Towards Generalisable and Unbiased Dynamic Recommender Systems. This project aims to develop the foundations, including models, methodology, and algorithms for building generalisable and unbiased dynamic recommender systems to facilitate intelligent decision-making, prompt contextualised and personalised strategic plans, and support context-aware action recourse. To ensure that fundamental principles, such as fairness and transparency, are respected, a set of algorithms and techniques are propos ....Towards Generalisable and Unbiased Dynamic Recommender Systems. This project aims to develop the foundations, including models, methodology, and algorithms for building generalisable and unbiased dynamic recommender systems to facilitate intelligent decision-making, prompt contextualised and personalised strategic plans, and support context-aware action recourse. To ensure that fundamental principles, such as fairness and transparency, are respected, a set of algorithms and techniques are proposed to develop recommender systems in a more responsible manner. The result of this project will not only maintain Australia's leadership in this frontier research area, but also serve as an excellent vehicle for the education and training of Australia's next generation of scholars and engineers.Read moreRead less
Mitigating the Influence of Social Bots in Heterogeneous Social Networks. This project aims to mitigate the influence of social bots in dynamic and constantly changing social networks. Social bots can spread misinformation, manipulate public opinion, and compromise privacy and security. This project will use advanced algorithms to detect and neutralize the impact of social bots, improving the integrity and accuracy of information on social media. The expected outcomes include the development of ....Mitigating the Influence of Social Bots in Heterogeneous Social Networks. This project aims to mitigate the influence of social bots in dynamic and constantly changing social networks. Social bots can spread misinformation, manipulate public opinion, and compromise privacy and security. This project will use advanced algorithms to detect and neutralize the impact of social bots, improving the integrity and accuracy of information on social media. The expected outcomes include the development of a robust system for identifying and mitigating social bot influence, and the reduction of harmful content and misinformation on social media. The benefits of this project include a more trustworthy and secure social media environment, protection of individuals and organizations from malicious activities.Read moreRead less
Trust-Oriented Data Analytics in Online Social Networks. Trust-oriented data analytics is essential in online social networks for reducing deceitful interactions and enhancing trust between users. This project aims to systematically devise innovative solutions by considering rich social contextual information as an important source of trust. The expected outcomes of this project include innovative solutions from a fundamental perspective to the challenges of context-aware trust propagation, trus ....Trust-Oriented Data Analytics in Online Social Networks. Trust-oriented data analytics is essential in online social networks for reducing deceitful interactions and enhancing trust between users. This project aims to systematically devise innovative solutions by considering rich social contextual information as an important source of trust. The expected outcomes of this project include innovative solutions from a fundamental perspective to the challenges of context-aware trust propagation, trust network searching/matching, and trustworthy/malicious user prediction in online social networks. This project is significant as it will advance the knowledge base for enabling a trustworthy social networking environment, benefiting billions of Australian and worldwide online social network users.Read moreRead less
Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less
Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend agains ....Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend against cyberattacks for both organisations and individuals in Australia and beyond, theory development in graph theory, refined graph neural network models and improved graph transfer learning algorithms.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Information-theoretic secure communications via caching. This project aims to address the cybersecurity problem of securing telecommunication networks to prevent data leakage. Current widely-adopted data-encryption approaches to secure communications will be broken with large-scale quantum computers, and existing information-theoretic approaches rely on the channel quality of the network. To circumvent these risks, this project proposes a new information security approach using information cache ....Information-theoretic secure communications via caching. This project aims to address the cybersecurity problem of securing telecommunication networks to prevent data leakage. Current widely-adopted data-encryption approaches to secure communications will be broken with large-scale quantum computers, and existing information-theoretic approaches rely on the channel quality of the network. To circumvent these risks, this project proposes a new information security approach using information cached at devices to camouflage data. The project will future-proof secure communication systems against large-scale quantum computers, which threaten current encryption approaches. This should ensure that data transmitted over communication networks can never be revealed to interceptors or hackers, even in public WiFi.Read moreRead less
Security Services for Stream-Oriented and Multicast-Based Communication. Multicast communication over lossy networks is becoming the basic for a growing number of aplications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. This project is concerned with two major security problems of multicast communications: authentication and secrecy. The goal of this project is to: (1) deve ....Security Services for Stream-Oriented and Multicast-Based Communication. Multicast communication over lossy networks is becoming the basic for a growing number of aplications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. This project is concerned with two major security problems of multicast communications: authentication and secrecy. The goal of this project is to: (1) develop a framework for analysis and evaluation of security services for multicast communication; (2) design efficient algorithms and protocols for securing emerging applications that are multicast-based and/or stream-oriented.
Read moreRead less
Secure Multi-Party Computation. The outcomes of this project will enhance information protection which is crucial fore rapidly growing e-commerce service and strengthen national safeguard capability of our digital systems and infrastructure. It will contribute to maintain Australia's leading position in the telecommunication and information industries. It will contribute to the quality of our culture by protecting individual's privacy and providing security for sensitive data.