Generative Visual Pre-training on Unlabelled Big Data. This project aims to develop a generative visual pre-training of large-scale deep neural networks on unlabelled big data. Developing pre-trained visual models that are accurate, robust, and efficient for downstream tasks is a keystone of modern computer vision, but it poses challenges and knowledge gaps to existing unsupervised representation learning. Expected outcomes include new theories and algorithms for unsupervised visual pre-training ....Generative Visual Pre-training on Unlabelled Big Data. This project aims to develop a generative visual pre-training of large-scale deep neural networks on unlabelled big data. Developing pre-trained visual models that are accurate, robust, and efficient for downstream tasks is a keystone of modern computer vision, but it poses challenges and knowledge gaps to existing unsupervised representation learning. Expected outcomes include new theories and algorithms for unsupervised visual pre-training, which are anticipated to deepen our understanding of visual representation and make it easier to build and deploy computer vision applications and services. Examples of benefits include modernising machines in manufacturing and farming with visual intelligence. Read moreRead less
Exploiting Geometries of Learning for Fast, Adaptive and Robust AI. This project aims to uniquely exploit geometric manifolds in deep learning to advance the frontier of Artificial Intelligence (AI) research and applications in cybersecurity and general cognitive tasks. It expects to develop new theories, algorithms, tools, and technologies for machine learning systems that are fast, adaptive, lifelong and robust, even with limited supervision. Expected outcomes will enhance Australia's capabili ....Exploiting Geometries of Learning for Fast, Adaptive and Robust AI. This project aims to uniquely exploit geometric manifolds in deep learning to advance the frontier of Artificial Intelligence (AI) research and applications in cybersecurity and general cognitive tasks. It expects to develop new theories, algorithms, tools, and technologies for machine learning systems that are fast, adaptive, lifelong and robust, even with limited supervision. Expected outcomes will enhance Australia's capability and competitiveness in AI, and deliver robust and trustworthy learning technology. The project should provide significant benefits not only in advancing scientific and translational knowledge but also in accelerating AI innovations, safeguarding cyberspace, and reducing the burden on defence expenses in Australia.Read moreRead less
3D Vision Geometric Optimisation in Deep Learning. This project aims to develop a methodology for integrating the algorithms of 3D Vision Geometry and Optimization into the framework of Machine Learning and demonstrate the wide applicability of the new methods on a variety of challenging fundamental problems in Computer Vision. These include 3D geometric scene understanding, and estimation and prediction of human 2D/3D pose and activity. Applications of this technology are to be found in Intell ....3D Vision Geometric Optimisation in Deep Learning. This project aims to develop a methodology for integrating the algorithms of 3D Vision Geometry and Optimization into the framework of Machine Learning and demonstrate the wide applicability of the new methods on a variety of challenging fundamental problems in Computer Vision. These include 3D geometric scene understanding, and estimation and prediction of human 2D/3D pose and activity. Applications of this technology are to be found in Intelligent Transportation, Environment Monitoring, and Augmented Reality, applicable in smart-city planning and medical applications such as computer-enhanced surgery. The goal is to build Australia's competitive advantage in the forefront of ICT research and technology innovation.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
A Novel Automatic Neural Network Feature Extractor. This project aims to study feature extraction abilities of convolutional as well as traditional neural networks and develop a generic feature extractor which can be applied to wide variety of real-world image and non-image data. New concepts for automatic feature extraction, feature explanation, hybrid evolutionary algorithms and non-iterative ensemble learning will be introduced and evaluated. The expected outcomes are a generic feature extrac ....A Novel Automatic Neural Network Feature Extractor. This project aims to study feature extraction abilities of convolutional as well as traditional neural networks and develop a generic feature extractor which can be applied to wide variety of real-world image and non-image data. New concepts for automatic feature extraction, feature explanation, hybrid evolutionary algorithms and non-iterative ensemble learning will be introduced and evaluated. The expected outcomes are a generic feature extractor for automatically extracting features, an optimiser for finding optimal parameters and non-iterative ensemble learning technique for classification of features into classes. The impact of this project will be automatic feature extractors and classifiers for real-world applications.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Quantum-Inspired Machine Learning. This project aims to develop new machine learning techniques based around the close correspondence between
neural networks used in deep learning, and tensor networks used in quantum physics. Tensor networks are a form of information compression that is useful in machine learning to construct a compact representation of a large data set in a way that is more amenable to understanding the internal structure than a deep neural network. Expected outcomes of this pr ....Quantum-Inspired Machine Learning. This project aims to develop new machine learning techniques based around the close correspondence between
neural networks used in deep learning, and tensor networks used in quantum physics. Tensor networks are a form of information compression that is useful in machine learning to construct a compact representation of a large data set in a way that is more amenable to understanding the internal structure than a deep neural network. Expected outcomes of this project include more resilient algorithms for machine learning, and new ways to represent quantum states that will impact fundamental physics. The resulting benefits include enhanced capacity for cross-discipline collaboration, and improved methods for future industrial applications.
Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less