Engagement in early childhood education in the context of disadvantage. This research responds to enduring inequalities in children’s participation in high quality early childhood education and care (ECEC). Contemporary families face precarious labour markets and a childcare system with stringent workforce participation requirements. This project will illuminate the affordances of everyday life for families most challenged by these emergent conditions and develop understandings of how to calibr ....Engagement in early childhood education in the context of disadvantage. This research responds to enduring inequalities in children’s participation in high quality early childhood education and care (ECEC). Contemporary families face precarious labour markets and a childcare system with stringent workforce participation requirements. This project will illuminate the affordances of everyday life for families most challenged by these emergent conditions and develop understandings of how to calibrate services accordingly. Findings will support universal ECEC access through knowledge translation about contemporary disadvantage to policy and practice forums. A strong Indigenous component contributes to researcher training and knowledge about effective practice for Indigenous children and their families.Read moreRead less
Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutt ....Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutting-edge Blockchain based secure IoT data management and privacy-preserving smart contracts for smart farming supply-chain management. This data infrastructure will be the first of its kind which will lay a solid foundation for smart farming technology.Read moreRead less
Young children in digital society: An Online Tool for service provision . This project aims to identify the practices enacted and shared amongst young children, their families and educators in digital society.The project is significant because in digital society families and educators face new demands ensuring technologies are used in the best interests of young children. Knowledge about practices in digital society informs adult decision-making using technologies with, by and for young children ....Young children in digital society: An Online Tool for service provision . This project aims to identify the practices enacted and shared amongst young children, their families and educators in digital society.The project is significant because in digital society families and educators face new demands ensuring technologies are used in the best interests of young children. Knowledge about practices in digital society informs adult decision-making using technologies with, by and for young children in the early years. The outcome is a new Online Tool for the Partner Organisations to share exemplar practices benefiting Australian children, their families and educators with new resources, materials and programs in areas including: digital media production, cyber-safety education, digital play and digital parenting.
Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Observe, Reflect, Improve: a tool to enrich Children’s Learning (ORICL). This project aims to address long-standing concerns about the quality of education and care for children during their critical first two years. It will introduce a promising, future-focused digital tool, co-designed with practitioners and providers of early childhood services, to support infant-toddler educators’ planning and practice. Building on ground-breaking pilot work, we will undertake a national implementation and e ....Observe, Reflect, Improve: a tool to enrich Children’s Learning (ORICL). This project aims to address long-standing concerns about the quality of education and care for children during their critical first two years. It will introduce a promising, future-focused digital tool, co-designed with practitioners and providers of early childhood services, to support infant-toddler educators’ planning and practice. Building on ground-breaking pilot work, we will undertake a national implementation and evaluation of the Observe, Reflect and Improve Children’s Learning (ORICL) tool. Expected outcomes include: enhanced pedagogical practices; enriched learning experiences for children birth-two; effective communication with families; and improved resourcing for providers of early childhood education and care services. Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
ARC Centre of Excellence for the Digital Child. Our vision is for Australian children to be healthy, educated and connected. This Centre will integrate child health, education, and digital and social connectedness, innovating across disciplines to meet Australia’s ongoing challenges of supporting young children growing up in a rapidly changing digital age. The Centre’s world-leading team investigates children’s digital practices through three interconnected research programs supported by a longi ....ARC Centre of Excellence for the Digital Child. Our vision is for Australian children to be healthy, educated and connected. This Centre will integrate child health, education, and digital and social connectedness, innovating across disciplines to meet Australia’s ongoing challenges of supporting young children growing up in a rapidly changing digital age. The Centre’s world-leading team investigates children’s digital practices through three interconnected research programs supported by a longitudinal family cohort study and children’s technology laboratories. The Centre will address tensions in a contested field to inform government and non-government policy, technology innovation, and develop programs and guidelines for children, families, educators and technology developers. Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less