A unified model of amino acid homeostasis. This project aims to develop a unified model of amino acid homeostasis in mammalian cells and apply it to brain cells. The model will be underpinned by a mathematical algorithm that allows predicting amino acid levels in the cytosol based on fundamental parameters such as transport and metabolism. This project should provide the significant benefit of enabling the prediction of essential functions such as cell growth and survival.
Peripheral and central mechanisms of sensory coding and integration. The research described in this proposal seeks to provide generic answers to fundamental questions about sensory processes, the nature of perceptual experience, and how these are subserved by the nervous system. The study of inter-sensory interactions in perception has the potential to be incorporated into the development of virtual reality-type computer-based technologies. The neurophysiology research will provide basic informa ....Peripheral and central mechanisms of sensory coding and integration. The research described in this proposal seeks to provide generic answers to fundamental questions about sensory processes, the nature of perceptual experience, and how these are subserved by the nervous system. The study of inter-sensory interactions in perception has the potential to be incorporated into the development of virtual reality-type computer-based technologies. The neurophysiology research will provide basic information that has the potential to deepen our understanding, and even enhance possible treatment, of neurological conditions that involve sensory systems.Read moreRead less
Realistic models of permeation in ion channels. Ion channels are formed by proteins in cell membranes and provide pathways for fast and controlled flow of selected ions. This activity generates action potentials in nerves and muscles that forms the basis of all movement, sensation and thought processes. Recent determination of the crystal structure of channel proteins has enabled construction of models that can relate channel function to its structure--necessary for understanding their operati ....Realistic models of permeation in ion channels. Ion channels are formed by proteins in cell membranes and provide pathways for fast and controlled flow of selected ions. This activity generates action potentials in nerves and muscles that forms the basis of all movement, sensation and thought processes. Recent determination of the crystal structure of channel proteins has enabled construction of models that can relate channel function to its structure--necessary for understanding their operation and seeking cures for diseases caused by their malfunction. This project aims to develop accurate ion-protein-water interactions for permeation models based on stochastic and molecular dynamics simulations using both classical and quantum mechanical methods.Read moreRead less
Hierarchical modeling of protein interactions. Protein interactions play a central role in function and structural organization of cells. Their elucidation is essential for a better understanding of many cellular processes from signal transduction to enzyme inhibition. The aim of this project is to utilize the unprecedented powers of current supercomputers in developing a hierarchical model of protein interactions. The method combines Brownian dynamics at large distances and long time scales ....Hierarchical modeling of protein interactions. Protein interactions play a central role in function and structural organization of cells. Their elucidation is essential for a better understanding of many cellular processes from signal transduction to enzyme inhibition. The aim of this project is to utilize the unprecedented powers of current supercomputers in developing a hierarchical model of protein interactions. The method combines Brownian dynamics at large distances and long time scales with molecular dynamics at small distances and shorter times. Applications to both membrane proteins (blocking of ion channels by toxins and drugs) and globular proteins (ligand binding to receptors and protein association) will be considered.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Analysing the protective role of platelets during malaria infection. Platelets protect the host during malarial infection. This project aims to study how platelets kill the malaria parasite by investigating the role of host molecules and their potential as novel antimalarial agents. The role of platelets in the pathogenesis of cerebral malaria syndrome will also be investigated.
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less