Coding of olfactory information in the piriform cortex. This project aims to understand how electrical activity in the primary olfactory (piriform) cortex enables mice to recognise and remember odours. By using optical recording techniques together with genetic tools, the project expects to generate new knowledge about how the mammalian brain builds internal representations of the external world. Specific outcomes of the project include new insights into the functional architecture of the pirifo ....Coding of olfactory information in the piriform cortex. This project aims to understand how electrical activity in the primary olfactory (piriform) cortex enables mice to recognise and remember odours. By using optical recording techniques together with genetic tools, the project expects to generate new knowledge about how the mammalian brain builds internal representations of the external world. Specific outcomes of the project include new insights into the functional architecture of the piriform cortex and fresh understanding of how olfactory information is encoded and stored in neural circuits. More broadly, the project aims to advance our understanding of how the brain works, with benefits for future improvements in artificial intelligence and brain-machine interfaces.Read moreRead less
Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutt ....Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutting-edge Blockchain based secure IoT data management and privacy-preserving smart contracts for smart farming supply-chain management. This data infrastructure will be the first of its kind which will lay a solid foundation for smart farming technology.Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Electrical properties of human dendrites. This project aims to determine the electrical properties of dendrites in human neurons. Dendrites are the primary site of synaptic input to neurons and their electrical properties play a key role in information processing in the brain. While we know much about the electrical properties of dendrites in other species, primarily rodents, little is known about the electrical properties of human dendrites. This project aims to address this gap in knowledge fo ....Electrical properties of human dendrites. This project aims to determine the electrical properties of dendrites in human neurons. Dendrites are the primary site of synaptic input to neurons and their electrical properties play a key role in information processing in the brain. While we know much about the electrical properties of dendrites in other species, primarily rodents, little is known about the electrical properties of human dendrites. This project aims to address this gap in knowledge for the first time. The results obtained will shed light on the mechanisms the brain uses to process information, and therefore will bring us a step closer to truly understanding ourselves.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Role of the superior colliculus in sensory processing. The ability of an organism to attend to, and orient towards, stimuli in the environment is critical for survival. In the mammalian brain, the principal brain region performing this function is the superior colliculus. Despite its importance, little is known about the role the superior colliculus plays in sensory perception. This project addresses this issue by leveraging revolutionary new recording techniques to determine how the superior co ....Role of the superior colliculus in sensory processing. The ability of an organism to attend to, and orient towards, stimuli in the environment is critical for survival. In the mammalian brain, the principal brain region performing this function is the superior colliculus. Despite its importance, little is known about the role the superior colliculus plays in sensory perception. This project addresses this issue by leveraging revolutionary new recording techniques to determine how the superior colliculus codes sensory information and ultimately drives behaviour. The outcomes will be of immediate benefit to scientists studying sensory processing and perceptual decision making, and will help keep Australia at the forefront of brain-inspired engineering and the neuroscience-based knowledge economy.Read moreRead less