Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create ....Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create new directions in the research of privacy-preserving distributed data mining and are applicable to Australian counter-terrorism and homeland defence in detecting bio-terrorism from privacy sensitive data.Read moreRead less
Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. ....Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. This project tackles new and urgent challenges in edge data storage, manipulation, maintenance, and protection with optimisation, distributed consensus, graph analytics, and cryptography techniques. The outcomes should build the pillars of edge caching systems and promote Australia's 5G software innovations.Read moreRead less
Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private da ....Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private data warehouse query, and are applicable to stock exchange data warehouses and pharmaceutical data warehouses, where the user is reluctant to reveal his query to the data warehouse operator.Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less
Combating Fake News on Social Media: From Early Detection to Intervention. The project aims to detect fake news early to minimise the negative impact of false information. This project expects to devise novel solutions to address technical challenges for detection of fake news with scarce signals. Expected outcomes of this project include a suite of data mining and machine learning models for identification of fake news from the social media stream, prediction of user propagation of false infor ....Combating Fake News on Social Media: From Early Detection to Intervention. The project aims to detect fake news early to minimise the negative impact of false information. This project expects to devise novel solutions to address technical challenges for detection of fake news with scarce signals. Expected outcomes of this project include a suite of data mining and machine learning models for identification of fake news from the social media stream, prediction of user propagation of false information as well as recommendation of truthful news to counteract adversarial fake news. This project should generate technologies that enhance the integrity of the online echo system and benefit media providers and online population within Australia and across the world. Read moreRead less
Classifying Internet traffic for security applications. As the internet traffic data exponentially increases every year, traffic classification has become a fundamental approach to the security of the Internet. This project aims to develop a set of novel techniques for internet traffic classification, which is fundamentally important to defend against the serious cyber-attacks and effectively minimise the damages. This project is significant as it can help to improve cyber security, which is ess ....Classifying Internet traffic for security applications. As the internet traffic data exponentially increases every year, traffic classification has become a fundamental approach to the security of the Internet. This project aims to develop a set of novel techniques for internet traffic classification, which is fundamentally important to defend against the serious cyber-attacks and effectively minimise the damages. This project is significant as it can help to improve cyber security, which is essential for the work and daily lives of the Australian people. Furthermore, the proposed models and techniques will be important for enhancing the protection of Australian critical infrastructures against malicious cyber-attacks.Read moreRead less
Modelling and defence against malware propagation. As the internet has become vital to our day-to-day working and living, we are witnessing a remarkable upsurge in the incidents of malicious software or malware on it. This project aims to develop key technologies that can precisely model the malware propagation on the internet. The technologies will help develop effective defence against malware propagation at an early stage, with limited defence resources, so as to minimise the damage and provi ....Modelling and defence against malware propagation. As the internet has become vital to our day-to-day working and living, we are witnessing a remarkable upsurge in the incidents of malicious software or malware on it. This project aims to develop key technologies that can precisely model the malware propagation on the internet. The technologies will help develop effective defence against malware propagation at an early stage, with limited defence resources, so as to minimise the damage and provide a capability to identify and control malware spreaders. This project is significant as it can secure the internet that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia by protecting our critical infrastructure.Read moreRead less