Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Machine learning in adversarial environments. Machine learning underpins the technologies driving the economies of both Silicon Valley and Wall Street, from web search and ad placement, to stock predictions and efforts in fighting cybercrime. This project aims to answer the question: How can machines learn from data when contributors act maliciously for personal gain?
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE220100680
Funder
Australian Research Council
Funding Amount
$403,482.00
Summary
Making Anomaly Detection Interpretable & Actionable in Hostile Environments. Anomaly detection plays a vital role in cyber security to identify threat patterns hidden within large volumes of data. However, current approaches experience high false alarm rates in noisy, heterogeneous and adversarial environments. This project aims to identify and interpret anomalies that can disrupt system performance by introducing the concept of actionable anomalies. It will significantly advance the effectivene ....Making Anomaly Detection Interpretable & Actionable in Hostile Environments. Anomaly detection plays a vital role in cyber security to identify threat patterns hidden within large volumes of data. However, current approaches experience high false alarm rates in noisy, heterogeneous and adversarial environments. This project aims to identify and interpret anomalies that can disrupt system performance by introducing the concept of actionable anomalies. It will significantly advance the effectiveness of anomaly detection by developing algorithms that distil local and global structures of data to characterise actionable anomalies and explain their outlying aspects. Project outcomes will enhance the security, trustworthiness and fault-tolerance of critical systems, contributing to international efforts in cyber security.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE160100584
Funder
Australian Research Council
Funding Amount
$370,000.00
Summary
Secure and Private Machine Learning. This project intends to answer the question: How can machines learn from data when participants behave maliciously for personal gain? Machine learning and statistics are used in many technologies where participants have an incentive to game the system (eg internet ad placement, e-commerce rating systems, credit risk in finance, health analytics and smart utility grids). However, little is known about how well state-of-the-art statistical inference techniques ....Secure and Private Machine Learning. This project intends to answer the question: How can machines learn from data when participants behave maliciously for personal gain? Machine learning and statistics are used in many technologies where participants have an incentive to game the system (eg internet ad placement, e-commerce rating systems, credit risk in finance, health analytics and smart utility grids). However, little is known about how well state-of-the-art statistical inference techniques fare when data is manipulated by a malicious participant. The project's outcomes aim to ensure that statistical analysis is accurate while preserving data privacy, providing theoretical foundations of secure machine learning in adversarial domains. Potential applications range from cybersecurity defences to measures for balancing security and privacy interests.Read moreRead less
Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that ....Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that are required for the 5G enabled environment. The construction of new AI-based tools and testing facilities as well as the generation of new knowledge in the field of privacy preservation and collaboration between universities are expected outcomes of this project. Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE170100361
Funder
Australian Research Council
Funding Amount
$360,000.00
Summary
Towards reliable and robust machine learning systems. This project aims to protect machine learning systems from adversarial manipulation. Machine learning technologies are used in e-commerce, search, virtual assistants and self-driving cars. However, they are vulnerable to adversarial manipulations which are imperceptible to humans but can cause systems to fail, thereby undermining their usefulness or possibly causing disasters. Less vulnerable machine learning systems are expected to make futu ....Towards reliable and robust machine learning systems. This project aims to protect machine learning systems from adversarial manipulation. Machine learning technologies are used in e-commerce, search, virtual assistants and self-driving cars. However, they are vulnerable to adversarial manipulations which are imperceptible to humans but can cause systems to fail, thereby undermining their usefulness or possibly causing disasters. Less vulnerable machine learning systems are expected to make future autonomous systems, such as self-driving cars and autonomous robots, safer. This project will provide a deeper understanding of how machine learning systems can be made less vulnerable, thereby increasing the safety of future autonomous systems such as self-driving cars and autonomous robots.Read moreRead less
A fast and effective automated insider threat detection and prediction system. Threats from insiders directly compromises the security, privacy and integrity of Australian e-commerce, large databases and communication channels. This project will provide an essential step in combating this criminal activity by developing methods to detect such threats and secure the public's information against exposure and identity theft.
Unlocking Mass Mobile Video Analytics with Advanced Neural Memory Networks. This project will develop neural memory architectures and dense spatial-temporal bundle adjustment to predict movement, behaviour, and perform multi-sensor fusion across large asynchronous video feeds. This capability will allow us to better interrogate and analyse mass video information recorded from the vast number of smartphones, action cameras, and surveillance cameras which exist at public events of interest. Outcom ....Unlocking Mass Mobile Video Analytics with Advanced Neural Memory Networks. This project will develop neural memory architectures and dense spatial-temporal bundle adjustment to predict movement, behaviour, and perform multi-sensor fusion across large asynchronous video feeds. This capability will allow us to better interrogate and analyse mass video information recorded from the vast number of smartphones, action cameras, and surveillance cameras which exist at public events of interest. Outcomes include the ability to ingest multiple video feeds into a dense and dynamic 3D reconstruction for knowledge representation and discovery, and analysis of events and behaviour through new spatio-temporal analytic approaches. This will offer significant benefits for video forensic analysis, policing, and emergency response.Read moreRead less