Whole-genome multivariate reaction norm model for complex traits. This project aims to develop a multivariate whole-genome genotype-covariate correlation and interaction model that can be applied to a wide range of existing genome-wide association study (GWAS) datasets. Genotype-covariate correlation and interaction (GCCI) are fundamental in biology but there is no standard approach to disentangle interaction from correlation in the whole-genome analyses. This project will address the key featur ....Whole-genome multivariate reaction norm model for complex traits. This project aims to develop a multivariate whole-genome genotype-covariate correlation and interaction model that can be applied to a wide range of existing genome-wide association study (GWAS) datasets. Genotype-covariate correlation and interaction (GCCI) are fundamental in biology but there is no standard approach to disentangle interaction from correlation in the whole-genome analyses. This project will address the key feature in biology, which relates to dissecting the complex mechanism of association and interaction. The proposed statistical model implemented in a context of a novel design based on multiple GWAS data sets is a paradigm shifting-tool with applications to multiple industries.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
The right to be forgotten: GDPR modelling in cross-domain social networks . The project aims to develop a theoretical model and practical mechanisms to address the critical challenge – ‘right to be forgotten’ - raised from the General Data Protection Regulation (GDPR) with minimal compromising of the utility of the data. To achieve the aim, we will design a ‘right to be forgotten’ framework and associated erasure mechanisms that are effective even information is derived from multiple related soc ....The right to be forgotten: GDPR modelling in cross-domain social networks . The project aims to develop a theoretical model and practical mechanisms to address the critical challenge – ‘right to be forgotten’ - raised from the General Data Protection Regulation (GDPR) with minimal compromising of the utility of the data. To achieve the aim, we will design a ‘right to be forgotten’ framework and associated erasure mechanisms that are effective even information is derived from multiple related social networks. The framework will be created by identifying heterogeneous information, modelling individual behaviour patterns and designing erasure policies. The outcomes of the project can be used by the government to provide privacy guarantees to Australian cyberspace and by industry to protect their clients’ privacy.Read moreRead less
Characterising inheritance patterns of whole genome DNA methylation. This project aims to characterise epigenetic diversity and inheritance patterns in whole genome sequencing data from a unique human population. The project will employ the well-characterised Norfolk Island genetic isolate, cost-effective whole genome bisulphite sequencing technologies and advanced bioinformatics pipelines and statistical models. It will involve cross-discipline collaboration between human geneticists, epigeneti ....Characterising inheritance patterns of whole genome DNA methylation. This project aims to characterise epigenetic diversity and inheritance patterns in whole genome sequencing data from a unique human population. The project will employ the well-characterised Norfolk Island genetic isolate, cost-effective whole genome bisulphite sequencing technologies and advanced bioinformatics pipelines and statistical models. It will involve cross-discipline collaboration between human geneticists, epigeneticists, statistical geneticists and bioinformaticians. This project will advance our understanding of the interaction of genetics and epigenetics and their relationship to diversity and inheritance in humans.Read moreRead less
Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate ....Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate the privacy concerns of people using online tools that require providing personal information.Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Cybersecurity ethics training simulations for values-based decision-making. This Project will investigate ways to train reflective ethical decision making in cybersecurity management through the design of interactive social simulations. The Project will advance understanding and management of human factors in cybersecurity breaches and the field of serious game design for cybersecurity training by using new techniques for building artificially intelligent virtual agents, drawing on interdiscipli ....Cybersecurity ethics training simulations for values-based decision-making. This Project will investigate ways to train reflective ethical decision making in cybersecurity management through the design of interactive social simulations. The Project will advance understanding and management of human factors in cybersecurity breaches and the field of serious game design for cybersecurity training by using new techniques for building artificially intelligent virtual agents, drawing on interdisciplinary expertise in ethics, artificial intelligence and serious game design. Expected outcomes of the Project include a new framework and technologies for cybersecurity training. This should provide significant benefits through deeper understanding of the ethical impact of new cybertechnologies and training solutions.Read moreRead less
Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and ....Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and an industrial-strength open-source framework that can significantly raise the bar on mobile software quality and security for Android, the dominant smartphone platform accounting a current market share at 87.0% with 2.9 million apps at Google Play in December 2019.Read moreRead less
Identification of causal variants for complex traits. The aim of this project is to identify causal variants for complex traits in cattle and humans. Although most important traits in agriculture, medicine and evolution are complex traits, very few of the genetic variants affecting these traits are known and this undermines our understanding of how genetic variants affect a trait and practical uses of this knowledge. Huge datasets of individuals with genome sequence and phenotypes and new statis ....Identification of causal variants for complex traits. The aim of this project is to identify causal variants for complex traits in cattle and humans. Although most important traits in agriculture, medicine and evolution are complex traits, very few of the genetic variants affecting these traits are known and this undermines our understanding of how genetic variants affect a trait and practical uses of this knowledge. Huge datasets of individuals with genome sequence and phenotypes and new statistical methods provide the opportunity to close this gap. The outcome will be identification of many genomic variants causing variation in complex traits. This will benefit scientific understanding of complex traits and the ability to predict traits for individuals from their genome sequence.Read moreRead less
Smart Personalized Privacy Preserved Information Sharing in Social Networks. This project aims to create a novel and effective method for privacy protection at individual level, which is now a great concern of persons, businesses, and government agencies in this big data age. The project expects to build an automatic smart practical personalized privacy preserving system through removing the fundamental obstacles. The project will significantly advance human knowledge of privacy, and push Austra ....Smart Personalized Privacy Preserved Information Sharing in Social Networks. This project aims to create a novel and effective method for privacy protection at individual level, which is now a great concern of persons, businesses, and government agencies in this big data age. The project expects to build an automatic smart practical personalized privacy preserving system through removing the fundamental obstacles. The project will significantly advance human knowledge of privacy, and push Australia to the front line of the research field, and protect Australia better. Read moreRead less