Space-based space surveillance with robust computer vision algorithms. Space-based space surveillance with robust computer vision algorithms. This project aims to develop computer vision algorithms to detect man-made objects in space. These algorithms function on nanosatellite platforms, enabling space-based space surveillance. This technology is expected to provide always-on monitoring of the Earth's orbit to enhance existing defence infrastructure and protect vital space assets, including comm ....Space-based space surveillance with robust computer vision algorithms. Space-based space surveillance with robust computer vision algorithms. This project aims to develop computer vision algorithms to detect man-made objects in space. These algorithms function on nanosatellite platforms, enabling space-based space surveillance. This technology is expected to provide always-on monitoring of the Earth's orbit to enhance existing defence infrastructure and protect vital space assets, including communications and navigational satellites, in Earth’s orbit from collisions and covert sabotage. Increased space use by government and civilian agencies opens up opportunities for the space industry. This project is expected to develop Australia’s space surveillance capabilities, protect space assets and capture a growing market.Read moreRead less
Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to devel ....Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to develop new ways designing bio-cryptosystems that provide strong security strength. The project will bring new body of knowledge into this field and place Australia in the forefront of this research, and also result in strengthened security of IT infrastructure and systems for industries.Read moreRead less
A theoretical framework for practical partial fingerprint identification. Fingerprints captured from a crime scene are often partial and poor quality which makes it difficult to identify the criminal suspects from large databases. This project will find mathematical models which can estimate the missing information located in the blank areas of a partial fingerprint and effectively identify it.
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE130100156
Funder
Australian Research Council
Funding Amount
$210,000.00
Summary
Computational infrastructure for machine learning in computer vision. The many trillions of images stored on computers around the world, including more than 100 billion on Facebook alone, represent exactly the information needed to develop artificial vision. All we need do is extract it. This project will develop the computational infrastructure required to allow Australian researchers to achieve this goal.
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE160100090
Funder
Australian Research Council
Funding Amount
$250,000.00
Summary
Computational infrastructure for developing deep machine learning models. Computational infrastructure for developing deep machine learning models:
The computational infrastructure for developing deep machine learning models aims to enable new developments in machine learning of deep neural network models by providing the specialised computing necessary to train and evaluate the networks. In the last three years, deep networks have smashed previous performance ceilings for tasks such as object ....Computational infrastructure for developing deep machine learning models. Computational infrastructure for developing deep machine learning models:
The computational infrastructure for developing deep machine learning models aims to enable new developments in machine learning of deep neural network models by providing the specialised computing necessary to train and evaluate the networks. In the last three years, deep networks have smashed previous performance ceilings for tasks such as object recognition in images, speech recognition and automatic translation, bringing the prospect of machine intelligence closer than ever. Modern machine learning techniques have had huge impact in the last decade in fields such as robotics, computer vision and data analytics. The facility would enable Australian researchers to develop, learn and apply deep networks to problems of national importance in robotic vision and big data analytics. Read moreRead less
ARC Centre for Perceptive & Intelligent Machines in Complex Environments. The Centre for Perceptive and Intelligent Machines in Complex Environments will perform fundamental research into and construct reliable large-scale systems of networked sensors, computational intelligence, mobile robots, and knowledge sources to support a large variety of critical human tasks, including surveillance/ security (eg. borders/airports/homes), health care support (eg. smart houses/ health condition monitoring, ....ARC Centre for Perceptive & Intelligent Machines in Complex Environments. The Centre for Perceptive and Intelligent Machines in Complex Environments will perform fundamental research into and construct reliable large-scale systems of networked sensors, computational intelligence, mobile robots, and knowledge sources to support a large variety of critical human tasks, including surveillance/ security (eg. borders/airports/homes), health care support (eg. smart houses/ health condition monitoring, semi autonomous wheelchairs), and civil disaster support (eg. fighting bushfires, looking for people in rubble) always keeping people in the loop so that strong human/ machine cooperative ventures can achieve what neither human or machines could accomplish independently.Read moreRead less
Industrial Transformation Research Hubs - Grant ID: IH210100030
Funder
Australian Research Council
Funding Amount
$5,000,000.00
Summary
ARC Research Hub in Intelligent Robotic Systems for Real-Time Asset Management. This hub aims to transform the way assets and infrastructure are managed by developing new capabilities for intelligent robotic systems for inspection, monitoring, and maintenance. The hub expects to generate new knowledge in robotics and associated fields including sensing, planning, data processing, and machine learning using interdisciplinary approaches and tight collaboration between academia and industry. The ex ....ARC Research Hub in Intelligent Robotic Systems for Real-Time Asset Management. This hub aims to transform the way assets and infrastructure are managed by developing new capabilities for intelligent robotic systems for inspection, monitoring, and maintenance. The hub expects to generate new knowledge in robotics and associated fields including sensing, planning, data processing, and machine learning using interdisciplinary approaches and tight collaboration between academia and industry. The expected outcomes are robots with the ability to autonomously collect data for integration into a digital twin that provides a real-time representation of the true state of a physical asset. The benefits include both improved asset management and establishing Australia as a leading manufacturer of advanced robotic systems.Read moreRead less