Investigation and Development of Parallel Large Scale Record Linkage Techniques. Record linkage aims at matching records of the same entity (like customer or patient) in large (administrative) databases. The outcomes of the proposed research will improve current techniques in terms of efficiency, accuracy and the need for human intervention. Through experimental studies and stochastic modelling the performance of traditional and new methods for data cleaning, standardisation and linkage will be ....Investigation and Development of Parallel Large Scale Record Linkage Techniques. Record linkage aims at matching records of the same entity (like customer or patient) in large (administrative) databases. The outcomes of the proposed research will improve current techniques in terms of efficiency, accuracy and the need for human intervention. Through experimental studies and stochastic modelling the performance of traditional and new methods for data cleaning, standardisation and linkage will be assessed. The effect of the statistical dependency of attribute values will be studied. New methods using clustering for blocking large datasets, and predictive models including interaction terms will be implemented, analysed and evaluated on high-performance computers and office-based PC clusters.
Read moreRead less
Defence Against Phishing Attacks. Australian businesses and citizens are losing millions of dollars in cybercrimes every year. Rural and regional businesses depend on the integrity of their Internet banking service, and yet, cybercriminals are working hard to defraud these users. This project aims to build a reliable defence against phishing attacks which rely on social engineering to steal online identities, using intelligence gathered from the brazen trade of credentials in the public domain.
Techniques to use stereo vision for improving person identification systems based on face recognition. The broad aim of this project is to use three-dimensional information available by processing images from stereo cameras in order to bridge the gap between constrained face recognition systems and viable systems that work well under varying illumination, changes in pose and variations in spectacles, facial hair and attire. Such a system will be useful in passenger verification at airports and a ....Techniques to use stereo vision for improving person identification systems based on face recognition. The broad aim of this project is to use three-dimensional information available by processing images from stereo cameras in order to bridge the gap between constrained face recognition systems and viable systems that work well under varying illumination, changes in pose and variations in spectacles, facial hair and attire. Such a system will be useful in passenger verification at airports and as a component of personal identification systems to counter terrorism. The key to successful face location and recognition is an effective combination of all data - range, luminance and colour - and techniques for this will be the discovered outcomes.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Learning Semi-Naive Bayesian Classifiers from Numeric Data. This project addresses research priority 3, offering frontier technologies. It will deliver better and faster classification technologies that greatly help accomplish many real-world tasks including medical diagnosis, fraud detection, spam filtering and webpage search, where accurate and fast classification is critical to save life, increase efficiency, reduce crime and conserve resources. Hence this project addresses priority 4 as well ....Learning Semi-Naive Bayesian Classifiers from Numeric Data. This project addresses research priority 3, offering frontier technologies. It will deliver better and faster classification technologies that greatly help accomplish many real-world tasks including medical diagnosis, fraud detection, spam filtering and webpage search, where accurate and fast classification is critical to save life, increase efficiency, reduce crime and conserve resources. Hence this project addresses priority 4 as well, better safeguarding Australia from disease and crime. This project will also support a young research group of international standing. It will train the involved researchers to attain a high level of proficiency and excellence in machine learning research and development.Read moreRead less
Robust face detection and recognition for computer-based security surveillance. The research aims at improving the existing and creating new automated face detection and recognition methods by making them invariant, firstly to head pose, orientation, scale and rotation, and then to occlusion, lighting conditions and facial expressions.
A robust face detector will be developed first and then a new face recognition algorithm that continues to learn identity-specific discriminants on-line by co ....Robust face detection and recognition for computer-based security surveillance. The research aims at improving the existing and creating new automated face detection and recognition methods by making them invariant, firstly to head pose, orientation, scale and rotation, and then to occlusion, lighting conditions and facial expressions.
A robust face detector will be developed first and then a new face recognition algorithm that continues to learn identity-specific discriminants on-line by collecting incremental face exemplars. The result of the research will be an algorithm that can improve its performance on-line adapting in a stable learning process each identity model to the correct facial examples.
The research has significant practical implication in visual surveillance increasing the robustness of identification of person identity, state and intent.
Read moreRead less
Resource-bounded adaptive inference of accurate conditional probability estimates from data. This project will develop machine learning techniques with a valuable new capability: the ability to produce estimates of complex conditional probabilities to varying levels of expected accuracy depending upon the constraints of available computational resources. This will provide significant competitive advantage to developers of many types of online application by allowing them to maximise utilisation ....Resource-bounded adaptive inference of accurate conditional probability estimates from data. This project will develop machine learning techniques with a valuable new capability: the ability to produce estimates of complex conditional probabilities to varying levels of expected accuracy depending upon the constraints of available computational resources. This will provide significant competitive advantage to developers of many types of online application by allowing them to maximise utilisation of available computational resources when making inferences from data, together with the flexibility to trade-off accuracy and computing resources during system design. Australia will also benefit by strengthening its machine learning expertise, which is central to many complex and intelligent systems and the booming data mining industry.Read moreRead less
Supporting adaptive, interactive documents. The project will improve comprehensibility of technical material, reduce paper usage, encourage collaborative science, improve the reliability of published science (by allowing post-publication annotation and correction), and improve the accessibility of technical material for readers who are blind or have poor vision. The project also holds considerable potential for supporting Australian companies in the publishing and document processing industries.