Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
LittleBrother: Vision Systems Supporting Detection of Offenders in Public Places. Current visual surveillance systems can track people in an area only if complete camera coverage is provided. This project will develop a visual surveillance system able to track and record people's movements in a public building requiring only limited visual coverage. We will propose novel ways of matching images of a single individual from distant cameras by using features such as color histograms decomposed for ....LittleBrother: Vision Systems Supporting Detection of Offenders in Public Places. Current visual surveillance systems can track people in an area only if complete camera coverage is provided. This project will develop a visual surveillance system able to track and record people's movements in a public building requiring only limited visual coverage. We will propose novel ways of matching images of a single individual from distant cameras by using features such as color histograms decomposed for the different body parts, estimated height, and build type. Creating a record with this tracking information will effectively support security officers in the identification of responsible parties in the event of an offence.Read moreRead less
Semantic change detection through large-scale learning. This project aims to develop technologies which understand the content of images before higher-level analysis is performed. This approach is intended to allow more accurate and reliable decisions to be made using automated image analysis than has previously been possible. The project will particularly investigate the detection of change in the contents of an image.
Automatic real-time detection of infiltrated objects for security of airports and train stations. Infiltrated objects represent a very high security threat in critical areas such as airports and train stations. In order to neutralise such a threat, this project will develop new automatic technologies capable of detecting infiltrated objects in sensitive areas in real time, analysing the movements of their original carriers in the nearby areas, and raising attention accordingly. The technologies ....Automatic real-time detection of infiltrated objects for security of airports and train stations. Infiltrated objects represent a very high security threat in critical areas such as airports and train stations. In order to neutralise such a threat, this project will develop new automatic technologies capable of detecting infiltrated objects in sensitive areas in real time, analysing the movements of their original carriers in the nearby areas, and raising attention accordingly. The technologies will be based on the automatic analysis of camera videos made by computers without the need for assessing or storing the identities of common passers-by. The potential of application is huge extending beyond airports and train stations to any public areas.Read moreRead less
A fast and effective automated insider threat detection and prediction system. Threats from insiders directly compromises the security, privacy and integrity of Australian e-commerce, large databases and communication channels. This project will provide an essential step in combating this criminal activity by developing methods to detect such threats and secure the public's information against exposure and identity theft.
View and shape invariant modeling of human actions for smart surveillance. This project aims to enable surveillance cameras to interpret videos and detect unexpected activity in real time. Existing surveillance cameras are unable to interpret videos. Because most are not monitored in real time, they play no role in improving security response time. The project plans to develop algorithms to detect actions from any camera viewpoint in continuous videos, a capability that is imperative for smart s ....View and shape invariant modeling of human actions for smart surveillance. This project aims to enable surveillance cameras to interpret videos and detect unexpected activity in real time. Existing surveillance cameras are unable to interpret videos. Because most are not monitored in real time, they play no role in improving security response time. The project plans to develop algorithms to detect actions from any camera viewpoint in continuous videos, a capability that is imperative for smart surveillance yet missing in current techniques. This would improve security and safety response time to events that need immediate attention, such as crimes and medical emergencies, and offer autonomous aids to elderly care, smart homes, child minding, patient monitoring and post-trauma rehabilitation.Read moreRead less
Network Intrusion Detection via Machine Learning. Computer security is an increasingly important, yet complex task. It
takes significant skills to configure systems properly such that they
are safe from malicious attacks.
The proposed project aims at designing automatic systems which are
able to adapt to an existing network configuration and which detect
novel and unusual events. For this purpose we will use modern machine
learning techniques, mainly based on kernels. In particular, rec ....Network Intrusion Detection via Machine Learning. Computer security is an increasingly important, yet complex task. It
takes significant skills to configure systems properly such that they
are safe from malicious attacks.
The proposed project aims at designing automatic systems which are
able to adapt to an existing network configuration and which detect
novel and unusual events. For this purpose we will use modern machine
learning techniques, mainly based on kernels. In particular, recently
developed algorithms to estimate the support of a distribution and
detect rare events will be employed in this context.
The project is in cooperation with Dr. Ralf Herbrich (Microsoft
Research, Cambridge).
Read moreRead less
Visual tracking of multiple objects: A stochastic geometrical approach. Reliable real-time visual multiple-object tracking techniques will open up new applications that enhance the quality of life such as driving safety, traffic monitoring, home security, security and surveillance of public facilities. These new applications have huge commercial potentials, and the technology developed from this project will provide the catalyst for vibrant new industries to grow. In addition, the expertise deve ....Visual tracking of multiple objects: A stochastic geometrical approach. Reliable real-time visual multiple-object tracking techniques will open up new applications that enhance the quality of life such as driving safety, traffic monitoring, home security, security and surveillance of public facilities. These new applications have huge commercial potentials, and the technology developed from this project will provide the catalyst for vibrant new industries to grow. In addition, the expertise developed from the project will provide a competitive edge for Australian industries in aerospace, oceanography, robotics, remote sensing, and biomedical engineering. Read moreRead less
Machine learning in adversarial environments. Machine learning underpins the technologies driving the economies of both Silicon Valley and Wall Street, from web search and ad placement, to stock predictions and efforts in fighting cybercrime. This project aims to answer the question: How can machines learn from data when contributors act maliciously for personal gain?