A Data-Centric Mobile Edge Platform for Resilient Logistics & Supply Chain. This project aims to develop a secure mobile edge computing platform for resilient logistic and supply chain management. It consists of easy-used functions that help businesses realise low latency, high reliability, low cost, and high security in their logistics and supply chain system. To cope with the vast generated application data, we invent new data replication, placement, and deduplication techniques to optimise th ....A Data-Centric Mobile Edge Platform for Resilient Logistics & Supply Chain. This project aims to develop a secure mobile edge computing platform for resilient logistic and supply chain management. It consists of easy-used functions that help businesses realise low latency, high reliability, low cost, and high security in their logistics and supply chain system. To cope with the vast generated application data, we invent new data replication, placement, and deduplication techniques to optimise the mobile edge computing platform from the computation, storage, and network aspects. The invented mobile edge computing platform will enable more intelligent business applications for various industries, e.g., IT, manufacturing, and media, to appear, thus benefiting both the economy of Australia.Read moreRead less
Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend agains ....Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend against cyberattacks for both organisations and individuals in Australia and beyond, theory development in graph theory, refined graph neural network models and improved graph transfer learning algorithms.Read moreRead less
Low-cost Sensing Methods and Hybrid Learning Models. This project aims to revolutionise the theory and practice of sensing and monitoring by developing novel Artificial Intelligence and Internet of Things technologies. This project expects to generate new knowledge in the area of Artificial Intelligence of Things by combining sensing, machine learning, and big data analytics. Expected outcomes of this project include novel low-cost sensing methods and new hybrid machine learning models for predi ....Low-cost Sensing Methods and Hybrid Learning Models. This project aims to revolutionise the theory and practice of sensing and monitoring by developing novel Artificial Intelligence and Internet of Things technologies. This project expects to generate new knowledge in the area of Artificial Intelligence of Things by combining sensing, machine learning, and big data analytics. Expected outcomes of this project include novel low-cost sensing methods and new hybrid machine learning models for predictive sensory data analytics. This should provide significant benefits, such as substantially reduced operating and service costs and improved accuracy for real-time monitoring in the fields where cheap-to-implement and easy-to-service monitoring systems over large geographical areas are imperative.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Next Generation Spatial Data Management for Virtual Spatial Systems. This project aims to design novel spatial data retrieval methods for efficient and accurate querying of large datasets with location information. Spatial data is being generated at an unprecedented rate due to the prevalence of mobile devices and ubiquitous connectivity. However, harnessing this data is hampered by outdated and inefficient methods. The project will investigate data retrieval methods that self-optimise for high ....Next Generation Spatial Data Management for Virtual Spatial Systems. This project aims to design novel spatial data retrieval methods for efficient and accurate querying of large datasets with location information. Spatial data is being generated at an unprecedented rate due to the prevalence of mobile devices and ubiquitous connectivity. However, harnessing this data is hampered by outdated and inefficient methods. The project will investigate data retrieval methods that self-optimise for high query efficiency and accuracy, by utilising underlying real-world data patterns. It will enable novel applications for virtual spatial systems with large-scale querying needs, such as spatial digital twins and metaverses, benefiting location-based service providers, urban planners, and emergency management agencies.Read moreRead less
Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate ....Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate the privacy concerns of people using online tools that require providing personal information.Read moreRead less
Virtual Environments for Improved Enterprise Software Deployment. This project aims to improve quality assurance for enterprise IT. Enterprise IT systems are highly interconnected and interdependent — a failure in one system can cause a cascade of failures across multiple systems, bringing business to a standstill. The project aims to create new technologies to automate the provisioning of virtual deployment environments to test the enterprise systems. In particular, it aims to develop new metho ....Virtual Environments for Improved Enterprise Software Deployment. This project aims to improve quality assurance for enterprise IT. Enterprise IT systems are highly interconnected and interdependent — a failure in one system can cause a cascade of failures across multiple systems, bringing business to a standstill. The project aims to create new technologies to automate the provisioning of virtual deployment environments to test the enterprise systems. In particular, it aims to develop new methods for the automatic analysis of service interaction traces and the generation of accurate executable service models, without requiring explicit knowledge of them. The automatic analysis and generation should reduce development cost for enterprise IT systems and increase system quality and reliability. The new software deployment technologies from this project aim to significantly reduce the time, effort and cost of system quality assurance activities in software development organisations, and yet produce higher-quality software leading to uninterrupted business operation in end-user organisations across all sectors.Read moreRead less
Insecure Work and the Mental Health of Workers and their Families. This project aims to explore the relationship between insecure work and mental health by applying advanced econometric methods to large survey and administrative datasets, and newly collected survey data. This project expects to provide causal policy-relevant estimates of how insecure work is affecting the wellbeing of workers and their families, and for whom the effects are most harmful. It also expects to inform on how poor men ....Insecure Work and the Mental Health of Workers and their Families. This project aims to explore the relationship between insecure work and mental health by applying advanced econometric methods to large survey and administrative datasets, and newly collected survey data. This project expects to provide causal policy-relevant estimates of how insecure work is affecting the wellbeing of workers and their families, and for whom the effects are most harmful. It also expects to inform on how poor mental health influences the types of jobs that people enter into. This should provide significant benefits, including evidence needed to improve existing workplace and employment programs, and evidence ensuring that assistance is efficiently targeted to those workers and industries with the greatest need.Read moreRead less
Advanced Machine Learning with Bilevel Optimization. There is an urgent need to develop a new machine learning (ML) paradigm that can overcome data-privacy and model-size constraints in real-world applications. This project aims to develop an advanced paradigm of ML with bilevel optimisation, called bilevel ML. A theoretically-guaranteed fast approximate solver and a new fuzzy bilevel learning framework will be developed to achieve the aim in complex situations; a methodology to transfer knowled ....Advanced Machine Learning with Bilevel Optimization. There is an urgent need to develop a new machine learning (ML) paradigm that can overcome data-privacy and model-size constraints in real-world applications. This project aims to develop an advanced paradigm of ML with bilevel optimisation, called bilevel ML. A theoretically-guaranteed fast approximate solver and a new fuzzy bilevel learning framework will be developed to achieve the aim in complex situations; a methodology to transfer knowledge and an approach to fast-adapt bilevel optimization solutions when required computing resources change. The anticipated outcomes should significantly improve the reliability of ML with benefits for safety learning and computing resource optimisation in ML-based data analytics.Read moreRead less