Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
The right to be forgotten: GDPR modelling in cross-domain social networks . The project aims to develop a theoretical model and practical mechanisms to address the critical challenge – ‘right to be forgotten’ - raised from the General Data Protection Regulation (GDPR) with minimal compromising of the utility of the data. To achieve the aim, we will design a ‘right to be forgotten’ framework and associated erasure mechanisms that are effective even information is derived from multiple related soc ....The right to be forgotten: GDPR modelling in cross-domain social networks . The project aims to develop a theoretical model and practical mechanisms to address the critical challenge – ‘right to be forgotten’ - raised from the General Data Protection Regulation (GDPR) with minimal compromising of the utility of the data. To achieve the aim, we will design a ‘right to be forgotten’ framework and associated erasure mechanisms that are effective even information is derived from multiple related social networks. The framework will be created by identifying heterogeneous information, modelling individual behaviour patterns and designing erasure policies. The outcomes of the project can be used by the government to provide privacy guarantees to Australian cyberspace and by industry to protect their clients’ privacy.Read moreRead less
Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate ....Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate the privacy concerns of people using online tools that require providing personal information.Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Cybersecurity ethics training simulations for values-based decision-making. This Project will investigate ways to train reflective ethical decision making in cybersecurity management through the design of interactive social simulations. The Project will advance understanding and management of human factors in cybersecurity breaches and the field of serious game design for cybersecurity training by using new techniques for building artificially intelligent virtual agents, drawing on interdiscipli ....Cybersecurity ethics training simulations for values-based decision-making. This Project will investigate ways to train reflective ethical decision making in cybersecurity management through the design of interactive social simulations. The Project will advance understanding and management of human factors in cybersecurity breaches and the field of serious game design for cybersecurity training by using new techniques for building artificially intelligent virtual agents, drawing on interdisciplinary expertise in ethics, artificial intelligence and serious game design. Expected outcomes of the Project include a new framework and technologies for cybersecurity training. This should provide significant benefits through deeper understanding of the ethical impact of new cybertechnologies and training solutions.Read moreRead less
Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and ....Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and an industrial-strength open-source framework that can significantly raise the bar on mobile software quality and security for Android, the dominant smartphone platform accounting a current market share at 87.0% with 2.9 million apps at Google Play in December 2019.Read moreRead less
Smart Personalized Privacy Preserved Information Sharing in Social Networks. This project aims to create a novel and effective method for privacy protection at individual level, which is now a great concern of persons, businesses, and government agencies in this big data age. The project expects to build an automatic smart practical personalized privacy preserving system through removing the fundamental obstacles. The project will significantly advance human knowledge of privacy, and push Austra ....Smart Personalized Privacy Preserved Information Sharing in Social Networks. This project aims to create a novel and effective method for privacy protection at individual level, which is now a great concern of persons, businesses, and government agencies in this big data age. The project expects to build an automatic smart practical personalized privacy preserving system through removing the fundamental obstacles. The project will significantly advance human knowledge of privacy, and push Australia to the front line of the research field, and protect Australia better. Read moreRead less
Automatic Training Data Search and Model Evaluation by Measuring Domain Gap. We aim to investigate computer vision training data and test data, using automatically generated data sets for facial expression recognition and object re-identification. This project expects to quantify and understand the domain gap, the distribution difference between training and test data sets. Expected outcomes of this project are insights on measuring the domain gap, the ability to estimate model performance witho ....Automatic Training Data Search and Model Evaluation by Measuring Domain Gap. We aim to investigate computer vision training data and test data, using automatically generated data sets for facial expression recognition and object re-identification. This project expects to quantify and understand the domain gap, the distribution difference between training and test data sets. Expected outcomes of this project are insights on measuring the domain gap, the ability to estimate model performance without accessing expensive test labels and improvements to system generalisation. This should provide significant benefits for computer vision applications that currently require expensive labelling, and commercial and economic benefits across sectors such as transportation, security and manufacturing.Read moreRead less
AI-Human Empowered Team Decision-Making. This project aims to introduce machine intelligence into human team decision-making using the brain-to-brain synchrony that arises when people cooperate toward achieving a goal. The expected outcomes are models and indicators of this synchrony, and methods to fuse individual human decisions with autonomous machine agents, into collective decisions. This new knowledge is expected to greatly increase our understanding of cooperative decision-making by human ....AI-Human Empowered Team Decision-Making. This project aims to introduce machine intelligence into human team decision-making using the brain-to-brain synchrony that arises when people cooperate toward achieving a goal. The expected outcomes are models and indicators of this synchrony, and methods to fuse individual human decisions with autonomous machine agents, into collective decisions. This new knowledge is expected to greatly increase our understanding of cooperative decision-making by humans and machine agents. The tools produced are expected to provide a computational basis for human-autonomy teaming, the core of Industry 5.0, that software developers and end-users in various industries could further build upon to optimise complex decision-making to benefit humanity.Read moreRead less
Learning kernel-based high-order visual representation for image retrieval. Image retrieval plays a key role in many practical applications. The recent increase of real-world applications calls for higher retrieval accuracy. This project aims to address this issue by exploring advanced visual representation that models the high-order information of image content. This project expects to generate new knowledge in the area of computer vision by developing a novel image retrieval framework. Expecte ....Learning kernel-based high-order visual representation for image retrieval. Image retrieval plays a key role in many practical applications. The recent increase of real-world applications calls for higher retrieval accuracy. This project aims to address this issue by exploring advanced visual representation that models the high-order information of image content. This project expects to generate new knowledge in the area of computer vision by developing a novel image retrieval framework. Expected outcomes include theory development on visual representation and more effective retrieval techniques. This should provide significant benefits, such as improving public information access services, facilitating environmental monitoring, and enhancing smart traffic management.Read moreRead less