Advanced Multimedia Research Laboratory

Title Student Degree Supervisor
Vision-Based Postural Assessment of Upper-Body Zewei Ding Ph.D. (Integrated) - CSCI991 Assoc. Prof. Wanqing Li, Prof. Philip Ogunbona
ConvNets-Based Action Recognition from Depth Maps Through Virtual Cameras and Pseudocoloring Pichao Wang Ph.D. Assoc. Prof. Wanqing Li, Prof. Philip Ogunbona
Visual Concept-based Image Retrieval Weitao Zhao Ph.D. Dr. Lei Ye, Assoc. Prof. Markus Hagenbuchner
Kernel representation for action recognition Jianjia Zhang Ph.D. (Integrated) Assoc.Prof. Lei Wang
Affine-invariant Deep Matching for Image Dense Correspondence Yan Zhou Ph.D. (Integrated) Assoc.Prof. Lei Wang
Visual Instance Retrieval with Deep Convolutional Networks Zhimin Gao Ph.D. (Integrated) Assoc.Prof. Lei Wang, Dr. Luping Zhou
Creation and Evaluation of a Large Scale RGB-D Action Dataset Jing Zhang Ph.D. (Integrated) Assoc.Prof. Wanqing Li, Prof. Philip Ogunbona
Learning an Action Lexicon Lijuan Zhou Ph.D. (Integrated) Assoc.Prof. Wanqing Li, Prof. Philip Ogunbona
Learning structural dictionary based on inter-class similarity and representative margins Yuyao Zhou Ph.D. Prof. Philip Ogunbona, Assoc.Prof. Wanqing Li

Centre for Computer and Information Security Research

Title Student Degree Supervisor
A Practical Treatment on Keyword Privacy in Encrypted Data Searching Rongmao Chen Ph.D. Prof. Yi Mu
Two stories, two protocols: Broadcast Encryption with Dealership and Online/Offline Ciphertext Attribute-Based Proxy Re-Encryption Clementine Gritti Ph.D. Prof. Willy Susilo, Dr. Thomas Plantard
Short Ciphertext-Policy Attribute Based Encryption with Fine-Grained access control Yinhao Jiang Ph.D. Prof. Willy Susilo, Prof. Yi Mu, Dr. Fuchun Guo
Functional Encryption By Encodings Jongkil Kim Ph.D. Prof. Jennifer Seberry, Prof. Willy Susilo
Improved Identity-Based Online/Offline Encryption Jianchang Lai Ph.D. Prof. Yi Mu, Dr. Fuchun Guo
Efficient Oblivious Transfer with Retrievable Receiver's Privacy Weiwei Liu Ph.D. (Integrated) Prof. Yi Mu, Dr. Guomin Yang
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key Tran Viet Xuan Phuong Ph.D. Prof. Willy Susilo, Dr. Guomin Yang
Post Quantum Cryptography Arnaud Sipasseuth Ph.D. Prof. Willy Susilo
Privacy-preserving grouping proof with key exchange in the multiple-party setting Yangguang Tian Ph.D. (Integrated) Dr. Guomin Yang
Anonymous Proxy Signature with Hierarchical Traceability Jiannan Wei Ph.D. (Integrated) Dr. Guomin Yang, Prof. Yi Mu
Proxy signature with revocation Shengmin Xu Ph.D. Prof. Yi Mu, Dr. Guomin Yang
A Group Secret Handshakes Scheme using in VANET Zhongyuan Yao Ph.D. (Integrated) Prof. Yi Mu, Dr. Guomin Yang
Threshold Broadcast Encryption with Keyword Search Shiwei Zhang Ph.D. Prof. Yi Mu, Dr. Guomin Yang

Centre for Intelligent Systems (Intelligent Systems Research Lab (ISRL))

Title Student Degree Supervisor
A Broker-Based Optimal Matching Approach of Buyers and Sellers for Multi-Attribute Exchanges in Open Markets Dien Tuan Le Ph.D. Prof. Minjie Zhang, Dr. Fenghui Ren
Computational Approaches for Coordinating Concurrent Multiple Negotiations Lei Niu Ph.D. Dr. Fenghui Ren, Prof. Minjie Zhang
GPU massive paralleled programming for a large scale learning problem Van Tuc Nguyen Ph.D. Assoc.Prof. Markus Hagenbuchner
A Hybrid-learning Based Broker Model for Strategic Power Trading in Smart Grid Markets Xishun Wang Ph.D. Prof. Minjie Zhang
Enhance Human Computer Interface with Electrotactile Feedback Daniel Pamungkas Ph.D. Dr. Koren Ward
A Multiagent-Based Domain Transportation Approach for Optimal Resource Allocation in Emergency Management Jihang Zhang Ph.D. Prof. Minjie Zhang, Dr. Fenghui Ren, Dr. Jiakun Liu
Centre for IT-Enabled Transformation

Title Student Degree Supervisor
A Multi Perspective Approach for Understanding the Determinants of Cloud Computing Adoption among Australian SMEs Salim Alismaili Ph.D. Assoc.Prof. Jun Shen, Dr. Mengxiang Li, Dr. Qiang He
Creating Business Value from Business Analytics: The Roles of Managerial Search and Resource Allocation Processes Abhijith Anand Ph.D. Prof. Rajeev Sharma, Prof. Tim Coltman
Public Value Creation through Social Media Networks: Multi-methods research on Indonesia's disaster management agencies Uuf Brajawidagda Ph.D. Prof. Akemi Chatfield
A Trust Model for Trust Establishment and Management in Business-to-Consumer E-Commerce Cong Cao Ph.D. (Integrated) Dr. Jun Yan, Dr. Mengxiang Li
Exploration of Chinese perception of the quality of data collection processes in public health information systems Hong Chen Ph.D. Assoc.Prof. Ping Yu, Prof. David Hailey, Prof. Ning Wang, Dr. Tingrui Cui
The Paradoxical Effect: Wearable Technologies, Exponential Growth & Privacy Alexander Hayes Ph.D. Assoc.Prof. Katina Michael
Cloud Computing Data Breaches: A Socio-Technical Approach David Kolevski Ph.D. (Integrated) Assoc.Prof. Katina Michael
Self-regulated oriented learning path for supporting seamless learning Alva Muhammad Ph.D. (Integrated) Assoc.Prof. Jun Shen, Assoc.Prof. Ghassan Beydoun, Prof. Dongming Xu
Flood Modelling: Using Geo-Social Intelligence Kun Yang Master of Philosophy Assoc.Prof. Katina Michael, Assoc.Prof. Jun Shen

Decision Systems Laboratory

Title Student Degree Supervisor
Mining Requirements from Open-Source Software Development Daniel Avery Ph.D. Dr. Hoa Dam, Prof. Aditya Ghose
Characterization and prediction of issue-related risks in software projects Morakot Choetkiertikul Ph.D. Prof. Hoa Dam
Online Integration of Fragmented Semi-Structured Data Handoko Ph.D. Dr. Janusz Getta
Optimization of Query Processing with Multilevel Storage Nan Noon Noon Master of Philosophy Dr. Janusz Getta
Clinical process analytic: from synthetic to real data Bakhtiar Sadeghi Ph.D. Prof. Aditya Ghose, Dr. Hoa Dam
Mining Process Task Post-Conditions Metta Santiputri Ph.D. Prof. Aditya Ghose, Dr. Hoa Dam
Failure-oriented testing: Web applications Elmin Selay Ph.D. Dr. Zhiquan Zhou, Prof. Willy Susilo

SMART Infrastructure Facility

Geolocating an area specific synthetic population into dwellings Ajith Jayasekare Ph.D. Prof. Pascal Perez, Dr. Mohammad-Reza, Dr. Rohan Wickramasuriya
The Impact of Implementing Virtual Reality Worlds for Safety Training in the context of Mining Industry Shiva Pedram Ph.D. Prof. Pascal Perez, Assoc.Prof. Stephen Palmisano
Flood Modelling: Using Geo-Social Intelligence Kun Yang Master of Philosophy Assoc.Prof. Katina Michael, Assoc.Prof. Jun Shen

Software Design Science

Real time multi agent systems platform Amir Ashamalla Ph.D. Assoc.Prof. Ghassan Beydoun
Learning Through Online Social Interactivity Matt Halliwell Ph.D. Dr. Mark Freeman
An agent-based knowledge analysis framework in disaster management Dedi Iskandar Inan Ph.D. Assoc.Prof. Ghassan Beydoun
Application of MBSE (Model Based Systems Engineering) Methodologies and tools to bring more transparency into the contracting of large and complex infrastructure systems Farid Shirvani Ph.D. Assoc.Prof. Ghassan Beydoun, Prof. Peter Campbell

Other research areas

Title Student Degree Supervisor
Development and Empirical Validation of A Stakeholder Value Driven Framework for Evaluating Big Data Portals in Government Wisam Al-Zubaidi Ph.D. Dr. Akemi Chatfield
Fully Homomorphic Encryption using Hidden Ideal Lattice with Public Key Compression Zhunzhun Chen Master of Philosophy Prof. Willy Susilo, Dr. Thomas Plantard
Data Mining to Identify the Relationship between Effective Use of EHR and Risk Management for Resident Safety in Australian Aged Care Homes Tao Jiang Ph.D. Assoc.Prof. Ping Yu, Dr. Jun Ma
An Access Control Mechanism for patients, healthcare professionals and healthcare organisations Sao Ian Leong Ph.D. Assoc.Prof. Khin Than Win, Prof. Willy Susilo
Automatic Test Case Prioritization Chen Liu Ph.D. Dr. Zhiquan Zhou
Technological contributions to end-user vulnerability Lindsay Robertson Ph.D. Assoc.Prof. Katina Michael, Dr. A Munoz Aneiros
Decision Making during Natural Disaster through Visualisation using Social Image Data Asslam Umar Ali Ph.D. (Integrated) Assoc.Prof. Katina Michael, Mr. Etienne Turpin, Dr. Tomas du Chemin Hodlerness, Assoc.Prof. Ghassan Beydoun
Policies for Information & Cyber Security Junhua Zhang Ph.D. Dr. William Tibben, Assoc.Prof. Khin Than Win