Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry an ....Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry and society. The outcomes of this research project will result in secure and trustworthy computing technologies that will enable secure e-commerce applications and on-line services and trusted interactions between users over the Internet. Read moreRead less
Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcom ....Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcomes of this research will result in secure and trustworthy computing technologies that will enable the design of trust enhanced secure applications and trusted platforms, which will help to achieve secure e-commerce applications and on-line services, and trusted interactions between users over the Internet.Read moreRead less
Mobile Device Autoconfiguration. Todays cellular networks are built to optimise spectrum efficiency by combining specific codecs and matching bearer services. With general purpose mobile terminals that can access different network types the applications will break this optimisation by using generic codecs. This project aims at solving this problem by letting the access networks configure the terminals with the natively supported codecs and bearer service definitions. The project will lead to con ....Mobile Device Autoconfiguration. Todays cellular networks are built to optimise spectrum efficiency by combining specific codecs and matching bearer services. With general purpose mobile terminals that can access different network types the applications will break this optimisation by using generic codecs. This project aims at solving this problem by letting the access networks configure the terminals with the natively supported codecs and bearer service definitions. The project will lead to considerably higher cost effectiveness in the emerging mobile Internet.Read moreRead less
Combating Fake News on Social Media: From Early Detection to Intervention. The project aims to detect fake news early to minimise the negative impact of false information. This project expects to devise novel solutions to address technical challenges for detection of fake news with scarce signals. Expected outcomes of this project include a suite of data mining and machine learning models for identification of fake news from the social media stream, prediction of user propagation of false infor ....Combating Fake News on Social Media: From Early Detection to Intervention. The project aims to detect fake news early to minimise the negative impact of false information. This project expects to devise novel solutions to address technical challenges for detection of fake news with scarce signals. Expected outcomes of this project include a suite of data mining and machine learning models for identification of fake news from the social media stream, prediction of user propagation of false information as well as recommendation of truthful news to counteract adversarial fake news. This project should generate technologies that enhance the integrity of the online echo system and benefit media providers and online population within Australia and across the world. Read moreRead less
Trust-Oriented Social Relation Analysis and Social Relation Aware Rating Analysis in Trust Management. Trust management is an emerging field offering critical challenges on evaluating the quality and trustworthiness of objects, services and raters. Thus it requires the development of novel techniques and solutions to address these challenges both conceptually and practically. This project will develop innovative techniques to infer trust in complex social networks, detect bias in trust ratings a ....Trust-Oriented Social Relation Analysis and Social Relation Aware Rating Analysis in Trust Management. Trust management is an emerging field offering critical challenges on evaluating the quality and trustworthiness of objects, services and raters. Thus it requires the development of novel techniques and solutions to address these challenges both conceptually and practically. This project will develop innovative techniques to infer trust in complex social networks, detect bias in trust ratings and its dependencies with social relations. They can greatly contribute to breakthrough techniques enabling trust-oriented social network analysis and more objective trust management systems that can be transferred to the Australian IT industry to promote the trustworthiness of Web services and reduce monetary loss.Read moreRead less
Targeted Graph Embedding for Anomaly Detection in Large-scale Networks. This project aims to tackle the challenging problem of anomaly detection in large-scale networks by leveraging graph embedding techniques. It expects to deliver a series of innovative graph embedding algorithms targeting optimised anomaly detection. By addressing under-developed research challenges, such as the versatile types of anomalies and lack of anomaly labels, the established theories and devised methodologies will ad ....Targeted Graph Embedding for Anomaly Detection in Large-scale Networks. This project aims to tackle the challenging problem of anomaly detection in large-scale networks by leveraging graph embedding techniques. It expects to deliver a series of innovative graph embedding algorithms targeting optimised anomaly detection. By addressing under-developed research challenges, such as the versatile types of anomalies and lack of anomaly labels, the established theories and devised methodologies will advance frontier technologies in both graph anomaly detection and graph representation learning. By uncovering anomalies with high efficiency and accuracy, this project will contribute to multiple real applications from fake review detection to financial fraud identification, bringing both social and economic benefits.Read moreRead less
New real-time risk indicators to improve the efficiency, environmental impact and safety of air traffic management. Air-traffic demand is constantly rising, and Australia is responsible for the management of 11 per cent of the world's airspace. This project aims to develop risk indicators which will enable us to monitor air-safety risks on a constantly updated basis.