Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend agains ....Knowledge Graph-driven Software Vulnerability Risk Discovery and Assessment. This project aims to alleviate cyberattacks which are increasingly being crafted to attack software vulnerabilities and weaknesses by utilising advanced knowledge graphs and deep learning techniques. This project expects to construct an innovative software vulnerability knowledge graph and develop advanced graph-based algorithms and models. Expected outcomes of this project include the enhanced capacity to defend against cyberattacks for both organisations and individuals in Australia and beyond, theory development in graph theory, refined graph neural network models and improved graph transfer learning algorithms.Read moreRead less
Responsible modelling respecting privacy, data quality, and green computing. With the unprecedented growing impact of data on science, the economy and society, there comes the need for responsible data science practices which are accountable for the social good. This project aims to investigate the challenging problem of how to provide responsible data management, spanning across privacy-aware data exploration, resilient modelling to cope with imperfect data, and efficient model architectures fo ....Responsible modelling respecting privacy, data quality, and green computing. With the unprecedented growing impact of data on science, the economy and society, there comes the need for responsible data science practices which are accountable for the social good. This project aims to investigate the challenging problem of how to provide responsible data management, spanning across privacy-aware data exploration, resilient modelling to cope with imperfect data, and efficient model architectures for resource-constrained environments. This will be achieved by developing theories and techniques for complex real-world multi-modal data retrieval throughout the data life-cycle. The expected outcomes will significantly contribute to building capability in emerging technologies in the context of responsible data science. Read moreRead less
Deep Learning Attacks and Active Defences: A Cybersecurity Perspective. The belief that deep learning technology is imperative for economic development, military control, and strategic competitiveness has accelerated its development across the globe. However, experience has revealed the disappointing fact that deep learning models are vulnerable to a range of security attacks. Hence, a series of methodologies and defence strategies will be devised that make deep learning systems robust to these ....Deep Learning Attacks and Active Defences: A Cybersecurity Perspective. The belief that deep learning technology is imperative for economic development, military control, and strategic competitiveness has accelerated its development across the globe. However, experience has revealed the disappointing fact that deep learning models are vulnerable to a range of security attacks. Hence, a series of methodologies and defence strategies will be devised that make deep learning systems robust to these attacks. The methodologies require analysing attack lifecycles to identify them in their early stages. With this knowledge, active defence methods and forensic strategies can be developed to ensure efficient defences and prevent further attacks. Moreover, the outputs will be generalisable to most deep learning services.Read moreRead less
Balance and reinforcement: privacy and fairness in high intelligence models. The aim of this project is to develop a series of privacy preservation methods to achieve a new balance between privacy and fairness in highly accurate intelligence models. The main issue in achieving this goal is that high-accuracy intelligence technologies have resulted in significant privacy violations and are very vulnerable to issues of unfairness. This project will analyse the privacy risks associated with intelli ....Balance and reinforcement: privacy and fairness in high intelligence models. The aim of this project is to develop a series of privacy preservation methods to achieve a new balance between privacy and fairness in highly accurate intelligence models. The main issue in achieving this goal is that high-accuracy intelligence technologies have resulted in significant privacy violations and are very vulnerable to issues of unfairness. This project will analyse the privacy risks associated with intelligent systems and devise mechanisms to mutually reinforce both privacy and fairness based on the theoretical foundations laid by our analysis. These outcomes will enable model owners to effectively protect their intellectual property and offer services to users in a private, fair, and accurate manner.Read moreRead less
Variable Structure Complex Network Systems with Smart Grid Applications. This project aims to establish a breakthrough theory and technology to help deliver reliability and security of complex network systems, which are subject to structure changes, against faults and cyberattacks. Expected outcomes include a new theory that lays the foundation for understanding such systems, innovative algorithms and tools for their design, and a practical software platform used for ensuring reliability and sec ....Variable Structure Complex Network Systems with Smart Grid Applications. This project aims to establish a breakthrough theory and technology to help deliver reliability and security of complex network systems, which are subject to structure changes, against faults and cyberattacks. Expected outcomes include a new theory that lays the foundation for understanding such systems, innovative algorithms and tools for their design, and a practical software platform used for ensuring reliability and security of such systems. It will be applied directly to critical infrastructure such as the national power grid to help maintain lifeline resilience and achieve economic benefits. It will also provide an opportunity to train the next generation engineers in this cutting-edge technology for Australia.Read moreRead less
Build competency aware and assuring machine learning systems. Recent development in machine learning (ML) has seen ML models with extremely high prediction accuracy. However, to support human-machine partnership in decision-making in complex environments, beyond accuracy, it is essential for ML systems to be competency aware and reliable, and at the same time be exploratory. This project aims to develop novel techniques to equip a ML system with the ability to identify own competency, to justify ....Build competency aware and assuring machine learning systems. Recent development in machine learning (ML) has seen ML models with extremely high prediction accuracy. However, to support human-machine partnership in decision-making in complex environments, beyond accuracy, it is essential for ML systems to be competency aware and reliable, and at the same time be exploratory. This project aims to develop novel techniques to equip a ML system with the ability to identify own competency, to justify its competency and decisions, to explore unknown situations and fully utilise existing expertise to deal with unknowns. The expected outcomes of the project will enable ML systems to become truely intelligent and reliable machine partners for human decision makers in a wide range of applications.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE230101329
Funder
Australian Research Council
Funding Amount
$432,355.00
Summary
Trading Privacy, Bandwidth and Accuracy in Algorithmic Machine Learning. This project aims to investigate the trade-offs between privacy, communication costs and accuracy of results when learning from users' sensitive data. The project intends to design faster and more accurate algorithms for a wide range of machine learning tasks by developing a novel and widely-applicable algorithmic framework. Expected outcomes of this project include new theoretical tools to guide the design of data-driven d ....Trading Privacy, Bandwidth and Accuracy in Algorithmic Machine Learning. This project aims to investigate the trade-offs between privacy, communication costs and accuracy of results when learning from users' sensitive data. The project intends to design faster and more accurate algorithms for a wide range of machine learning tasks by developing a novel and widely-applicable algorithmic framework. Expected outcomes of this project include new theoretical tools to guide the design of data-driven decision systems and rigorously analyse their performance and privacy guarantees. Privacy of individuals' information in data analytics pipelines is a key societal concern. This project should lead to significant benefits by strengthening privacy in these pipelines while also improving accuracy and cost-efficiency.Read moreRead less
Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods an ....Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods and efficient algorithms that will be able to prevent real-time exfiltration and identify previously undetected exfiltration of sensitive data. This should provide significant benefits to governments, defence networks as well as businesses and health sectors, as it will protect them from sophisticated cyber attacks.
Read moreRead less
Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and wo ....Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and worldwide to reliably identify potential privacy risks and issues on their applications. The intended outcomes should endow data controllers with the capability of evidencing their compliance of data protection legislations such as Australia Privacy Act 1988 and EU General Data Protection Regulation (GDPR).Read moreRead less
Efficient and secure data integrity auditing on cloud. Data auditing presents a promising way for verifying user data integrity on cloud, i.e., whether user privacy sensitive data such as identity information on cloud is modified or lost. Current auditing approaches lack sufficient efficiency and security. This results in that they cannot provide timely warning and precaution on potential data loss threats. This project aims to systematically investigate this significant challenge and expects to ....Efficient and secure data integrity auditing on cloud. Data auditing presents a promising way for verifying user data integrity on cloud, i.e., whether user privacy sensitive data such as identity information on cloud is modified or lost. Current auditing approaches lack sufficient efficiency and security. This results in that they cannot provide timely warning and precaution on potential data loss threats. This project aims to systematically investigate this significant challenge and expects to establish innovative research and solutions for enabling efficient and secure data integrity auditing on cloud. The project outcomes will help to safeguard Australian community in fast-growing cyber world, and benefit to fast-growing user privacy sensitive data hosting and applications on cloud.Read moreRead less