Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Semantic Vectorisation: From Bitmaps to Intelligent Representations. The objective of this innovative project is to provide a solution to the open question of representing natural images by semantically rich vector graphics. The challenges are to identify key visual and temporal elements for images and videos, and efficiently decompose the visual data into semantic vector representations that are faithful to original data, compact and editable. The project aims to investigate new bitmap-to-vecto ....Semantic Vectorisation: From Bitmaps to Intelligent Representations. The objective of this innovative project is to provide a solution to the open question of representing natural images by semantically rich vector graphics. The challenges are to identify key visual and temporal elements for images and videos, and efficiently decompose the visual data into semantic vector representations that are faithful to original data, compact and editable. The project aims to investigate new bitmap-to-vector conversion methods. It is expected to develop a framework where semantic labels and hyperlinks can be embedded in visual data automatically. It hopes to pioneer the creation of a web of images where the links are on image/video regions. New image simplification, stylisation, and non-photorealistic rendering methods are expected to be provided.Read moreRead less
Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance provid ....Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance providers can place on health data from wearable devices, and showcase Australian innovation in developing world-class security solutions. The outcome of this project is expected to be the development and demonstration of ultra-lightweight algorithms and mechanisms that execute in wearable devices to safeguard the integrity of the data.Read moreRead less
User-task co-adaptation for effective interactive simulation environments. This project aims to deliver smart interactive simulation environments in which users and simulation tasks work together. This project aims to create novel adaptive algorithms to automatically discover those user and task features that vary together to smartly adapt users and simulation tasks to work together harmoniously, seamlessly and effectively. Interactive simulation environments are the backbone for evaluating conc ....User-task co-adaptation for effective interactive simulation environments. This project aims to deliver smart interactive simulation environments in which users and simulation tasks work together. This project aims to create novel adaptive algorithms to automatically discover those user and task features that vary together to smartly adapt users and simulation tasks to work together harmoniously, seamlessly and effectively. Interactive simulation environments are the backbone for evaluating concepts, designs, products and advanced training systems in industry and government organisations. By bringing the user naturally inside the simulation as a task's component, users can improve their experience while task performance is simultaneously optimised. Intended outcomes include novel dynamic user-task profiling algorithms and new adaptive algorithms for user-task co-adaptation. Practical outcomes may include robust and highly effective simulation environments.Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Automatic Training Data Search and Model Evaluation by Measuring Domain Gap. We aim to investigate computer vision training data and test data, using automatically generated data sets for facial expression recognition and object re-identification. This project expects to quantify and understand the domain gap, the distribution difference between training and test data sets. Expected outcomes of this project are insights on measuring the domain gap, the ability to estimate model performance witho ....Automatic Training Data Search and Model Evaluation by Measuring Domain Gap. We aim to investigate computer vision training data and test data, using automatically generated data sets for facial expression recognition and object re-identification. This project expects to quantify and understand the domain gap, the distribution difference between training and test data sets. Expected outcomes of this project are insights on measuring the domain gap, the ability to estimate model performance without accessing expensive test labels and improvements to system generalisation. This should provide significant benefits for computer vision applications that currently require expensive labelling, and commercial and economic benefits across sectors such as transportation, security and manufacturing.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
Eco-NextNet: An Ecologically-Inspired Adaptive Network Resource Management Framework for a Sustainable Next Generation Mobile Network for Ubiquitous Services. Ubiquitous communications service is the most important element of today's societies. In urban and rural areas of the country as well as at the time of natural disasters such as bushfires, floods, cyclones, it is vital to devise alternative schemes to create and sustain on-demand telecommunications services. In most cases it is not the lac ....Eco-NextNet: An Ecologically-Inspired Adaptive Network Resource Management Framework for a Sustainable Next Generation Mobile Network for Ubiquitous Services. Ubiquitous communications service is the most important element of today's societies. In urban and rural areas of the country as well as at the time of natural disasters such as bushfires, floods, cyclones, it is vital to devise alternative schemes to create and sustain on-demand telecommunications services. In most cases it is not the lack of technology that hinders the implementation of a reliable communications service, but it is the resource allocation. In this project we propose a novel sustainable resource management framework inspired by natural ecological systems to solve the above problem. Upon completion, Australia will be in forefront of technologies related to the management of complex networks.Read moreRead less
Affective sensing technology for the detection and monitoring of depression and melancholia. This project will develop reliable and affective sensing technology and evaluate it as an objective measure of depressive disorders; a leading cause of disability worldwide. Outcomes will significantly support and aid clinicians in their diagnosis and treatment, thus providing a major breakthrough with significant research, healthcare and commercial possibilities.
Generative Visual Pre-training on Unlabelled Big Data. This project aims to develop a generative visual pre-training of large-scale deep neural networks on unlabelled big data. Developing pre-trained visual models that are accurate, robust, and efficient for downstream tasks is a keystone of modern computer vision, but it poses challenges and knowledge gaps to existing unsupervised representation learning. Expected outcomes include new theories and algorithms for unsupervised visual pre-training ....Generative Visual Pre-training on Unlabelled Big Data. This project aims to develop a generative visual pre-training of large-scale deep neural networks on unlabelled big data. Developing pre-trained visual models that are accurate, robust, and efficient for downstream tasks is a keystone of modern computer vision, but it poses challenges and knowledge gaps to existing unsupervised representation learning. Expected outcomes include new theories and algorithms for unsupervised visual pre-training, which are anticipated to deepen our understanding of visual representation and make it easier to build and deploy computer vision applications and services. Examples of benefits include modernising machines in manufacturing and farming with visual intelligence. Read moreRead less