Our Alumni

Worked With US

 

 

  • Deepak Puthal is a Lecturer (Assistant Professor) at the School of Computing, Newcastle University, United Kingdom and honorary fellow at University of Technology Sydney, Australia. Prior to this position, he was a Lecturer at University of Technology Sydney, Australia and an associate researcher at Commonwealth Scientific and Industrial Research Organization (CSIRO Data61), Australia. He has a Ph.D. (2017) from the Faculty of Engineering and Information Technology, University of Technology Sydney. His research spans several areas in Cyber Security, Blockchain, Internet of Things and Edge/Fog Computing. He serves on the editorial boards of top quality international journals including IEEE Transactions on Big Data, IEEE Consumer Electronics Magazine, Computers & Electrical Engineering (Elsevier), International Journal of Communication Systems (John Wiley & Sons), and Internet Technology Letters (John Wiley & Sons). He has received several recognitions and best paper awards from IEEE. For more details visit his website.
  • Alumni since:  Feb 2017
  • Current role:  Assistant Professor, Newcastle University
  • Publications:  Web site
  • Garrison received his Master of Science degree from the University of Electronic Science and Technology of China in 2013 and a PhD degree from the University of Adelaide, Australia, in 2017. His current research interests are hardware security and system security.
  • Address: MARSFIELD, NSW 2122, AUSTRALIA
  • Publications: Google Scholar
  • Tags: Hardware Security | Physical Unclonable Function | System Security | AI security

 

 

  • After receiving his Bachelor of Science in Computer Science degree from the University of Illinois at Urbana-Champaign, USA, Hendra moved to Singapore and spent most of his time working with SAP on Answers Anywhere product. It’s a NLP tool that helps software developers built an interpreter from human languages to executable computer instructions. He moved to Australia afterwards where he spent 6.5 years working with CSIRO Data61. During that period, he built microservices framework that solves the problem of discovering and linking distributed datasets from multiple sources. He also worked with cross-functional teams across CSIRO to develop internal tool that provides detailed information about CSIRO staffs along with their projects and publications. Furthermore, as part of the smart home IoT research project, he built Android application for managing and monitoring IoT devices. His ON Prime team received performance award for the work on “Blind Inspection” that provides full security and privacy for inspecting network packages. Afterwards, he then joined Atlassian as a Senior Software Engineer to work on Jira Service Desk product. Currently he is part of Amazon Web Services team in Seattle, Washington..
  • Alumni since:  August 2018
  • Current role:  Software Development Engineer at Amazon Web Services
  • Publications: Linkedin
  • Hyoungshick Kim is a distinguished visiting researcher at CSIRO Data61. He is also working as an associate professor in the Department of Software, College of Software, Sungkyunkwan University (SKKU), Republic of Korea. In 2011, he received his PhD in the Security Group at the Computer Laboratory, University of Cambridge with Prof. Ross Anderson, having written his thesis on complex network analysis for secure and robust communications. He worked in Samsung Electronics on research projects for secure home networking and content protection before pursuing a PhD. His research interests are usable security, blockchain and software security.
  • Alumni since:
  • Current role:
  • Tags: Usable Security | Data-driven Security | Software Security
  • Highlight: Interesting and practical research problems such as real-world malware analysis in CSIRO Data61 constantly motivate me to conduct research. I am always looking for a chance to collaborate with CSIRO Data61 members in order to solve such research problems. Please don’t wait for the perfect moment. Done is better than perfect!

 

 

  • Julian is an Associate Professor with Information Technology cluster of College of Science at Massey University, New Zealand. She is an experienced and passionate IT professional whose career has spanned over 15 years across industries, universities, and a top government research agency. Her core research focuses sit in two broad categories: cyber security and data science. In cybersecurity area; her research focuses on developing algorithms and protocols to protect user (via identity management and access control), system (via intrusion detection, trust based computing and trustworthy system, cloud/mobile protection), and data (via applied cryptography and data anonymization). In data science area, combining with her background in database research, her research focuses on developing privacy preserving techniques and machine learning algorithms to enhance the scope of big data analytics. Her techniques have been applied in real-life telco and health informatics trials with success. Prior to joining Massey, she was a leading research scientist at CSIRO (Commonwealth Scientist Industrial Research Organisation), Australia working on multi-million dollar projects within Australia and across Pacific. Before CSIRO, she was a professional java developer and a certified database administrator working at a cutting edge Australian software development industry. She is an active member of several database, cyber security and health data informatics research communities and has published more than 50 articles in the leading conferences and journal venues including IEEE and ACM. She obtained a BBus(Comp) from University of Western Sydney Australia, MinfTech with top 1% ranking and PhD from University of Sydney, all in Australia.
  • Alumni since:  Feb 2016
  • Current role:  Associate Professor at Massey University
  • Publications:  Google Scholar
  • Highlight: My highlight at CSIRO was working with many smart colleagues, the world class research environment, being on the inaugural AccelerationON program, and seeing my invention almost made to a commercial product!
  • Leda’s happiest when she’s writing. She has worked in communications roles in almost every sector she can think of, and now at CSIRO’s Data61 finds herself in a fast-paced world of innovation, mind-bending technology and brilliant minds. Being the adaptable type, she’s thriving on using her well-honed skills in content curation, strategic communication planning and social strategy in this new ecosystem.
  • Address: ADELAIDE, SA 5000, AUSTRALIA
  • Highlight: I’m inspired by taking on the not-so-comfortable. It’s in these
    spaces that we grow the most both professionally and
    personally.
  • Mehwish worked as a Research Scientist in the Security Data Science team at CSIRO’s Data61 for nearly two years. During this time she reckon she worked on exciting projects with awesome colleagues. She got the opportunity to work with the Cyber Security CRC on a project related to executive decision making. She also published several papers on misinformation in online social networks during her time at CSIRO. She has now moved to Flinders University as a Lecturer where I will be working in the Computer Science school.
  • Address: ADELAIDE, SA 5000, AUSTRALIA

 

 

  • Prof. Rajiv Ranjan is an Australian-British computer scientist, of Indian origin, known for his research in Distributed Systems (Cloud Computing, Big Data, and the Internet of Things). He is University Chair Professor for the Internet of Things research in the School of Computing of Newcastle University, United Kingdom. He is also the director of Networked and Ubiquitous Systems Engineering (NUSE) Group, jointly with Dr. Graham Morgan, in the School of Computing. He is an internationally established scientist in the area of Distributed Systems (having published about 275 scientific papers). He has secured more than $14 Million+ AUD (£7 Million+ GBP) in the form of competitive research grants from both public and private agencies. He is an innovator with strong and sustained academic and industrial impact and a globally recognized R&D leader with the proven track record. He serves on the editorial boards of top quality international journals including IEEE Transactions on Computers (2014-2016), IEEE Transactions on Cloud Computing, ACM Computing Surveys, ACM Transactions on the Internet of Things, The Computer (Oxford University), The Computing (Springer) and Future Generation Computer Systems. He is one of the highly cited authors (top 0.05%) in computer science and software engineering worldwide (h-index=52, g-index=158, and 15500+ Google scholar citations).
  • Alumni since:   September 2015
  • Current role:  Chair Professor in Computing Science and Internet of Things
  • Publications: Publications

 

 

  • Robertus is a lecturer at Soegijapranata Catholic University in Semarang Indonesia and Visiting Scientist at CSIRO Data61, Australia. He received his PhD from the Department of Computing, Macquarie University, Australia, in 2018 and masters degree in computing and information technology from the University of New South Wales, Australia, in 2009. Before returning to Soegijapranata Catholic University, Robertus worked as a research fellow at Macquarie University and CSIRO Data61. He was awarded a postgraduate studentship position at CSIRO Australia (2014–2017). In 2015, he received the best student paper award at IEEE BigData Congress 2015 and the best paper award at Web Information System Engineering (WISE) 2015 Conference. His current research interests include big data, social network analysis, and machine learning.
  • Alumni since:  May 2018
  • Current role:  Dean of Computer Science Faculty at Soegijapranata Catholic University
  • Publications:  Robertusnugroho
  • Highlight: Joining DSS allowed me to meet world class researchers and learn many good things that lead me to my current role and capability in research.

 

 

  • While at CSIRO, Sanat worked as a research fellow within the Information Engineering Laboratory (currently Distributed Systems Group). His primary involvement was in theNextStep online community project within the Human Services Delivery Research Alliance (HSDRA) between CSIRO and the Australian Government Department of Human Services (DHS). Working together with the Knowledge Discovery and Management Group, the project explored innovative use of social networks to help DHS customers achieve better outcomes through access to informational and emotional support in the online community.
    In addition to the delivery of the online community, Sanat and team researched into Social Trust within the online community, addressing questions like: how does trust evolve, how do we measure it, what influences trust, how do we visualise trust interactively, is trust dependent on engagement, how do we boost engagement etc.
  • Alumni since:  Oct 2014
  • Publications:  DBLP
  • Current role: Executive Technology Leader, Australian Government. As an executive leader in the Data and Artificial intelligence area, Sanat leads projects that seek to automate and optimise analytical capabilities that would support senior leaders to make efficient and effective investment decisions.
  • Shabnam is a postdoctoral research fellow at RMIT University jointly with CSIRO’s Data61 under the supervision of Prof. Xun Yi, and Dr Surya Nepal. Her current research focuses on searchable encryption, database security, privacy and data protection. Her research interests lie in the area of applied cryptography.
  • Publications: ORCID
  • Tags: Searchable Encryption | Cloud Data Protection | Privacy in Cloud | Applied Cryptography
  • Shifeng (aka Shi-Feng) is currently a research fellow in the Faculty of Information Technology at Monash University, Clayton. Meanwhile, he is a visiting scientist at CSIRO’s Data61. Prior to joining Monash, he obtained his PhD degree in Computer Science from Shanghai Jiao Tong University, China in 2016. His research interests centre on cryptography and data privacy, particularly: provably secure cryptosystems against side-channel attacks, data privacy-preserving technology in cloud storage and privacy-enhancing technology in blockchain.

 

 

  • Shiping is a principal research scientist at CSIRO’s Data61. He holds an conjoint A/Professor title with the University of New South Wales (UNSW) and the University of Sydney. He has been working on distributed systems for 20+ years with focus on performance and security. He has published 180+ research papers and has been actively participating in research communities through publishing papers, journal editorships and conference PC/Chair services. His current research interests include: application security, blockchain and service-oriented trusted collaboration. He is a senior member of the IEEE.
  • Alumni since:  May 2019
  • Current role:  Team Leader, CSIRO’s Data61
  • Publications: EDU | GitHub|ORCID|Google Scholar
  • Highlight: It has been a real pleasure to help Dr Nepal build up the DSS research group from scratch from NICTA/CSIRO merger in 2015. It allowed me to witness DSS growing from small to big, from weak to strong, from uncertain to confident, even though we faced a lot of difficulties including shortage of staff, funding, and trust. I consider it an honour to have been a part of that journey, which has become one of the most unforgettable experience & memory in my life.
  • Slivia is a R+ postdoctoral fellow targeting bugs. Her work is to design tools and systems to help developers check whether their development is secure and what potential attacks might happen. Consider from the security perspective, developers do not know how to fix existing bugs unless those bugs are pointed out. Therefore, Slivia’s tools are significant to help developers with identification. Her analysis mainly targets software such as apps and firmware, web protocols but is not limited to them.
  • Publications: Google Scholar
  • Tags: System Security | Web Security | Vulnerability Detection and Repair
  • Highlight: I particularly enjoy the opportunity to help others, particularly those less familiar with bugs.

 

 

  • Suraj is a driven senior technical professional with a love of client engagements+technology and ready to challenge the norms with senior executives.Demonstrated applied machine learning skills (search my name in Google Scholar and Patents) Experience building, testing and deploying data-driven software applications (check my client network) Strong software development background (born to code) Hands-on experience analyzing real-world data (Banking, industrial, retail, telco, oil&gas) Strong oral and written communication skills Ability to effectively communicate quantitative results to non-technical stakeholders Domain expertise in : data analytics, Cloud Paas Consulting experience in USA, A/NZ markets – directly interacting with clients to scope a problem, build a solution, and communicate the results.
  • Alumni since:  May 2012
  • Current role:  Consulting Architect at Elastic (Asia-Pacific)
  • Publications:  Google Scholar| LinkedIn
  • Highlight: It was fun working and living with talented, fun-loving people at CSIRO. Researchers are dedicated to science and technology, and are guided by elite leadership. I learnt a lot working with the brightest minds of Australia and was able to contribute towards publications, external funding initiatives (such as Nectar), and industry collaborations.
  • Tarique is working as a Postdoctoral Research Fellow at CSIRO’s Data61 and Macquarie University. He obtained a Master of Computer Science and Applications degree from Jamia Millia Islamia (India), and PhD degree in Computer Science from Swinburne University of Technology (Australia) jointly with CSIRO’s Data61. Prior to starting his current position, he held positions as Assistant Professor (currently on sabbatical leave) at Indian Institute of Technology Ropar, India, Postdoctoral Research Fellow at Australia’s Swinburne University of Technology, and Researcher at King Saud University in Saudi Arabia. He has authored/co-authored more than 25 research papers in leading international conferences and journals. His research has won a Best Paper award in the SSDBM 2017 conference and was one of the finalists for the ABJ70’s Kikuchi-Karlaftis Best Paper award in the TRB 2016 Annual Meeting. His research interest lies in the areas of data science, social networks, spatial database, and big data analytics.
  • Publications: ORCID |Google Scholar |DBLP
  • Tags: Data Science | Trust in Social Networks | Data-driven Cyber Security
  • Highlight: Data has immense potential, and Data61 provides the perfect platform to develop innovative ideas, algorithms, and systems to effectively use the data.
  • Terry’s main areas of expertise are in the big data and data analytics space. He has had multiple experiences developing big data solutions and software applications, predominantly leveraging Spark, HBase and Elasticsearch. More recently Terry has applied his expertise for developing graph storage and processing solutions to facilitate advance graph machine learning on large scale datasets, developing systems for distributed machine learning and a cloud-based marketplace for “climate risk” analytics in the financial services domain. Terry has now moved into the start-up world since August 2021 with Fivecast developing engineering solutions in the space of Open Source Intelligence (OSINT).
  • Travis is a senior engineer with over 20 years of experience across a wide range of industries. His passion is building great products with a focus on amazing end-user experiences.
  • Tran received her Bachelor degree from the Vietnam National University – University of Science in 2010, a Masters degree from Japan Advanced Institute of Science and Technology in 2012 and a PhD degree at the School of Computing and Information Technology, University of Wollongong, Australia in 2016. Tran was previously a Postdoc Research Associate at the Centre for Cybersecurity Education and Research, Old Dominion University, Virginia USA and is currently a Research Fellow at CSIRO’s Data61 and University of Wollongong. Her main research interest is applied cryptography, network security, and lightweight IoT computation.
  • Publications: Google Scholar
  • Tags: Functional Encryption | Broadcast Encryption | Secure Lightweight Computation | Smart IoT Devices | Blockchain Security
  • Highlight: I thoroughly enjoy research and feel thankful to work together with such great colleagues and experts to solve the new challenges of cryptography.

 

 

  • Xuyun is currently working as a senior lecturer in cyber security in Department of Computing at Macquarie University in Australia. Prior to that, he worked as a lecturer in The University of Auckland during 2016 ~ 2019 and a postdoc researcher in NICTA (National ICT Australia, now Data61, CSIRO) during 2014 ~ 2016. He got his PhD degree in Computer Science and Technology from University of Technology Sydney (UTS), Australia, and his Master’s and Bachelor’s degrees in the same major from Nanjing University, China. He worked as a co-supervised PhD student in CSIRO ICT from 2011 to 2014 under a top-up scholarship. His research interests include big data privacy and cyber security, scalable and secure machine learning, big data mining and analytics, cloud/edge/service computing and IoT, etc.
  • Alumni since:  Feb 2016
  • Current role: Senior Lecturer, Department of Computing, Faculty of Science and Engineering, Macquarie University; Undergraduate Cyber Security program leader
  • Publications:  Google Scholar| LinkedIn
  • Yifeng received a PhD degree in Computer Science from City University of Hong Kong, China in 2019, and a Bachelor of Information Engineering from South China University of Technology, Guangzhou, China in 2013. From 2014 to 2015, he worked as a Research Assistant in the Department of Computer Science, City University of Hong Kong. He received an Outstanding Teaching award for Teaching Assistants, Outstanding Academic Performance award, and the Chow Yei Ching School of Graduate Studies Scholarship from City University of Hong Kong in 2018. His current research interests include security in cloud media applications, security in IoT applications, and privacy-aware computing.
  • Address: MARSFIELD, NSW 2122, AUSTRALIA
  • Publications: GitHub
  • Tags: Cloud and IoT security | Machine Learning Privacy | Secure Computation

 

 

  • Zubair (B.S., M.S., Ph.D., CISSP) is a cyber security professional based in Melbourne. He is presently a senior lecturer in cyber security at Deakin University, Victoria, Australia. He has previously undertaken complex and mission critical cyber security projects, and has an impeccable track record as a cyber security inventor, academic, researcher and consultant. He has two US patents and eighty research articles in international journals and conferences. In addition, he has been interviewed on radio and TV channels on numerous occasions and has delivered more than a dozen keynote talks on cyber security internationally.
  • Alumni since:  Jan 2019
  • Current role: Senior Lecturer, Cyber Security, Deakin University, Victoria, Australia
  • Publications:  Google Scholar

 

Students

  • After working in industry for 10 years, Ahmad completed a Master of Science degree in Information Security from the University Technology of Malaysia, and a Master of Philosophy degree in Information Security from Queensland University of Technology. He is currently pursuing a PhD in Cybersecurity at Monash University. Ahmads key research interests include formal method, access control, healthcare and cryptographic protocols with a particular focus on cyber security in the dynamic cross-domain authorisation in Internet of Things (IoT) and healthcare system. He received the 2018 Fraunhofer Innovation Award InnoHealth Australia 2017-2019, and has introduced a decentralised access control model for dynamic collaboration of healthcare applications (published in InnoHealth 2019 (Australia and Germany), IEEE IM 2019 (USA) and IEEE TrustCom 2019 (New Zealand)).
  • Publications: ORCID
  • Tags: Network Security | Cryptography | Access Control | Healthcare and Formal Model

 

  • Vacation Scholar 2020
  • Adam is a Mathematics and Computer Science student from the University of Adelaide with a current interest in natural language processing and game theory. Having found his way to his current studies through a partial Bachelor of Science, as well as nine years teaching English literature and sociology, he is, naturally, also interested in educational statistics and intuitive automation. So, it comes as no surprise that Adam is excited to lend his skills to Data 61’s project on intuitive decision-making interfaces.

 

  • Vacation Scholar 2020
  • Aditya is a vacation student at CSIRO’s Data61. In 2019, Aditya received his Bachelor of Information Technology with a Distinction predicate from RMIT University Australia. In 2020 he received a Bachelor of Computer Science from BINUS University Indonesia for the double degree program. In the same year, he received his Bachelor of Science in Computer Science (Honours) degree with First-Class Honours predicate from RMIT University. His main research interests are in Cybersecurity, Blockchain technology, Privacy Preservation.

Tags: Cybersecurity | Cryptography | Blockchain | Distributed System | Privacy Preservation

LinkedIn Profile: https://www.linkedin.com/in/adityapribadi/

 

  • Vacation Scholar 2020
  • “I am a hardworking and enthusiastic student at The Australian National University studying Advanced Computing Honours with a major in Cybersecurity and a specialisation in ML. I am currently working as a vacation student at the Canberra, Black Mountain CSIRO site. My research is concerned with determining the latency and costs associated with running serverless computing based ML applications in comparison to virtualized servers or distributed containerised systems.”
  • Annie is a final year PhD student. Her research focuses on End-to-End IoT Security.
  • Publications: ORCID
  • Tags: IoT Security | Lightweight Authentication | 6LoWPAN | Network Packet Analysis | Deep Learning IDS

 

  • Alex is a final year Computer Science PhD at UNSW, focusing on Sample Efficient Reinforcement Learning. Previously he simultaneously completed an M.E. (UQ, 1st hons.) and MSc. (TUM, 1st hons.) in Electrical Engineering from the Technical University Munich with a thesis on humanoid robotics that received a rarely awarded 1.0. He administers and guest lectures the Neural network and Introduction to AI courses at UNSW.
  • Tags: Reinforcement Learning | Machine Learning | Artificial Intelligence | Representation Learning | Neural Networks
  • Bedeuro received his Master of Computer Science degree from Sungkyunkwan University of Republic of Korea in 2017. He is now PhD student in the Sungkyunkwan University. His current research interests are usable security and web security.
  • Tags: Usable security | Web security

 

 

  • Bin is a final year PhD student in the cyber security lab at Monash University, currently researching the privacy protection and consensus of blockchain systems. He has implemented a secured voting system on Hyperledger fabric, proposed and emulated a distributed file system for blockchain and proposed the routing protocols for secured payment channel networks. Prior to his PhD study, he worked at the IBM Linux Technology Centre in China as a software developer in the OpenStack Community.
  • Publications: GitHub
  • Tags: IoT Security | Blockchain | Distributed System Security | Privacy Protection

 

Student profile: https://www.d2dcrc.com.au/student-profile?id=30DyPFCee

 

My name is Calvin and I am a Vacation Student at CSIRO’s Data61, working under the Smart Shield project. I am a Computer Science and Commerce (Finance) graduate from UNSW who enjoys problem solving and developing innovative technical solutions, and thus I am excited to be working in the forefront of the cyber security space. I come from a technical background, with previous professional experience in internships at Commonwealth Bank and Accenture, and have strong experience in programming and full stack web development through both personal and university projects.

    • The focus of Chadni’s PhD is providing reference architecture for security orchestration and automation that can facilitate design and development of concrete self-adaptive security orchestration platform. Security orchestration and automation aim to integrate different types of multivendor security software used by a security operation centre to automate and accelerate the incident response process. Her work falls at the intersection of cybersecurity and software engineering that aims to provide architecture support for large-scale realisation of security orchestration and automation. Chadni is leveraging existing software engineering, analytical reasoning, natural language processing and machine learning tools and techniques to develop an intelligence self-adaptive security orchestration and automation platform.
    • Publications: Google Scholar
    • Tags: Software Engineering | Software Architecture | Cybersecurity | Security Orchestration and Automation | Natural Language Processing
    • Highlight: I find that attempting to address one of the critical issues faced by security operation centres – integrating multivendor isolated heterogeneous security software/tools – incredibly motivational. Mentoring has always played an essential role in my PhD Journey, that’s why working under the direct supervision of prominent researchers, such as Dr Surya Nepal and Professor Ali Babar, inspires me to improve my capabilities on a daily basis.
  • Chamila has submitted his thesis for examination in January 2020 with Dr Marthie Grobler and Dr Nalin Arachchilage as supervisors. Chamila is a PhD student at University of New South Wales, Canberra. Prior to his PhD, he worked as a software engineer at WSO2 Inc. Chamila’s research interests include API usability, programmer experience, programmer psychology and usable security.
  • Publications: Google Scholar
  • Tags: API Usability | Programmer Experience | Programmer Psychology | Usable Security
  • Charles is a PhD student at CSIRO’s Data61 researching distributed self-managing systems. Charles’s research is focused on creating more resilient and robust networks by decentralising existing network control models. Previously, Charles worked as a specialist for one of the largest (physical) metrology equipment suppliers in Australia, applying his expertise in a number of diverse engineering domains including aerospace, automotive, rail, defence, medical and power generation.
  • Publications: Google Scholar
  • Tags: Multi Agent Systems | Distributed Reasoning | Distributed Self-Managing Systems
  • Highlight: Since first learning about programming and AI in my early twenties, I have been working to transition my career. Now, working with world leading experts, I am truly inspired to apply myself in addressing the challenges of the future.
  • Vacation Scholar
  • Connor is currently studying Mechanical Engineering and Computer Science at the University of Adelaide with a focus on cyber security and defence. Connor has previously worked on engineering research projects at the University of Adelaide which focused on the design and computational analysis of load bearing structures. He is looking to develop his skills in the data science domain and use his engineering background to give a unique perspective to this field.
  • Tags: Cyber Security | Mechanical Engineering

 

Highlight: I am really excited about working with the bright scientists at CSIRO’s Data61 and looking forward to learning as much as possible from them.

  • Cong is currently pursuing a PhD degree under the supervision of Dr Joseph K. Liu, Shi-Feng Sun and Dr Josef Pieprzyk. His main research interests are applied cryptography and searchable symmetric encryption.
  • Publications: dblp |Google Scholar
  • Tags: Searchable Symmetric Encryption | Cryptography
  • Dennis is a PhD student at the University of Adelaide under the supervision of Joshua Ross and Lewis Mitchell in the School of Mathematical Sciences, and is interested in data science, systems design, meaningful insights and learning algorithms. Currently, he is working on developing models of disease outbreaks based on digital data, and understanding the inherent biases in digital data. Alongside this work, he is also investigating different statistical & machine learning algorithms to understand their mathematical foundations and their appropriate use.
  • Publications: Orcid
  • Tags: Epidemiology | Bayesian Inference | Digital Data
  • Highlight:

A major highlight was assisting the Australian Government response and preparedness for COVID-19 through epidemiological modelling, and being asked to help inform the greater public on the mathematics behind why we should flatten the curve by The Conversation.

  • Derui (Derek) received his Bachelor degree from Huazhong University of Technology, China and his Master of Science degree from Deakin University, Australia. He is working on adversarial machine learning and AI-related cybersecurity. Deep Neural Networks (DNNs) are powerful in machine learning tasks, yet DNNs are vulnerable to adversarial attacks. Investigating vulnerabilities of complex DNN systems and enhancing the robustness and resilience of the DNNs are the key to trustworthy and secure deep learning applications. Dereks other research interests include applied machine learning, decision-making systems, and complex networks.
  • Publications: Google Scholar
  • Tags: Cybersecurity | Adversarial Machine Learning | Deep Learning | Adversarial Examples
  • Dimaz Ankaa Wijaya (PhD at Monash University) submitted his thesis, entitled “Anonymity in Cryptocurrency”, in April 2020. He worked under Dr Dongxi Liu’s supervision for three years, supported by Data61 Top-up Scholarship. Dimaz focuses on anonymity in cryptocurrency. He is also interested in Blockchain technology implementation in taxation. A cryptocurrency is a decentralised digital currency that utilises blockchain technology to remove the role of a central authority. Monero is one of the cryptocurrencies that improves its anonymity by employing privacy-preserving cryptographic techniques, such as linkable ring signature. In this thesis, we explore three areas in Monero system that can cause anonymity problems. These areas are Monero transaction creation protocol, Monero protocol update, and Monero third-party services. We identify attack schemes to reduce honest users’ transaction anonymity. We then investigate the impact of Monero protocol updates to transaction anonymity. Lastly, we study wallet service providers that can trace Monero transactions and mining pools that leak information.
  • Publications: DBLP
  • Tags: Cryptocurrency | Blockchain
  • Highlight: I enjoyed my time at Data61, with Dr Marthie Grobler as line manager. I also participated in the CSIRO mentoring program with Dr Gary Delaney as a mentor. The programs and activities at Data61 allowed me to polish my organisational and communication skills that are going to be useful in my future career.
  • Hagen Lauer (Monash University) has submitted his thesis in January 2020 with his supervisors Carsten Rudolph (Monash) and Surya Nepal (Data61). Hagen was a PhD Candidate in the Faculty of Information Technology at Monash University, Australia where he conducted research on formal aspects of secure and trustworthy virtualisation systems. He received his Bachelor of Science and Master of Science in Computer Science from Technische Hochschule Mittelhessen respectively in 2013 and 2014. During his studies, he was a research assistant at the Fraunhofer Institute for Secure Information Technology where he worked on non-repudiation and tamper-resistant protocols for communication and industrial control systems. He joined Huawei’s German Research Center in Darmstadt in 2015 where he carried out research as a Security Technologist working on operating system integrity and verification. Before joining Monash University in 2016, he became an invited expert of the Trusted Computing Group where he currently serves as a co-chair for the Trusted Virtualized Platforms working group. Hagen’s research interest lies in the construction and verification of secure systems, formal methods, and information security. His PhD thesis deals with the formal analysis and design of next generation secure and trustworthy virtualisation systems. Producing verifiably secure virtualisation system designs is a fundamental step towards creating future distributed and cloud systems. Designing and composing large systems to provide desirable security guarantees is a core topic of the thesis.
  • Publications:  Google Scholar
  • Tags: Trusted Computing | Formal Methods | Virtualisation Security | Standardisation
  • Highlight:  My thesis entitled “Security and Trust I’m Virtual Environments” tackles the design and verification of a Virtual Trusted Platform for applications such as Cloud Computing. Virtualization is a core concept in modern cloud systems and clients place a vast amount of trust in the virtualization system to provide essential security guarantees such as data confidentiality and software integrity. A virtualization system’s unlimited access to software and data in virtual environments presents a genuine scientific challenge. The Trusted Computing Module (TPM) as part of a trusted platform can be used to establish trust in a computer and my thesis discusses challenges and presents solutions related to establishing trust in a virtual environment. With the help of my supervisors, I was able to make great progress and secure Monash University’s Postgraduate Publications Award for my thesis. With significant help from Data61, I was able to present our research at excellent venues which resulted in great feedback and many new research contacts across the globe. I am particularly grateful for Data61’s support in opportunities such as attending the 50th Turing Awards Conference, DSTG’s Hacking for Defense, Data61 Summer Schools, and several Trusted Computing Group events. Shortly after submitting my thesis, I joined the Fraunhofer Institute for Secure Information Technology in Darmstadt, Germany as a research associate where I conduct my research and coordinate R&D projects in the Digital Energy space. I felt well prepared for this role because of the experience and influence from my colleagues and supervisors at Data61 and I certainly hope to collaborate with them again in the future.
  • Jishan received her Bachelor and Master of Science degrees in Electrical and Electronic Engineering from Rajshahi University of Engineering and Technology, Bangladesh respectively in 2011 and 2014. She is currently a PhD student in the Faculty of Information Technology, Monash University, Australia. Her research interests include wireless communication and physical layer security.
  • Publications: Google Scholar
  • Tags: Physical Layer Security | Wireless Communication | Wireless Jamming
  • Jihyeon Ryu received the B.S. degrees in Mathematics and Computer science from the Sungkyunkwan University in 2018. She is currently working at the Information Security Group (ISG) towards a Master’s and Doctorate Integrated Course at Sungkyunkwan University.
  • Publications: Google scholar |SciProfile
  • Tags: Cyber Security | Machine Learning | User authentication
  • Highlight: I want to help many people around the world through research.
  • Junyaup is a master’s Postgraduate Student at CSIRO’s Data61. His research interests lie in media forensics, speech recognition, audio engineering and distributed systems. He received the Next Generation Leader award by Korea Professional Engineer Association (2019) and the highest prize by National Research Foundation of Korea by developing Wafer edge inspection system in X-corps festival (2019).
  • Tags: Media forensics | Speech recognition | Audio engineering | Distributed Systems | Software Engineering
  • Highlight: I love to talk about software engineering and deep learning subject papers. I’m always trying to show anything by my hand because I’m a researcher but also a developer.
  • Junyang received his Bachelor and Master of Science degrees from Nanjing University of Posts and Telecommunications, China. He is currently a PhD student with CSIRO’s Data61. Junyang is working on Android malware analysis and AI-related cybersecurity. His other research interests include deep neural networks and applied machine learning. Android mobile devices are becoming increasingly popular in people’s daily life, with approximately 74.45% of the global mobile market share in January 2019. The huge market share of Android mobile devices has contributed to the boom of Android malware, and Android malware has caused serious security and privacy risks to the end mobile users. Thus it is urgent to design effective and efficient automatic methods to detect Android malware.
  • Publications: ORCID
  • Tags: Cybersecurity | Android Malware Detection | Machine Learning | Static Analysis
  • Keelan is an Honours student at Edith Cowan University and collaborating with Data61. Currently, he is working on using machine learning techniques to detect spear phishing attacks. His research interests involve using artificial intelligence for security.
  • Publications:
  • Tags: Machine Learning | Phishing | Cyber Security

 

Highlight: I am excited to be a part of Data61 and be able to research cutting-edge AI technologies.

  • Kim is a student currently working on a comparison of federated learning and split learning on Raspberry Pi. As part of his research interest in web programming, he developed websites for the College of Software in SKKU. He also developed the indoor localisation algorithm with nTels as part of the Industry-Academy Cooperation Project, aligning with his interest in IoT. Kim did an internship at Data61 in 2019.
  • Tags: Deep Learning| Security | IoT
  • Kyuyeon is a senior student at the College of Software in Sungkyunkwan University, South Korea. His current research interests include split learning and privacy in deep learning. He is currently working on showing the performance of split learning in sequential data, using 1D convolutional neural network. Kyuyeon did an internship at Data61 in 2019.
  • Tags: Split Learning | 1d-cnn
  • Lee Dong Won is an undergraduate student of SKKU in mathematics and computer science. He is currently doing an internship at CSIRO. His research interests include graph theory, number theory and cryptography. He is analysing OTP protocol, used for connecting several IoT devices and mobile phone applications, and trying to extract random number generators of each OTP protocol in apps to figure out if these OTP protocols are secure enough. He is also working on a graph structure of networks that could better preserve privacy. Le Dong did an internship at Data61 in 2019.
  • Tags: Graph Theory | Security | Cryptography
  • Chamikara is a PhD researcher in computer science and software engineering at the School of Science, RMIT University, Melbourne, Australia, and a researcher at CSIRO’s Data61. Chamikara also works as a lecturer at the Department of Statistics and Computer Science, Faculty of Science, University of Peradeniya, Sri Lanka. He received his Bachelor of Science (special) in Computer Science from the University of Peradeniya, Sri Lanka in 2010 and his Master of Philosophy in Computer Science from the University of Peradeniya, Sri Lanka in 2015. His research interests include information privacy and security, data mining, data science, artificial neural networks, and fuzzy logic.
  • Publications: ORCID |Google Scholar |ResearchGate |ResearchID
  • Tags: Information Privacy and Security | Data Science
  • Highlight: I am delighted to be a part of Data61. It is full of enthusiastic scientists who make Data61 one of the best research institutes in the world.
  • Mohammad is currently pursuing a PhD degree with the School of Computer Science, University of Technology Sydney. His research interests include data security and privacy, machine learning, and blockchain systems. He also teaches IT subjects at Deakin College.
  • Publications: Google Scholar
  • Tags: Privacy | Anonymity | Location Verification | Machine Learning | Blockchain
  • Nan Sun received the bachelor’s degree (Hons.) in information technology from Deakin University, Geelong, VIC, Australia, in 2016, where she is currently pursuing the Ph.D. degree. Her current research interests include cybersecurity and social network security.
  • Publications: ORCID
  • Tags: Data-driven cybersecurity incident prediction | Cybersecurity | Network Security
  • Nicholas is a third-year PhD student working in the field of electronic voting. His research interests include secure voter authentication and participation privacy.
  • Publications: DBLP
  • Tags: Electronic Voting | Voter Authentication | Poll-site Voting
  • Shangqi is a third year PhD student at Monash University. His research mainly focuses on data privacy in cloud environment.
  • Publications: Google Scholar
  • Tags: Data Privacy | Secure Computation | Cloud Security
  • Soolin is a graduate student in the Department of Software, College of Information and Communication Engineering, Sungkyunkwan University, supervised by Prof. Hyoungshick Kim.
  • Her main research focus is on mobile security and usable security.
  • Publications: Google Scholar
  • Tags: Usable security | Mobile Security | Software engineering
  • Highlight: Done is better than perfect!
  • Vacation scholar
  • Sophie Do is a student at the University of South Australia. She is pursuing a degree in Information Technology and Data Analytics with an interest in data mining and statistical analysis. Currently, she is working on investigating visualisation techniques for different algorithms applied to cyber security data.
  • Tags: Cyber Security | Data Visualisation
  • Qin is a PhD student at the Department of Computer Science and Software Engineering, Swinburne University of Technology. He achieved his Master degree at Beihang University, Beijing China. His research interests are blockchain and cryptography.
  • Publications: ORCID |Google Scholar
  • Tags: Blockchain | Cryptography
  • Runchao is a first-year PhD student at Cybersecurity Lab, Monash University, under the supervision of Jiangshan Yu, Joseph Liu and Shiping Chen (from CSIRO’s Data61). His research focuses on all aspects of blockchain, particularly the scalability and the privacy of permissionless blockchains.
  • Publications: dblp
  • Tags: Blockchain | Distributed Computing | Applied Cryptography
  • Peter is currently a PhD student in the area of medical image security and bioinformatics at the Computing and Information Systems Department at the University of Melbourne. Peter is passionate about agile software processes and development of security application in telemedicine. He has worked in different software projects in the industry ranging from health information systems, biometric check-in systems, educational management software and booking systems. He currently mentors Master of Software Engineering students on agile processes in software engineering. His research is intended to find alternative means of securing medical image scans and associated patient data when such combinations are to be transmitted via a noise network that is prone to both malicious and unintentional attacks.
  • Publications: Google Scholar
  • Tags: Steganography | Software Process Optimisation | Java | Agile Development | Machine Learning
  • Highlight: The diversity in the technology, expertise and culture experience at Data61 is significantly motivational as it enables me expand my thoughts in interdisciplinary research. As computing is more of applied science, I am inspired to become more creative and design solutions to complex problems via simple ideas from diverse areas.
  • Ryou is an undergraduate student of SKKU in computer science. He is currently doing an internship at CSIRO co-working on the project MEDUSA (MalwarE Detection Using Statistical Analysis of System Normal Behaviour). His research interests include algorithms and security. Ryou did an internship at Data61 in 2019.
  • Tags: Algorithms | Security
  • Tae-Eun is an undergraduate student in computer engineering currently doing an internship at CSIRO’s Data61. She is working on the collection of data and implementing statistical analysis models in the MEDUSA (MalwarE Detection Using Statistical Analysis of System Normal Behaviour) project. Tae-Eun did an internship at Data61 in 2019.
  • Tags: Computer Vision | HCI | Graphics
  • Sami is a PhD student in the Department of Computing and Information Systems at Melbourne University. Sami is interested in studying users privacy in emerging technology applications in the health industry, such as Internet of Things, machine learning and AI. He is also a candidate of the Australasian College of Health Informatics (ACHI) Fellowship by Training Program (FbT) for health informatics research doctorate students. Sami has a career of 15 years and has held various positions in the field of IT and telecommunication value-added services.
  • Publications: ORCID |Researchgate |Google Scholar
  • Tags: Privacy | Internet of Things | Health Informatics | Emerging Technologies
  • Sunil is a proficient software engineer with more than three years of industry experience in software development. In his PhD, he is leveraging his experience to design and build an adaptive resource management framework for cloud hosted IoT data pipelines. Sunil aims to pursue a career as a software research engineer focusing on designing and building high performance software tools and frameworks for distributed systems. He proposes a novel resource allocation model for finding the QoS assured and cost-effective cloud resource for IoT data pipelines. It captures the end-to-end QoS requirements of the pipeline while reducing the total cost of ownership and achieves the state-of-the-art performance in terms of the cost-effectiveness and quality requirements. Sunil also proposes a novel resource management framework for an adaptive management of cloud resources utilising the autonomic computing paradigm and optimisation technique for cloud hosted IoT data pipelines. The framework defines and captures the notion of sustainable QoS, including the IoT data ingestion benchmarks during the adaptive resource management process. In addition, the framework considers the challenges in IoT data analytics such as data volume, velocity, and latency requirement.
  • Publications: Google Scholar |researchgate
  • Tags: Autonomic Computing | Optimisation | Cloud Computing | Big Data Pipeline | IoT

 

Vacation Scolar 2020

Veronika is a vacation student on CSIRO Data61. She received a Bachelor of Computer Science (Honours) degree with first-class honours from RMIT university in 2020. In the same year, she also received her Bachelor of Information technology from Bina Nusantara University. Her research interests focus on users’ privacy preservation in unsupervised recommendation applications in mobile edge computing and the cloud.

Tags: Machine Learning | Differential Privacy | Mobile Edge Computing | Cloud Computing | Distributed System |

  • Xiaogang is a PhD student at the Department of Computer Science and Software Engineering, Swinburne University of Technology. He got his Masters degree at Xian Jiaotong University. His expertise is in detecting vulnerabilities utilising fuzzing. Fuzzing is a popular technique utilised for finding software bugs. Famous fuzzing tools such AFL and OSS-FUZZ have found thousands of bugs in real world applications. His other research interests are system security and IoT security.
  • Publications: Google Scholar
  • Tags: Fuzzing | System Security | IoT
  • Xu’s research interests include secure authentication in Internet of Things (IoT), IoT security and applied cryptography.
  • Publications: ORCID id |Google Scholar
  • Tags: IoT | Cryptography | Authentication | Privacy | Security
  • Highlight: I get excited by doing research that I think can significantly improve our daily life.
    • Vacation Scholar
    • William is an undergraduate student at the University of Adelaide, studying a Bachelor of Computer Science and Mathematics. He is a Data61 summer vacation student in 2020. His interests include computer systems, architecture, and security and at home he enjoys writing retro game system emulators and mobile apps.
  • Yannan’s research interests include secure cloud storage and blockchain-based applications as she is aiming to address the privacy and security issues in blockchain with the cryptographic tools and find new blockchain-based applications.
  • Tags: Blockchain | Smart Contract | Solidity | Cloud Storage | Data Auditing
  • Highlight: Blockchain is a revolutionary topic that is fully decentralised. I enjoy working on such an emerging and challenging topic as my research interest. I like cryptography, which is mysterious and magical. Solving problems with crypto tools makes me happy and fulfilled. Talking to people about my research helps me a lot. I like to discuss my research topic with not only my supervisors but also my classmates and colleges, who will always inspire me a lot.
    • Jane is an undergraduate student at the College of Software at Sungkyunkwan University, South Korea. She is expected to graduate in February 2020. Her current research interests are deep learning, natural language processing, and AI security. She is working with CSIRO’s Data61 to detect a backdoor attack in neural networks. Jane did an internship at Data61 in 2019.
    • Tags: Deep Learning | Natural Language Processing | AI Security
  • Zhi is a PhD student in the School of Computer Science and Engineering at the University of New South Wales. His research interests are in the areas of system security and virtualisation, including rowhammer attacks and defences. He focuses on building a trustworthy system. Commodity OS kernels have broad attack surfaces due to a large code base and numerous features such as device drivers, making it necessary to reduce the attack surface as much as possible. Zhi received his Bachelor degree from Sichuan University, China in 2011 and his Masters degree from Peking University, China in 2014.
  • Publications: ORCID |Google Scholar
  • Tags: System Security | Virtualisation Security | Rowhammer
  • Highlight: OS kernel is the most privileged software component in bare-metal systems; how to enhance its security is always an interesting and important topic. If the kernel is compromised, then the whole system will be under control of the adversary. In that case, all the sensitive data that concerns users like cryptographic keys and credentials are no longer secure and cannot be trusted. Thus, it is pretty crucial to do research on the system security.
  • Zichan is an HDR scholarship holder at CSIRO’s Data61. She received her Honors and Bachelor degree in Information Technology at Deakin University. Motivated by her passion for Cybersecurity and programming, she involved in different projects ranging from visualization for Cybersecurity to anomaly detection using graph embedding. Her current research interests are intelligent anomaly detection and Software Defined-Network security. Her main techniques are machine learning algorithms and graph embedding algorithms.
  • Tags: Anomaly detection | Machine Learning | Graph Embedding | Graph Neural Network
  • Highlight: Step out of your comfort zone.