Discovery Early Career Researcher Award - Grant ID: DE170100106
Funder
Australian Research Council
Funding Amount
$360,000.00
Summary
Measuring interference from prior memories using experience sampling. The project aims to better understand the causes of forgetting in recognition memory. This project will measure participants' experiences using smartphone technology for four weeks before a recognition memory experiment. Similarities between the images in the experiment and images in prior experience can be used to fully specify all interference components within a computational model of recognition memory, leading to a comple ....Measuring interference from prior memories using experience sampling. The project aims to better understand the causes of forgetting in recognition memory. This project will measure participants' experiences using smartphone technology for four weeks before a recognition memory experiment. Similarities between the images in the experiment and images in prior experience can be used to fully specify all interference components within a computational model of recognition memory, leading to a complete model of recognition memory. Better understanding the causes of forgetting in recognition memory could show how interference contributes to memory impairments in ageing, and ultimately Alzheimer’s and other clinical disorders.Read moreRead less
Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not o ....Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not only practical solutions for protecting sensitive data recorded in blockchain but also crucial techniques to make the blockchain accountable for practical applications with enhanced security. This project provides significant benefits, such as building a trusted environment for sensitive transactions in the digital economy.Read moreRead less
Design guidelines for safety-critical controllers in high-risk environments. This project aims to generate novel product design guidelines for developing safer controllers for use by potentially stressed individuals in high-risk situations. It will do this by generating specific insights and verifying generalisable solutions from the context of total artificial heart recipients –who must engage with critical controllers constantly. This project expects to generate new knowledge in design by esta ....Design guidelines for safety-critical controllers in high-risk environments. This project aims to generate novel product design guidelines for developing safer controllers for use by potentially stressed individuals in high-risk situations. It will do this by generating specific insights and verifying generalisable solutions from the context of total artificial heart recipients –who must engage with critical controllers constantly. This project expects to generate new knowledge in design by establishing a new research topic around an under-examined user cohort. Expected outcomes of this project include interaction design theory developments and improved controller design techniques. This should provide significant benefits and competitive advantages by lowering stress and improving safety across a range of contexts.Read moreRead less
Mapping the Effectiveness of Automated Software Testing. This project aims to help software engineers build complex software systems in far more reliable and cost-effective ways. It takes an interdisciplinary approach by applying machine learning techniques to automatically test complex software systems. Expected outcomes include a novel methodology for assessing the strengths and weaknesses of test suites generated by automated software testing techniques and the approaches required for generat ....Mapping the Effectiveness of Automated Software Testing. This project aims to help software engineers build complex software systems in far more reliable and cost-effective ways. It takes an interdisciplinary approach by applying machine learning techniques to automatically test complex software systems. Expected outcomes include a novel methodology for assessing the strengths and weaknesses of test suites generated by automated software testing techniques and the approaches required for generating high-quality test cases. Such advances are urgently needed to avoid disasters when deploying software systems in the real world.Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distribute ....Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distributed data records. The intended outcome should bring users confidence for the secure adoption of cloud data storage services and significantly benefit enterprises that demand guaranteed protection on their proprietary data.Read moreRead less
Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop ....Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop a self-contained, reliable, compatible and verifiable crypto library; (2) we will develop security test software automatically to test and verify security of codes; and (3) we will provide intelligent decision support through argumentation to help developers to apply the library efficiently and correctly.Read moreRead less
Co-designing Innovations in Digital Storytelling with Older Adults. This project aims to investigate how emerging technologies can be leveraged to provide innovative ways for older adults to create and share their life stories to foster social wellbeing. Later life can be a time of considerable change, leaving people feeling disconnected from the people, places, and life events that are important to them. Autobiographical storytelling can help create links with one's past, but little is known ab ....Co-designing Innovations in Digital Storytelling with Older Adults. This project aims to investigate how emerging technologies can be leveraged to provide innovative ways for older adults to create and share their life stories to foster social wellbeing. Later life can be a time of considerable change, leaving people feeling disconnected from the people, places, and life events that are important to them. Autobiographical storytelling can help create links with one's past, but little is known about how technologies such as digital games and virtual reality can be used to enable older adults to share stories about their lives in a way that supports ongoing social interactions. This project is expected to co-design new forms of digital storytelling to improve social wellbeing of older adults. Read moreRead less
SenShaMart: A Trusted Internet of Things Marketplace for Sensor Sharing. This project aims to devise a novel Internet of Things (IoT) sensor sharing marketplace that permits IoT applications to discover, integrate, and pay for any IoT sensor data that is made available by other parties. The project will devise highly-scalable sensor classification, query processing, and transactions solutions and incorporate them in a pair of novel blockchains that work in tandem to securely manage all the infor ....SenShaMart: A Trusted Internet of Things Marketplace for Sensor Sharing. This project aims to devise a novel Internet of Things (IoT) sensor sharing marketplace that permits IoT applications to discover, integrate, and pay for any IoT sensor data that is made available by other parties. The project will devise highly-scalable sensor classification, query processing, and transactions solutions and incorporate them in a pair of novel blockchains that work in tandem to securely manage all the information and contracts needed by IoT applications to discover, integrate, pay, and use sensors provided by another parties. These IoT advancements will provide significant economic, environmental, and social benefits via making low-cost and immediate sensing available across the world.Read moreRead less