New modulation techniques for future high-mobility wireless communications. Future wireless networks will support huge amounts of mobile data traffic and numbers of terminals. To provide satisfactory service to emerging mass transportation systems such as self-driving cars, high-speed trains, and drones, it will be critical to incorporate the ability for wireless networks to function in high-mobility environments. The project aims to devise novel modulation techniques to support high-mobility co ....New modulation techniques for future high-mobility wireless communications. Future wireless networks will support huge amounts of mobile data traffic and numbers of terminals. To provide satisfactory service to emerging mass transportation systems such as self-driving cars, high-speed trains, and drones, it will be critical to incorporate the ability for wireless networks to function in high-mobility environments. The project aims to devise novel modulation techniques to support high-mobility communications with superior performance. The theoretical advances will be demonstrated using software-defined radios. These outcomes will provide fundamental scientific basis for deployment of future air interfaces. The project will benefit Australia in gaining a leading position in global telecommunications development.Read moreRead less
Network coding over finite rings. Wireless networks are increasing exponentially throughout the world, but are still plagued by delay, jitter, and interference. Advanced algebraic tools are the key to designing novel network coding and relaying schemes, which will overcome these issues and increase the network capacity in terms of sustainable data rates.
Taming uncertainty: a stochastic-geometric foundation for complex wireless networks. This project will improve our understanding of complex networks such as the internet, wireless communication networks and social networks. We will do this by properly studying the impact of the network geometry. The outcomes will be new approaches to managing complex networks to improve both efficiency and performance.
Discovery Early Career Researcher Award - Grant ID: DE210101497
Funder
Australian Research Council
Funding Amount
$427,455.00
Summary
Structured Codes: Harnessing Interference to Improve Communication Networks. Interference occurs when a device involuntarily receives signals from unintended transmitters. Interference is the biggest challenge in modern large-scale communication networks. In contrast to conventional wisdom that avoids interference, this project aims to harness interference for its advantage. It will view interference as a form of computation that can be exploited advantageously using structured codes. Developing ....Structured Codes: Harnessing Interference to Improve Communication Networks. Interference occurs when a device involuntarily receives signals from unintended transmitters. Interference is the biggest challenge in modern large-scale communication networks. In contrast to conventional wisdom that avoids interference, this project aims to harness interference for its advantage. It will view interference as a form of computation that can be exploited advantageously using structured codes. Developing theory and novel coding techniques, this project expects to deepen our understanding of interference, and significantly increase the network bandwidth efficiency. Expected outcomes will benefit a wide range of applications such as next-generation mobile systems, sensor networks, and cyber-physical systems.Read moreRead less
Secure and Energy Efficient mmWave Unmanned Aerial Vehicles Communications. Future wireless networks comprising unmanned aerial vehicles (UAVs) in millimeter wave bands will provide ubiquitous connectivity to a massive number of devices, even in unexpected situations such as disaster relief. Common wireless security solutions are developed only for terrestrial infrastructures but are unsuitable for mmWave UAVs due to the high mobility and limited energy supply. This project aims to develop novel ....Secure and Energy Efficient mmWave Unmanned Aerial Vehicles Communications. Future wireless networks comprising unmanned aerial vehicles (UAVs) in millimeter wave bands will provide ubiquitous connectivity to a massive number of devices, even in unexpected situations such as disaster relief. Common wireless security solutions are developed only for terrestrial infrastructures but are unsuitable for mmWave UAVs due to the high mobility and limited energy supply. This project aims to develop novel energy efficient physical layer security techniques to prevent system attacks and malfunctions. The expected outcomes will deliver innovative solutions to safeguard future wireless networks. The project should benefit Australia in advancing knowledge base in wireless security and supporting future critical infrastructures.Read moreRead less
XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contr ....XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contribute to the advance in database and web research communities and establish us as an internationally leading group in this research area. The technological outcomes will help organisations in Australia effectively and efficiently conduct e-Business on the Internet. Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Identifying and Tracking Influential Events in Large Social Networks. This project aims to invent a novel model and techniques for identifying and tracking influential events in large and dynamic social networks in real time. The proposed model would take into account the structure and content of social networks, and the influence of events. The project also plans to develop efficient strategies for identifying and tracking events in large and dynamic social network environments based on the mod ....Identifying and Tracking Influential Events in Large Social Networks. This project aims to invent a novel model and techniques for identifying and tracking influential events in large and dynamic social networks in real time. The proposed model would take into account the structure and content of social networks, and the influence of events. The project also plans to develop efficient strategies for identifying and tracking events in large and dynamic social network environments based on the model, In particular, the project plans to investigate flexible social network query methods to make users’ event search easy. Finally the project plans to build an evaluation system to demonstrate the efficiency of the algorithms and effectiveness of the model.Read moreRead less
Biclique discovery in Big Data. This project aims to design algorithms to capture Big Data. Biclique is a popular graph model that can capture important cohesive structures in many applications. However, traditional biclique discovery algorithms which only focus on simple, small-scale, static and deterministic data are inadequate in the era of Big Data where data has Variety (various formats), Volume (large quantity), Velocity (dynamic update) and Veracity (uncertainty). This project expects to ....Biclique discovery in Big Data. This project aims to design algorithms to capture Big Data. Biclique is a popular graph model that can capture important cohesive structures in many applications. However, traditional biclique discovery algorithms which only focus on simple, small-scale, static and deterministic data are inadequate in the era of Big Data where data has Variety (various formats), Volume (large quantity), Velocity (dynamic update) and Veracity (uncertainty). This project expects to benefit real applications in both public and private sectors and add value to Australian manufactured products.Read moreRead less
Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less