Our Students

  • Baiqi Chen is a PhD candidate at the University of Queensland and CSIRO’s Data61, under the supervision of A/Prof. Guangdong Bai. Her main research areas are human-centric cyber security and security usability. Baiqi’s PhD project explores the human-centric factors to inform the development of a framework for designing accessible and effective technology-mediated cyber security nudges. Specially, Baiqi investigates the use of nudges in the domain of Virtual Personal Assistant (VPA) applications and websites for diverse end-users in a variety of cyber security decision-making contexts.
  • Publications: Orcid
  • Ben is a PhD student at the University of Melbourne. He received a BSc. and MSc, both majority in Physics at the University of Melbourne. His Masters research project was on classical simulation of quantum computation, using stabilizer simulation techniques, and using this simulator to implement quantum error correcting codes. Now for his PhD project, Ben is working to develop a quantum compiler – taking high level code and transforming it into something that can be run on physical machines.
  • Tags: Tags: Quantum Computing | Compilers | Quantum Error Correction | Simulation
  • David is a Cyber Security CRC PhD student from the Edith Cowan University (ECU) in Perth, Western Australia. David’s PhD project relates to the semantic modelling of digital twins from a cyber security defence automation perspective. David also has an interest in the blending of blockchain technology into the digital twin and cyber-physical system domains. 
David comes to the research environment with a Master of Network Technology, a Master of Cybersecurity and extensive experience in private enterprise, where, as a network engineer, he worked for over 25 years in Australia and in other countries around the world providing business end-user network technical support.
  • This business experience gives David a unique perspective on the mutually beneficial returns from the interaction between research and commerce where his focus is on making research relevant to the business model.

  • Publications: Orcid: https://orcid.org/0000-0002-8644-4387
  • Tags: Network Engineering | Honeypots | Semantic Modelling | Digital Twins | Blockchaining

Erik is a Computer Science PhD candidate at UNSW Sydney and is working with the Cyber Security Collaborative Research Centre. His research focuses on the question of how collected data can be used safely for research purposes without harming privacy, e.g., preventing the re-identification of individuals from a shared dataset. Before coming to Sydney, Erik completed both his bachelor’s and master’s degree at the RWTH Aachen in Germany. Ever since his first seminar during his bachelor’s degree, Erik worked on projects that aim at the improvement of user privacy. For his bachelor’s thesis, he developed a platform that gives the users control over their own data and the decision of who is allowed to utilize it. In his master’s thesis, Erik developed a prototype for a privacy-preserving exchange platform that allows exchanging process parameters in industrial settings.

  • Personal Bio Website: https://erikbuchholz.de/
  • Publications: Google Scholar
  • Highlights: Personal privacy is a human right, and privacy protection plays a crucial role in today’s interconnected world. I am very excited to help finding solutions that allow the protection of individuals’ privacy without preventing sensible utilization of data and without hindering progress. By protecting everyone’s privacy, I want to contribute to making this world a safer and better place.
  • Tags: Privacy-enhancing Technologies | Cybersecurity | Sensitive Information Sharing
  • Falih is currently a Ph.D. Student at Federation University Australia, Ballarat Campus and working under the supervision of Dr. Kristen Moore (Data61), Dr. Chandra Thapa (Data61), and A/Professor Feng Xia (FedUni). His current research focuses on deploying graph learning and lifelong learning for human-centric applications. The activities include enabling the learning agent to learn continuously for addressing incremental tasks of graph data in a specific domain of misinformation and malicious activities.
  • Publications: https://scholar.google.com.au/citations?user=wqzYPTcAAAAJ&hl=en&oi=ao
  • Tags: Graph Learning | Lifelong Learning | Deep Learning | Human-Centric Cyber Security
  • Geetanjli pursued a Master of Information Technology degree from La Trobe University, Australia. She is a PhD candidate at the La Trobe University, Australia. She has spent couple of years as Software Developer in Amdocs, India. Her experience includes working on telecommunications and DTH projects that involves optimizing the services for better performance and high customer satisfaction. Her research interests focus on detailed study and mitigations of cyber security issues in different sectors i.e Health, Agriculture and Fintech using Distributed Machine Learning.
  • Tags: Federated Learning | Distributed Machine Learning | Cyber Security
  • Gnana is a PhD student attached to the School of Computing & Mathematics, Charles Sturt University. His interests are in privacy preserving data collection techniques for statistical aggregation. Currently his area of interest lies around Local Differential Privacy. He is being supported by a scholarship from the Cyber Security Corporate Research Centre.
  • Publications: Orcid ; ResearchgateGoogle scholar;
  • Tags: Data Privacy | Differential Privacy | Local Differential Privacy.
  • Hetong is a first year PhD student at The University of Queensland. He received his bachelor degree majoring in mechanical engineering from the Queensland University of Technology, Australia in 2018, and Master of IT degree from The University of Queensland, Australia in 2020. His research interests include data provenance, distributed Storage and any cyber security-related areas.

  • Publications: https://orcid.org/0000-0003-4149-6244
  • Tags: Data Provenance | Distributed Storage | Cyber Security
  • After nearly 3 years of experience as an Electrical Engineer in the industry, I am currently doing a Ph.D. in Quantum Machine Learning with applications in Cybersecurity at The University of Melbourne and CSIRO/Data61. My experiences over the years have enabled me to develop skills in leadership, problem-solving and decision-making. I intend to use these to bring a fresh perspective to my current research endeavours and make significant contributions to the field of Quantum Technologies.
  • Hossein Rahimpour is a PhD student at UNSW and CSIRO’s Data61. He is the recipient of the Australian Government Research Training Program (RTP) scholarship as well as the Cybersecurity Cooperative Research Centre scholarship 2021-2024. Hossein is a Chartered Professional Electrical Engineer and holds Mphil degree in Electrical Engineering from the University of Newcastle. He worked over 15 years in various roles in power industry with expertise in high voltage, transformers and asset management. Hossein’s PhD project explores the application of AI techniques in cyber protection of smart transformers in modern electrical network. The continuing digitisation of power grid and the evolving cyber-attacks motivated him to pursue a higher degree research in this area.
  • Tags: Cyber Security | Artificial Intelligence | Smart Grid | Smart Transformers
  • Jeff (Haodong) Lu is currently pursuing his PhD at the University of New South Wales (UNSW). He is an alumnus of the same institution, where he earned both his Bachelor’s degree and Honors in Computer Science. Jeff’s research is primarily centered around the development of reliable machine learning models and identifying potential vulnerabilities within these systems. He has a particular interest in the detection of out-of-distribution instances across a range of problem domains. His work is especially focused on deep learning models and the robustness of these models when faced with adversarial or abnormal samples. His dedication to enhancing the trustworthiness and resilience of machine learning systems is a testament to his commitment to the field.
  • Tags: Deep Learning | Trustworthy Systems
  • Publications: Orcid.

  • Kane is a Computer Science PhD candidate at UNSW working with The Cyber Security Cooperative Research Centre on security of distributed machine learning. Previously completed a Bachelor of Computer Science (1st class) at UNSW which culminated in a thesis on satellite image retrieval using unsupervised machine learning models. Kane began his career in the healthcare setting but developed a passion for deep learning and is now dedicated to ensuring Australia can use this amazing technology in a safe and secure way.
  • Publications: orcid
  • Tags: Machine Learning | Cybersecurity | Federated Learning
  • Keerth is a research affiliate of CSIRO. He gained his Bachelor of Science from ANU and worked in the analytics and software engineering industry before joining CSIRO. His research interests lie in representation learning. In particular, he is interested in interpretable generative models.
  • Tags: Generative models | Inference
  • Kevin is a commercially-minded QUT PhD candidate with over 20 years of experience in a diverse range of fields. These include cloud services (before it ever had such a name), banking, public health, energy, mining, and cybersecurity. He has the unusual distinction of having worked for 4 of CSIRO’s major business units in various capacities. He enjoys all things technical and reads as much as reasonably possible, and then some more.
  • I am a PhD student at the University of Western Australia, looking into developing quantum-inspired machine learning algorithms for improving cybersecurity. My research interests lie in this intersection of classical machine learning and quantum computing, and exploring the possible advantages that can be derived from quantum mechanics and distilled into classical computing models. I’ve also gained experience in various applications of classical machine learning. My work includes NLP for rumour generation to better combat the limitations of rumour detection models, anomaly detection techniques for maritime contexts with limited available data, and enhancing methods for visual field defect classification using perimetry data.
  • Publications: Google Scholar
  • Tags: Machine Learning | Quantum Computing | Quantum-Inspired ML | Cybersecurity
  • Highlight: I’m passionate about the transformative power of computer science education. As an educator, I aim to inspire and empower the next generation of software engineers and cybersecurity experts, helping them build the skills and knowledge they need to make their mark in this exciting field.
  • Mathew is a master’s student at the University of Adelaide. He received his bachelor’s degree in software engineering at the University of Adelaide in 2021. His research is centered in cyber security specially looking into vulnerability analysis using automated testing techniques.
  • Tags: Cyber Security | Fuzzing | Causality analysis
  • Mengyao is a PhD student at the University of Queensland (UQ) and is working with the UQ TrustLab. She received M.DS. degree at UQ. Her current research interest lies in Trustworthy AI within Distributed frameworks, under the supervision of A/Professor Guangdong Bai.
  • Publications: Google scholar
  • Tags: Trustworthy AI | Federated Learning | Distributed Machine Learning
  • Michael is a PhD student from the University of Adelaide focusing on binary vulnerability analysis using fuzzing techniques. He is particularly interested in manipulating and executing binaries in order to analyse them in new and unique ways.
  • Publications: Google Scholar
  • Tags: Cyber Security | Fuzzing | Emulation | Virtual Machine
  • My name is Mina Khan. I am a PhD candidate at Deakin University, Australia. My research focuses on developing a useability framework for Verifiable Credentials which will help promote the use of Decentralized Identity Management solutions. I am studying under the supervision of Prof Robin Ram Mohan Doss (Deakin University), Dr Jay Jeong (Deakin University), Dr. Marthie Grobler (CSIRO/Data61), Tina Wu (CSIRO/Data61), Jasmin Krapf (BUPA) and Paul Burrow (BUPA). Previously, I completed my Master of Information Technology from Charles Sturt University, Australia in 2018. The title of my final year project was “Internet of Things (IoT) From a Legal and Ethical Perspective”. I completed my Bachelor of Science in Electrical (Computer) Engineering from COMSATS Institute of IT, Pakistan in 2016. The title of my final year project was “IP Controlled Robot Receptionist/Guide through Raspberry Pi”. During my PhD, I am eager to learn from all my supervisors and just like them, become an expert in the field of cybersecurity.
  • Tags: Verifiable credentials | Decentralized Identity | Self-sovereign identity (SSI)
  • I am currently a PhD student in Cryptology from the University of Wollongong, under the supervision of Prof. Willy Susilo and Dr. Khoa Nguyen. Before that, I received a master’s degree in Cryptology in the University of Limoges (France) and spent 6 months as a research intern in the Institute of Mathematics of Bordeaux (France). My research aims at providing a better understanding about the current state of post-quantum cryptography, namely the theoretical foundation and connection between lattice-based and code-based cryptography, and possibly how they could be adapted to a quantum setting.
  • Publications:  Google Scholar; Publons; Research Gate; LinkedIn; ORCID
  • Tags: Lattice-based cryptography | code-based cryptography
  • Nikai is a PhD student in the Department of Software Systems and Cybersecurity at Monash University. She is a recipient of CSIRO’s Data61 PhD Scholarship as part of the Quantum Technologies Future Science Platform (QT-FSP). After being captivated by cryptography during her BSc in Mathematics and Computer Science at the University of Cape Town, she continued to pursue her studies in this field and in 2021 sealed her MSc in Mathematics of Cryptography and Communications from Royal Holloway, University of London. Her research interests include post- quantum cryptography, specifically lattice-based cryptography, and how it can be integrated with quantum cryptography. She will be under the supervision of Dr R. Steinfeld, Dr A. Sakzad and Dr M.F. Esgin from Monash University and Dr D. Liu from CSIRO during her PhD programme.

  • Publications:
  • Tags: Post-quantum cryptography | Quantum cryptography
  • Highlight:  I feel privileged to have this opportunity to work with such esteemed academics in my field of cryptography (and to explore a new country!). I am keen to contribute to an area I believe is critical in this Information Age when the threat posed by quantum computers is ever-looming.
  • Nuwan Kaluarachchi is an HDR candidate in mathematical sciences at RMIT. He is working with Multimodal multi-device continuous authentication to enhance safety by adding more protection over passwords and PINs to multiple devices simultaneously using machine learning and deep learning techniques under the supervision of Dr Arathi Arakala (RMIT), Dr Sevvandi Kandannarachchi (RMIT) and Dr Kristen Moore (Data61),. He completed his bachelor’s degree in Applied Statistics at the Faculty of Science, the University of Colombo, with a First Class Honours. He won the Gold Medal for the Best Student in Applied Statistics. He worked as an Associate data engineer at Altria Consulting Pvt. Ltd before arriving in Melbourne, Australia.
  • Tags: Use authentication | Biometrics | Machine learning algorithms | Anomaly detection
  • Highlight: ‘Digital security is essential in the highly digitalised world. I’m excited to support finding better solutions for providing a safe multi-device experience by enhancing the social well-being of the users. Your device is under your complete authenticity.’
  • Robert worked as a Research Assistant at QUT in 2019 investigating blockchain within industry application. Currently Robert is undertaking a PhD degree with QUT, CSIRO, and Data61 researching “Distributed and Privacy Preserving Analytics of Smart Grid Data”. Robert has over a decade of hands on experience in the ITC industry, including working for 5 years as the Network Administrator for the Statistical Institute of Belize.
  • Tags: Machine Learning | Blockchain Technology | Cybersecurity
  • Saud is a Doctoral Candidate with the School of Engineering at The Australian National University and Data61, CSIRO. He holds a first-class honours equivalent qualification and receives the equivalent Australian Government Research Training Program and CSIRO Postgraduate Research Scholarship. His previous background includes two years of full-time experience overseeing industrial project research at the Kumoh National Institute of Technology, South Korea, funded by the National Research Foundation of Korea (equivalent to Discovery Project of the Australian Research Council). His research focuses on bridging the gap between deep learning, the internet of things, and cybersecurity in the physical layer wireless communication domain.
  • Publications: https://scholar.google.com/citations?user=eEe1-SkAAAAJ&hl=en
  • Tags: Deep Learning | Internet of Things | Wireless Communication | Physical Layer Security
  • Shane is a PhD Candidate at University of Queensland and CSIRO’s Data61, under the subversion of A/Prof Guangdong Bai and Dr Sharif Abuadbba. His research interests include Trustworthy Machine Learning and Natural Language Processing. His existing research focuses on exploring the privacy issues of Large Language Models under Federated Learning setting.
  • Publications: Orcid
  • Tags: Machine Learning | Natural Language Processing | Trustworthy ML
  • Shuofeng Liu is a PhD student at the University of Queensland and Data6,1specializing in Trustworthy AI research. With a primary focus on Natural Language Processing (NLP), Shuofeng’s work revolves around exploring various aspects of NLP and its applications. His research interests encompass data privacy protection, NLP techniques, and computer vision. Shuofeng is passionate about the development of AI technologies that not only deliver accurate results but also prioritize privacy and fairness. By addressing the challenges in natural language understanding, sentiment analysis, and machine translation, he aims to contribute to the responsible and ethical deployment of AI systems across different domains.. Shuofeng remains dedicated to advancing the field of Trustworthy AI. With a strong foundation in NLP and a multidisciplinary approach, they strive to make meaningful contributions to the scientific community. By leveraging their expertise and collaborating with peers, Shuofeng aims to drive the progress of AI research, promoting its societal impact and ensuring the development of reliable and trustworthy AI systems.
  • Publications:Orcid
  • Tags: Trustworthy AI, NLP, CV, Deep Learning
  • Highlight: Shuofeng has already designed a Algorithm-specific encryption method to protect the original data from being leaked, called AlgoSpec. He is also extremally interested in trustworthy AI, especially in LLM, NLP and time-series data analysis domains. And now he devotes himself in researching how to build a task-specific LLM, for the sake of protecting the original input, and also finding a way to detect the AI-generated text.
  • Tina is a PhD candidate at the University of Queensland and CSIRO’s Data61.  Her research is focused on investigating AI-powered attacks on networks and developing novel  defences against these attacks. Prior to commencing her PhD, she completed a dual Bachelor of Software Engineering (Hons) and Science (Physics) at the University of Queensland, Australia.
  • Publications: Orcid | Google Scholar
  • Tags: Cybersecurity | Network Security  | Machine Learning |  Moving Target Defence
  • Highlight: As AI technologies proliferate, they’re starting to be used in malicious ways. Protecting against these is a new and important challenge. I’m very excited to be working to develop defences in such a fast developing field.
  • Xinyu is a first year PhD candidate in the department of software and cybersecurity at Monash University, whose research is sponsored by Data61 CSIRO. Xinyu’s research focuses on developing post-quantum multiparty signatures based on symmetric primitives (e.g., hash functions, pseudo-random functions, and block ciphers). She is passionate about cryptography, especially digital signatures, and variants (i.e., signatures involving multiple signers). Currently, she is working on constructing post-quantum multi-signature protocol utilising symmetric primitives only. She is also interested in applying the protocol to blockchain-based applications such as cryptocurrencies and blockchain-based supply chain systems.
  • Publications: Google Scholar
  • Tags: Cryptography | Post-Quantum Cryptography | Symmetric Primitives | Blockchain
  • Zahra is a Ph.D. student with the Center for Research on Engineering Software Technologies (CREST) at the University of Adelaide. Her research interests include Natural language Processing and Information Extraction using Deep Learning methods and their applications in the Cyber Security domain. She has already worked on constructing a Persian wordnet and improving machine translation using this wordnet and verb sense disambiguation. Currently, she is working on security automation and orchestration leveraging NLP techniques.
  • Publications:  Orcid
  • Tags: Deep Learning | Natural Language Processing | Cybersecurity
  • Zehang Deng is a PhD student at Swinburne University of Technology, Melbourne. His current research focuses on machine learning, particularly the security and robustness of machine learning systems on different cloud devices. He is dedicated to exploring methods that ensure tradeoffs between model utility, privacy and efficiency in federated learning settings.
  • Zhibo Xu is a PhD student at Monash University since 2022 under the supervision of Dr Xingliang Yuan and Dr Shangqi Lai. Prior to that, he received the Bachelor of Computer and Network Engineering (H1) from RMIT University in 2020. His research interests include using cryptographic tools to protect machine learning models, which leads to safe and secure training and inference of machine learning and AI models.
  • Tags: Machine Learning Privacy and Security | Privacy-preserving Machine Learning
  • Zihan (Andrew) Wang is a Ph.D. student at the School of Electrical Engineering and Computer Science, the University of Queensland. He is an innovative & adaptable student, with great problem-solving, communication, and teamwork skills. His current research focuses on tackling real-world security & privacy issues of machine learning systems in a formally verifiable manner. https://www.zihan.com.au/
  • Tags: Machine Learning | Privacy and Security | Formal Methods
  • Luna is a PhD student of SEIT at the University of New South Wales Canberra. She received her MS degree from University of Twente and Eötvös Loránd University in 2020, and the BE degree from Nanjing University of Posts and Telecommunications in 2016. Her research focuses on the automated vulnerability detection and repair in software
  • Tags: Software security | IoT security | Mobile security