Deep Adder Networks on Edge Devices. This project aims to empower edge devices with intelligence by developing advanced deep neural networks that address the conflict between the high resource requirements of deep learning and the generally inadequate performance of the edge. Multiplication has been the dominant type of operation in deep learning, though the addition is known to be much cheaper. This project expects to yield theories and algorithms that allow deep neural networks consisting of n ....Deep Adder Networks on Edge Devices. This project aims to empower edge devices with intelligence by developing advanced deep neural networks that address the conflict between the high resource requirements of deep learning and the generally inadequate performance of the edge. Multiplication has been the dominant type of operation in deep learning, though the addition is known to be much cheaper. This project expects to yield theories and algorithms that allow deep neural networks consisting of nearly pure additions to fulfil the requisites of accuracy, robustness, calibration and generalisation in real-world computer vision tasks. The success of this project will benefit deep learning-based products on smartphones or robots in health and cybersecurity.Read moreRead less
Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. Th ....Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. The success of this project will further enhance the international competitiveness of Australian research in this important field and will benefit any Australian industry and business where software systems are deeply-rooted, such as transportation, smart homes, medical devices, defence and finance.Read moreRead less
Situated Anomaly Detection in an Open Environment. This project aims to investigate situated anomaly detection in an open environment. Existing anomaly detection techniques follow the setting of conventional machine learning and discover anomalies from a set of collected data. In contrast, this project proposes to develop the next-generation of anomaly detection algorithms by learning from interactions with an open environment, which enables the discovery of new anomalies and the early detection ....Situated Anomaly Detection in an Open Environment. This project aims to investigate situated anomaly detection in an open environment. Existing anomaly detection techniques follow the setting of conventional machine learning and discover anomalies from a set of collected data. In contrast, this project proposes to develop the next-generation of anomaly detection algorithms by learning from interactions with an open environment, which enables the discovery of new anomalies and the early detection of anomalies. The established theories and developed algorithms will advance frontier technologies in machine intelligence. The success of the project will contribute to a wide range of real applications in cybersecurity, defence and finance, bringing massive social and economic benefits. Read moreRead less