A hardware accellerated platform for high-fidelity, high speed simulation of infrared scenes. Missiles present a major military and terrorist threat to aircraft and ships. A possible method to detect them is an infrared imaging system which is sensitive to a missile's spectrally unique rocket propulsion exhaust. It is both dangerous and expensive to conduct field trials; so simulation is used extensively. This project aims to use high performance computing to accelerate the slowest parts of the ....A hardware accellerated platform for high-fidelity, high speed simulation of infrared scenes. Missiles present a major military and terrorist threat to aircraft and ships. A possible method to detect them is an infrared imaging system which is sensitive to a missile's spectrally unique rocket propulsion exhaust. It is both dangerous and expensive to conduct field trials; so simulation is used extensively. This project aims to use high performance computing to accelerate the slowest parts of the industrial partner's existing simulations: the generation of simulated infrared images.
This project will improve the competitiveness of the manufacturer of infrared threat and warning systems and provide research training in an area of high performance computing.
Read moreRead less
Advancing Medical Image Analysis through High Performance Heterogeneous Computing, Numerical Simulation, and Novel Human Computer Interfaces. This project will link Australian researchers with a major multi-national IT company. The engagement of world-class personnel from Microsoft will provide unprecedented opportunities for graduate students to experience research in both an academic and an industrial setting. The participation of Microsoft product division offers the potential to transform th ....Advancing Medical Image Analysis through High Performance Heterogeneous Computing, Numerical Simulation, and Novel Human Computer Interfaces. This project will link Australian researchers with a major multi-national IT company. The engagement of world-class personnel from Microsoft will provide unprecedented opportunities for graduate students to experience research in both an academic and an industrial setting. The participation of Microsoft product division offers the potential to transform the outcomes of this project into widely-used software solutions. The project will pave the way for more widespread and reliable evidenced-based computer-aided diagnosis and image-guided treatment. It will produce well-trained and sought-after graduates and research associates with extensive inter-disciplinary knowledge of medical image analysis and high-performance computing.Read moreRead less
Special Research Initiatives - Grant ID: SR0567334
Funder
Australian Research Council
Funding Amount
$125,748.00
Summary
A Grid-Enabled National Archive of Nanostructural Imagery (GRANI). The Nanostructural Analysis Network Organization (NANO) is an Australian Major National Research Facility that provides access to a grid of advanced microscopic instruments for the nanostructural analysis of both physical materials and biological systems. The aim of this initiative is to provide the NANO community with a set of common, interoperable tools and services to enable more efficient, cost-effective storage, management, ....A Grid-Enabled National Archive of Nanostructural Imagery (GRANI). The Nanostructural Analysis Network Organization (NANO) is an Australian Major National Research Facility that provides access to a grid of advanced microscopic instruments for the nanostructural analysis of both physical materials and biological systems. The aim of this initiative is to provide the NANO community with a set of common, interoperable tools and services to enable more efficient, cost-effective storage, management, analysis and sharing of generated microscopic images, video and analytical data. The significance of the proposed middleware is that it will improve collaboration and reduce duplication across many disciplines, through a shareable, distributed national scientific image/video database.Read moreRead less
Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a unive ....Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a universal data structure, which unfortunately makes it hard to separate trusted code from untrusted user-provided data. This project intends to develop novel program analysis tools and string constraint solvers, and employ these tools to support sophisticated automated reasoning about string manipulating software.Read moreRead less
Human interaction with context-aware computing systems. Context-aware systems can provide seamless support of IT applications in a variety of technologies and therefore can improve: (i) work performance and adoption of IT in many industries; and (ii) the quality of life through better support for health services, education, and everyday tasks. Currently proposed solutions for context-aware systems fail to deliver systems which are usable for non-IT professionals. The proposed project will show h ....Human interaction with context-aware computing systems. Context-aware systems can provide seamless support of IT applications in a variety of technologies and therefore can improve: (i) work performance and adoption of IT in many industries; and (ii) the quality of life through better support for health services, education, and everyday tasks. Currently proposed solutions for context-aware systems fail to deliver systems which are usable for non-IT professionals. The proposed project will show how to design context-aware systems that are usable and whose autonomic decisions can be trusted. Additional benefits include increased scientific competitiveness of Australia, strengthened collaboration with international research institutions, and high quality graduates (PhDs, Masters, Honours).Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE0347131
Funder
Australian Research Council
Funding Amount
$115,490.00
Summary
Intelligent Computer System to Access Information Directly from the Brain Using High Resolution Electroencephalography and Repetitive Transcranial Magnetic Stimulation. The ambitious aim of this project is to create a novel intelligent computer system which accesss information from the brain. To do this we use repetitive Transcranial Magnetic Stimulation and high resolution Electroencephalography.
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not o ....Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not only practical solutions for protecting sensitive data recorded in blockchain but also crucial techniques to make the blockchain accountable for practical applications with enhanced security. This project provides significant benefits, such as building a trusted environment for sensitive transactions in the digital economy.Read moreRead less
Domain-specific visual languages for big data analytics applications. This project aims to invent domain-specific visual languages and support model-driven engineering based infrastructure so domain experts can specify, generate and apply complex data analytics and visualisation techniques. Many domains, including intelligent transport, business intelligence, and population health, need more effective “big data” analytics and visualisation. A challenge is to combine detailed domain knowledge – w ....Domain-specific visual languages for big data analytics applications. This project aims to invent domain-specific visual languages and support model-driven engineering based infrastructure so domain experts can specify, generate and apply complex data analytics and visualisation techniques. Many domains, including intelligent transport, business intelligence, and population health, need more effective “big data” analytics and visualisation. A challenge is to combine detailed domain knowledge – what the data means and what it can be used for – with sophisticated, scalable computational techniques to mine and present information from the huge volumes of raw data. This project is expected to improve productivity and quality of big data analytics and visualisation in critical domains.Read moreRead less
Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider a ....Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider attacks. The outcomes of the project will incorporate new security constraints and policies raised by emerging technologies to enable better protection of sensitive information. Read moreRead less