Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
Practical unified framework for secure e-consent mechanism for health records. This project is driven by modern applications of cryptography and network security and their applications in securing e-health by enabling secure Personal Health Records (PHRs), which will play an important role in the future healthcare industry.
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE200100049
Funder
Australian Research Council
Funding Amount
$900,000.00
Summary
Whopping Volta GPU Cluster – Transforming Artificial Intelligence Research. Artificial intelligence (AI), as it continues to grow and evolve, is taking an increasingly leading role in strategic plans of the world’s leading economies, IT companies, and universities, with the promise to be a key driver in innovation, science, education, and society. This project will establish a whopping Volta graphical processing unit Cluster (wVGC) with the aim of smashing current impediments to compute-intensiv ....Whopping Volta GPU Cluster – Transforming Artificial Intelligence Research. Artificial intelligence (AI), as it continues to grow and evolve, is taking an increasingly leading role in strategic plans of the world’s leading economies, IT companies, and universities, with the promise to be a key driver in innovation, science, education, and society. This project will establish a whopping Volta graphical processing unit Cluster (wVGC) with the aim of smashing current impediments to compute-intensive AI research. The wVGC features a contemporary HPC system equipped with 120 most advanced NVIDIA Volta GPUs distributed in 30 high capable nodes. The wVGC will transform AI research in Australia, putting us on the same footing as leading research groups around the globe, and at the forefront of the world’s AI revolution.Read moreRead less
Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend agains ....Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend against cyberattacks for both organisations and individuals in Australia and beyond, theory development in graph theory, refined graph neural network models and improved graph transfer learning algorithms.Read moreRead less
Next Generation Spatial Data Management for Virtual Spatial Systems. This project aims to design novel spatial data retrieval methods for efficient and accurate querying of large datasets with location information. Spatial data is being generated at an unprecedented rate due to the prevalence of mobile devices and ubiquitous connectivity. However, harnessing this data is hampered by outdated and inefficient methods. The project will investigate data retrieval methods that self-optimise for high ....Next Generation Spatial Data Management for Virtual Spatial Systems. This project aims to design novel spatial data retrieval methods for efficient and accurate querying of large datasets with location information. Spatial data is being generated at an unprecedented rate due to the prevalence of mobile devices and ubiquitous connectivity. However, harnessing this data is hampered by outdated and inefficient methods. The project will investigate data retrieval methods that self-optimise for high query efficiency and accuracy, by utilising underlying real-world data patterns. It will enable novel applications for virtual spatial systems with large-scale querying needs, such as spatial digital twins and metaverses, benefiting location-based service providers, urban planners, and emergency management agencies.Read moreRead less
Low-Complexity Capacity-Scalable Multiple Antenna Wireless Communications. The project aims to develop innovative solutions for low-complexity, capacity-scalable multiple antenna wireless communications, in order to meet future data rate requirements whilst maintaining a practical system at a sustainable cost. By leveraging delay-Doppler domain channel properties and geometric reciprocity, pragmatic transceiver technologies and innovative delay-Doppler domain signal processing algorithms for cha ....Low-Complexity Capacity-Scalable Multiple Antenna Wireless Communications. The project aims to develop innovative solutions for low-complexity, capacity-scalable multiple antenna wireless communications, in order to meet future data rate requirements whilst maintaining a practical system at a sustainable cost. By leveraging delay-Doppler domain channel properties and geometric reciprocity, pragmatic transceiver technologies and innovative delay-Doppler domain signal processing algorithms for channel prediction and multi-user transmissions will be developed. The outcomes of the project are expected to significantly improve users' data rates with low system complexity and reduced signalling overhead for future wireless communications.Read moreRead less
Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and ....Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and organizational knowledge. Outcomes include a framework for modelling knowledge-intensive processes to assess their security vulnerability, an associated methodology of creating security risk profiles of knowledge intensive processes and the validation of the methodology in 3 to 6 organizations.Read moreRead less