Cohort discovery and activity mining for policy impact prediction. Cohort discovery and activity mining for policy impact prediction. This project aims to develop an intelligent systematic framework to predict policy impacts on Australian patients, by discovering inherent patient cohorts and assessing the impact of the policies on these cohorts. The proposed methods lay the theoretical foundations for building intelligent automated tools for policy assessment. Expected outcomes are data-driven p ....Cohort discovery and activity mining for policy impact prediction. Cohort discovery and activity mining for policy impact prediction. This project aims to develop an intelligent systematic framework to predict policy impacts on Australian patients, by discovering inherent patient cohorts and assessing the impact of the policies on these cohorts. The proposed methods lay the theoretical foundations for building intelligent automated tools for policy assessment. Expected outcomes are data-driven patient group discovery, which could more precisely identify the patient cohorts most likely to benefit from a specific policy; and a model to predict the efficacy of policy options, which could increase the sustainability of the national health system by enabling smarter, more efficient policy decision-making.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Reconceiving Machine Learning. The proposed research will develop a new way to consider problems to which machine learning can be applied. Machine learning is crucial enabler of the digital economy. The research will provide better opportunities for Australian industry to gain a competitive advantage with machine learning technology. The framework developed will enable better opportunities for collaborative research and will build and strengthen international linkages.
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Legal and social dynamics of eBook lending in Australia’s public libraries. Legal and social dynamics of eBook lending in Australia’s public libraries. This project aims to develop an evidence base of quantitative and qualitative data about how eBooks are used in libraries. EBooks have tremendous beneficial potential, particularly for Australians in remote areas and those with impaired mobility or vision. However, libraries’ rights to acquire and lend them are more restricted than for physical b ....Legal and social dynamics of eBook lending in Australia’s public libraries. Legal and social dynamics of eBook lending in Australia’s public libraries. This project aims to develop an evidence base of quantitative and qualitative data about how eBooks are used in libraries. EBooks have tremendous beneficial potential, particularly for Australians in remote areas and those with impaired mobility or vision. However, libraries’ rights to acquire and lend them are more restricted than for physical books. Libraries and legal, social and data science researchers will investigate eBook lending practices and understand their social impacts. The project will identify ways of reforming policy, law, and practice to help libraries fulfil their public interest missions. This project is expected to enable libraries to extract more value from existing public investments.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Analysing Iterative Machine Learning Algorithms with Information Geometric Methods. Online machine learning problems arise from situations where data is provided a point at a time. There are many classical algorithms for solving such problems based on the principle of stochastic gradient descent. Recent research by the CIs and others have thrown up interesting but diverse geometric connections that offer new insights. The proposed research aims to integrate the understanding of these algori ....Analysing Iterative Machine Learning Algorithms with Information Geometric Methods. Online machine learning problems arise from situations where data is provided a point at a time. There are many classical algorithms for solving such problems based on the principle of stochastic gradient descent. Recent research by the CIs and others have thrown up interesting but diverse geometric connections that offer new insights. The proposed research aims to integrate the understanding of these algorithms with the aim of designing algorithms better able to exploit prior knowledge, and to extend existing algorithms to new problem domains thus offering well principled and well understood algorithms for solving a variety of novel online problems.Read moreRead less
Generic Content-based News Picture Retrieval with Local Invariant Features. Image Retrieval searches for images from large databases whose visual content meets the requirements submitted by users. Besides directly benefiting the Partner Organization, this project will enable more efficient access to large picture repositories in news agencies and publishers, digital libraries and film archives. It will make public use of visual information much more convenient and economical. It will help securi ....Generic Content-based News Picture Retrieval with Local Invariant Features. Image Retrieval searches for images from large databases whose visual content meets the requirements submitted by users. Besides directly benefiting the Partner Organization, this project will enable more efficient access to large picture repositories in news agencies and publishers, digital libraries and film archives. It will make public use of visual information much more convenient and economical. It will help security officers to effortlessly and accurately find particular scenes from the images generated by a large closed-circuit TV networks. Also, the developed technology can be applied to tele-education and e-commerce. New algorithms developed in this project will benefit the Australian and world scientific communities.Read moreRead less