This flagship encompasses research into innovative data management, storage and indexing techniques as well as addressing the challenge of keeping data secure in the rapidly changing and increasingly online data ecosphere.
The ability to capture, analyse and utilise data is crucial to decision making on many levels. The proliferation of mobile devices, sensors and social networks has led to the generation of massive amounts of data about individuals, groups of individuals and organisations. Besides having to deal with this deluge of data in terms of storage and efficient access, current data systems must also deal with new types of data analysis. Both challenges require re-thinking of the way data management systems should be developed. In addition, the adoption of online computing services and communication devices in recent years has brought with it a wide variety of security challenges, from privacy violations through to financial fraud and service interruptions. These challenges have been aggravated due to the lack of effective technologies for enforcing security without compromising the convenience of use of online services.
The flagship currently incorporates, amongst others, projects in high performance databases, spatial data management, information retrieval, cryptographic technologies, information forensics, network security and biometrics.
The major research themes that the flagship operates under are as follows:
- Research and develop technology that supports data analytics at large scale for industry and research community.
- Research and develop technology for individual data capture, analysis and visualisation of individual data from mobile device and sensors.
- Development and investigation of the application of innovative data system solutions to a specific industry and/or research problems.
Research and development of technology that:
- Provides robust authentication and identification in uncontrolled environment with pervasive devices and limited special infrastructure
- Ensures information privacy, integrity and robustness to users of information and communication technology
- Leverages today's online, mobile and cloud-based computing infrastructure
|Nandita Bhattacharjee || Advanced implementation systems; Audio Watermarking; Computer Systems Security; Computer vision; Image and signal processing;Digital design; Hardware implementation of neural networks |
|Muhammad Cheema || Databases; Uncertain data; Computational geometry; Spatial databases |
|Maria Indrawan-Santiago || Data Mining; E-science data management; Information Retrieval; Pattern Recognition; Pervasive Computing; Ubiquitous Computing |
|Phu Dung Le || Computer Systems Security; Data encryption; Denial of Service; Filtering; Flexible Authentication Technique, Packet filtering; Passport (identification token); Token Filter Technique (TFT); Ubiquitous Wireless Communication; Visa (authorisation token) |
|Vincent CS Lee || Big data analytics; Collaborative networks; Complex problem optimisation; Disruptive/radical/business model innovations; Microblogging; Neural, Evolutionary and Fuzzy Computation; Pattern Recognition and Data Mining; Terrorism Informatics; Twitter |
|Ariel Liebman || Energy market modelling and analysis capability Wholesale market price projections; carbon price simulatio; Smart Grid Modelling; Electricity and energy market modelling; Price forecasting and portfolio analysis; Energy Efficiency, Distributed Energy and Demand Managemen |
|Chris Ling || Computational logic and Formal languages; Frontier technologies; Mobile Web services; Mobile technologie; Ubiquitous Computing; Web technologies |
|Bala Srinivasan || Data mining through adaptive learning network; Data structures for OODBS; Image quality and coding techniques for storage and transmission; Information and image retrieval; Temporal modelling and databases; Unconventional file structures |
|Ron Steinfeld || Pseudorandom bit generators; Cryptographic hash functions; Public key encryption; digital signatures; Signcryption; Secure multiparty computation protocols; Application of lattice basis reduction algorithms in cryptology and computational number theory |
|David Taniar || Computation Theory and Mathematics; Distributed Computing; Information Systems; Mobile databases |
|Campbell Wilson || Content-based multimedia retrieval; Digital libraries; Probabilistic information retrieval |
|Joseph Liu || Cyber-physical security; Lightweight security; Future transportation security; Privacy enhanced technology; Public key cryptography; Identity-based cryptography; Digital signature; Attribute-based system; Anonymous signature|
|Carsten Rudolph||Cyber Security, Trusted Computing, Formal Methods, Security Protocols, Security Engineering, Digital Forensics, Forensic Readiness, Network Security, Security Verification|