Situated Anomaly Detection in an Open Environment. This project aims to investigate situated anomaly detection in an open environment. Existing anomaly detection techniques follow the setting of conventional machine learning and discover anomalies from a set of collected data. In contrast, this project proposes to develop the next-generation of anomaly detection algorithms by learning from interactions with an open environment, which enables the discovery of new anomalies and the early detection ....Situated Anomaly Detection in an Open Environment. This project aims to investigate situated anomaly detection in an open environment. Existing anomaly detection techniques follow the setting of conventional machine learning and discover anomalies from a set of collected data. In contrast, this project proposes to develop the next-generation of anomaly detection algorithms by learning from interactions with an open environment, which enables the discovery of new anomalies and the early detection of anomalies. The established theories and developed algorithms will advance frontier technologies in machine intelligence. The success of the project will contribute to a wide range of real applications in cybersecurity, defence and finance, bringing massive social and economic benefits. Read moreRead less
Cost-effective and Reliable Edge Caching for Software Vendors. This project aims to deliver a suite of models and techniques for cost-effective and reliable data caching in the multi-access edge computing (MEC) environment facilitated by 5G mobile network. MEC offers great promises for rapidly advancing mobile and IoT applications in various domains in Australia, e.g., smart cities, remote medical services, advanced manufacturing, etc. Combining graph analytics, optimisation techniques and game ....Cost-effective and Reliable Edge Caching for Software Vendors. This project aims to deliver a suite of models and techniques for cost-effective and reliable data caching in the multi-access edge computing (MEC) environment facilitated by 5G mobile network. MEC offers great promises for rapidly advancing mobile and IoT applications in various domains in Australia, e.g., smart cities, remote medical services, advanced manufacturing, etc. Combining graph analytics, optimisation techniques and game theory, this project tackles the new challenges in the placement, update and adaptation of edge data faced by software vendors embracing 5G. The outcomes can ease software vendors' cost and security concerns during the transition from 4G to 5G, and significantly promote the wave of 5G innovation in Australia.Read moreRead less
Cost-effective Edge Service Provisioning in the Last Mile of 5G. This project aims to deliver a suite of novel approaches for enabling cost-effective last-mile service provisioning in the 5G mobile edge computing (MEC). This project is the world's first attempt to systematically tackle the critical service provisioning challenges in the last mile where base stations link users to MEC applications. It offers a practical solution for provisioning software vendors' MEC services cost-effectively. Th ....Cost-effective Edge Service Provisioning in the Last Mile of 5G. This project aims to deliver a suite of novel approaches for enabling cost-effective last-mile service provisioning in the 5G mobile edge computing (MEC). This project is the world's first attempt to systematically tackle the critical service provisioning challenges in the last mile where base stations link users to MEC applications. It offers a practical solution for provisioning software vendors' MEC services cost-effectively. This project should drive Australia's 5G transition and innovations, promote its post-COVID economic recovery and resilience by enabling various real-time mobile and IoT applications, e.g., telehealth, remote learning/working, industry 4.0, and ensure its pioneering position in the global 5G research.Read moreRead less
Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods an ....Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods and efficient algorithms that will be able to prevent real-time exfiltration and identify previously undetected exfiltration of sensitive data. This should provide significant benefits to governments, defence networks as well as businesses and health sectors, as it will protect them from sophisticated cyber attacks.
Read moreRead less
Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and wo ....Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and worldwide to reliably identify potential privacy risks and issues on their applications. The intended outcomes should endow data controllers with the capability of evidencing their compliance of data protection legislations such as Australia Privacy Act 1988 and EU General Data Protection Regulation (GDPR).Read moreRead less
Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptiv ....Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptive trust and integrity preserving methods, and reliable distributed data processing mechanisms to mitigate vulnerabilities in real-time IoT-enabled critical surveillance. This should provide significant benefits to Australia's economy, one of which is the enhanced consumer-centric adoption of IoT for sensitive operations.Read moreRead less
Toward Human-guided Safe Reinforcement Learning in the Real World. This project aims to investigate human-guided safe reinforcement learning (RL). Safe RL is an important topic that could enable real applications of RL systems by addressing safety constraints. Existing safe RL assumes the availability of specified safety constraints in mathematical or logical forms. This project proposes to study learning safety objectives from information provided directly by humans or indirectly via language m ....Toward Human-guided Safe Reinforcement Learning in the Real World. This project aims to investigate human-guided safe reinforcement learning (RL). Safe RL is an important topic that could enable real applications of RL systems by addressing safety constraints. Existing safe RL assumes the availability of specified safety constraints in mathematical or logical forms. This project proposes to study learning safety objectives from information provided directly by humans or indirectly via language models, and human-guided continuous correction for safety improvements. The established theories and developed algorithms will advance frontier technologies in AI and contribute to a wide range of real applications of safe RL, such as robotics and autonomous driving, bringing enormous social and economic benefits. Read moreRead less
Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramat ....Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramatically benefit Australian people and government, especially for the Australian ICT industry for commercializing the research outputs. Read moreRead less