A new theory of Aboriginal art. The paradigms developed by scholars have a huge impact on the value of art. After the Australian artworld repositioned Aboriginal art from the frame of 'primitive art' to that of contemporary art, the price of and market for Aboriginal art increased enormously. However, Aboriginal art failed to penetrate the international contemporary artworld because the paradigms of contemporary art within which it was framed were outmoded. Through examining the production of Ab ....A new theory of Aboriginal art. The paradigms developed by scholars have a huge impact on the value of art. After the Australian artworld repositioned Aboriginal art from the frame of 'primitive art' to that of contemporary art, the price of and market for Aboriginal art increased enormously. However, Aboriginal art failed to penetrate the international contemporary artworld because the paradigms of contemporary art within which it was framed were outmoded. Through examining the production of Aboriginal art from the perspectives of its producers and recent globalised contemporary art practices, this project aims to develop a new theory of Aboriginal art that is more aligned with the thinking of current curators who set the agenda at the upper end of the market.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
The reformulation of landscape as a user-generated interactive aesthetic. This project seeks to provide Australia with an opportunity to advance its understanding of landscape and climate change by building the world's first networked landscape visualisation system.
Atmoscape: the aesthetic reformulation of the atmosphere using intelligent imaging systems. The proposed research provides Australia with an opportunity to advance its understanding of atmosphere and climate by building the world's first remote sensing visualisation system networked across three continents.
Art and Human Rights in the Asia-Pacific: The Limits of Tolerance in the Twenty-First Century. The question of human rights is emerging as perhaps the most critical issue of the twenty-first century. This project aims to develop a cross-disciplinary methodology and a set of conceptual frameworks for analysing the interactions between contemporary art and global discourses on human rights in the Asia-Pacific. In the process we address the debate on universality versus cultural specificity in rel ....Art and Human Rights in the Asia-Pacific: The Limits of Tolerance in the Twenty-First Century. The question of human rights is emerging as perhaps the most critical issue of the twenty-first century. This project aims to develop a cross-disciplinary methodology and a set of conceptual frameworks for analysing the interactions between contemporary art and global discourses on human rights in the Asia-Pacific. In the process we address the debate on universality versus cultural specificity in relation to human rights issues, and we seek to place current Australian responses to human rights in the context of the dynamically changing region in which we live.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Art and Cultural Exchange at the Strait of Gibraltar. The project aims to give a first-time analysis of visual culture at the Strait of Gibraltar. It asks how painting, photography, film, and maps relate to colonial expansion, with a focus on Australian, French and Spanish involvement in the Western Mediterranean. The British fortress-colony of Gibraltar and the international Moroccan port of Tangier have never before been subject to comparative analysis. Key outcomes include two major exhibit ....Art and Cultural Exchange at the Strait of Gibraltar. The project aims to give a first-time analysis of visual culture at the Strait of Gibraltar. It asks how painting, photography, film, and maps relate to colonial expansion, with a focus on Australian, French and Spanish involvement in the Western Mediterranean. The British fortress-colony of Gibraltar and the international Moroccan port of Tangier have never before been subject to comparative analysis. Key outcomes include two major exhibitions, one on Australian Orientalism at the National Gallery and the second on historical art in the region. By shedding historical light on people smuggling, contraband and post-Brexit identity at the Strait, the project aims to generate cultural knowledge pertinent to international co-operation.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Analysing the protective role of platelets during malaria infection. Platelets protect the host during malarial infection. This project aims to study how platelets kill the malaria parasite by investigating the role of host molecules and their potential as novel antimalarial agents. The role of platelets in the pathogenesis of cerebral malaria syndrome will also be investigated.