Interaction Mining for Cyberbullying Detection on Social Networks. This project plans to build an interactive mining system to detect cyberbullying on social networks that have a large number of participants and a variety of inputs, including conversation texts, time-variant changes and user profiles. The project is designed to change the existing cyberbullying prevention services from reactive keyword filtering to proactive social interaction pattern mining. The intended outcome will enable the ....Interaction Mining for Cyberbullying Detection on Social Networks. This project plans to build an interactive mining system to detect cyberbullying on social networks that have a large number of participants and a variety of inputs, including conversation texts, time-variant changes and user profiles. The project is designed to change the existing cyberbullying prevention services from reactive keyword filtering to proactive social interaction pattern mining. The intended outcome will enable the early detection and warning of cyberbullying and approach open a new way to discover interaction patterns with a large number of participants over evolving and complex social networks.Read moreRead less
Artificial intelligence meets wireless sensor networks: filling the gaps between sensors using spatial reasoning. Monitoring potential disaster regions and integrating available information with expert knowledge can prevent disasters and save many lives. The outcome of our project is one of the key components for intelligent systems that can autonomously monitor the environment, make the correct inferences and issue appropriate warnings and recommendations.
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Integrated Planning for Uncertainty-Centric Pilot Assistance Systems. This project aims to deliver a novel pilot assistance system to improve the viability, speed and safety of Helicopter Emergency Medical Services (HEMS) and Search and Rescue (SAR) missions. It will advance fundamental algorithms for probabilistic planning in partially observable scenarios to form the core technology of a pilot assistance system that accounts the various types of uncertainty faced by pilots in a typical HEMS/S ....Integrated Planning for Uncertainty-Centric Pilot Assistance Systems. This project aims to deliver a novel pilot assistance system to improve the viability, speed and safety of Helicopter Emergency Medical Services (HEMS) and Search and Rescue (SAR) missions. It will advance fundamental algorithms for probabilistic planning in partially observable scenarios to form the core technology of a pilot assistance system that accounts the various types of uncertainty faced by pilots in a typical HEMS/SAR missions. It will exploit recent advances in Partially Observable Markov Decision Processes (POMDPs) to recommend robust, safe, and pilot-aware mission and manoeuvring strategies to make HEMS/SAR operations safer for helicopter crews, and more effective for those in need of the service.Read moreRead less
Robust AI Planning for Hybrid Systems. Automated planning, a core area of Artificial Intelligence, can effectively deal with the automatic synthesis of optimised action strategies for discrete system models. Extending the reach of planning to hybrid discrete/continuous systems, under exogenous uncertainty, is a widely open problem which this project will address. This will enable the proactive, and therefore more effective, management of microgrids and other cyber-physical systems, based on fore ....Robust AI Planning for Hybrid Systems. Automated planning, a core area of Artificial Intelligence, can effectively deal with the automatic synthesis of optimised action strategies for discrete system models. Extending the reach of planning to hybrid discrete/continuous systems, under exogenous uncertainty, is a widely open problem which this project will address. This will enable the proactive, and therefore more effective, management of microgrids and other cyber-physical systems, based on forecast information.Read moreRead less
Thermo-mechanical interactive atlas of basin evolution. We propose to create a thermo-mechanical interactive atlas of basin evolution as a desktop geodynamic modelling resource for exploration geologists. The atlas will allow the user to iteratively run our 2D/3D basin modelling software ELLIPSIS to alter model parameters until they match observed basin geometries or thermal history. Model iteration will be based on interactive user evaluation of model outputs and genetic algorithms, which pr ....Thermo-mechanical interactive atlas of basin evolution. We propose to create a thermo-mechanical interactive atlas of basin evolution as a desktop geodynamic modelling resource for exploration geologists. The atlas will allow the user to iteratively run our 2D/3D basin modelling software ELLIPSIS to alter model parameters until they match observed basin geometries or thermal history. Model iteration will be based on interactive user evaluation of model outputs and genetic algorithms, which progressively modify the solution set by mimicking the evolutionary behavior of biological systems (selection, cross-over and mutation), until an acceptable result is achieved. The interactive atlas will be applied to Australian and international case studies.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Using data mining methods to remove uncertainties in sensor data streams. This project will develop key techniques for removing uncertainties in sensor data streams and thus improve the monitoring quality of sensor networks. The expected outcomes will benefit Australia by enabling improved, lower-cost monitoring of natural resources and management of stock raising.
Democratisation of Deep Learning: Neural Architecture Search at Low Cost. The need to manually design Deep Learning-based Neural Networks (DNNs) limits their usage to AI experts and hinders the exploitation of their true potential more broadly, e.g., in farming, humanities. We aim to replace this tedious process through novel AI methods capable of generating DNNs that can perform significantly better and at a lower computational cost than manually designed DNNs. We further expand this idea to so ....Democratisation of Deep Learning: Neural Architecture Search at Low Cost. The need to manually design Deep Learning-based Neural Networks (DNNs) limits their usage to AI experts and hinders the exploitation of their true potential more broadly, e.g., in farming, humanities. We aim to replace this tedious process through novel AI methods capable of generating DNNs that can perform significantly better and at a lower computational cost than manually designed DNNs. We further expand this idea to solve complex real-world problems with both labelled and unlabelled data found in various applications including energy and climate change. The expected outcomes include the novel AI methods, highly trained AI researchers and a number of critical applications that will bring significant benefits to Australia and the world.Read moreRead less