Deep Learning Attacks and Active Defences: A Cybersecurity Perspective. The belief that deep learning technology is imperative for economic development, military control, and strategic competitiveness has accelerated its development across the globe. However, experience has revealed the disappointing fact that deep learning models are vulnerable to a range of security attacks. Hence, a series of methodologies and defence strategies will be devised that make deep learning systems robust to these ....Deep Learning Attacks and Active Defences: A Cybersecurity Perspective. The belief that deep learning technology is imperative for economic development, military control, and strategic competitiveness has accelerated its development across the globe. However, experience has revealed the disappointing fact that deep learning models are vulnerable to a range of security attacks. Hence, a series of methodologies and defence strategies will be devised that make deep learning systems robust to these attacks. The methodologies require analysing attack lifecycles to identify them in their early stages. With this knowledge, active defence methods and forensic strategies can be developed to ensure efficient defences and prevent further attacks. Moreover, the outputs will be generalisable to most deep learning services.Read moreRead less
Balance and reinforcement: privacy and fairness in high intelligence models. The aim of this project is to develop a series of privacy preservation methods to achieve a new balance between privacy and fairness in highly accurate intelligence models. The main issue in achieving this goal is that high-accuracy intelligence technologies have resulted in significant privacy violations and are very vulnerable to issues of unfairness. This project will analyse the privacy risks associated with intelli ....Balance and reinforcement: privacy and fairness in high intelligence models. The aim of this project is to develop a series of privacy preservation methods to achieve a new balance between privacy and fairness in highly accurate intelligence models. The main issue in achieving this goal is that high-accuracy intelligence technologies have resulted in significant privacy violations and are very vulnerable to issues of unfairness. This project will analyse the privacy risks associated with intelligent systems and devise mechanisms to mutually reinforce both privacy and fairness based on the theoretical foundations laid by our analysis. These outcomes will enable model owners to effectively protect their intellectual property and offer services to users in a private, fair, and accurate manner.Read moreRead less
Provably Secure Cryptography Techniques: Effective, Elegant, and Economic. This project aims to contribute to advanced knowledge and techniques to remove relaxed proof factors from provable security. Cryptography nowadays can be proven secure and must be provably secure before being adopted for data protection. Until today, most cryptography schemes are still using some relaxed proof factors to prove security, but using these relaxed factors was risky. The expected outcomes are proof methodolog ....Provably Secure Cryptography Techniques: Effective, Elegant, and Economic. This project aims to contribute to advanced knowledge and techniques to remove relaxed proof factors from provable security. Cryptography nowadays can be proven secure and must be provably secure before being adopted for data protection. Until today, most cryptography schemes are still using some relaxed proof factors to prove security, but using these relaxed factors was risky. The expected outcomes are proof methodologies for researchers to prove security in an easy way (effective), cryptography techniques for proving security without any relaxed proof factors for cryptography schemes (elegant), and more practical cryptography schemes with elegant proofs to enable Australians to receive benefit from secure data protection (economic).
Read moreRead less
Robust Defences against Adversarial Machine Learning for UAV Systems. This project aims to investigate robust defences for Unmanned Aerial Vehicle (UAV) systems to protect them against adversarial Machine Learning (ML) attacks. This project expects to generate new knowledge in the area of cybersecurity using innovative approaches to safeguard UAV systems from attacks that exploit vulnerabilities in ML models. The expected outcomes of this project include improve techniques for understanding and ....Robust Defences against Adversarial Machine Learning for UAV Systems. This project aims to investigate robust defences for Unmanned Aerial Vehicle (UAV) systems to protect them against adversarial Machine Learning (ML) attacks. This project expects to generate new knowledge in the area of cybersecurity using innovative approaches to safeguard UAV systems from attacks that exploit vulnerabilities in ML models. The expected outcomes of this project include improve techniques for understanding and developing robust ML models and enhanced capacity to design secure UAV systems. This should provide significant benefits, such as improving the security of UAV technology and increasing the reliable use of UAVs for transport and logistics services to support urban and regional communities in Australia.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE230100001
Funder
Australian Research Council
Funding Amount
$424,064.00
Summary
Regulations in Privacy-Preserving Blockchain Systems. This project aims to develop an integrated regulatory paradigm for privacy-preserving blockchain. This project expects to reduce cybercrimes and illegal transactions in blockchain and provide solutions for the regulation concerns raised in the national blockchain roadmap, using interdisciplinary approaches and new primitives. Expected outcomes of this project include providing versatile regulation services covering the whole lifetime of trans ....Regulations in Privacy-Preserving Blockchain Systems. This project aims to develop an integrated regulatory paradigm for privacy-preserving blockchain. This project expects to reduce cybercrimes and illegal transactions in blockchain and provide solutions for the regulation concerns raised in the national blockchain roadmap, using interdisciplinary approaches and new primitives. Expected outcomes of this project include providing versatile regulation services covering the whole lifetime of transactions while maintaining transaction privacy and user anonymity. This should provide significant benefits to the economy by reducing the financial loss caused by blockchain abuse worldwide ($76 billion per year) and promoting Australia’s blockchain ecosystem (grow to AU$68.4 billion by 2030). Read moreRead less
Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend agains ....Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend against cyberattacks for both organisations and individuals in Australia and beyond, theory development in graph theory, refined graph neural network models and improved graph transfer learning algorithms.Read moreRead less
Bridging the gap between Key-Evolving Signatures and Their Applications. This project aims to address the gap between cryptography primitives and their applications. Key-evolution signatures are effective in resolving secret key compromises. Theoretically, they can be adopted to secure Proof-of-Stake in blockchain against long-range attacks. Unfortunately, there are many remaining issues to address that make adoption insecure. This project is significant since it will enrich theoretical cryptogr ....Bridging the gap between Key-Evolving Signatures and Their Applications. This project aims to address the gap between cryptography primitives and their applications. Key-evolution signatures are effective in resolving secret key compromises. Theoretically, they can be adopted to secure Proof-of-Stake in blockchain against long-range attacks. Unfortunately, there are many remaining issues to address that make adoption insecure. This project is significant since it will enrich theoretical cryptography contributions and ensure their practical and secure applications. The expected outcomes are innovative technologies, guaranteeing security whilst solving real-life problems. The project will deliver significant and innovative technology for enabling effective and secure blockchain systems. Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE230100495
Funder
Australian Research Council
Funding Amount
$422,154.00
Summary
Structured Federated Learning for Personalised Intelligence on Devices. The project aims to develop a new structured federated machine-learning framework to enhance the customisation of artificial intelligence across mobile and smart devices. It seeks to enable users to receive customised services on their devices without sending their sensitive personal data to a cloud service provider. Anticipated benefits include greater privacy, data security and device performance, as well as better end-use ....Structured Federated Learning for Personalised Intelligence on Devices. The project aims to develop a new structured federated machine-learning framework to enhance the customisation of artificial intelligence across mobile and smart devices. It seeks to enable users to receive customised services on their devices without sending their sensitive personal data to a cloud service provider. Anticipated benefits include greater privacy, data security and device performance, as well as better end-user experience. Expected outcomes of this research include new knowledge, toolkits and algorithms for use in developing machine-learning based secure, efficient and fault-tolerant technologies for software applications, mobile services, cloud computing, autonomous vehicles and advanced manufacturing processes.Read moreRead less
Australian Laureate Fellowships - Grant ID: FL230100033
Funder
Australian Research Council
Funding Amount
$3,034,371.00
Summary
Secure Cloud Computing from Cryptography:The Rise of Pragmatic Cryptography. This Fellowship aims to deliver a new research principle by developing cryptography solutions, namely pragmatic cryptography, for cloud security. Cryptography is critical in protecting data and computing for confidentiality and integrity. Current cryptography solutions are advanced but idealised and incompatible with existing cloud applications. The expected outcomes include design principles of pragmatic cryptography a ....Secure Cloud Computing from Cryptography:The Rise of Pragmatic Cryptography. This Fellowship aims to deliver a new research principle by developing cryptography solutions, namely pragmatic cryptography, for cloud security. Cryptography is critical in protecting data and computing for confidentiality and integrity. Current cryptography solutions are advanced but idealised and incompatible with existing cloud applications. The expected outcomes include design principles of pragmatic cryptography and concrete cryptography constructions to achieve secure cloud computing solutions, narrowing the gap between theory and practice. Achieving these outcomes will revolutionise cloud technology and position Australia as a global leader in innovative technologies that provide user assurance and trust in cloud security.Read moreRead less