Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for loca ....Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for localised IoT execution, through microservices executing autonomously on nodes of IoT fog networks. It will develop new techniques for automated discovery of microservices from enterprise systems and the verification of future-state system execution based on current-state behavioural and other properties such as security.Read moreRead less
Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detecti ....Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detection, and 3) finding unseen vulnerabilities. We therefore propose to use a series of new techniques such as efficient in-memory fuzzing, conditional formulas, and transfer learning to solve the above challenges. The project outcomes will help Australia gain cutting edge techniques in vulnerability detection. Read moreRead less
Re-engineering enterprise systems for microservices in the cloud. This project will enable automatic re-engineering of large enterprise applications to run in modern cloud environments as microservices. Microservices are the latest wave of service-based software, capable of exploiting the high performance and third-party integration opportunities made available through the cloud. The project will develop new techniques for analysing enterprise systems code and execution data, and making recommen ....Re-engineering enterprise systems for microservices in the cloud. This project will enable automatic re-engineering of large enterprise applications to run in modern cloud environments as microservices. Microservices are the latest wave of service-based software, capable of exploiting the high performance and third-party integration opportunities made available through the cloud. The project will develop new techniques for analysing enterprise systems code and execution data, and making recommendations for restructuring suitable parts as microservices. These microservices manage individual business objects via sets of lightweight distributed computational operations. The outcomes will support progressive evolution of an enterprise system, into distributed microservices running in public clouds, while still being integrated with "backend" systems.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE200101465
Funder
Australian Research Council
Funding Amount
$419,498.00
Summary
Minimising Human Efforts to Fight Fake News and Restore the Public Trust. Our modern society is struggling with an unprecedented amount of online fake news, which is recently driven by misused artificial intelligence (AI) technologies. This project aims to build the first real-time system integrating algorithmic models and human validators to counter such falsehoods, especially those AI-fabricated false stories. This project expects to deliver a series of cost-effective and streaming methods emp ....Minimising Human Efforts to Fight Fake News and Restore the Public Trust. Our modern society is struggling with an unprecedented amount of online fake news, which is recently driven by misused artificial intelligence (AI) technologies. This project aims to build the first real-time system integrating algorithmic models and human validators to counter such falsehoods, especially those AI-fabricated false stories. This project expects to deliver a series of cost-effective and streaming methods empowering a Web-based observatory dashboard of fake news propagation. This achieves significant benefits for media organisations, governments, the public, and academia via timely alerts, data-journalism reports, and novel data visualisations of social media landscape to distinguish between legitimate and deceptive contents.Read moreRead less
Challenging big data for scalable, robust and real-time recommendations. With the advent of big data era, recommender systems are facing unprecedented challenges with respect to the four dimensions of big data: big volume, low veracity, high velocity and high variety. This project aims to develop a new generation of cost-effective techniques for scalable, robust and real-time recommendations utilising big data. This project aims to address these challenges to achieve scalable, robust and real-ti ....Challenging big data for scalable, robust and real-time recommendations. With the advent of big data era, recommender systems are facing unprecedented challenges with respect to the four dimensions of big data: big volume, low veracity, high velocity and high variety. This project aims to develop a new generation of cost-effective techniques for scalable, robust and real-time recommendations utilising big data. This project aims to address these challenges to achieve scalable, robust and real-time recommendations. This project will devise a series of cost-effective machine learning methods and schemes to deliver an end-to-end recommender framework. This project has the potential to significantly reduce the energy consumption of large-scale recommender systems as well as facilitating an increase in the use of recommendation applications for big data.Read moreRead less
Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in shor ....Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in short, to enable localised information and communication services, while preserving users' privacy, in infrastructure-deficient environments. The deployment of this system will bring great benefits to Australia’s economic growth, the quality of life, cybersecurity, and environment control in rural and regional Australia. Read moreRead less
Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory an ....Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory and informed decision-making. This provides significant benefits of not only placing Australia in the forefront of exploiting multimodal user behaviour big data in dynamic e-commerce but also transforming Australian government and businesses to intelligent and contextual services adaptive to complex situations.Read moreRead less
Enhancing privacy preserving in dynamic cyberspace. This project aims to develop a novel infrastructure operational monitoring and management strategy to reduce the redundant maintenance actions and achieve a cost-effective approach for civil infrastructure asset management. The project will use multiple social networks as a platform for the project, with the potential for the results to be extended to any dynamic cyberspace. Project outcomes will include a set of new analysis theories and tools ....Enhancing privacy preserving in dynamic cyberspace. This project aims to develop a novel infrastructure operational monitoring and management strategy to reduce the redundant maintenance actions and achieve a cost-effective approach for civil infrastructure asset management. The project will use multiple social networks as a platform for the project, with the potential for the results to be extended to any dynamic cyberspace. Project outcomes will include a set of new analysis theories and tools to facilitate government, companies, individuals, and organisations to enhance their information gathering and privacy-preserving capabilities. This is expected to enhance the credibility of the government and organisations and save the possible financial loss of companies and individuals.Read moreRead less
Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage ....Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage capabilities, including graphics processor and flash-based memory. This project will devise an adaptive key-value store framework for heterogeneous systems. Our new framework will adaptively harvest the performance potential of future hardware such that applications can cope with fast-growing data sets.Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less