Industrial Transformation Training Centres - Grant ID: IC170100030
Funder
Australian Research Council
Funding Amount
$4,133,659.00
Summary
ARC Training Centre in Cognitive Computing for Medical Technologies. The ARC Training Centre in Cognitive Computing for Medical Technologies aims to create a workforce that is expert in developing, applying and interrogating cognitive computing technologies in data-intensive medical contexts. This will facilitate the next generation of data-driven and machine learning-based medical technologies. The Centre will provide a world-class industry-driven research training environment for PhD students ....ARC Training Centre in Cognitive Computing for Medical Technologies. The ARC Training Centre in Cognitive Computing for Medical Technologies aims to create a workforce that is expert in developing, applying and interrogating cognitive computing technologies in data-intensive medical contexts. This will facilitate the next generation of data-driven and machine learning-based medical technologies. The Centre will provide a world-class industry-driven research training environment for PhD students and postdoctoral researchers. These researchers will lead the medical technology industry into a new era of data-driven personalised and precision medical devices and applications. The Centre will result in the development of capabilities in the core technologies of machine learning and the practical application of cognitive computing in the area of health.Read moreRead less
Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutt ....Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutting-edge Blockchain based secure IoT data management and privacy-preserving smart contracts for smart farming supply-chain management. This data infrastructure will be the first of its kind which will lay a solid foundation for smart farming technology.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Optimising the spring in your step to enhance footwear design. This project aims to examine how the nervous system adjusts the mechanical function of our feet across a spectrum of speeds, from slow running through to maximal effort sprinting. The proposed research will explore how the nervous system controls the function of the foot to meet the ever-varying demands of locomotion in the real-world. Expected outcomes of this project are to determine if running shoes help or hinder the natural spri ....Optimising the spring in your step to enhance footwear design. This project aims to examine how the nervous system adjusts the mechanical function of our feet across a spectrum of speeds, from slow running through to maximal effort sprinting. The proposed research will explore how the nervous system controls the function of the foot to meet the ever-varying demands of locomotion in the real-world. Expected outcomes of this project are to determine if running shoes help or hinder the natural spring-like function of the foot. It will explain a conceptually novel design allowing shoes to support our feet, whilst harnessing the energetic benefits of the foot's spring-like function. This research has the potential to revolutionise athletic footwear design and has direct implications for enhanced performance in running athletes.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
Understanding snow gum dieback for effective and integrated management. The project leverages recent research and infrastructure investments and our determined and collaborative team as it aims to: 1) assess the future geography of snow gum dieback in the high country and identify priority locations for pro-active management, 2) quantify the impact of snow gums on high country water and carbon budgets and thus the socio- economic and biodiversity values, and 3) determine options for mitigation. ....Understanding snow gum dieback for effective and integrated management. The project leverages recent research and infrastructure investments and our determined and collaborative team as it aims to: 1) assess the future geography of snow gum dieback in the high country and identify priority locations for pro-active management, 2) quantify the impact of snow gums on high country water and carbon budgets and thus the socio- economic and biodiversity values, and 3) determine options for mitigation. Dieback of our iconic snow gum forests is diminishing the ecological, hydrological and cultural values of the Australian Alps and will impact state and national water-supply and power-generation systems. Our research will inform Alps-wide management efforts designed for long-term success.Read moreRead less