Investigations into machine learning applications in link analysis. Link analysis is an emerging tool for the detection of patterns in structured data. The detection of pattern in such data can lead to the detection of fraud occurrence, security breaches in computer systems, and patterns of social interactions with a community. It is also popularly applied to applications such as Web search engine designs and marketing analysis. This project aims to advance the area of link analysis by allowing ....Investigations into machine learning applications in link analysis. Link analysis is an emerging tool for the detection of patterns in structured data. The detection of pattern in such data can lead to the detection of fraud occurrence, security breaches in computer systems, and patterns of social interactions with a community. It is also popularly applied to applications such as Web search engine designs and marketing analysis. This project aims to advance the area of link analysis by allowing the incorporation of contextual information which accounts for relationships among actors properly. Advances in link detection will allow improvements in security and Web services on which a wide field of national bodies rely. This project can help to place Australia at the forefront of this research area.Read moreRead less
Planning, Communication, and Collaboration in Cognitive Systems: A Constructive Approach. Change is a constant and unavoidable characteristic of the current and foreseeable business environment. Currently systems cope poorly with change and as a result they are not sufficiently dependable and adaptable to support business agility and innovation. The aim of this project is to advance the start-of-the art and to lay a new foundation for dependable and adaptable cognitive systems that can plan, com ....Planning, Communication, and Collaboration in Cognitive Systems: A Constructive Approach. Change is a constant and unavoidable characteristic of the current and foreseeable business environment. Currently systems cope poorly with change and as a result they are not sufficiently dependable and adaptable to support business agility and innovation. The aim of this project is to advance the start-of-the art and to lay a new foundation for dependable and adaptable cognitive systems that can plan, communicate and collaborate in complex and dynamic environments.Read moreRead less
Exploring Scientific Information with Advanced New Search Tools. The rapidly growth of scientific literature in many fields makes finding information a challenge. For example, biologists produce over 1 million articles each year. Existing search tools have only limited success satisfying the demands of scientists' queries. This project will deliver intelligent e-research assistants capable of answering scientists' questions directly rather than returning a list of documents. This will allow scie ....Exploring Scientific Information with Advanced New Search Tools. The rapidly growth of scientific literature in many fields makes finding information a challenge. For example, biologists produce over 1 million articles each year. Existing search tools have only limited success satisfying the demands of scientists' queries. This project will deliver intelligent e-research assistants capable of answering scientists' questions directly rather than returning a list of documents. This will allow scientists to more efficiently exploit the literature enabling them to be more innovative and productive. This technology is applicable where ever finding facts in large volumes of text is critical, e.g. analysing surveillance material. Advanced search tools will have considerable academic and industrial impact.Read moreRead less
Network Intrusion Detection via Machine Learning. Computer security is an increasingly important, yet complex task. It
takes significant skills to configure systems properly such that they
are safe from malicious attacks.
The proposed project aims at designing automatic systems which are
able to adapt to an existing network configuration and which detect
novel and unusual events. For this purpose we will use modern machine
learning techniques, mainly based on kernels. In particular, rec ....Network Intrusion Detection via Machine Learning. Computer security is an increasingly important, yet complex task. It
takes significant skills to configure systems properly such that they
are safe from malicious attacks.
The proposed project aims at designing automatic systems which are
able to adapt to an existing network configuration and which detect
novel and unusual events. For this purpose we will use modern machine
learning techniques, mainly based on kernels. In particular, recently
developed algorithms to estimate the support of a distribution and
detect rare events will be employed in this context.
The project is in cooperation with Dr. Ralf Herbrich (Microsoft
Research, Cambridge).
Read moreRead less
Ask the Net: Intelligent Natural Language Learning. Natural Language Processing (NLP) has progressed rapidly using corpus-based machine learning techniques. However, corpus development costs cause a ?data bottleneck? which prevents systems from reaching human competence. This project overcomes the difficulties of creating huge corpora by employing the innate language ability of untrained contributors. We will show how to automatically select and present examples, containing informative lingui ....Ask the Net: Intelligent Natural Language Learning. Natural Language Processing (NLP) has progressed rapidly using corpus-based machine learning techniques. However, corpus development costs cause a ?data bottleneck? which prevents systems from reaching human competence. This project overcomes the difficulties of creating huge corpora by employing the innate language ability of untrained contributors. We will show how to automatically select and present examples, containing informative linguistic structures, which are most beneficial for training NLP systems. These examples will be analysed by many contributors whose responses will be automatically collated into corpora. Huge corpora are vital to emerging language technologies for managing textual information in the global economy.
Read moreRead less
Computer Vision Optimization Problems Using Machine Learning. Computer Vision concerns itself with understanding the world through the analysis of images obtained by a video or still camera. An important application is tracking of people in video and modelling their movements. This has evident applications in security, sport and entertainment. By enabling the computer to capture the motion of a subject in a video, we may detect suspicious activity in security, analyze the motion (golf-swing, ....Computer Vision Optimization Problems Using Machine Learning. Computer Vision concerns itself with understanding the world through the analysis of images obtained by a video or still camera. An important application is tracking of people in video and modelling their movements. This has evident applications in security, sport and entertainment. By enabling the computer to capture the motion of a subject in a video, we may detect suspicious activity in security, analyze the motion (golf-swing, diving style) of a sports-person, or capture the motion of an actor for animation or game applications. Development of a reliable technology requires new optimization techniques, which will place Australia at the forefront of the application of such research, commercially and for the public benefit.Read moreRead less
Parsing the web: Exploiting redundancy to understand language. This project will automatically learn the grammatical structure of language by exploiting redundancy of facts, like 'Mozart was born in 1756', from a trillion words of web text. These facts will be used to understand more complex sentences. This will enable smart information use of text with grammatical information for large-scale information access for the first time. This project will strengthen Australia's world-class expertise, ....Parsing the web: Exploiting redundancy to understand language. This project will automatically learn the grammatical structure of language by exploiting redundancy of facts, like 'Mozart was born in 1756', from a trillion words of web text. These facts will be used to understand more complex sentences. This will enable smart information use of text with grammatical information for large-scale information access for the first time. This project will strengthen Australia's world-class expertise, providing opportunities for future researchers in this area. Our expanded C&C tools and trillion word corpus will be used by academics, companies and governments, in Australia and internationally, aiding applications including financial surveillance and fraud detection.
Read moreRead less
Fast, practical and effective algorithms for clustering with advice. To maintain a safe and healthy society, government and industry need high quality immunization and national security databases. Since we cannot afford to have duplicate, incomplete and conflicting records that refer to the same person, we unify them by identifying clusters of related records.
In the emerging field of functional genomics, diagnosis of certain diseases is enhanced by determining which genes act together. Diffe ....Fast, practical and effective algorithms for clustering with advice. To maintain a safe and healthy society, government and industry need high quality immunization and national security databases. Since we cannot afford to have duplicate, incomplete and conflicting records that refer to the same person, we unify them by identifying clusters of related records.
In the emerging field of functional genomics, diagnosis of certain diseases is enhanced by determining which genes act together. Different experimental runs might result in different clusterings of genes: we need one consensus clustering that summarizes the experimental outcomes.
Cleaning databases and combining clusterings by hand would require vast amounts of time. This project will result in faster and more accurate computational procedures.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less