Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Toward inclusive peace. Toward inclusive peace. This project will investigate how peace agreements can advance women’s rights and participation after post-conflict and political transitions. It will examine the relationship between women’s presence in peacemaking processes, women’s rights and gender provisions in peace agreements, and women’s participation in post-conflict governance of countries with successful peace agreements. Women’s participation in peace processes makes a successful peace ....Toward inclusive peace. Toward inclusive peace. This project will investigate how peace agreements can advance women’s rights and participation after post-conflict and political transitions. It will examine the relationship between women’s presence in peacemaking processes, women’s rights and gender provisions in peace agreements, and women’s participation in post-conflict governance of countries with successful peace agreements. Women’s participation in peace processes makes a successful peace agreement likelier, but may not consolidate peace or lead to greater participation by women in the governance of the country. Anticipated outcomes are analysis of the relationship between peace processes and gender equality in conflict-affected societies; improved consular delivery of aid programmes in fragile states; and targeted air delivery that empowers women.Read moreRead less
Using data mining methods to remove uncertainties in sensor data streams. This project will develop key techniques for removing uncertainties in sensor data streams and thus improve the monitoring quality of sensor networks. The expected outcomes will benefit Australia by enabling improved, lower-cost monitoring of natural resources and management of stock raising.
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Gender after conflict: a gendered analysis of the international community's engagement in post-conflict zones. Efforts by the international community to transition post-conflict societies into peaceful democracies can be fraught with complex politics. This project seeks to examine the role that the international community's ideas and policies about gender have on the failures and successes of this transition.
Whistling While They Work: Enhancing the Theory and Practice of Internal Witness Management in Public Sector Organisations. The protection of whistleblowers and other internal witnesses to corruption, misconduct and maladministration is a great unsolved problem in public sector governance. Involving 11 integrity institutions, this first national study of internal witness management will describe and compare organisational experience under varying public interest disclosure regimes across the Au ....Whistling While They Work: Enhancing the Theory and Practice of Internal Witness Management in Public Sector Organisations. The protection of whistleblowers and other internal witnesses to corruption, misconduct and maladministration is a great unsolved problem in public sector governance. Involving 11 integrity institutions, this first national study of internal witness management will describe and compare organisational experience under varying public interest disclosure regimes across the Australian public sector. By identifying and promoting current best practice in workplace responses to public interest whistleblowing, the project will use the experience and perceptions of internal witnesses and first- and second-level managers to identify more routine strategies for preventing, reducing and addressing reprisals and other whistleblowing-related conflicts.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE150100015
Funder
Australian Research Council
Funding Amount
$430,000.00
Summary
Australian Facility for Taphonomic Experimental Research . Australian facility for taphonomic experimental research: The aim of this project is to establish a unique Australian research facility dedicated to studying the physical, chemical, and biological processes of human decomposition. This facility will be the first of its kind in Australia and the Southern Hemisphere, drawing together a collaborative team of experts in a broad range of taphonomy disciplines. The results of the research are ....Australian Facility for Taphonomic Experimental Research . Australian facility for taphonomic experimental research: The aim of this project is to establish a unique Australian research facility dedicated to studying the physical, chemical, and biological processes of human decomposition. This facility will be the first of its kind in Australia and the Southern Hemisphere, drawing together a collaborative team of experts in a broad range of taphonomy disciplines. The results of the research are expected to advance our limited understanding of the taphonomic processes acting on remains in a natural Australian environment. The outcomes will assist police and forensic services to improve their procedures for searching, locating, recovering, and identifying missing persons, victims of homicide, and victims of disaster on both a national and international scale.Read moreRead less
On effectively modelling and efficiently discovering communities from large networks. Finding and maintaining close communities from very large scale, dynamically changing networks is interesting and challenging. This project aims to develop new techniques to identify such communities as fast as possible through exploiting the rich semantics and individual relationships within the communities.