identify, as they continuously evolve to avoid detection and the volume of Internet reviews makes analysis a monumental task. This project will provide advanced tools to detect fake website reviews and a cybersecurity system prototype ready to be used by industry, making Australia a leader in this field and resulting in a safer internet environment for all.Read moreRead less
Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that ....Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that are required for the 5G enabled environment. The construction of new AI-based tools and testing facilities as well as the generation of new knowledge in the field of privacy preservation and collaboration between universities are expected outcomes of this project. Read moreRead less
Preventing railway suicide: An open-systems perspective. Preventing railway suicide: An open-systems perspective. This project aims to develop an automated suicide risk detection system to reduce the incidence and impact of railway suicide, which has a devastating effect on victims’ families, station staff, train drivers, emergency workers, and bystanders. This project will use open-systems theory to develop two complementary information systems for more effective detection and reporting of suic ....Preventing railway suicide: An open-systems perspective. Preventing railway suicide: An open-systems perspective. This project aims to develop an automated suicide risk detection system to reduce the incidence and impact of railway suicide, which has a devastating effect on victims’ families, station staff, train drivers, emergency workers, and bystanders. This project will use open-systems theory to develop two complementary information systems for more effective detection and reporting of suicide risk; use these systems to investigate how different situational factors interact with different combinations of service interventions to influence suicide risk; and share the findings to reduce railway suicide in Australia and overseas.Read moreRead less
Discontinued Use of Social Media: Dichotomy of Rational & Emotional Choices. This project aims to gain a better understanding of discontinued use of social media. For businesses and governments, social media serves as a dynamic channel for engagement, value co-creation, and business analytics marketing that is lost when users choose to discontinue its use. This project will generate new knowledge of rational and emotional decision criteria, enabling design features of social media, and their com ....Discontinued Use of Social Media: Dichotomy of Rational & Emotional Choices. This project aims to gain a better understanding of discontinued use of social media. For businesses and governments, social media serves as a dynamic channel for engagement, value co-creation, and business analytics marketing that is lost when users choose to discontinue its use. This project will generate new knowledge of rational and emotional decision criteria, enabling design features of social media, and their complex effects on discontinued use of social media. The expected outcome of this project is an integrated theory of social media discontinuance. The project findings provide significant benefits, such as strategic capabilities and actionable knowledge for businesses and governments to mitigate social media discontinued use.Read moreRead less
Trusted business processes. This project aims to use conceptual design, process modelling and co-design approaches to create a structured approach for the management of trust. With a focus on business processes, it is intended to develop research- informed methods in order to (1) identify and specify trust concerns and opportunities, (2) model these within a common process modelling language and (3) propose patterns for how to mitigate trust concerns and how to benefit from opportunities. If suc ....Trusted business processes. This project aims to use conceptual design, process modelling and co-design approaches to create a structured approach for the management of trust. With a focus on business processes, it is intended to develop research- informed methods in order to (1) identify and specify trust concerns and opportunities, (2) model these within a common process modelling language and (3) propose patterns for how to mitigate trust concerns and how to benefit from opportunities. If successful, this would lead to an operational, and world first, detailed trust methodology for organisations in all sectors. As a result, Australian customers would engage with business processes with reduced trust concerns and experience increased integrity and benevolence.Read moreRead less
Examining multi-level Information Technology (IT) project alignment in government services: the case of contracted employment services. Improved Information Technology (IT) alignment is essential for the delivery of government services within a complex public-private, inter-organisational environment. This project will investigate the extent to which well-aligned IT support systems contribute positively to the efficient and effective delivery of contracted employment services.
Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detecti ....Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detection, and 3) finding unseen vulnerabilities. We therefore propose to use a series of new techniques such as efficient in-memory fuzzing, conditional formulas, and transfer learning to solve the above challenges. The project outcomes will help Australia gain cutting edge techniques in vulnerability detection. Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE220101597
Funder
Australian Research Council
Funding Amount
$360,264.00
Summary
Empowering Users to Protect their Personal Privacy on Social Media. This Information Systems project aims to take a bold approach to finally overcome the paradoxical inertia of people who care about their privacy but do not protect it. This project integrates different psychological theories proposing a paradigm shift expecting to generate new knowledge in privacy research, which can currently neither explain nor provide means to overcome the vexing issue. Expected outcomes of the project includ ....Empowering Users to Protect their Personal Privacy on Social Media. This Information Systems project aims to take a bold approach to finally overcome the paradoxical inertia of people who care about their privacy but do not protect it. This project integrates different psychological theories proposing a paradigm shift expecting to generate new knowledge in privacy research, which can currently neither explain nor provide means to overcome the vexing issue. Expected outcomes of the project include a privacy behaviour model (PIM), privacy training program and system design solutions. This should offer substantial benefits as it integrates privacy research and guides behavioural models beyond Information Systems, provide means to solve the paradox, guide legislation and the privacy consent mechanism design.Read moreRead less