Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend agains ....Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend against cyberattacks for both organisations and individuals in Australia and beyond, theory development in graph theory, refined graph neural network models and improved graph transfer learning algorithms.Read moreRead less
Variable Structure Complex Network Systems with Smart Grid Applications. This project aims to establish a breakthrough theory and technology to help deliver reliability and security of complex network systems, which are subject to structure changes, against faults and cyberattacks. Expected outcomes include a new theory that lays the foundation for understanding such systems, innovative algorithms and tools for their design, and a practical software platform used for ensuring reliability and sec ....Variable Structure Complex Network Systems with Smart Grid Applications. This project aims to establish a breakthrough theory and technology to help deliver reliability and security of complex network systems, which are subject to structure changes, against faults and cyberattacks. Expected outcomes include a new theory that lays the foundation for understanding such systems, innovative algorithms and tools for their design, and a practical software platform used for ensuring reliability and security of such systems. It will be applied directly to critical infrastructure such as the national power grid to help maintain lifeline resilience and achieve economic benefits. It will also provide an opportunity to train the next generation engineers in this cutting-edge technology for Australia.Read moreRead less
Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods an ....Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods and efficient algorithms that will be able to prevent real-time exfiltration and identify previously undetected exfiltration of sensitive data. This should provide significant benefits to governments, defence networks as well as businesses and health sectors, as it will protect them from sophisticated cyber attacks.
Read moreRead less
Efficient and secure data integrity auditing on cloud. Data auditing presents a promising way for verifying user data integrity on cloud, i.e., whether user privacy sensitive data such as identity information on cloud is modified or lost. Current auditing approaches lack sufficient efficiency and security. This results in that they cannot provide timely warning and precaution on potential data loss threats. This project aims to systematically investigate this significant challenge and expects to ....Efficient and secure data integrity auditing on cloud. Data auditing presents a promising way for verifying user data integrity on cloud, i.e., whether user privacy sensitive data such as identity information on cloud is modified or lost. Current auditing approaches lack sufficient efficiency and security. This results in that they cannot provide timely warning and precaution on potential data loss threats. This project aims to systematically investigate this significant challenge and expects to establish innovative research and solutions for enabling efficient and secure data integrity auditing on cloud. The project outcomes will help to safeguard Australian community in fast-growing cyber world, and benefit to fast-growing user privacy sensitive data hosting and applications on cloud.Read moreRead less
Attribution of Machine-generated Code for Accountability. Machine-generated (or neural) code is usually produced by AI tools to speed up software development. However, such codes have recently raised serious security and privacy concerns. This project aims to attribute these codes to their generative models for accountability purposes. In the process, a series of new techniques are developed to differentiate between the codes generated by different models. The outcomes include analysis of neural ....Attribution of Machine-generated Code for Accountability. Machine-generated (or neural) code is usually produced by AI tools to speed up software development. However, such codes have recently raised serious security and privacy concerns. This project aims to attribute these codes to their generative models for accountability purposes. In the process, a series of new techniques are developed to differentiate between the codes generated by different models. The outcomes include analysis of neural code fingerprints, classification of neural codes, and theories to verify the correctness of code attribution. These will provide significant benefits, ranging from copyright protection to privacy preservation. This project is timely since currently the software community is pervasively using neural codes.Read moreRead less
Advanced Machine Learning with Bilevel Optimization. There is an urgent need to develop a new machine learning (ML) paradigm that can overcome data-privacy and model-size constraints in real-world applications. This project aims to develop an advanced paradigm of ML with bilevel optimisation, called bilevel ML. A theoretically-guaranteed fast approximate solver and a new fuzzy bilevel learning framework will be developed to achieve the aim in complex situations; a methodology to transfer knowled ....Advanced Machine Learning with Bilevel Optimization. There is an urgent need to develop a new machine learning (ML) paradigm that can overcome data-privacy and model-size constraints in real-world applications. This project aims to develop an advanced paradigm of ML with bilevel optimisation, called bilevel ML. A theoretically-guaranteed fast approximate solver and a new fuzzy bilevel learning framework will be developed to achieve the aim in complex situations; a methodology to transfer knowledge and an approach to fast-adapt bilevel optimization solutions when required computing resources change. The anticipated outcomes should significantly improve the reliability of ML with benefits for safety learning and computing resource optimisation in ML-based data analytics.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE240101089
Funder
Australian Research Council
Funding Amount
$436,847.00
Summary
Trustworthy Hypothesis Transfer Learning. It is urgent to develop a new hypothesis transfer learning scheme that can overcome potential risks when finetuning unreliable large-scale pre-trained models. This project aims to develop an advanced and reliable scheme of hypothesis transfer learning, called Trustworthy Hypothesis Transfer Learning (TrustHTL). A new theoretically guaranteed heterogeneous hypothesis transfer learning framework will be developed to handle heterogeneous situations; a metho ....Trustworthy Hypothesis Transfer Learning. It is urgent to develop a new hypothesis transfer learning scheme that can overcome potential risks when finetuning unreliable large-scale pre-trained models. This project aims to develop an advanced and reliable scheme of hypothesis transfer learning, called Trustworthy Hypothesis Transfer Learning (TrustHTL). A new theoretically guaranteed heterogeneous hypothesis transfer learning framework will be developed to handle heterogeneous situations; a methodology to disinherit risks of pre-trained models and a new fuzzy relation based distributional discrepancy in heterogeneous transfer learning scenarios. The outcomes should significantly improve the reliability of machine learning with benefits for safety learning in data analytics.Read moreRead less