Industrial Transformation Research Hubs - Grant ID: IH170100013
Funder
Australian Research Council
Funding Amount
$2,962,655.00
Summary
ARC Research Hub for Digital Enhanced Living. The ARC Research Hub for Digital Enhanced Living aims to address the growing challenges of aging people living in their own home or residential care. This will be through inventing new personalised medical technologies through an innovative approach, with a multi-disciplinary team leveraging diverse expertise. An enhanced capacity to create and deploy fit-for-purpose personalised health solutions will result in revenues from new and repurposed device ....ARC Research Hub for Digital Enhanced Living. The ARC Research Hub for Digital Enhanced Living aims to address the growing challenges of aging people living in their own home or residential care. This will be through inventing new personalised medical technologies through an innovative approach, with a multi-disciplinary team leveraging diverse expertise. An enhanced capacity to create and deploy fit-for-purpose personalised health solutions will result in revenues from new and repurposed devices, analytics and integration platforms. New jobs and improved care will see cost reductions, better use of resources and enhanced mental, physical and social well-being.Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Next-generation genomic resources to tackle parasitic diseases of animals. The revolution in genomics provides unprecedented opportunities to tackle destructive parasitic diseases affecting billions of animals worldwide. Through a synergy of leading-edge technologies and a strong partnership with BGI International, this project aims to deliver major conceptual advances in the understanding of parasitism; an unparalleled skills-base in genomics and bioinformatics; innovative new molecular technol ....Next-generation genomic resources to tackle parasitic diseases of animals. The revolution in genomics provides unprecedented opportunities to tackle destructive parasitic diseases affecting billions of animals worldwide. Through a synergy of leading-edge technologies and a strong partnership with BGI International, this project aims to deliver major conceptual advances in the understanding of parasitism; an unparalleled skills-base in genomics and bioinformatics; innovative new molecular technologies; and new treatments and diagnostic tests as biotechnological outcomes. This leap forward in Australia will substantially enhance the global profile of parasitology research, training and employment opportunities for early career scientists, and improve access to international research funding and networks. Read moreRead less
Searching for near-exact protein models. This project aims to develop novel and efficient heuristic-based algorithms leading to near accurate protein tertiary structure models. Knowledge about protein structures is fundamental to our understanding of living systems. The progress on experimental determination of these structures has been extremely limited and remains an open challenge in molecular biology. Computational prediction of protein structures from sequences is emerging as a promising ap ....Searching for near-exact protein models. This project aims to develop novel and efficient heuristic-based algorithms leading to near accurate protein tertiary structure models. Knowledge about protein structures is fundamental to our understanding of living systems. The progress on experimental determination of these structures has been extremely limited and remains an open challenge in molecular biology. Computational prediction of protein structures from sequences is emerging as a promising approach, but its accuracy is far from satisfactory. The software systems developed in this project will be used in structural identification of target proteins in drug design. This will make drug design process more efficient, saving time and cost, potentially saving lives.Read moreRead less
Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and ....Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and techniques. The expected outcomes include novel software, verified by industry partners in real world case studies, ranging from life sciences to hypersonic transport. This should provide significant benefits, including the capacity for Australian industries to access world-class supercomputing technology.Read moreRead less
Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and wo ....Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and worldwide to reliably identify potential privacy risks and issues on their applications. The intended outcomes should endow data controllers with the capability of evidencing their compliance of data protection legislations such as Australia Privacy Act 1988 and EU General Data Protection Regulation (GDPR).Read moreRead less
Tractable topological computing: Escaping the hardness trap. Computational topology is a young and energetic field that uses computers to solve complex geometric problems driven by pure mathematics, and with diverse applications in biology, signal processing and data mining. A major barrier is that many of these problems are thought to be fundamentally and intractably hard. This project aims to defy such barriers for typical real-world inputs by fusing geometric techniques with technologies from ....Tractable topological computing: Escaping the hardness trap. Computational topology is a young and energetic field that uses computers to solve complex geometric problems driven by pure mathematics, and with diverse applications in biology, signal processing and data mining. A major barrier is that many of these problems are thought to be fundamentally and intractably hard. This project aims to defy such barriers for typical real-world inputs by fusing geometric techniques with technologies from the field of parameterised complexity, creating powerful, practical solutions for these problems. It is expected to shed much-needed light on the vast and puzzling gap between theory and practice, and give researchers fast new software tools for large-scale experimentation and cutting-edge computer proofs.Read moreRead less
Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for loca ....Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for localised IoT execution, through microservices executing autonomously on nodes of IoT fog networks. It will develop new techniques for automated discovery of microservices from enterprise systems and the verification of future-state system execution based on current-state behavioural and other properties such as security.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important effici ....Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important efficiency gains, but can introduce complex and error-prone behaviours that cannot be managed using traditional software development approaches. This project will produce better, scalable and mechanised methods for the design and verification of such software which is expected to reduce the prevalence of failures in efficient, modern software.Read moreRead less