Identifying and Tracking Influential Events in Large Social Networks. This project aims to invent a novel model and techniques for identifying and tracking influential events in large and dynamic social networks in real time. The proposed model would take into account the structure and content of social networks, and the influence of events. The project also plans to develop efficient strategies for identifying and tracking events in large and dynamic social network environments based on the mod ....Identifying and Tracking Influential Events in Large Social Networks. This project aims to invent a novel model and techniques for identifying and tracking influential events in large and dynamic social networks in real time. The proposed model would take into account the structure and content of social networks, and the influence of events. The project also plans to develop efficient strategies for identifying and tracking events in large and dynamic social network environments based on the model, In particular, the project plans to investigate flexible social network query methods to make users’ event search easy. Finally the project plans to build an evaluation system to demonstrate the efficiency of the algorithms and effectiveness of the model.Read moreRead less
Biclique discovery in Big Data. This project aims to design algorithms to capture Big Data. Biclique is a popular graph model that can capture important cohesive structures in many applications. However, traditional biclique discovery algorithms which only focus on simple, small-scale, static and deterministic data are inadequate in the era of Big Data where data has Variety (various formats), Volume (large quantity), Velocity (dynamic update) and Veracity (uncertainty). This project expects to ....Biclique discovery in Big Data. This project aims to design algorithms to capture Big Data. Biclique is a popular graph model that can capture important cohesive structures in many applications. However, traditional biclique discovery algorithms which only focus on simple, small-scale, static and deterministic data are inadequate in the era of Big Data where data has Variety (various formats), Volume (large quantity), Velocity (dynamic update) and Veracity (uncertainty). This project expects to benefit real applications in both public and private sectors and add value to Australian manufactured products.Read moreRead less
Privacy-preserving record linkage on multiple large databases. Record linkage has been recognised as a crucial infrastructure component in many information systems, however privacy concerns commonly prevent the linking of databases that contain personal information. This project will develop techniques that will enable the linking of multiple large databases without revealing any private information.
Discovery Early Career Researcher Award - Grant ID: DE210101808
Funder
Australian Research Council
Funding Amount
$395,775.00
Summary
Genetic Programming for Big Data Analytics. The project aims to extend a powerful machine learning method, called genetic programming and also developing a new concept called Alpha program, for big data analytics. This project expects to generate a new approach by finding a systematic approach to develop gene structures using information theory. By borrowing the best genes from the population of programs, the Alpha program concept will be developed for the first time. The proposed approach aims ....Genetic Programming for Big Data Analytics. The project aims to extend a powerful machine learning method, called genetic programming and also developing a new concept called Alpha program, for big data analytics. This project expects to generate a new approach by finding a systematic approach to develop gene structures using information theory. By borrowing the best genes from the population of programs, the Alpha program concept will be developed for the first time. The proposed approach aims to enhance genetic programming for many practical problems. I contend that not only finding better tools for big data analytics is in the best interest of machine learning and big data communities, it also provides significant benefits for other communities and industries in Australia.Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Learning the Focus of Attention to Detect Distributed Coordinated Attacks. Cyber security analysts need to detect and respond to attacks as soon as possible, to minimise the damage attackers can inflict. However, the growth in highly distributed attacks that span multiple networks has meant that massive volumes of data need to be analysed. While machine learning techniques can help filter the data, we need techniques that can automatically provide a focus of attention for analysts on the most re ....Learning the Focus of Attention to Detect Distributed Coordinated Attacks. Cyber security analysts need to detect and respond to attacks as soon as possible, to minimise the damage attackers can inflict. However, the growth in highly distributed attacks that span multiple networks has meant that massive volumes of data need to be analysed. While machine learning techniques can help filter the data, we need techniques that can automatically provide a focus of attention for analysts on the most relevant observations. Our aim is to devise a novel suite of attention mechanisms that can focus the search of machine learning techniques for cyber security. The results of this project will improve the accuracy and efficiency of detecting distributed attacks across multiple networks.Read moreRead less
Low-cost Sensing Methods and Hybrid Learning Models. This project aims to revolutionise the theory and practice of sensing and monitoring by developing novel Artificial Intelligence and Internet of Things technologies. This project expects to generate new knowledge in the area of Artificial Intelligence of Things by combining sensing, machine learning, and big data analytics. Expected outcomes of this project include novel low-cost sensing methods and new hybrid machine learning models for predi ....Low-cost Sensing Methods and Hybrid Learning Models. This project aims to revolutionise the theory and practice of sensing and monitoring by developing novel Artificial Intelligence and Internet of Things technologies. This project expects to generate new knowledge in the area of Artificial Intelligence of Things by combining sensing, machine learning, and big data analytics. Expected outcomes of this project include novel low-cost sensing methods and new hybrid machine learning models for predictive sensory data analytics. This should provide significant benefits, such as substantially reduced operating and service costs and improved accuracy for real-time monitoring in the fields where cheap-to-implement and easy-to-service monitoring systems over large geographical areas are imperative.Read moreRead less
Using data mining methods to remove uncertainties in sensor data streams. This project will develop key techniques for removing uncertainties in sensor data streams and thus improve the monitoring quality of sensor networks. The expected outcomes will benefit Australia by enabling improved, lower-cost monitoring of natural resources and management of stock raising.
Deep Data Mining for Anomaly Prediction from Sensor Data Streams. Sensor data streams are crucial for anomaly predictions in real-life monitoring. However, balancing efficiency and accuracy in predicting anomalies with sensor streams is a great challenge; it requires new techniques that go beyond detecting anomalies and predicting trends. This project will develop a deep mining method for anomaly prediction from sensor streams; it will comprise mining algorithms at various levels - from compress ....Deep Data Mining for Anomaly Prediction from Sensor Data Streams. Sensor data streams are crucial for anomaly predictions in real-life monitoring. However, balancing efficiency and accuracy in predicting anomalies with sensor streams is a great challenge; it requires new techniques that go beyond detecting anomalies and predicting trends. This project will develop a deep mining method for anomaly prediction from sensor streams; it will comprise mining algorithms at various levels - from compressing massive raw data, to recognition of abnormal waveforms preceding anomalies, and to retrieving and summarising similar past anomalies for creating descriptions of future anomalies. The project will demonstrate our method in health/environment monitoring applications, and its adoption will save resources, money and lives.Read moreRead less
Deep analytics of non-occurring but important behaviours. This project aims to build a systematic theory for the deep analytics of complex and important occurring and non-occurring behaviours. Behaviours that should occur but do not take place, called non-occurring behaviours (NOB), are widely evident but easily overlooked, such as missed important medical treatments. While often occurring behaviours are focused, such NOB may be associated with significant effects such as a threat to health. Thi ....Deep analytics of non-occurring but important behaviours. This project aims to build a systematic theory for the deep analytics of complex and important occurring and non-occurring behaviours. Behaviours that should occur but do not take place, called non-occurring behaviours (NOB), are widely evident but easily overlooked, such as missed important medical treatments. While often occurring behaviours are focused, such NOB may be associated with significant effects such as a threat to health. This project expects to fill the knowledge gaps in representing, analysing and evaluating NOB complexities and impact, with significant benefits for the evidence-based detection, prediction and risk management of covert NOB applications and their important effects.Read moreRead less