Linkage Infrastructure, Equipment And Facilities - Grant ID: LE240100131
Funder
Australian Research Council
Funding Amount
$539,000.00
Summary
Federated Omniverse Facilities for Smart Digital Futures. A world-first trans-disciplinary, -domain, and -institutional smart 3D omniverse R&D ecosystem AuVerse will be built in NSW, affiliated with Queensland, and accessible to academia and industry. AuVerse will support cloud-based, reality-virtuality-fused, immersive, interactive and secure future-oriented digital design, development, training and society. In the new era of digital innovation and paradigm shift, AuVerse will substantially boo ....Federated Omniverse Facilities for Smart Digital Futures. A world-first trans-disciplinary, -domain, and -institutional smart 3D omniverse R&D ecosystem AuVerse will be built in NSW, affiliated with Queensland, and accessible to academia and industry. AuVerse will support cloud-based, reality-virtuality-fused, immersive, interactive and secure future-oriented digital design, development, training and society. In the new era of digital innovation and paradigm shift, AuVerse will substantially boost Australia’s pivotal research leadership and business competitiveness in nurturing new-generation, collaborative and transformative digital R&D and talent pipeline. It will enable large-scale strategic business innovation and transformation including smart manufacturing and Industry 4.0.Read moreRead less
Towards Generalisable and Unbiased Dynamic Recommender Systems. This project aims to develop the foundations, including models, methodology, and algorithms for building generalisable and unbiased dynamic recommender systems to facilitate intelligent decision-making, prompt contextualised and personalised strategic plans, and support context-aware action recourse. To ensure that fundamental principles, such as fairness and transparency, are respected, a set of algorithms and techniques are propos ....Towards Generalisable and Unbiased Dynamic Recommender Systems. This project aims to develop the foundations, including models, methodology, and algorithms for building generalisable and unbiased dynamic recommender systems to facilitate intelligent decision-making, prompt contextualised and personalised strategic plans, and support context-aware action recourse. To ensure that fundamental principles, such as fairness and transparency, are respected, a set of algorithms and techniques are proposed to develop recommender systems in a more responsible manner. The result of this project will not only maintain Australia's leadership in this frontier research area, but also serve as an excellent vehicle for the education and training of Australia's next generation of scholars and engineers.Read moreRead less
A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
A Data-Centric Mobile Edge Platform for Resilient Logistics & Supply Chain. This project aims to develop a secure mobile edge computing platform for resilient logistic and supply chain management. It consists of easy-used functions that help businesses realise low latency, high reliability, low cost, and high security in their logistics and supply chain system. To cope with the vast generated application data, we invent new data replication, placement, and deduplication techniques to optimise th ....A Data-Centric Mobile Edge Platform for Resilient Logistics & Supply Chain. This project aims to develop a secure mobile edge computing platform for resilient logistic and supply chain management. It consists of easy-used functions that help businesses realise low latency, high reliability, low cost, and high security in their logistics and supply chain system. To cope with the vast generated application data, we invent new data replication, placement, and deduplication techniques to optimise the mobile edge computing platform from the computation, storage, and network aspects. The invented mobile edge computing platform will enable more intelligent business applications for various industries, e.g., IT, manufacturing, and media, to appear, thus benefiting both the economy of Australia.Read moreRead less
Situated Anomaly Detection in an Open Environment. This project aims to investigate situated anomaly detection in an open environment. Existing anomaly detection techniques follow the setting of conventional machine learning and discover anomalies from a set of collected data. In contrast, this project proposes to develop the next-generation of anomaly detection algorithms by learning from interactions with an open environment, which enables the discovery of new anomalies and the early detection ....Situated Anomaly Detection in an Open Environment. This project aims to investigate situated anomaly detection in an open environment. Existing anomaly detection techniques follow the setting of conventional machine learning and discover anomalies from a set of collected data. In contrast, this project proposes to develop the next-generation of anomaly detection algorithms by learning from interactions with an open environment, which enables the discovery of new anomalies and the early detection of anomalies. The established theories and developed algorithms will advance frontier technologies in machine intelligence. The success of the project will contribute to a wide range of real applications in cybersecurity, defence and finance, bringing massive social and economic benefits. Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Mitigating the Influence of Social Bots in Heterogeneous Social Networks. This project aims to mitigate the influence of social bots in dynamic and constantly changing social networks. Social bots can spread misinformation, manipulate public opinion, and compromise privacy and security. This project will use advanced algorithms to detect and neutralize the impact of social bots, improving the integrity and accuracy of information on social media. The expected outcomes include the development of ....Mitigating the Influence of Social Bots in Heterogeneous Social Networks. This project aims to mitigate the influence of social bots in dynamic and constantly changing social networks. Social bots can spread misinformation, manipulate public opinion, and compromise privacy and security. This project will use advanced algorithms to detect and neutralize the impact of social bots, improving the integrity and accuracy of information on social media. The expected outcomes include the development of a robust system for identifying and mitigating social bot influence, and the reduction of harmful content and misinformation on social media. The benefits of this project include a more trustworthy and secure social media environment, protection of individuals and organizations from malicious activities.Read moreRead less
Trust-Oriented Data Analytics in Online Social Networks. Trust-oriented data analytics is essential in online social networks for reducing deceitful interactions and enhancing trust between users. This project aims to systematically devise innovative solutions by considering rich social contextual information as an important source of trust. The expected outcomes of this project include innovative solutions from a fundamental perspective to the challenges of context-aware trust propagation, trus ....Trust-Oriented Data Analytics in Online Social Networks. Trust-oriented data analytics is essential in online social networks for reducing deceitful interactions and enhancing trust between users. This project aims to systematically devise innovative solutions by considering rich social contextual information as an important source of trust. The expected outcomes of this project include innovative solutions from a fundamental perspective to the challenges of context-aware trust propagation, trust network searching/matching, and trustworthy/malicious user prediction in online social networks. This project is significant as it will advance the knowledge base for enabling a trustworthy social networking environment, benefiting billions of Australian and worldwide online social network users.Read moreRead less
Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less
Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend agains ....Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend against cyberattacks for both organisations and individuals in Australia and beyond, theory development in graph theory, refined graph neural network models and improved graph transfer learning algorithms.Read moreRead less