Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Towards Generalisable and Unbiased Dynamic Recommender Systems. This project aims to develop the foundations, including models, methodology, and algorithms for building generalisable and unbiased dynamic recommender systems to facilitate intelligent decision-making, prompt contextualised and personalised strategic plans, and support context-aware action recourse. To ensure that fundamental principles, such as fairness and transparency, are respected, a set of algorithms and techniques are propos ....Towards Generalisable and Unbiased Dynamic Recommender Systems. This project aims to develop the foundations, including models, methodology, and algorithms for building generalisable and unbiased dynamic recommender systems to facilitate intelligent decision-making, prompt contextualised and personalised strategic plans, and support context-aware action recourse. To ensure that fundamental principles, such as fairness and transparency, are respected, a set of algorithms and techniques are proposed to develop recommender systems in a more responsible manner. The result of this project will not only maintain Australia's leadership in this frontier research area, but also serve as an excellent vehicle for the education and training of Australia's next generation of scholars and engineers.Read moreRead less
Cohort discovery and activity mining for policy impact prediction. Cohort discovery and activity mining for policy impact prediction. This project aims to develop an intelligent systematic framework to predict policy impacts on Australian patients, by discovering inherent patient cohorts and assessing the impact of the policies on these cohorts. The proposed methods lay the theoretical foundations for building intelligent automated tools for policy assessment. Expected outcomes are data-driven p ....Cohort discovery and activity mining for policy impact prediction. Cohort discovery and activity mining for policy impact prediction. This project aims to develop an intelligent systematic framework to predict policy impacts on Australian patients, by discovering inherent patient cohorts and assessing the impact of the policies on these cohorts. The proposed methods lay the theoretical foundations for building intelligent automated tools for policy assessment. Expected outcomes are data-driven patient group discovery, which could more precisely identify the patient cohorts most likely to benefit from a specific policy; and a model to predict the efficacy of policy options, which could increase the sustainability of the national health system by enabling smarter, more efficient policy decision-making.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Legal and social dynamics of eBook lending in Australia’s public libraries. Legal and social dynamics of eBook lending in Australia’s public libraries. This project aims to develop an evidence base of quantitative and qualitative data about how eBooks are used in libraries. EBooks have tremendous beneficial potential, particularly for Australians in remote areas and those with impaired mobility or vision. However, libraries’ rights to acquire and lend them are more restricted than for physical b ....Legal and social dynamics of eBook lending in Australia’s public libraries. Legal and social dynamics of eBook lending in Australia’s public libraries. This project aims to develop an evidence base of quantitative and qualitative data about how eBooks are used in libraries. EBooks have tremendous beneficial potential, particularly for Australians in remote areas and those with impaired mobility or vision. However, libraries’ rights to acquire and lend them are more restricted than for physical books. Libraries and legal, social and data science researchers will investigate eBook lending practices and understand their social impacts. The project will identify ways of reforming policy, law, and practice to help libraries fulfil their public interest missions. This project is expected to enable libraries to extract more value from existing public investments.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Interaction Mining for Cyberbullying Detection on Social Networks. This project plans to build an interactive mining system to detect cyberbullying on social networks that have a large number of participants and a variety of inputs, including conversation texts, time-variant changes and user profiles. The project is designed to change the existing cyberbullying prevention services from reactive keyword filtering to proactive social interaction pattern mining. The intended outcome will enable the ....Interaction Mining for Cyberbullying Detection on Social Networks. This project plans to build an interactive mining system to detect cyberbullying on social networks that have a large number of participants and a variety of inputs, including conversation texts, time-variant changes and user profiles. The project is designed to change the existing cyberbullying prevention services from reactive keyword filtering to proactive social interaction pattern mining. The intended outcome will enable the early detection and warning of cyberbullying and approach open a new way to discover interaction patterns with a large number of participants over evolving and complex social networks.Read moreRead less
Sewer Monitoring and Management in the Digital Era. Overflow, flooding, corrosion, and odorous emissions are persistent issues for utilities managing sewers. Current sewer maintenance is reactive, and focuses on solving problems in local networks, despite that optimal solutions require a system-wide approach. Capitalising on recent development in IoT sensors, wireless transmission, and machine learning, this multidisciplinary project aims to develop digital-twin supported data analytics for proa ....Sewer Monitoring and Management in the Digital Era. Overflow, flooding, corrosion, and odorous emissions are persistent issues for utilities managing sewers. Current sewer maintenance is reactive, and focuses on solving problems in local networks, despite that optimal solutions require a system-wide approach. Capitalising on recent development in IoT sensors, wireless transmission, and machine learning, this multidisciplinary project aims to develop digital-twin supported data analytics for proactive sewer management including network-wide real-time control. The project aims to generate significant social, environmental and economic benefits by enabling utilities to better protect public and environmental health, reduce sewer odour and greenhouse gas emissions, and extend sewer asset life.Read moreRead less