Finding and exploiting interesting paths in multidimensional information spaces. This project will invent a new approach for searching within a large complex information space, finding interesting paths between points within the space, visualising the results, and supporting rich, human-centric user interaction with queries and results. This project will embody these techniques in a novel, internet-scale framework to support rapid development of large path search and visualisation applications. ....Finding and exploiting interesting paths in multidimensional information spaces. This project will invent a new approach for searching within a large complex information space, finding interesting paths between points within the space, visualising the results, and supporting rich, human-centric user interaction with queries and results. This project will embody these techniques in a novel, internet-scale framework to support rapid development of large path search and visualisation applications. Evaluation will be via development of several exemplar applications. The techniques and framework will be applicable to a broad range of economically important problems in areas as diverse as health, travel, scientific publication search, product marketing and software engineering.Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important effici ....Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important efficiency gains, but can introduce complex and error-prone behaviours that cannot be managed using traditional software development approaches. This project will produce better, scalable and mechanised methods for the design and verification of such software which is expected to reduce the prevalence of failures in efficient, modern software.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
SenShaMart: A Trusted Internet of Things Marketplace for Sensor Sharing. This project aims to devise a novel Internet of Things (IoT) sensor sharing marketplace that permits IoT applications to discover, integrate, and pay for any IoT sensor data that is made available by other parties. The project will devise highly-scalable sensor classification, query processing, and transactions solutions and incorporate them in a pair of novel blockchains that work in tandem to securely manage all the infor ....SenShaMart: A Trusted Internet of Things Marketplace for Sensor Sharing. This project aims to devise a novel Internet of Things (IoT) sensor sharing marketplace that permits IoT applications to discover, integrate, and pay for any IoT sensor data that is made available by other parties. The project will devise highly-scalable sensor classification, query processing, and transactions solutions and incorporate them in a pair of novel blockchains that work in tandem to securely manage all the information and contracts needed by IoT applications to discover, integrate, pay, and use sensors provided by another parties. These IoT advancements will provide significant economic, environmental, and social benefits via making low-cost and immediate sensing available across the world.Read moreRead less
Adaptive data stream processing in heterogeneous distributed computing environments using real-time context. This project falls within the ARC research priority goal, Smart Information Use. The innovative contributions of this project through the development of adaptive data stream mining algorithms for heterogeneous devices will have an impact on a range of emerging application areas such as:
1. Meeting time-critical, intelligent information needs of the mobile workforce (e.g. mobile healthca ....Adaptive data stream processing in heterogeneous distributed computing environments using real-time context. This project falls within the ARC research priority goal, Smart Information Use. The innovative contributions of this project through the development of adaptive data stream mining algorithms for heterogeneous devices will have an impact on a range of emerging application areas such as:
1. Meeting time-critical, intelligent information needs of the mobile workforce (e.g. mobile healthcare professionals, stockbrokers). 2. Improving Intelligent Transportation Systems via in-vehicle analysis and crash prevention. 3. Facilitating 'on-board' analysis in sensors that monitor the environment and patients. The project will enhance Australia's leading international role in the area of data stream processing in distributed computing environments.Read moreRead less
Robust AI Planning for Hybrid Systems. Automated planning, a core area of Artificial Intelligence, can effectively deal with the automatic synthesis of optimised action strategies for discrete system models. Extending the reach of planning to hybrid discrete/continuous systems, under exogenous uncertainty, is a widely open problem which this project will address. This will enable the proactive, and therefore more effective, management of microgrids and other cyber-physical systems, based on fore ....Robust AI Planning for Hybrid Systems. Automated planning, a core area of Artificial Intelligence, can effectively deal with the automatic synthesis of optimised action strategies for discrete system models. Extending the reach of planning to hybrid discrete/continuous systems, under exogenous uncertainty, is a widely open problem which this project will address. This will enable the proactive, and therefore more effective, management of microgrids and other cyber-physical systems, based on forecast information.Read moreRead less
Mathematical, logical and computational foundations of hybrid control systems, and their application to design and synthesis problems in control engineering. Hybrid control systems are mathematical models of heterogeneous systems consisting of digital computer components interacting in real-time with continuous physical processes. Their many engineering applications include air traffic control, medical technology and automated transport. Motivated by such safety-critical and high-confidence appl ....Mathematical, logical and computational foundations of hybrid control systems, and their application to design and synthesis problems in control engineering. Hybrid control systems are mathematical models of heterogeneous systems consisting of digital computer components interacting in real-time with continuous physical processes. Their many engineering applications include air traffic control, medical technology and automated transport. Motivated by such safety-critical and high-confidence applications, the project aims to develop a unified framework of mathematical logics adequate to formally represent and reason about the structure, behaviour, and properties of hybrid control systems, and use this to develop methodologies for automatically synthesising hybrid control programs that are provably correct with respect to their specifications. Other outcomes include prototype software implementations of hybrid controller design tools.Read moreRead less