XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contr ....XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contribute to the advance in database and web research communities and establish us as an internationally leading group in this research area. The technological outcomes will help organisations in Australia effectively and efficiently conduct e-Business on the Internet. Read moreRead less
Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less
Closing the Gap: Fundamental Capacity Limits for Interfering Wireless Networks and Practical Methods to Get There. Enhancing communication networks to achieve broadband data rates is now a national priority. Wireless communications is hugely important, with mobile phones, wireless computers, and wireless Internet access to homes, all rapidly growing areas. This project addresses the fundamental bottleneck of interference between links in wireless networks. Wireless unplugs the user and allows hi ....Closing the Gap: Fundamental Capacity Limits for Interfering Wireless Networks and Practical Methods to Get There. Enhancing communication networks to achieve broadband data rates is now a national priority. Wireless communications is hugely important, with mobile phones, wireless computers, and wireless Internet access to homes, all rapidly growing areas. This project addresses the fundamental bottleneck of interference between links in wireless networks. Wireless unplugs the user and allows him/her to roam, and to set up ad-hoc networks with other users. This research will thus contribute to Australia's increased productivity. Just as importantly, this project addresses fundamental research; it will increase Australia's knowledge base and provide training for students and researchers in how to think about communications problems.Read moreRead less
Information Capacity of High Data Rate Wireless Networks. Future wireless networks must support huge data rates in order to meet
the escalating demands of emerging Internet applications. Required
capacities far exceed those which can be provided by existing wireless
systems. Space-time coding is one very promising new technique which
may provide a solution. In spite of the potentials of this technique,
there are many important practical issues that affect the realizable
capacities. We a ....Information Capacity of High Data Rate Wireless Networks. Future wireless networks must support huge data rates in order to meet
the escalating demands of emerging Internet applications. Required
capacities far exceed those which can be provided by existing wireless
systems. Space-time coding is one very promising new technique which
may provide a solution. In spite of the potentials of this technique,
there are many important practical issues that affect the realizable
capacities. We aim to investigate two such issues: the impact of
channel uncertainty at the receiver, and the impact of multiple access
interference. This research will provide new directions for the design
of wireless data networks.
Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
New modulation techniques for future high-mobility wireless communications. Future wireless networks will support huge amounts of mobile data traffic and numbers of terminals. To provide satisfactory service to emerging mass transportation systems such as self-driving cars, high-speed trains, and drones, it will be critical to incorporate the ability for wireless networks to function in high-mobility environments. The project aims to devise novel modulation techniques to support high-mobility co ....New modulation techniques for future high-mobility wireless communications. Future wireless networks will support huge amounts of mobile data traffic and numbers of terminals. To provide satisfactory service to emerging mass transportation systems such as self-driving cars, high-speed trains, and drones, it will be critical to incorporate the ability for wireless networks to function in high-mobility environments. The project aims to devise novel modulation techniques to support high-mobility communications with superior performance. The theoretical advances will be demonstrated using software-defined radios. These outcomes will provide fundamental scientific basis for deployment of future air interfaces. The project will benefit Australia in gaining a leading position in global telecommunications development.Read moreRead less
Index coding for multimedia content distribution networks. The project aims to develop new bandwidth-efficient index coding schemes to reduce network congestion. A large portion of the increasing internet traffic is due to video content browsing and distribution. This creates serious strains on the current network infrastructure, which is designed to support conventional data. It is crucial to explore new avenues to reduce the network congestion due to large file downloads. The project aims to t ....Index coding for multimedia content distribution networks. The project aims to develop new bandwidth-efficient index coding schemes to reduce network congestion. A large portion of the increasing internet traffic is due to video content browsing and distribution. This creates serious strains on the current network infrastructure, which is designed to support conventional data. It is crucial to explore new avenues to reduce the network congestion due to large file downloads. The project aims to tackle this problem by exploring new index coding techniques that are robust to failures in wireless and wired network links. Using advanced mathematical tools from algebraic number theory and module theory, the project aims to design optimally bandwidth-efficient index coding schemes that enable timely and reliable content distribution to end users.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distribute ....Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distributed data records. The intended outcome should bring users confidence for the secure adoption of cloud data storage services and significantly benefit enterprises that demand guaranteed protection on their proprietary data.Read moreRead less
Practical unified framework for secure e-consent mechanism for health records. This project is driven by modern applications of cryptography and network security and their applications in securing e-health by enabling secure Personal Health Records (PHRs), which will play an important role in the future healthcare industry.