Sort by
Refine Your Search
-
Category
-
Program
-
Field
-
through theory and simulation and/or experimental design and testing; developing new image reconstruction algorithms for providing more information with less radiation; and applying our techniques
-
healthcare application needs to analyze sensitive patient data across distributed nodes. Researchers and students can explore privacy-preserving algorithms and technologies like federated learning and zero
-
formula is true or false (EXPTIME vs NP). Can we develop and implement efficient algorithms for this problem? This problem has been attacked using multiple different methods for the past 40 years, without
-
systems from QC attacks, and accelerate the adoption of quantum-enhanced cybersecurity, AI, optimisation and simulation algorithms across Australian industries – aligning with the Digital Economy 2030
-
software is not on the blacklist" (without revealing the exact software). There are multiple aspects of this project. For all aspects, some cryptography background is required. Design and analysis of new
-
Anomaly detection is an important task in data mining. Traditionally most of the anomaly detection algorithms have been designed for ‘static’ datasets, in which all the observations are available
-
guarantees of FL. In this project, we aim at an ambitious goal - designing secure and privacy-enhancing algorithms and framework for FL and applying our designs into real-world applications. To achieve