MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE210100107
Funder
Australian Research Council
Funding Amount
$672,000.00
Summary
The next generation fast radio burst detector for Australia. This project intends to provide a next-generation fast radio burst detector for the Australian Square Kilometre Array Pathfinder. The project expects to both transform our understanding of fast radio bursts, enigmatic flashes of radio waves of unknown origin, but also use the bursts as tools to study the cosmic web of matter that resides in intergalactic space. To do so, the project aims to deliver a more sensitive detection system ca ....The next generation fast radio burst detector for Australia. This project intends to provide a next-generation fast radio burst detector for the Australian Square Kilometre Array Pathfinder. The project expects to both transform our understanding of fast radio bursts, enigmatic flashes of radio waves of unknown origin, but also use the bursts as tools to study the cosmic web of matter that resides in intergalactic space. To do so, the project aims to deliver a more sensitive detection system capable of localising a large sample of fast radio bursts to greater distances, found commensal to other observations. This should provide significant benefit, including the resolutions to key open astrophysical questions and improved scientific outcomes for transient searches with the Square Kilometre Array.Read moreRead less
On-site and comprehensive technology for chemical weapons, toxins and drugs. This project aims to evaluate and validate broad capabilities of advanced chemical profiling using benchtop and portable gas chromatography–mass spectrometry for forensic applications. Establishing guidelines for sampling various matrices, key performance measures, and improving chemical and residue identification for drug profiling in clandestine laboratories and public venues, chemical warfare agents, and chemical tox ....On-site and comprehensive technology for chemical weapons, toxins and drugs. This project aims to evaluate and validate broad capabilities of advanced chemical profiling using benchtop and portable gas chromatography–mass spectrometry for forensic applications. Establishing guidelines for sampling various matrices, key performance measures, and improving chemical and residue identification for drug profiling in clandestine laboratories and public venues, chemical warfare agents, and chemical toxins is expected. Anticipated outcomes for project partners in defence and policing include detailed knowledge of sample and residue composition and on-site assessment of chemical risks with immediate feedback. Benefits should include improved community and security services safety by enhanced detection of harmful substances.Read moreRead less
The impact of environmental toxicants on the fertility of female animals. This study aims to address a problem of national significance; determining the impact of commonly used environmental toxicants (pesticides) on the fertility and health of female animals, both agricultural and native. This project expects to generate new knowledge in the fields of ovarian biology, female fertility and toxicology by using a combination of mouse and marsupial animal models. The expected outcomes include the e ....The impact of environmental toxicants on the fertility of female animals. This study aims to address a problem of national significance; determining the impact of commonly used environmental toxicants (pesticides) on the fertility and health of female animals, both agricultural and native. This project expects to generate new knowledge in the fields of ovarian biology, female fertility and toxicology by using a combination of mouse and marsupial animal models. The expected outcomes include the establishment of interdisciplinary collaborations and provision of world-class training for staff and students in the field of reproductive biology. This project should provide significant benefits, such as improved chemical management in livestock production and the development of marsupial conservation action plans.Read moreRead less
Electrical properties of human dendrites. This project aims to determine the electrical properties of dendrites in human neurons. Dendrites are the primary site of synaptic input to neurons and their electrical properties play a key role in information processing in the brain. While we know much about the electrical properties of dendrites in other species, primarily rodents, little is known about the electrical properties of human dendrites. This project aims to address this gap in knowledge fo ....Electrical properties of human dendrites. This project aims to determine the electrical properties of dendrites in human neurons. Dendrites are the primary site of synaptic input to neurons and their electrical properties play a key role in information processing in the brain. While we know much about the electrical properties of dendrites in other species, primarily rodents, little is known about the electrical properties of human dendrites. This project aims to address this gap in knowledge for the first time. The results obtained will shed light on the mechanisms the brain uses to process information, and therefore will bring us a step closer to truly understanding ourselves.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less