MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Finding and exploiting interesting paths in multidimensional information spaces. This project will invent a new approach for searching within a large complex information space, finding interesting paths between points within the space, visualising the results, and supporting rich, human-centric user interaction with queries and results. This project will embody these techniques in a novel, internet-scale framework to support rapid development of large path search and visualisation applications. ....Finding and exploiting interesting paths in multidimensional information spaces. This project will invent a new approach for searching within a large complex information space, finding interesting paths between points within the space, visualising the results, and supporting rich, human-centric user interaction with queries and results. This project will embody these techniques in a novel, internet-scale framework to support rapid development of large path search and visualisation applications. Evaluation will be via development of several exemplar applications. The techniques and framework will be applicable to a broad range of economically important problems in areas as diverse as health, travel, scientific publication search, product marketing and software engineering.Read moreRead less
Semantic Vectorisation: From Bitmaps to Intelligent Representations. The objective of this innovative project is to provide a solution to the open question of representing natural images by semantically rich vector graphics. The challenges are to identify key visual and temporal elements for images and videos, and efficiently decompose the visual data into semantic vector representations that are faithful to original data, compact and editable. The project aims to investigate new bitmap-to-vecto ....Semantic Vectorisation: From Bitmaps to Intelligent Representations. The objective of this innovative project is to provide a solution to the open question of representing natural images by semantically rich vector graphics. The challenges are to identify key visual and temporal elements for images and videos, and efficiently decompose the visual data into semantic vector representations that are faithful to original data, compact and editable. The project aims to investigate new bitmap-to-vector conversion methods. It is expected to develop a framework where semantic labels and hyperlinks can be embedded in visual data automatically. It hopes to pioneer the creation of a web of images where the links are on image/video regions. New image simplification, stylisation, and non-photorealistic rendering methods are expected to be provided.Read moreRead less
DNA methylation in insect social evolution. This project will investigate the evolutionary relationship between DNA methylation and the advanced sociality displayed by bees, ants and wasps. The project will map DNA methylation across the social insects and test whether it has coevolved with sociality. It will also determine how a vital social cue, the queen pheromone, influences the worker methylome. Finally, it will apply quantitative genetic and methylomic methods to wild insects, revealing pa ....DNA methylation in insect social evolution. This project will investigate the evolutionary relationship between DNA methylation and the advanced sociality displayed by bees, ants and wasps. The project will map DNA methylation across the social insects and test whether it has coevolved with sociality. It will also determine how a vital social cue, the queen pheromone, influences the worker methylome. Finally, it will apply quantitative genetic and methylomic methods to wild insects, revealing patterns of selection and inheritance in epigenetic and phenotypic traits. By combining genomic and evolutionary methods, the project will advance the ongoing debate about the importance of methylation to sociality and extreme phenotypic plasticity. It will contribute to a quantum leap in our understanding of DNA methylation and sociobiology and mark the first application of quantitative genetics to wild insects.Read moreRead less
Nonlinear Signal Processing: Optimisation and Tracking on Manifolds. Most hi-tech electronic devices must process signals. A mobile phone, for example, must encode, transmit, decode and receive voice signals. This project will use specialised mathematical theories applied in novel ways to advance the theoretical foundations of signal processing and develop better signal processing algorithms for practical applications. Companies with access to better signal processing algorithms have an edge ov ....Nonlinear Signal Processing: Optimisation and Tracking on Manifolds. Most hi-tech electronic devices must process signals. A mobile phone, for example, must encode, transmit, decode and receive voice signals. This project will use specialised mathematical theories applied in novel ways to advance the theoretical foundations of signal processing and develop better signal processing algorithms for practical applications. Companies with access to better signal processing algorithms have an edge over their competitors, and consumers benefit too from better and more advanced products.Read moreRead less
Mathematical, logical and computational foundations of hybrid control systems, and their application to design and synthesis problems in control engineering. Hybrid control systems are mathematical models of heterogeneous systems consisting of digital computer components interacting in real-time with continuous physical processes. Their many engineering applications include air traffic control, medical technology and automated transport. Motivated by such safety-critical and high-confidence appl ....Mathematical, logical and computational foundations of hybrid control systems, and their application to design and synthesis problems in control engineering. Hybrid control systems are mathematical models of heterogeneous systems consisting of digital computer components interacting in real-time with continuous physical processes. Their many engineering applications include air traffic control, medical technology and automated transport. Motivated by such safety-critical and high-confidence applications, the project aims to develop a unified framework of mathematical logics adequate to formally represent and reason about the structure, behaviour, and properties of hybrid control systems, and use this to develop methodologies for automatically synthesising hybrid control programs that are provably correct with respect to their specifications. Other outcomes include prototype software implementations of hybrid controller design tools.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Location-Based Personalisation in Mobile Commerce (M-Commerce). M-commerce, though playing an important role in future competitiveness of Australia, suffers a low user demand. While location-based services have taken off in Europe, they are still at their infancy in Australia. In terms of IT access, Australia is ranked lower than many Asian countries. Our work gains an understanding of users' concerns and expectations of location-based services, which leads to better application designs and thus ....Location-Based Personalisation in Mobile Commerce (M-Commerce). M-commerce, though playing an important role in future competitiveness of Australia, suffers a low user demand. While location-based services have taken off in Europe, they are still at their infancy in Australia. In terms of IT access, Australia is ranked lower than many Asian countries. Our work gains an understanding of users' concerns and expectations of location-based services, which leads to better application designs and thus a wider adoption. An examination of users' attitude towards personalised content and concerns about data privacy provides insights to Australian legislation in relation to telemarketing and data-driven marketing. National benefits will stem from a balance between telemarketing efficiency and users' benefits.Read moreRead less
Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important effici ....Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important efficiency gains, but can introduce complex and error-prone behaviours that cannot be managed using traditional software development approaches. This project will produce better, scalable and mechanised methods for the design and verification of such software which is expected to reduce the prevalence of failures in efficient, modern software.Read moreRead less