Australian Laureate Fellowships - Grant ID: FL170100117
Funder
Australian Research Council
Funding Amount
$3,208,192.00
Summary
On snapping up semantics of dynamic pixels from moving cameras. The project aims to develop a suite of original models and algorithms for processing and understanding videos captured by moving cameras, and to establish the mathematical foundations for deep learning-based computer vision to provide theoretical underpinnings. The project expects to generate new knowledge that will transform moving-camera computer vision with step-changes in visual quality enhancement, compression and acceleration ....On snapping up semantics of dynamic pixels from moving cameras. The project aims to develop a suite of original models and algorithms for processing and understanding videos captured by moving cameras, and to establish the mathematical foundations for deep learning-based computer vision to provide theoretical underpinnings. The project expects to generate new knowledge that will transform moving-camera computer vision with step-changes in visual quality enhancement, compression and acceleration technologies, and solutions for fundamental computer vision tasks. A new concept of feature complexity for measuring the discriminant and learnable abilities of features from deep models will also be defined. The outcomes of the project will be critical for enabling autonomous machines to perceive and interact with the environment.Read moreRead less
Virtual Environments for Improved Enterprise Software Deployment. This project aims to improve quality assurance for enterprise IT. Enterprise IT systems are highly interconnected and interdependent — a failure in one system can cause a cascade of failures across multiple systems, bringing business to a standstill. The project aims to create new technologies to automate the provisioning of virtual deployment environments to test the enterprise systems. In particular, it aims to develop new metho ....Virtual Environments for Improved Enterprise Software Deployment. This project aims to improve quality assurance for enterprise IT. Enterprise IT systems are highly interconnected and interdependent — a failure in one system can cause a cascade of failures across multiple systems, bringing business to a standstill. The project aims to create new technologies to automate the provisioning of virtual deployment environments to test the enterprise systems. In particular, it aims to develop new methods for the automatic analysis of service interaction traces and the generation of accurate executable service models, without requiring explicit knowledge of them. The automatic analysis and generation should reduce development cost for enterprise IT systems and increase system quality and reliability. The new software deployment technologies from this project aim to significantly reduce the time, effort and cost of system quality assurance activities in software development organisations, and yet produce higher-quality software leading to uninterrupted business operation in end-user organisations across all sectors.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
Adversarial Learning of Hybrid Representation. This project aims to design and implement a foundational deep representation learning framework for early detection, classification and defense of emerging malware by capturing their underlying behaviours via structured and unstructured heterogeneous information through hybrid representation learning, behaviour graph mining, and symbolic adversarial learning to discover and defend unknown malware families, thereby significantly boosting the accuracy ....Adversarial Learning of Hybrid Representation. This project aims to design and implement a foundational deep representation learning framework for early detection, classification and defense of emerging malware by capturing their underlying behaviours via structured and unstructured heterogeneous information through hybrid representation learning, behaviour graph mining, and symbolic adversarial learning to discover and defend unknown malware families, thereby significantly boosting the accuracy and robustness of existing classifiers and detectors. The resulting representation learning framework will enhance the national security to protect user privacy, reducing the multi-million-dollar loss caused by fraudulent transactions, and defending against cyber attacks.Read moreRead less
Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage ....Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage capabilities, including graphics processor and flash-based memory. This project will devise an adaptive key-value store framework for heterogeneous systems. Our new framework will adaptively harvest the performance potential of future hardware such that applications can cope with fast-growing data sets.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Intelligent Technologies for Smart Cryptography. This project aims to improve cybersecurity by automating the process of generating cryptographic software for smart devices. The expected outcomes are tools that automatically produce efficient cryptographic software that resists attacks. The main benefit of this project is to reduce the amount of expert labour required when developing secure software.
New approaches to interactive sessional search for complex tasks. This project aims to develop new tools and techniques to improve the accuracy and speed of search and data analytics for complex information tasks. There are currently no publicly available search engines which support users engaged in complex interactive search, or that allow searchers to fully control their own data and privacy. Fundamental research advances, based on understanding real user behaviour and search needs will have ....New approaches to interactive sessional search for complex tasks. This project aims to develop new tools and techniques to improve the accuracy and speed of search and data analytics for complex information tasks. There are currently no publicly available search engines which support users engaged in complex interactive search, or that allow searchers to fully control their own data and privacy. Fundamental research advances, based on understanding real user behaviour and search needs will have an impact on important academic, industrial, and government domains, including virtual assistants, health care (clinical decision support), precision medicine, eDiscovery, crime prevention, and detailed socio-economic evaluations.Read moreRead less