Computer Science has a long tradition of excellence at Melbourne. The arrival of Australia’s first computer to Melbourne in 1956 form the roots of our current computing research, which still examines how to realise the full potential of computer technology.
Our main strands of research balance theoretical and applied, established and new fields of exploration. Current areas of excellence include programming languages, algorithms, distributed computing, and cybersecurity and cryptography.
Effective data structures and algorithms optimise the performance of any computer program. Computer science has a number of continuing areas of interest including text information retrieval (search) technology, text indexation and compression, and the analysis of big data.
Databases and Information Retrieval
Databases is the study of efficient storage, retrieval, and management of large data, whereas information retrieval is the process of accessing and extracting relevant information from the databases.
Distributed Systems and Cloud Computing
Our world-leading distributed computing research group is pushing the boundaries of how we can extract more performance and computer-power from large-scale networks of computing devices. Fog, edge, cloud and grid computing issues are a continuing focus of our distributed computing work.
Programming Languages and Formal Verification
We work on designing and implementing programming language and formal verification tools and techniques that enable the development of high-assurance trustworthy software.
Quantum computing focuses on developing computer technology based on the principles of quantum theory, which explains the nature and behavior of energy and matter on the quantum (atomic and subatomic) level.
Security and Privacy
We are working on novel and practical solutions to improve the security and privacy of large real-world systems. Our research includes both attack and defense approaches that work on different layers, from web APIs, ML models, core software libraries to micro-architecture, firmware and hardware.
Software Engineering is a multidisciplinary field which focuses on the systematic design, development, testing, and maintenance of software applications and systems. Research areas within this theme encompass topics such as software quality assurance, agile methodologies, program repair, and human and social aspects of software engineering.
Groups, Labs and Centres
Melbourne eResearch Group (MEG)
The Melbourne eResearch Group (MEG) supports the development, support and delivery of research-oriented IT systems to a wide range of research communities at the University of Melbourne. We provide research-oriented software engineering using a combination of the current bleeding edge technologies through to more tried and trusted software solutions.
Cloud Computing and Distributed Systems (CLOUDS) Laboratory
The CLOUDS Lab is a software research and development group engaged in the design and development of next-generation computing systems and applications that aggregate or lease services of distributed resources depending on their availability, capability, performance, cost, and users' quality-of-service requirements.
Academic Centre of Cyber Security Excellence (ACCSE)
Our research capability is focused on key challenges, including detecting attacks in large, complex systems, using formal methods to design platforms that are resilient to attack, designing robust controllers for critical infrastructure, and providing a legal framework for the governance of cyber operations that span a range of jurisdictions.
While machine learning bots reduce the burden on human analysts by filtering information, cybersecurity poses unique challenges for human-bot teams. This project aims to develop rigorous science for human-bot cybersecurity teams, with the goal of developing cohesive teams that are robust to active human and machine learning adversaries.
|Given name||Family name||Position||Profile|
|Joseph||Bonneau||Associate Professor Of Cybersecurity||Profilefirstname.lastname@example.org|
|Rajkumar||Buyya||Redmond Barry Distinguished Professor||Profileemail@example.com|
|Ni||Ding||Doreen Thomas Postdoctoral Fellow||Profilefirstname.lastname@example.org|
|Patrick||Eades||Research Fellow in Approximate Data Structures||Profileemail@example.com|
|Thuan||Pham||Lecturer in Cybersecurity||Profilefirstname.lastname@example.org|
|Lida||Rashidi||Postdoctoral Fellow and Lecturer||Profileemail@example.com|
|Richard||Sinnott||Professor Applied Computing Science and Director, eResearch||Profilefirstname.lastname@example.org|
|Johanne||Trippas||Doreen Thomas Postdoctoral Fellow||Profileemail@example.com|
|Justin||Zobel||Redmond Barry Distinguished Professor and Pro Vice-Chancellor (Graduate & International Research)||Profilefirstname.lastname@example.org|
Computer Science Graduate Researchers
|Given||Family name||Profile||Thesis Title|
|Siddharth||Agarwal||Profile||Serverless computing optimization: reducing cold starts|
|Kasun||Amarasinghe||Profile||Learning index structure for multi-dimensional spatial data|
|Philip||Cervenjak||Profile||Approximation algorithms for submodular optimisation|
|Ming||Chen||Profile||A heterogeneous stream processing system based on online learning and blockchain in IoT|
|Zhuo (Zoey)||Chen||Profile||A Verified Cost Model for Call-By-Push-Value Lambda Calculus|
|Louis||Cheung||Profile||Formally Verified Data Compression Algorithms|
|Qifan||Deng||Profile||An Energy-Efficient Distributed System for Integration of Heterogeneous Resources|
|Luxin||Fang||Profile||Estimation of distribution power network topology from smart meter measurements|
|Duneesha||Fernando||Profile||Performance Anomaly-aware Management of Serverless Applications deployed in CaaS (Container as a Service) platforms|
|Wentao||Gao||Profile||Human-in-the-loop fuzzing for effective vulnerability discovery|
|Reyhaneh||Goli||Profile||User Search Modelling in Complex Querying Environments|
|Shuzhi||Gong||Profile||Social Media Fake News Detection Through Graph Based Deep Learning|
|Zifeng (Peaker)||Guo||Profile||Efficient structures for recency and string-searching queries in data streams|
|Yulun||Huang||Profile||Resource Management and Application Scheduling in Big Data Cloud|
|Zuo||Huang||Profile||Real-time hot-spot detection for the environmental sciences through deep learning, sensor networks and data fusion|
|Vincent||Jackson||Profile||Mechanised High-Level Verification for Concurrent Low-level Programs|
|Amanda||Jayanetti||Profile||Understanding User Attention in Mobile Augmented Reality|
|Jiankai||Jin||Profile||Analysing utility and tradeoffs of multi-party machine learning|
|Vinay||Kabadi||Profile||Automated software regression bug fixing|
|Zhenzhi||Lai||Profile||Security of Post-Quantum Algorithms for IoT|
|Rabindra||Lamsal||Profile||Social media analytics: a real-time machine learning approach|
|Cong Thanh||Le||Profile||Automated Software Bug Fixing|
|Alex Jacey||Ligthart-Smith||Profile||Preserving data privacy with semi-trusted adversaries|
|Pilar Selene||Linares Arévalo||Profile||Refinement types to simplify verification|
|Li||Profile||Type-Based Complexity Analysis for Higher-Order Functional Programs|
|Han||Liu||Profile||Enhancing Scientific Document Categorization with Taxonomy Information|
|Anupama Ruwanthika||Mampage||Profile||Context-aware dynamic resource management in fog/edge computing environments|
|Tharindu Lakmal||Muthugama||Profile||Spatiotemporal data and future transportation systems|
|Saeed||Nasehibasharzad||Profile||A high performance and near real-time integrated driving navigation and traffic controlling system|
|Mak||Nazecic-Andrlon||Profile||Efficient interval reasoning for floating-point arithmetic|
|Huy||Nguyen||Profile||Encoding additional natural language artefacts for better code representation|
|Thanh-Dat||Nguyen||Profile||Machine learning for program synthesis|
|Thanh Hoa||Nguyen||Profile||Serverless Quantum Cloud Computing|
|Lianglu||Pan||Profile||Automated vulnerability and flaw detection in network communications|
|Kalyani||Penyala||Profile||Machine learning-based Management of Data Centre Resources for Green Cloud Computing|
|Tianyu||Qi||Profile||Optimization of Data Processing and Resource Management for Distributed Stream Processing Systems|
|Landadinee||Rathuwadu||Profile||Self-Driving Databases: Statistical Sampling for Efficient Cost Estimation|
|Larissa||Salerno||Profile||Software installation in third-party software ecosystems|
|Tharindu Bandara||Saryakara Hewage||Profile||Learning-centric Resource Management in Energy-efficient Cloud Computing|
|Elisa||Shioji||Profile||Rules as code: Can privacy be automated?|
|Kwangsuk||Song||Profile||Storage systems management in cloud computing environments|
|Kanwal Aslam||Syed||Profile||Hash based post quantum cryptography on FPGA|
|Samuel||Thomas||Profile||Designing Efficient Algorithms for Big Data|
|Chenhao||Tong||Profile||Multi-agent Distributed Autonomous System Optimisation using Reinforcement Learning|
|Faxing||Wang||Profile||Removing trust assumptions for distributed zero-knowledge proofs|
|Lingfei||Wang||Profile||High performance event detection and tracking in social media|
|Zhe||Wang||Profile||Privacy-oriented Deployment of Health Application in Distributed Clouds|
|Zhiyu||Wang||Profile||A New Approach for Efficient Deployment of Applications in Edge Cloud|
|Ziren||Xiao||Profile||Runtime optimisation of distributed systems using reinforcement learning|
|Pengbo||Yan||Profile||Scalable, Principled Vulnerability Detection via Insecurity Logics|
|Hongwei||Yin||Profile||Real-time Action Recognition in Sports Games through Deep Learning on Mobile Devices|
|Zhiyuan||Zhang||Profile||Investigating and mitigating performance interference of shared execution in browsers|
|Zhuo||Zhang||Profile||Efficient algorithms for solving problems on massive data|
|Jie||Zhao||Profile||Autonomous workload management in federated cloud computing environments|
|Zihan||Yang||Profile||Deep learning in applications with limited data and computation resources|
|Zhuowei||Zhao||Profile||Learning-based algorithms with non-trivial theoretical guarantees for solving problems on massive data|
|Mike||Zhuang||Profile||Does the law make sense? Behavioral-Psychological tests of the Social Media Addiction Reduction (SMART) Act|