Linkage Infrastructure, Equipment And Facilities - Grant ID: LE210100001
Funder
Australian Research Council
Funding Amount
$875,000.00
Summary
A 3-photon imaging system for deep live imaging. This project aims to establish Australia’s first 3-photon microscope system with adaptive optics for deep intravital imaging. This advanced imaging system will enable researchers to investigate the biology of cells and tissue structures in a wide range of organs and engineered tissues, to a degree not possible with existing technology. This project will capitalise on advanced laser, microscope and adaptive optics technologies with the expected out ....A 3-photon imaging system for deep live imaging. This project aims to establish Australia’s first 3-photon microscope system with adaptive optics for deep intravital imaging. This advanced imaging system will enable researchers to investigate the biology of cells and tissue structures in a wide range of organs and engineered tissues, to a degree not possible with existing technology. This project will capitalise on advanced laser, microscope and adaptive optics technologies with the expected outcomes to include the generation of new knowledge of major biological systems, including the immune system and the nervous system. This will provide significant benefits to fundamental interdisciplinary research into immunology, infectious disease, neuroscience, mechanobiology and engineering.Read moreRead less
Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutt ....Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutting-edge Blockchain based secure IoT data management and privacy-preserving smart contracts for smart farming supply-chain management. This data infrastructure will be the first of its kind which will lay a solid foundation for smart farming technology.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Social, economic and health vulnerabilities in Indonesia. This project aims to study and provide ways to overcome vulnerability in Indonesia. Half the Indonesian population is still clustered around the poverty line, contributing to their vulnerability. This project will identify vulnerable groups and why they are vulnerable. Using a common framework of the life course in eight Indonesian field sites, this project will investigate whether social networks and welfare programs reduce vulnerability ....Social, economic and health vulnerabilities in Indonesia. This project aims to study and provide ways to overcome vulnerability in Indonesia. Half the Indonesian population is still clustered around the poverty line, contributing to their vulnerability. This project will identify vulnerable groups and why they are vulnerable. Using a common framework of the life course in eight Indonesian field sites, this project will investigate whether social networks and welfare programs reduce vulnerability, and pinpoint strategies for reducing vulnerabilities in the future. The project expects to show how vulnerable citizens in Indonesia can be made more secure, helping to build a more stable and prosperous region.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
Reciprocal Accountability and Public Value in Aboriginal Organisations. This project aims to examine the different meanings of ‘public value’ and accountability in the work of Aboriginal organisations. Aboriginal organisations in the Kimberley region are funded by governments to deliver services that are of value to the public. They also reflect Aboriginal culture and identity, and represent Aboriginal interests. This also creates value for their own publics. This project investigates the tensio ....Reciprocal Accountability and Public Value in Aboriginal Organisations. This project aims to examine the different meanings of ‘public value’ and accountability in the work of Aboriginal organisations. Aboriginal organisations in the Kimberley region are funded by governments to deliver services that are of value to the public. They also reflect Aboriginal culture and identity, and represent Aboriginal interests. This also creates value for their own publics. This project investigates the tension between these two ways of understanding public value. It investigates accountability for public value creation, whether it reflects the real value of Aboriginal organisations, and whether it can be done better. The project plans to draw on anthropology and public administration theory.Read moreRead less