Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. ....Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. This project tackles new and urgent challenges in edge data storage, manipulation, maintenance, and protection with optimisation, distributed consensus, graph analytics, and cryptography techniques. The outcomes should build the pillars of edge caching systems and promote Australia's 5G software innovations.Read moreRead less
Service orientated architectures in management of IT infrastructures. Through the utilisation of the proposed framework for building rich business service registries, Australian companies will be able to take full advantage of service oriented architectures in constructing and managing their IT infrastructure in a way that is not currently possible. Such a registry will be able to provide a coherent view of an enterprise's services and resources, and an effective way to co-relate and utilise the ....Service orientated architectures in management of IT infrastructures. Through the utilisation of the proposed framework for building rich business service registries, Australian companies will be able to take full advantage of service oriented architectures in constructing and managing their IT infrastructure in a way that is not currently possible. Such a registry will be able to provide a coherent view of an enterprise's services and resources, and an effective way to co-relate and utilise them, in a changing environment. The development of the framework will also further cement Australia's leading market position in providing service registries to enterprises world-wide, enhance Australia's international research reputation and provide an excellent training environment for young researchers.Read moreRead less
Understanding the impact of enterprise system use on system performance. To optimise organizational benefits, resource intensive enterprise systems must be appropriately used by all user cohorts. This study investigates the impact of system-use on system success. System-use patterns derived for all key user cohorts across the lifecycle phases will create management matrices to assist organizations maximise system-use.
Architecture-based Open Network Management Systems for Next Generation Telecommunications. We aim to develop an open, policy-based architecture for the management of next generation telecommunications networks. It is expected that a comprehensive Open Architecture-based Telecommunications Management Network (AuTuMN) framework could be put in place to manage the network based on centralised policies and roles rather than having to handle individual users and elements. Significantly, the scient ....Architecture-based Open Network Management Systems for Next Generation Telecommunications. We aim to develop an open, policy-based architecture for the management of next generation telecommunications networks. It is expected that a comprehensive Open Architecture-based Telecommunications Management Network (AuTuMN) framework could be put in place to manage the network based on centralised policies and roles rather than having to handle individual users and elements. Significantly, the scientific knowledge of open systems and network management systems for next generation networks will be extended.Read moreRead less
Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry an ....Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry and society. The outcomes of this research project will result in secure and trustworthy computing technologies that will enable secure e-commerce applications and on-line services and trusted interactions between users over the Internet. Read moreRead less
Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcom ....Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcomes of this research will result in secure and trustworthy computing technologies that will enable the design of trust enhanced secure applications and trusted platforms, which will help to achieve secure e-commerce applications and on-line services, and trusted interactions between users over the Internet.Read moreRead less
Streaming video media using semantic information. Delivering video over the Internet has posted a big problem. Video files are extremely big and need hours or even tens of hours to download. This is too long to wait for the content. Much research has been attempted over low-level structures such as coding, buffer, protocol, agent and server. These techniques are either not scalable or impractical. This project aims to collaborate with CyberView on developing a high-level scheme of streaming vide ....Streaming video media using semantic information. Delivering video over the Internet has posted a big problem. Video files are extremely big and need hours or even tens of hours to download. This is too long to wait for the content. Much research has been attempted over low-level structures such as coding, buffer, protocol, agent and server. These techniques are either not scalable or impractical. This project aims to collaborate with CyberView on developing a high-level scheme of streaming video using semantic information. It breaks videos into shots and allows semantic browsing of the content. It also introduces intelligent agents with various behaviours.Read moreRead less
Managing quality of experience delivery in new generation telecommunications networks with e-negotiation. New generation telecommunications networks are required to support increasingly demanding services, including interactive multimedia and conferencing. The success of these networks will rely on the users' perception of their quality of experience. The management of these networks will rely on the ability of informed decision making that competes effectively for limited resources in such a ....Managing quality of experience delivery in new generation telecommunications networks with e-negotiation. New generation telecommunications networks are required to support increasingly demanding services, including interactive multimedia and conferencing. The success of these networks will rely on the users' perception of their quality of experience. The management of these networks will rely on the ability of informed decision making that competes effectively for limited resources in such a highly dynamic environment. This project will design information distribution strategies and smart decision making agents that negotiate a user's quality of experience using market mechanisms. Designs from this project will be trialled and validated in the partner's commercial networks.Read moreRead less
Smart communications network management: Delivering bundled interdependent services across internetworked heterogeneous domains. Sophisticated communications network management (data, voice, video) is crucial to the global economy. The field is worth several billion dollars per annum. This project will generate expertise that addresses and solves an important problem in communications management, will enable Australia to use communications networks more effectively, and will advance communicatio ....Smart communications network management: Delivering bundled interdependent services across internetworked heterogeneous domains. Sophisticated communications network management (data, voice, video) is crucial to the global economy. The field is worth several billion dollars per annum. This project will generate expertise that addresses and solves an important problem in communications management, will enable Australia to use communications networks more effectively, and will advance communications technology. Read moreRead less