Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distribute ....Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distributed data records. The intended outcome should bring users confidence for the secure adoption of cloud data storage services and significantly benefit enterprises that demand guaranteed protection on their proprietary data.Read moreRead less
Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not o ....Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not only practical solutions for protecting sensitive data recorded in blockchain but also crucial techniques to make the blockchain accountable for practical applications with enhanced security. This project provides significant benefits, such as building a trusted environment for sensitive transactions in the digital economy.Read moreRead less
Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop ....Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop a self-contained, reliable, compatible and verifiable crypto library; (2) we will develop security test software automatically to test and verify security of codes; and (3) we will provide intelligent decision support through argumentation to help developers to apply the library efficiently and correctly.Read moreRead less
New modulation techniques for future high-mobility wireless communications. Future wireless networks will support huge amounts of mobile data traffic and numbers of terminals. To provide satisfactory service to emerging mass transportation systems such as self-driving cars, high-speed trains, and drones, it will be critical to incorporate the ability for wireless networks to function in high-mobility environments. The project aims to devise novel modulation techniques to support high-mobility co ....New modulation techniques for future high-mobility wireless communications. Future wireless networks will support huge amounts of mobile data traffic and numbers of terminals. To provide satisfactory service to emerging mass transportation systems such as self-driving cars, high-speed trains, and drones, it will be critical to incorporate the ability for wireless networks to function in high-mobility environments. The project aims to devise novel modulation techniques to support high-mobility communications with superior performance. The theoretical advances will be demonstrated using software-defined radios. These outcomes will provide fundamental scientific basis for deployment of future air interfaces. The project will benefit Australia in gaining a leading position in global telecommunications development.Read moreRead less
Advanced error control coding techniques for scalable blockchains. The project aims to investigate the application of error-control coding theory in blockchains, focusing on reducing the storage, computation, and communication overheads, as well as increasing the throughput of blockchain networks. The ambition is to develop coding theory in a completely new territory: decentralised, untrusted, and peer-to-peer networks. The intended outcome is to greatly extend the current state of the art of th ....Advanced error control coding techniques for scalable blockchains. The project aims to investigate the application of error-control coding theory in blockchains, focusing on reducing the storage, computation, and communication overheads, as well as increasing the throughput of blockchain networks. The ambition is to develop coding theory in a completely new territory: decentralised, untrusted, and peer-to-peer networks. The intended outcome is to greatly extend the current state of the art of the theory of error-control codes, previously investigated only in the context of centralised architectures, where a server coordinates every task. Practically, the project should provide significant benefits in terms of cost-effectiveness of blockchains, increase in their processing speed, and security enhancement. Read moreRead less
Searching Cohesive Subgraphs in Big Attributed Graph Data. The availability of big attributed graph data brings great opportunities for realizing big values of data. Making sense of such big attributed graph data finds many applications, including health, science, engineering, business, environment, etc. A cohesive subgraph, one of key components that captures the latent properties in a graph, is essential to graph analysis. This project aims to invent effective models of cohesive subgraphs and ....Searching Cohesive Subgraphs in Big Attributed Graph Data. The availability of big attributed graph data brings great opportunities for realizing big values of data. Making sense of such big attributed graph data finds many applications, including health, science, engineering, business, environment, etc. A cohesive subgraph, one of key components that captures the latent properties in a graph, is essential to graph analysis. This project aims to invent effective models of cohesive subgraphs and efficient algorithms for searching and monitoring cohesive subgraphs in big and dynamic attributed graphs from both structure and attribute perspectives. The methods, techniques, and prototype systems developed in this project can be deployed to facilitate the smart use of big graph data across the nation. Read moreRead less
Modelling and Searching Cohesive Groups over Heterogeneous Graphs . Heterogeneous information networks (HINs) contain richer structural and semantic information represented as different types of objects and links. Searching cohesive groups from HINs finds many applications and also brings challenges at both conceptual and technical levels. This project aims to investigate the effective modelling of cohesive groups that take both homogeneous and heterogeneous information into account for differen ....Modelling and Searching Cohesive Groups over Heterogeneous Graphs . Heterogeneous information networks (HINs) contain richer structural and semantic information represented as different types of objects and links. Searching cohesive groups from HINs finds many applications and also brings challenges at both conceptual and technical levels. This project aims to investigate the effective modelling of cohesive groups that take both homogeneous and heterogeneous information into account for different applications and devise efficient algorithms for searching and monitoring those cohesive groups based on different models. The methods, techniques, and evaluation systems developed in this project can be deployed to facilitate the smart use of heterogeneous information networks across the nation.Read moreRead less
Privacy-Preserving Location Based Queries. This project aims to develop efficient solutions for mobile users to consume location-based services (LBS) without revealing their locations. The project expects to demonstrate the effectiveness of the solutions using theoretic analysis and practical experiments. The expected outcomes are a multiparty trust model, techniques to distribute user location information among multiple location-based services, and a practical system to protect privacy in mobil ....Privacy-Preserving Location Based Queries. This project aims to develop efficient solutions for mobile users to consume location-based services (LBS) without revealing their locations. The project expects to demonstrate the effectiveness of the solutions using theoretic analysis and practical experiments. The expected outcomes are a multiparty trust model, techniques to distribute user location information among multiple location-based services, and a practical system to protect privacy in mobile environments. This should protect the privacy of individuals and increase users’ trust in location-based systems.Read moreRead less
Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend agains ....Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend against cyberattacks for both organisations and individuals in Australia and beyond, theory development in graph theory, refined graph neural network models and improved graph transfer learning algorithms.Read moreRead less