Advanced Multimedia Research Laboratory
| Title | Student | Degree | Supervisor |
|---|---|---|---|
| Vision-Based Postural Assessment of Upper-Body | Zewei Ding | Ph.D. (Integrated) - CSCI991 | Assoc. Prof. Wanqing Li, Prof. Philip Ogunbona |
| ConvNets-Based Action Recognition from Depth Maps Through Virtual Cameras and Pseudocoloring | Pichao Wang | Ph.D. | Assoc. Prof. Wanqing Li, Prof. Philip Ogunbona |
| Visual Concept-based Image Retrieval | Weitao Zhao | Ph.D. | Dr. Lei Ye, Assoc. Prof. Markus Hagenbuchner |
| Kernel representation for action recognition | Jianjia Zhang | Ph.D. (Integrated) | Assoc.Prof. Lei Wang |
| Affine-invariant Deep Matching for Image Dense Correspondence | Yan Zhou | Ph.D. (Integrated) | Assoc.Prof. Lei Wang |
| Visual Instance Retrieval with Deep Convolutional Networks | Zhimin Gao | Ph.D. (Integrated) | Assoc.Prof. Lei Wang, Dr. Luping Zhou |
| Creation and Evaluation of a Large Scale RGB-D Action Dataset | Jing Zhang | Ph.D. (Integrated) | Assoc.Prof. Wanqing Li, Prof. Philip Ogunbona |
| Learning an Action Lexicon | Lijuan Zhou | Ph.D. (Integrated) | Assoc.Prof. Wanqing Li, Prof. Philip Ogunbona |
| Learning structural dictionary based on inter-class similarity and representative margins | Yuyao Zhou | Ph.D. | Prof. Philip Ogunbona, Assoc.Prof. Wanqing Li |
Centre for Computer and Information Security Research
| Title | Student | Degree | Supervisor |
|---|---|---|---|
| A Practical Treatment on Keyword Privacy in Encrypted Data Searching | Rongmao Chen | Ph.D. | Prof. Yi Mu |
| Two stories, two protocols: Broadcast Encryption with Dealership and Online/Offline Ciphertext Attribute-Based Proxy Re-Encryption | Clementine Gritti | Ph.D. | Prof. Willy Susilo, Dr. Thomas Plantard |
| Short Ciphertext-Policy Attribute Based Encryption with Fine-Grained access control | Yinhao Jiang | Ph.D. | Prof. Willy Susilo, Prof. Yi Mu, Dr. Fuchun Guo |
| Functional Encryption By Encodings | Jongkil Kim | Ph.D. | Prof. Jennifer Seberry, Prof. Willy Susilo |
| Improved Identity-Based Online/Offline Encryption | Jianchang Lai | Ph.D. | Prof. Yi Mu, Dr. Fuchun Guo |
| Efficient Oblivious Transfer with Retrievable Receiver's Privacy | Weiwei Liu | Ph.D. (Integrated) | Prof. Yi Mu, Dr. Guomin Yang |
| Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key | Tran Viet Xuan Phuong | Ph.D. | Prof. Willy Susilo, Dr. Guomin Yang |
| Post Quantum Cryptography | Arnaud Sipasseuth | Ph.D. | Prof. Willy Susilo |
| Privacy-preserving grouping proof with key exchange in the multiple-party setting | Yangguang Tian | Ph.D. (Integrated) | Dr. Guomin Yang |
| Anonymous Proxy Signature with Hierarchical Traceability | Jiannan Wei | Ph.D. (Integrated) | Dr. Guomin Yang, Prof. Yi Mu |
| Proxy signature with revocation | Shengmin Xu | Ph.D. | Prof. Yi Mu, Dr. Guomin Yang |
| A Group Secret Handshakes Scheme using in VANET | Zhongyuan Yao | Ph.D. (Integrated) | Prof. Yi Mu, Dr. Guomin Yang |
| Threshold Broadcast Encryption with Keyword Search | Shiwei Zhang | Ph.D. | Prof. Yi Mu, Dr. Guomin Yang |
Centre for Intelligent Systems (Intelligent Systems Research Lab (ISRL))
| Title | Student | Degree | Supervisor |
|---|---|---|---|
| A Broker-Based Optimal Matching Approach of Buyers and Sellers for Multi-Attribute Exchanges in Open Markets | Dien Tuan Le | Ph.D. | Prof. Minjie Zhang, Dr. Fenghui Ren |
| Computational Approaches for Coordinating Concurrent Multiple Negotiations | Lei Niu | Ph.D. | Dr. Fenghui Ren, Prof. Minjie Zhang |
| GPU massive paralleled programming for a large scale learning problem | Van Tuc Nguyen | Ph.D. | Assoc.Prof. Markus Hagenbuchner |
| A Hybrid-learning Based Broker Model for Strategic Power Trading in Smart Grid Markets | Xishun Wang | Ph.D. | Prof. Minjie Zhang |
| Enhance Human Computer Interface with Electrotactile Feedback | Daniel Pamungkas | Ph.D. | Dr. Koren Ward |
| A Multiagent-Based Domain Transportation Approach for Optimal Resource Allocation in Emergency Management | Jihang Zhang | Ph.D. | Prof. Minjie Zhang, Dr. Fenghui Ren, Dr. Jiakun Liu |
Centre for IT-Enabled Transformation
| Title | Student | Degree | Supervisor |
|---|---|---|---|
| A Multi Perspective Approach for Understanding the Determinants of Cloud Computing Adoption among Australian SMEs | Salim Alismaili | Ph.D. | Assoc.Prof. Jun Shen, Dr. Mengxiang Li, Dr. Qiang He |
| Creating Business Value from Business Analytics: The Roles of Managerial Search and Resource Allocation Processes | Abhijith Anand | Ph.D. | Prof. Rajeev Sharma, Prof. Tim Coltman |
| Public Value Creation through Social Media Networks: Multi-methods research on Indonesia's disaster management agencies | Uuf Brajawidagda | Ph.D. | Prof. Akemi Chatfield |
| A Trust Model for Trust Establishment and Management in Business-to-Consumer E-Commerce | Cong Cao | Ph.D. (Integrated) | Dr. Jun Yan, Dr. Mengxiang Li |
| Exploration of Chinese perception of the quality of data collection processes in public health information systems | Hong Chen | Ph.D. | Assoc.Prof. Ping Yu, Prof. David Hailey, Prof. Ning Wang, Dr. Tingrui Cui |
| The Paradoxical Effect: Wearable Technologies, Exponential Growth & Privacy | Alexander Hayes | Ph.D. | Assoc.Prof. Katina Michael |
| Cloud Computing Data Breaches: A Socio-Technical Approach | David Kolevski | Ph.D. (Integrated) | Assoc.Prof. Katina Michael |
| Self-regulated oriented learning path for supporting seamless learning | Alva Muhammad | Ph.D. (Integrated) | Assoc.Prof. Jun Shen, Assoc.Prof. Ghassan Beydoun, Prof. Dongming Xu |
| Flood Modelling: Using Geo-Social Intelligence | Kun Yang | Master of Philosophy | Assoc.Prof. Katina Michael, Assoc.Prof. Jun Shen |
Decision Systems Laboratory
| Title | Student | Degree | Supervisor |
|---|---|---|---|
| Mining Requirements from Open-Source Software Development | Daniel Avery | Ph.D. | Dr. Hoa Dam, Prof. Aditya Ghose |
| Characterization and prediction of issue-related risks in software projects | Morakot Choetkiertikul | Ph.D. | Prof. Hoa Dam |
| Online Integration of Fragmented Semi-Structured Data | Handoko | Ph.D. | Dr. Janusz Getta |
| Optimization of Query Processing with Multilevel Storage | Nan Noon Noon | Master of Philosophy | Dr. Janusz Getta |
| Clinical process analytic: from synthetic to real data | Bakhtiar Sadeghi | Ph.D. | Prof. Aditya Ghose, Dr. Hoa Dam |
| Mining Process Task Post-Conditions | Metta Santiputri | Ph.D. | Prof. Aditya Ghose, Dr. Hoa Dam |
| Failure-oriented testing: Web applications | Elmin Selay | Ph.D. | Dr. Zhiquan Zhou, Prof. Willy Susilo |
SMART Infrastructure Facility
| Geolocating an area specific synthetic population into dwellings | Ajith Jayasekare | Ph.D. | Prof. Pascal Perez, Dr. Mohammad-Reza, Dr. Rohan Wickramasuriya |
| The Impact of Implementing Virtual Reality Worlds for Safety Training in the context of Mining Industry | Shiva Pedram | Ph.D. | Prof. Pascal Perez, Assoc.Prof. Stephen Palmisano |
| Flood Modelling: Using Geo-Social Intelligence | Kun Yang | Master of Philosophy | Assoc.Prof. Katina Michael, Assoc.Prof. Jun Shen |
Software Design Science
| Real time multi agent systems platform | Amir Ashamalla | Ph.D. | Assoc.Prof. Ghassan Beydoun |
| Learning Through Online Social Interactivity | Matt Halliwell | Ph.D. | Dr. Mark Freeman |
| An agent-based knowledge analysis framework in disaster management | Dedi Iskandar Inan | Ph.D. | Assoc.Prof. Ghassan Beydoun |
| Application of MBSE (Model Based Systems Engineering) Methodologies and tools to bring more transparency into the contracting of large and complex infrastructure systems | Farid Shirvani | Ph.D. | Assoc.Prof. Ghassan Beydoun, Prof. Peter Campbell |
Other research areas
| Title | Student | Degree | Supervisor |
|---|---|---|---|
| Development and Empirical Validation of A Stakeholder Value Driven Framework for Evaluating Big Data Portals in Government | Wisam Al-Zubaidi | Ph.D. | Dr. Akemi Chatfield |
| Fully Homomorphic Encryption using Hidden Ideal Lattice with Public Key Compression | Zhunzhun Chen | Master of Philosophy | Prof. Willy Susilo, Dr. Thomas Plantard |
| Data Mining to Identify the Relationship between Effective Use of EHR and Risk Management for Resident Safety in Australian Aged Care Homes | Tao Jiang | Ph.D. | Assoc.Prof. Ping Yu, Dr. Jun Ma |
| An Access Control Mechanism for patients, healthcare professionals and healthcare organisations | Sao Ian Leong | Ph.D. | Assoc.Prof. Khin Than Win, Prof. Willy Susilo |
| Automatic Test Case Prioritization | Chen Liu | Ph.D. | Dr. Zhiquan Zhou |
| Technological contributions to end-user vulnerability | Lindsay Robertson | Ph.D. | Assoc.Prof. Katina Michael, Dr. A Munoz Aneiros |
| Decision Making during Natural Disaster through Visualisation using Social Image Data | Asslam Umar Ali | Ph.D. (Integrated) | Assoc.Prof. Katina Michael, Mr. Etienne Turpin, Dr. Tomas du Chemin Hodlerness, Assoc.Prof. Ghassan Beydoun |
| Policies for Information & Cyber Security | Junhua Zhang | Ph.D. | Dr. William Tibben, Assoc.Prof. Khin Than Win |
