Towards Invisibly Intelligent Appliances via Experience-based Computing. As computers become more pervasive, people will inevitably interact with a wide range of networked appliances. This proposal aims to develop prototype enabling technology to allow appliances to operate cooperatively and seamlessly with minimum human input - 'invisible intelligence'. Experience-based computing is the key concept underlying the technology. A prototype 'operating experience' will be developed to sit on top of ....Towards Invisibly Intelligent Appliances via Experience-based Computing. As computers become more pervasive, people will inevitably interact with a wide range of networked appliances. This proposal aims to develop prototype enabling technology to allow appliances to operate cooperatively and seamlessly with minimum human input - 'invisible intelligence'. Experience-based computing is the key concept underlying the technology. A prototype 'operating experience' will be developed to sit on top of existing operating systems that will allow appliances to join and leave networks, and interact with other appliances. Also to be developed are a modeling framework, language and methodology for specifying appliance behaviour, and allow learning from experience.Read moreRead less
Flexible user-guided network layout for biomedical applications. This project will develop techniques for automatic layout of biological network diagrams, allowing users to guide the layout while satisfying any required placement constraints and drawing conventions. As part of the project, these methods will be integrated into several real-world systems biology applications for network browsing and authoring.
Software engineering of people-oriented technologies and services. This project will use role, goal, and activity modelling to improve technologies that enable older people in their homes to communicate with loved ones and support networks. The models will be evaluated to determine whether built technologies are indeed meaningful and helpful for the increasing number of older adults.
Finding and exploiting interesting paths in multidimensional information spaces. This project will invent a new approach for searching within a large complex information space, finding interesting paths between points within the space, visualising the results, and supporting rich, human-centric user interaction with queries and results. This project will embody these techniques in a novel, internet-scale framework to support rapid development of large path search and visualisation applications. ....Finding and exploiting interesting paths in multidimensional information spaces. This project will invent a new approach for searching within a large complex information space, finding interesting paths between points within the space, visualising the results, and supporting rich, human-centric user interaction with queries and results. This project will embody these techniques in a novel, internet-scale framework to support rapid development of large path search and visualisation applications. Evaluation will be via development of several exemplar applications. The techniques and framework will be applicable to a broad range of economically important problems in areas as diverse as health, travel, scientific publication search, product marketing and software engineering.Read moreRead less
Catering for individuals’ emotions in technology development. This project aims to develop new approaches to integrate emotional design into software engineering. Modern technologies can positively transform lives. Many good concepts fail, however, to have a transformative effect by not meeting the emotional needs of intended users. Creating software applications that satisfy needs such as ‘feeling in touch’ or ‘feeling accepted’ is difficult, due to the hard-to-define, personal and subtle natur ....Catering for individuals’ emotions in technology development. This project aims to develop new approaches to integrate emotional design into software engineering. Modern technologies can positively transform lives. Many good concepts fail, however, to have a transformative effect by not meeting the emotional needs of intended users. Creating software applications that satisfy needs such as ‘feeling in touch’ or ‘feeling accepted’ is difficult, due to the hard-to-define, personal and subtle nature of these needs. The project aims to support the development of software that better meets emotional needs by focusing on people, their life context and technology adoption, in concert with existing methods for expressing functionality. The project plans to evaluate applications in two areas: assistance for homeless people, and financial literacy among older people.Read moreRead less
Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a unive ....Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a universal data structure, which unfortunately makes it hard to separate trusted code from untrusted user-provided data. This project intends to develop novel program analysis tools and string constraint solvers, and employ these tools to support sophisticated automated reasoning about string manipulating software.Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not o ....Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not only practical solutions for protecting sensitive data recorded in blockchain but also crucial techniques to make the blockchain accountable for practical applications with enhanced security. This project provides significant benefits, such as building a trusted environment for sensitive transactions in the digital economy.Read moreRead less
Domain-specific visual languages for big data analytics applications. This project aims to invent domain-specific visual languages and support model-driven engineering based infrastructure so domain experts can specify, generate and apply complex data analytics and visualisation techniques. Many domains, including intelligent transport, business intelligence, and population health, need more effective “big data” analytics and visualisation. A challenge is to combine detailed domain knowledge – w ....Domain-specific visual languages for big data analytics applications. This project aims to invent domain-specific visual languages and support model-driven engineering based infrastructure so domain experts can specify, generate and apply complex data analytics and visualisation techniques. Many domains, including intelligent transport, business intelligence, and population health, need more effective “big data” analytics and visualisation. A challenge is to combine detailed domain knowledge – what the data means and what it can be used for – with sophisticated, scalable computational techniques to mine and present information from the huge volumes of raw data. This project is expected to improve productivity and quality of big data analytics and visualisation in critical domains.Read moreRead less
Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider a ....Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider attacks. The outcomes of the project will incorporate new security constraints and policies raised by emerging technologies to enable better protection of sensitive information. Read moreRead less