Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. ....Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. This project tackles new and urgent challenges in edge data storage, manipulation, maintenance, and protection with optimisation, distributed consensus, graph analytics, and cryptography techniques. The outcomes should build the pillars of edge caching systems and promote Australia's 5G software innovations.Read moreRead less
Combating Fake News on Social Media: From Early Detection to Intervention. The project aims to detect fake news early to minimise the negative impact of false information. This project expects to devise novel solutions to address technical challenges for detection of fake news with scarce signals. Expected outcomes of this project include a suite of data mining and machine learning models for identification of fake news from the social media stream, prediction of user propagation of false infor ....Combating Fake News on Social Media: From Early Detection to Intervention. The project aims to detect fake news early to minimise the negative impact of false information. This project expects to devise novel solutions to address technical challenges for detection of fake news with scarce signals. Expected outcomes of this project include a suite of data mining and machine learning models for identification of fake news from the social media stream, prediction of user propagation of false information as well as recommendation of truthful news to counteract adversarial fake news. This project should generate technologies that enhance the integrity of the online echo system and benefit media providers and online population within Australia and across the world. Read moreRead less
Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that ....Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that are required for the 5G enabled environment. The construction of new AI-based tools and testing facilities as well as the generation of new knowledge in the field of privacy preservation and collaboration between universities are expected outcomes of this project. Read moreRead less
Learning human activities through low cost, unobtrusive RFID technology. A rapidly growing aged population presents many challenges to Australia's health and aged care services. The outcomes of this project will help aging Australians live in their own homes longer, with greater independence and safety by providing an automated, unobtrusive means for health professionals to monitor activity and intervene as required.
Opinion Analysis on Objects in Social Networks. This project seeks to provide a new integrated interactive data mining approach to analysing opinions on social networks, enabling organisations and individuals to make informed decisions based on qualitative as well as quantitative analysis. Social networks are fast becoming an important platform for understanding social opinions about events, organisations, products or services. Through an interactive analysis of social opinion, people can make b ....Opinion Analysis on Objects in Social Networks. This project seeks to provide a new integrated interactive data mining approach to analysing opinions on social networks, enabling organisations and individuals to make informed decisions based on qualitative as well as quantitative analysis. Social networks are fast becoming an important platform for understanding social opinions about events, organisations, products or services. Through an interactive analysis of social opinion, people can make better decisions. An ‘object’ in social networks refers to anything people talk about. This project aims to design and implement new social media mining algorithms to analyse the opinions that people express about such objects in terms of who, what, when and where.Read moreRead less
Targeted Graph Embedding for Anomaly Detection in Large-scale Networks. This project aims to tackle the challenging problem of anomaly detection in large-scale networks by leveraging graph embedding techniques. It expects to deliver a series of innovative graph embedding algorithms targeting optimised anomaly detection. By addressing under-developed research challenges, such as the versatile types of anomalies and lack of anomaly labels, the established theories and devised methodologies will ad ....Targeted Graph Embedding for Anomaly Detection in Large-scale Networks. This project aims to tackle the challenging problem of anomaly detection in large-scale networks by leveraging graph embedding techniques. It expects to deliver a series of innovative graph embedding algorithms targeting optimised anomaly detection. By addressing under-developed research challenges, such as the versatile types of anomalies and lack of anomaly labels, the established theories and devised methodologies will advance frontier technologies in both graph anomaly detection and graph representation learning. By uncovering anomalies with high efficiency and accuracy, this project will contribute to multiple real applications from fake review detection to financial fraud identification, bringing both social and economic benefits.Read moreRead less
Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry an ....Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry and society. The outcomes of this research project will result in secure and trustworthy computing technologies that will enable secure e-commerce applications and on-line services and trusted interactions between users over the Internet. Read moreRead less
Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create ....Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create new directions in the research of privacy-preserving distributed data mining and are applicable to Australian counter-terrorism and homeland defence in detecting bio-terrorism from privacy sensitive data.Read moreRead less
Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private da ....Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private data warehouse query, and are applicable to stock exchange data warehouses and pharmaceutical data warehouses, where the user is reluctant to reveal his query to the data warehouse operator.Read moreRead less
Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcom ....Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcomes of this research will result in secure and trustworthy computing technologies that will enable the design of trust enhanced secure applications and trusted platforms, which will help to achieve secure e-commerce applications and on-line services, and trusted interactions between users over the Internet.Read moreRead less