Embracing Changes for Responsive Video-sharing Services. Video-sharing platforms are a critical information channel for the public. Increasing scale and shifts in user base, with Generation Z now as the dominant user, have resulted in an unprecedented amount of ubiquitous changes in the content and users of these platforms which greatly challenges the responsiveness and quality of the services provided. This project aims to design innovative algorithms to effectively predict and leverage changes ....Embracing Changes for Responsive Video-sharing Services. Video-sharing platforms are a critical information channel for the public. Increasing scale and shifts in user base, with Generation Z now as the dominant user, have resulted in an unprecedented amount of ubiquitous changes in the content and users of these platforms which greatly challenges the responsiveness and quality of the services provided. This project aims to design innovative algorithms to effectively predict and leverage changes, optimise the value of changes, and extract insights from changes for diverse downstream applications of video-sharing platforms. The expected outcomes will create new-generation representation learning techniques, and provide practical tools to amplify the socioeconomic values of video-sharing platforms.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Efficient and Secure Word-Based Stream Ciphers for Wireless Communications. Wireless networks are increasingly being used for communication, and to manage and control Australia's critical infrastructure. However, current methods of securing wireless networks are flawed, putting the country's economy, environment, and citizens at risk. The most reliable method for protecting wireless communications requires secure and efficient encryption algorithms. However, flaws have been found in most algo ....Efficient and Secure Word-Based Stream Ciphers for Wireless Communications. Wireless networks are increasingly being used for communication, and to manage and control Australia's critical infrastructure. However, current methods of securing wireless networks are flawed, putting the country's economy, environment, and citizens at risk. The most reliable method for protecting wireless communications requires secure and efficient encryption algorithms. However, flaws have been found in most algorithms proposed to date. This project will examine existing algorithms and attacks to determine design criteria for secure encryption algorithms for use in a wireless environment. An algorithm which meets these criteria and can be implemented efficiently in hardware and software will be proposed.Read moreRead less
A novel low-energy process route for primary copper production utilising synergistic hydro- and pyro-metallurgical processes. With increasing demand for copper metal, there is an urgent need to find new ways to efficiently treat lower grade ores. The new process offers a way of significantly reducing energy consumption and greenhouse gas emissions in primary copper production and making more efficient use of the world's copper resources.
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE240100105
Funder
Australian Research Council
Funding Amount
$458,823.00
Summary
Towards Evolvable and Sustainable Multimodal Machine Learning. Machine learning is commonly limited to a single operational modality. To enable image, sound and language comprehension simultaneously would require machines to reuse knowledge and understand concepts from multimodal data. The project aims to build a sparse model and present a set of innovative algorithms to enhance model generalisation for addressing distributional and semantic shifts and minimise the computational and labelling co ....Towards Evolvable and Sustainable Multimodal Machine Learning. Machine learning is commonly limited to a single operational modality. To enable image, sound and language comprehension simultaneously would require machines to reuse knowledge and understand concepts from multimodal data. The project aims to build a sparse model and present a set of innovative algorithms to enhance model generalisation for addressing distributional and semantic shifts and minimise the computational and labelling costs for training multimodal systems. Its outcomes will enable evolvable learning of models to suit varying testing scenarios after deployment and whilst reducing energy consumption and carbon emission. The application of these techniques could benefit sectors such as E-commerce, agriculture and transport.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computatio ....Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computational and storage demands. This project will study five recently proposed public key algorithms and assess their suitability for various secure applications. These results are of significant potential value in Australia's electronic commerce market.Read moreRead less
Effect of Saline Water on Flotation Processes. The Australian mineral and coal industry is valued at $40 billion in export income per year. This significant component of the Australian economy will benefit from this research into the increased use of highly saline water to improve coal and mineral flotation recovery. The project will keep Australia at the leading edge of flotation research, research training and development for the coal and mineral industry. With direct relevance to the National ....Effect of Saline Water on Flotation Processes. The Australian mineral and coal industry is valued at $40 billion in export income per year. This significant component of the Australian economy will benefit from this research into the increased use of highly saline water to improve coal and mineral flotation recovery. The project will keep Australia at the leading edge of flotation research, research training and development for the coal and mineral industry. With direct relevance to the National Research Priorities: Water - a Critical Resource, this project will make contributions to the development of a more environmentally sustainable coal and mineral processing industry.Read moreRead less