Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastru ....An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity. The outcomes of this project can be directly used in Australian research communities and adopted by industry and government agencies.Read moreRead less
Robust, valid and interpretable deep learning for quantitative imaging. One of the biggest challenges in employing artificial intelligence is the “black-box” nature of the models used. This project aims to improve the effectiveness and trustworthiness of deep learning within quantitative magnetic resonance imaging. Deep learning has great promise in speeding-up complex image processing tasks, but currently suffers from variable data inputs, predictions are not guaranteed to be plausible and it i ....Robust, valid and interpretable deep learning for quantitative imaging. One of the biggest challenges in employing artificial intelligence is the “black-box” nature of the models used. This project aims to improve the effectiveness and trustworthiness of deep learning within quantitative magnetic resonance imaging. Deep learning has great promise in speeding-up complex image processing tasks, but currently suffers from variable data inputs, predictions are not guaranteed to be plausible and it is not clear to the end user how reliable the results are. The outcomes intend to deliver advanced knowledge and capability in artificial intelligence and machine learning that Australia urgently needs to capitalise on bringing deep learning into practical applications delivering economic, commercial and social impact.Read moreRead less
Formal modelling and analysis of software requirements for air traffic management systems for improved integrity assurance. This project will significantly reduce the time and cost of developing software for critical applications such as aviation and air traffic management. As well as improving the trustworthiness of safety-critical computer-based systems, this project will also enable system improvements to be deployed faster and more reliably.
An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used b ....An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used by program analysers to identify faulty or insufficient security checks in the Java Class Library that may lead to the sandbox being bypassed.Read moreRead less
Interaction Mining for Cyberbullying Detection on Social Networks. This project plans to build an interactive mining system to detect cyberbullying on social networks that have a large number of participants and a variety of inputs, including conversation texts, time-variant changes and user profiles. The project is designed to change the existing cyberbullying prevention services from reactive keyword filtering to proactive social interaction pattern mining. The intended outcome will enable the ....Interaction Mining for Cyberbullying Detection on Social Networks. This project plans to build an interactive mining system to detect cyberbullying on social networks that have a large number of participants and a variety of inputs, including conversation texts, time-variant changes and user profiles. The project is designed to change the existing cyberbullying prevention services from reactive keyword filtering to proactive social interaction pattern mining. The intended outcome will enable the early detection and warning of cyberbullying and approach open a new way to discover interaction patterns with a large number of participants over evolving and complex social networks.Read moreRead less
Multi-Modal Dictionary Learning for Smart City Operation and Management. This Project aims to provide new digital asset management tools for city councils to improve city services by utilising new sensing and automated learning technologies for recognising, tracking and auditing of assets. Currently, there are no digital tools available to handle these services. This project proposes new multi-modal sensing and mapping of city asset techniques by building new multi-modal dictionary learning proc ....Multi-Modal Dictionary Learning for Smart City Operation and Management. This Project aims to provide new digital asset management tools for city councils to improve city services by utilising new sensing and automated learning technologies for recognising, tracking and auditing of assets. Currently, there are no digital tools available to handle these services. This project proposes new multi-modal sensing and mapping of city asset techniques by building new multi-modal dictionary learning procedures. The new framework will recognise different conditions of city assets in real-time to make decisions. Expected outcomes of this Project include integration and easy access of assets with unique digital identities to help city councils, governments, and navigation services for real-time asset monitoring.Read moreRead less
Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and ....Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and techniques. The expected outcomes include novel software, verified by industry partners in real world case studies, ranging from life sciences to hypersonic transport. This should provide significant benefits, including the capacity for Australian industries to access world-class supercomputing technology.Read moreRead less
Privacy Preserving Data Sharing in Electronic Health Environment. This project aims to improve access to electronic health data (EHD) while still ensuring patient privacy. EHD can provide important information for medical research and health-care resource allocations. However, data sharing in electronic health environments is challenging because of the privacy concerns of customers. Large-scale unauthorised access from internal staff has been reported in Medicare. This project aims to develop ne ....Privacy Preserving Data Sharing in Electronic Health Environment. This project aims to improve access to electronic health data (EHD) while still ensuring patient privacy. EHD can provide important information for medical research and health-care resource allocations. However, data sharing in electronic health environments is challenging because of the privacy concerns of customers. Large-scale unauthorised access from internal staff has been reported in Medicare. This project aims to develop new privacy-preserving algorithms on EHD database federations, which can provide efficient data access yet block inside attacks. It will significantly improve the data available for medical research, while reducing the cost of EHD system management and providing visualised decision supports to medical staff and the government health resource planners.Read moreRead less
Software debuggers for next generation heterogeneous supercomputers. Supercomputing underpins a wide range of areas of importance to the Australian economy; mining, agriculture, engineering and medical research to name a few. It is of critical importance that software solutions in these areas behave correctly. This project will develop software tools and techniques to help locate errors in such applications.