Sort by
Refine Your Search
-
I supervise computational projects in electron microscopy imaging for investigating materials at atomic resolution. Some projects centre on analysing experimental data acquired by experimental
-
diseases of interest. The goal of this project is to develop computational models using text and images (and possibly other data modalities) to help medical experts to improve the quality of patient care
-
Strait Islander peoples. This ground-breaking course is a transformational leadership program for Indigenous Australians, designed to strengthen Australia’s Indigenous workforce in public, private and
-
this goal, we expect to deeply and comprehensively explore the following directions: 1) Investigate privacy-enhancing techniques (e.g., differential privacy and/or secure multi-party computation) and design
-
I am seeking PhD candidates interested in working on designing Learning Analytics or similar reflection interfaces that automatically highlight design elements of data visualisations and generate
-
, Melbourne. We are seeking PhD candidates interested in developing methods to assist the formative assessment and improvement of collocated teamwork, by making multimodal activity traces visible and available
-
tools that would allow individuals to understand their own personal risk at any time in their lives. We plan to offer appropriate health care strategies that combine guidance and maintenance to provide a
-
older than 18 years old without giving away any more personal details. PETs are extremely powerful tools and have potential to solve major privacy issues encountered today. They can help to minimise
-
, due to the difficulty of designing models which can condition on the context, coupled with the difficulty of creating workable abstractions of the context. In our work, we have made progress on using
-
application, AML has attracted a large amount of attention in recent years. However, the underlying theoretical foundation for AML still remains unclear and how to design effective and efficient attack and