Embracing Changes for Responsive Video-sharing Services. Video-sharing platforms are a critical information channel for the public. Increasing scale and shifts in user base, with Generation Z now as the dominant user, have resulted in an unprecedented amount of ubiquitous changes in the content and users of these platforms which greatly challenges the responsiveness and quality of the services provided. This project aims to design innovative algorithms to effectively predict and leverage changes ....Embracing Changes for Responsive Video-sharing Services. Video-sharing platforms are a critical information channel for the public. Increasing scale and shifts in user base, with Generation Z now as the dominant user, have resulted in an unprecedented amount of ubiquitous changes in the content and users of these platforms which greatly challenges the responsiveness and quality of the services provided. This project aims to design innovative algorithms to effectively predict and leverage changes, optimise the value of changes, and extract insights from changes for diverse downstream applications of video-sharing platforms. The expected outcomes will create new-generation representation learning techniques, and provide practical tools to amplify the socioeconomic values of video-sharing platforms.Read moreRead less
Efficient and Secure Word-Based Stream Ciphers for Wireless Communications. Wireless networks are increasingly being used for communication, and to manage and control Australia's critical infrastructure. However, current methods of securing wireless networks are flawed, putting the country's economy, environment, and citizens at risk. The most reliable method for protecting wireless communications requires secure and efficient encryption algorithms. However, flaws have been found in most algo ....Efficient and Secure Word-Based Stream Ciphers for Wireless Communications. Wireless networks are increasingly being used for communication, and to manage and control Australia's critical infrastructure. However, current methods of securing wireless networks are flawed, putting the country's economy, environment, and citizens at risk. The most reliable method for protecting wireless communications requires secure and efficient encryption algorithms. However, flaws have been found in most algorithms proposed to date. This project will examine existing algorithms and attacks to determine design criteria for secure encryption algorithms for use in a wireless environment. An algorithm which meets these criteria and can be implemented efficiently in hardware and software will be proposed.Read moreRead less
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
Temporal Graph Mining for Anomaly Detection. This project aims to develop new technologies to detect anomalous patterns from dynamic networked data. Anomalies in networked data are commonly seen but are often hidden within the complex interconnections of large-scale, heterogeneous, and dynamic data, rendering existing detection methods ineffective. This project expects to design novel temporal graph mining techniques to compress large-scale networks, unify heterogeneous information, and enable l ....Temporal Graph Mining for Anomaly Detection. This project aims to develop new technologies to detect anomalous patterns from dynamic networked data. Anomalies in networked data are commonly seen but are often hidden within the complex interconnections of large-scale, heterogeneous, and dynamic data, rendering existing detection methods ineffective. This project expects to design novel temporal graph mining techniques to compress large-scale networks, unify heterogeneous information, and enable label-efficient anomaly detection. The performance will be assessed in social and business networks, with significant benefits to governments and businesses in many critical applications, including cyberbullying detection, malicious account detection, and cyber-attack detection.Read moreRead less
Responsible modelling respecting privacy, data quality, and green computing. With the unprecedented growing impact of data on science, the economy and society, there comes the need for responsible data science practices which are accountable for the social good. This project aims to investigate the challenging problem of how to provide responsible data management, spanning across privacy-aware data exploration, resilient modelling to cope with imperfect data, and efficient model architectures fo ....Responsible modelling respecting privacy, data quality, and green computing. With the unprecedented growing impact of data on science, the economy and society, there comes the need for responsible data science practices which are accountable for the social good. This project aims to investigate the challenging problem of how to provide responsible data management, spanning across privacy-aware data exploration, resilient modelling to cope with imperfect data, and efficient model architectures for resource-constrained environments. This will be achieved by developing theories and techniques for complex real-world multi-modal data retrieval throughout the data life-cycle. The expected outcomes will significantly contribute to building capability in emerging technologies in the context of responsible data science. Read moreRead less
EEG Based Global Network Models and Platform for Brain States Assessment. This project aims to generate new knowledge and tools in global brain network modelling and deep learning technology. It addresses the significant issues in higher brain function state assessment using brain signal EEG. The project applies global brain networks to model brain dynamical activities as a whole, and assesses higher brain functions such as consciousness, fatigue, sleep, stress and depression, and their step by ....EEG Based Global Network Models and Platform for Brain States Assessment. This project aims to generate new knowledge and tools in global brain network modelling and deep learning technology. It addresses the significant issues in higher brain function state assessment using brain signal EEG. The project applies global brain networks to model brain dynamical activities as a whole, and assesses higher brain functions such as consciousness, fatigue, sleep, stress and depression, and their step by step evolution in real-time using innovative deep learning approaches. The expected outcomes are optimised brain network models and a platform technology. The intended results can be applied to greatly improve the sleep quality and productivity of general community, and the safety of workplace and transportation.Read moreRead less
Low-cost Sensing Methods and Hybrid Learning Models. This project aims to revolutionise the theory and practice of sensing and monitoring by developing novel Artificial Intelligence and Internet of Things technologies. This project expects to generate new knowledge in the area of Artificial Intelligence of Things by combining sensing, machine learning, and big data analytics. Expected outcomes of this project include novel low-cost sensing methods and new hybrid machine learning models for predi ....Low-cost Sensing Methods and Hybrid Learning Models. This project aims to revolutionise the theory and practice of sensing and monitoring by developing novel Artificial Intelligence and Internet of Things technologies. This project expects to generate new knowledge in the area of Artificial Intelligence of Things by combining sensing, machine learning, and big data analytics. Expected outcomes of this project include novel low-cost sensing methods and new hybrid machine learning models for predictive sensory data analytics. This should provide significant benefits, such as substantially reduced operating and service costs and improved accuracy for real-time monitoring in the fields where cheap-to-implement and easy-to-service monitoring systems over large geographical areas are imperative.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less