Responsible modelling respecting privacy, data quality, and green computing. With the unprecedented growing impact of data on science, the economy and society, there comes the need for responsible data science practices which are accountable for the social good. This project aims to investigate the challenging problem of how to provide responsible data management, spanning across privacy-aware data exploration, resilient modelling to cope with imperfect data, and efficient model architectures fo ....Responsible modelling respecting privacy, data quality, and green computing. With the unprecedented growing impact of data on science, the economy and society, there comes the need for responsible data science practices which are accountable for the social good. This project aims to investigate the challenging problem of how to provide responsible data management, spanning across privacy-aware data exploration, resilient modelling to cope with imperfect data, and efficient model architectures for resource-constrained environments. This will be achieved by developing theories and techniques for complex real-world multi-modal data retrieval throughout the data life-cycle. The expected outcomes will significantly contribute to building capability in emerging technologies in the context of responsible data science. Read moreRead less
Efficient and secure data integrity auditing on cloud. Data auditing presents a promising way for verifying user data integrity on cloud, i.e., whether user privacy sensitive data such as identity information on cloud is modified or lost. Current auditing approaches lack sufficient efficiency and security. This results in that they cannot provide timely warning and precaution on potential data loss threats. This project aims to systematically investigate this significant challenge and expects to ....Efficient and secure data integrity auditing on cloud. Data auditing presents a promising way for verifying user data integrity on cloud, i.e., whether user privacy sensitive data such as identity information on cloud is modified or lost. Current auditing approaches lack sufficient efficiency and security. This results in that they cannot provide timely warning and precaution on potential data loss threats. This project aims to systematically investigate this significant challenge and expects to establish innovative research and solutions for enabling efficient and secure data integrity auditing on cloud. The project outcomes will help to safeguard Australian community in fast-growing cyber world, and benefit to fast-growing user privacy sensitive data hosting and applications on cloud.Read moreRead less
Attribution of Machine-generated Code for Accountability. Machine-generated (or neural) code is usually produced by AI tools to speed up software development. However, such codes have recently raised serious security and privacy concerns. This project aims to attribute these codes to their generative models for accountability purposes. In the process, a series of new techniques are developed to differentiate between the codes generated by different models. The outcomes include analysis of neural ....Attribution of Machine-generated Code for Accountability. Machine-generated (or neural) code is usually produced by AI tools to speed up software development. However, such codes have recently raised serious security and privacy concerns. This project aims to attribute these codes to their generative models for accountability purposes. In the process, a series of new techniques are developed to differentiate between the codes generated by different models. The outcomes include analysis of neural code fingerprints, classification of neural codes, and theories to verify the correctness of code attribution. These will provide significant benefits, ranging from copyright protection to privacy preservation. This project is timely since currently the software community is pervasively using neural codes.Read moreRead less
Reconciliation strategies for continuous variable quantum key distribution. This project aims to advance a novel key distribution method, called quantum key distribution, which distributes secure keys using the quantum state of optical channels. Key distribution is a foundational part of data security, allowing digital keys to be securely exchanged between two or more parties, before they are used to protect and share information. The expected outcome is new rateless error correction codes desi ....Reconciliation strategies for continuous variable quantum key distribution. This project aims to advance a novel key distribution method, called quantum key distribution, which distributes secure keys using the quantum state of optical channels. Key distribution is a foundational part of data security, allowing digital keys to be securely exchanged between two or more parties, before they are used to protect and share information. The expected outcome is new rateless error correction codes designed specifically to implement quantum key distribution over long distances. Quantum key distribution is beneficial for ultra-secure communications as it avoids the vulnerability to weak random numbers and quantum-computing brute force attacks that currently threated the security of data protected by existing methods. Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE230101058
Funder
Australian Research Council
Funding Amount
$437,254.00
Summary
Glass-box Deep Machine Perception for Trustworthy Artificial Intelligence. Explainability and Transparency are the key values for development and deployment of Artificial Intelligence (AI) in Australia’s AI Ethics Framework for industry and governments. This project aims to build new tools to make the central technology of AI - deep learning - transparent and explainable. Its expected outputs are novel theory-driven algorithms and unconventional foundational blocks for deep learning that will al ....Glass-box Deep Machine Perception for Trustworthy Artificial Intelligence. Explainability and Transparency are the key values for development and deployment of Artificial Intelligence (AI) in Australia’s AI Ethics Framework for industry and governments. This project aims to build new tools to make the central technology of AI - deep learning - transparent and explainable. Its expected outputs are novel theory-driven algorithms and unconventional foundational blocks for deep learning that will allow humans to clearly interpret the reasoning process of this technology, which is currently not possible. It is expected to significantly advance our knowledge in machine intelligence and perception. Due to their fundamental nature, the project outcomes are likely to benefit industry and scientific frontiers alike.Read moreRead less
High Quality-of-Experience Real-time Video for Smart Online Shopping. This project aims to develop high quality-of-experience real-time video systems for smart shopping applications by devising new deep-neural-network-enhanced video delivery schemes. It will generate new knowledge of combined AI and network solutions to achieve high-quality and low-latency real-time video delivery, addressing unsatisfactory user experience intrinsically caused by network delay and bandwidth. Fundamental principl ....High Quality-of-Experience Real-time Video for Smart Online Shopping. This project aims to develop high quality-of-experience real-time video systems for smart shopping applications by devising new deep-neural-network-enhanced video delivery schemes. It will generate new knowledge of combined AI and network solutions to achieve high-quality and low-latency real-time video delivery, addressing unsatisfactory user experience intrinsically caused by network delay and bandwidth. Fundamental principles and an all-in-one platform will be developed to address research problems and the industrial partner’s practical problems. It will significantly benefit all shopping businesses and their customers in Australia, as well as all other video-related services (e.g., online education, video conferencing, etc.).Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE230100001
Funder
Australian Research Council
Funding Amount
$424,064.00
Summary
Regulations in Privacy-Preserving Blockchain Systems. This project aims to develop an integrated regulatory paradigm for privacy-preserving blockchain. This project expects to reduce cybercrimes and illegal transactions in blockchain and provide solutions for the regulation concerns raised in the national blockchain roadmap, using interdisciplinary approaches and new primitives. Expected outcomes of this project include providing versatile regulation services covering the whole lifetime of trans ....Regulations in Privacy-Preserving Blockchain Systems. This project aims to develop an integrated regulatory paradigm for privacy-preserving blockchain. This project expects to reduce cybercrimes and illegal transactions in blockchain and provide solutions for the regulation concerns raised in the national blockchain roadmap, using interdisciplinary approaches and new primitives. Expected outcomes of this project include providing versatile regulation services covering the whole lifetime of transactions while maintaining transaction privacy and user anonymity. This should provide significant benefits to the economy by reducing the financial loss caused by blockchain abuse worldwide ($76 billion per year) and promoting Australia’s blockchain ecosystem (grow to AU$68.4 billion by 2030). Read moreRead less
Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend agains ....Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend against cyberattacks for both organisations and individuals in Australia and beyond, theory development in graph theory, refined graph neural network models and improved graph transfer learning algorithms.Read moreRead less
Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and wo ....Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and worldwide to reliably identify potential privacy risks and issues on their applications. The intended outcomes should endow data controllers with the capability of evidencing their compliance of data protection legislations such as Australia Privacy Act 1988 and EU General Data Protection Regulation (GDPR).Read moreRead less
Deep Learning Attacks and Active Defences: A Cybersecurity Perspective. The belief that deep learning technology is imperative for economic development, military control, and strategic competitiveness has accelerated its development across the globe. However, experience has revealed the disappointing fact that deep learning models are vulnerable to a range of security attacks. Hence, a series of methodologies and defence strategies will be devised that make deep learning systems robust to these ....Deep Learning Attacks and Active Defences: A Cybersecurity Perspective. The belief that deep learning technology is imperative for economic development, military control, and strategic competitiveness has accelerated its development across the globe. However, experience has revealed the disappointing fact that deep learning models are vulnerable to a range of security attacks. Hence, a series of methodologies and defence strategies will be devised that make deep learning systems robust to these attacks. The methodologies require analysing attack lifecycles to identify them in their early stages. With this knowledge, active defence methods and forensic strategies can be developed to ensure efficient defences and prevent further attacks. Moreover, the outputs will be generalisable to most deep learning services.Read moreRead less