Space-based space surveillance with robust computer vision algorithms. Space-based space surveillance with robust computer vision algorithms. This project aims to develop computer vision algorithms to detect man-made objects in space. These algorithms function on nanosatellite platforms, enabling space-based space surveillance. This technology is expected to provide always-on monitoring of the Earth's orbit to enhance existing defence infrastructure and protect vital space assets, including comm ....Space-based space surveillance with robust computer vision algorithms. Space-based space surveillance with robust computer vision algorithms. This project aims to develop computer vision algorithms to detect man-made objects in space. These algorithms function on nanosatellite platforms, enabling space-based space surveillance. This technology is expected to provide always-on monitoring of the Earth's orbit to enhance existing defence infrastructure and protect vital space assets, including communications and navigational satellites, in Earth’s orbit from collisions and covert sabotage. Increased space use by government and civilian agencies opens up opportunities for the space industry. This project is expected to develop Australia’s space surveillance capabilities, protect space assets and capture a growing market.Read moreRead less
Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to devel ....Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to develop new ways designing bio-cryptosystems that provide strong security strength. The project will bring new body of knowledge into this field and place Australia in the forefront of this research, and also result in strengthened security of IT infrastructure and systems for industries.Read moreRead less
A theoretical framework for practical partial fingerprint identification. Fingerprints captured from a crime scene are often partial and poor quality which makes it difficult to identify the criminal suspects from large databases. This project will find mathematical models which can estimate the missing information located in the blank areas of a partial fingerprint and effectively identify it.
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
ARC Financial Integrity Research Network. The integrity of the financial system is constantly under stress because of the development of ever more complex financial instruments, structures and strategies, and the associated research technologies that continues to accelerate worldwide. FIRN's vision is to harness the considerable strengths of Australia's internationally renowned finance, accounting and economics researchers into a research agenda to address issues concerning the integrity of the ....ARC Financial Integrity Research Network. The integrity of the financial system is constantly under stress because of the development of ever more complex financial instruments, structures and strategies, and the associated research technologies that continues to accelerate worldwide. FIRN's vision is to harness the considerable strengths of Australia's internationally renowned finance, accounting and economics researchers into a research agenda to address issues concerning the integrity of the financial system. It will enable Australian research in this area to match the scale and impact of similar research in other major international financial centres, and play an essential role in placing Australia among the world's leaders in financial markets related research.Read moreRead less
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE130100156
Funder
Australian Research Council
Funding Amount
$210,000.00
Summary
Computational infrastructure for machine learning in computer vision. The many trillions of images stored on computers around the world, including more than 100 billion on Facebook alone, represent exactly the information needed to develop artificial vision. All we need do is extract it. This project will develop the computational infrastructure required to allow Australian researchers to achieve this goal.
Infill Developments: Project HOME (Housing Outcomes Metrics and Evaluation). The project plans to improve housing outcomes by evaluating housing design in the rapidly growing infill multi-residential sector, which often experiences design quality problems. Set across four global cities, the project aims to use a unique combination of design and social science methods to analyse good design and how this is produced and experienced. It is expected that this will deliver greater definition of and e ....Infill Developments: Project HOME (Housing Outcomes Metrics and Evaluation). The project plans to improve housing outcomes by evaluating housing design in the rapidly growing infill multi-residential sector, which often experiences design quality problems. Set across four global cities, the project aims to use a unique combination of design and social science methods to analyse good design and how this is produced and experienced. It is expected that this will deliver greater definition of and evidence for ‘good’ design as experienced through the real lives of Australian households. Outcomes should include robust design evaluation methods and transition strategies for cities, allowing city decision-makers to improve housing design for many people in Australian cities.Read moreRead less
Stochastic Analysis with a View to Applications in Financial Risk Processes. Recent decades have seen explosive growth in applications of probability theory and statistics to the modelling of risk in finance and insurance. An intensive theoretical investigation into passage time and other problems for Levy and other continuous time processes will be applied to financial risk analyses. Related investigations will involve perpetuities and stochastic volatility models for price series. Outcomes ....Stochastic Analysis with a View to Applications in Financial Risk Processes. Recent decades have seen explosive growth in applications of probability theory and statistics to the modelling of risk in finance and insurance. An intensive theoretical investigation into passage time and other problems for Levy and other continuous time processes will be applied to financial risk analyses. Related investigations will involve perpetuities and stochastic volatility models for price series. Outcomes will include the development of new theory in probability and statistics, the initiation and reinforcement of collaborative ties with major international research figures, and the fostering of contacts with the finance industry.Read moreRead less