Computer science
Computer Science has a long tradition of excellence at Melbourne. The arrival of Australia’s first computer to Melbourne in 1956 form the roots of our current computing research, which still examines how to realise the full potential of computer technology.
Our main strands of research balance theoretical and applied, established and new fields of exploration. Current areas of excellence include programming languages, algorithms, distributed computing, and cybersecurity and cryptography.
Research Themes
-
Algorithms
Effective data structures and algorithms optimise the performance of any computer program. Computer science has a number of continuing areas of interest including text information retrieval (search) technology, text indexation and compression, and the analysis of big data.
-
Databases and Information Retrieval
Databases is the study of efficient storage, retrieval, and management of large data, whereas information retrieval is the process of accessing and extracting relevant information from the databases.
-
Distributed Systems and Cloud Computing
Our world-leading distributed computing research group is pushing the boundaries of how we can extract more performance and computer-power from large-scale networks of computing devices. Fog, edge, cloud and grid computing issues are a continuing focus of our distributed computing work.
-
Programming Languages and Formal Verification
We work on designing and implementing programming language and formal verification tools and techniques that enable the development of high-assurance trustworthy software.
-
Quantum Computing
Quantum computing focuses on developing computer technology based on the principles of quantum theory, which explains the nature and behavior of energy and matter on the quantum (atomic and subatomic) level.
-
Security and Privacy
We are working on novel and practical solutions to improve the security and privacy of large real-world systems. Our research includes both attack and defense approaches that work on different layers, from web APIs, ML models, core software libraries to micro-architecture, firmware and hardware.
-
Software Engineering
Software Engineering is a multidisciplinary field which focuses on the systematic design, development, testing, and maintenance of software applications and systems. Research areas within this theme encompass topics such as software quality assurance, agile methodologies, program repair, and human and social aspects of software engineering.
Groups, Labs and Centres
-
Melbourne eResearch Group (MEG)
The Melbourne eResearch Group (MEG) supports the development, support and delivery of research-oriented IT systems to a wide range of research communities at the University of Melbourne. We provide research-oriented software engineering using a combination of the current bleeding edge technologies through to more tried and trusted software solutions.
-
Cloud Computing and Distributed Systems (CLOUDS) Laboratory
The CLOUDS Lab is a software research and development group engaged in the design and development of next-generation computing systems and applications that aggregate or lease services of distributed resources depending on their availability, capability, performance, cost, and users' quality-of-service requirements.
-
Academic Centre of Cyber Security Excellence (ACCSE)
Our research capability is focused on key challenges, including detecting attacks in large, complex systems, using formal methods to design platforms that are resilient to attack, designing robust controllers for critical infrastructure, and providing a legal framework for the governance of cyber operations that span a range of jurisdictions.
-
CATCH
While machine learning bots reduce the burden on human analysts by filtering information, cybersecurity poses unique challenges for human-bot teams. This project aims to develop rigorous science for human-bot cybersecurity teams, with the goal of developing cohesive teams that are robust to active human and machine learning adversaries.
- Toby Murray
Group leader
- Olya Ohrimenko
Group leader
People
Given name | Family name | Position | Profile | |
---|---|---|---|---|
Lachlan | Andrew | Lecturer | Profile | lachlan.andrew@unimelb.edu.au |
Giuseppe | Barca | Associate Professor | Profile | Giuseppe.Barca@unimelb.edu.au |
Rajkumar | Buyya | Redmond Barry Distinguished Professor | Profile | rbuyya@unimelb.edu.au |
Farhana | Choudhury | Lecturer | Profile | farhana.choudhury@unimelb.edu.au |
Chitchanok | Chuengsatiansup | Senior Lecturer | Profile | c.chuengsatiansup@unimelb.edu.au |
Shaanan | Cohney | Lecturer | Profile | cohneys@unimelb.edu.au |
Philip | Dart | Senior Lecturer | Profile | philip.dart@unimelb.edu.au |
Junhao | Gan | Lecturer | Profile | junhao.gan@unimelb.edu.au |
Bach | Le | Lecturer | Profile | bach.le@unimelb.edu.au |
Alistair | Moffat | Professor | Profile | ammoffat@unimelb.edu.au |
Toby | Murray | Associate Professor | Profile | toby.murray@unimelb.edu.au |
Olya | Ohrimenko | Senior Lecturer | Profile | olga.ohrimenko@unimelb.edu.au |
Udaya | Parampalli | Professor | Profile | udaya@unimelb.edu.au |
Thuan | Pham | Lecturer in Cybersecurity | Profile | thuan.pham@unimelb.edu.au |
Maria | Read | Lecturer | Profile | marodriguez@unimelb.edu.au |
Christine | Rizkallah | Senior Lecturer | Profile | christine.rizkallah@unimelb.edu.au |
Peter | Schachte | Senior Lecturer | Profile | schachte@unimelb.edu.au |
Richard | Sinnott | Professor Applied Computing Science and Director, eResearch | Profile | rsinnott@unimelb.edu.au |
Robert | Sison | Research Fellow | Profile | robert.sison@unimelb.edu.au |
Leon | Sterling | Professor | Profile | leonss@unimelb.edu.au |
Egemen | Tanin | Professor | Profile | etanin@unimelb.edu.au |
Patanamon | Thongtanunam | Arc Decra Fellow | Profile | patanamon.t@unimelb.edu.au |
William | Umboh | Lecturer | Profile | william.umboh@unimelb.edu.au |
Tony | Wirth | Professor | Profile | awirth@unimelb.edu.au |
Mansooreh | Zahedi | Lecturer | Profile | mansooreh.zahedi@unimelb.edu.au |
Zheguang | Zhao | Research Fellow | Profile | zheguang.zhao@unimelb.edu.au |
Justin | Zobel | Redmond Barry Distinguished Professor and Pro Vice-Chancellor (Graduate & International Research) | Profile | jzobel@unimelb.edu.au |
Computer Science Graduate Researchers
Given | Family name | Profile | Thesis Title |
---|---|---|---|
Siddharth | Agarwal | Profile | Serverless computing optimization: reducing cold starts |
Daghash | Alqahtani | Profile | Container Orchestration for AI-driven IoT Applications in Heterogeneous Computing Continuum Environments |
Unaiza | Alvi | Profile | Enhance Robustness and Reliability of Large Language Models for Software Engineering |
Kasun | Amarasinghe | Profile | Learning index structure for multi-dimensional spatial data |
Marjan | Azimi | Profile | Hierarchical Topics-Specific Expert Identification |
Peerachai | Banyongrakkul | Profile | Exploring bug reports in AI-based software applications |
Adam | Caldwell | Profile | Cyber defence challenges in developing island nations |
Philip | Cervenjak | Profile | Approximation algorithms for submodular optimisation |
Ming | Chen | Profile | A heterogeneous stream processing system based on online learning and blockchain in IoT |
Zhuo (Zoey) | Chen | Profile | A Verified Cost Model for Call-By-Push-Value Lambda Calculus |
Louis | Cheung | Profile | Formally Verified Data Compression Algorithms |
Qifan | Deng | Profile | An Energy-Efficient Distributed System for Integration of Heterogeneous Resources |
Chen | Exton | Profile | Reliable Information Systems |
Luxin | Fang | Profile | Estimation of distribution power network topology from smart meter measurements |
Duneesha | Fernando | Profile | Performance Anomaly-aware Management of Serverless Applications deployed in CaaS (Container as a Service) platforms |
Wentao | Gao | Profile | Human-in-the-loop fuzzing for effective vulnerability discovery |
Reyhaneh | Goli | Profile | User Search Modelling in Complex Querying Environments |
Shuzhi | Gong | Profile | Social Media Fake News Detection Through Graph Based Deep Learning |
Zifeng (Peaker) | Guo | Profile | Efficient structures for recency and string-searching queries in data streams |
Anh | Ho | Profile | Automated Bug Fixing Using Program Analysis and AI |
Gerald | Huang | Profile | TBA |
Yujin | Huang | Profile | Towards Secure and Robust On-device Deep Learning Models |
Zuo | Huang | Profile | Real-time hot-spot detection for the environmental sciences through deep learning, sensor networks and data fusion |
Vincent | Jackson | Profile | Mechanised High-Level Verification for Concurrent Low-level Programs |
Weijia | Jia | Profile | Causal Reinforcement Learning-Based Autonomous Intersection Management Optimization |
Jiankai | Jin | Profile | Analysing utility and tradeoffs of multi-party machine learning |
Vinay | Kabadi | Profile | Automated software regression bug fixing |
Zhenzhi | Lai | Profile | Security of Post-Quantum Algorithms for IoT |
Zhonghong | Lai | Profile | IP Protection for On-device Machine Learning |
Rabindra | Lamsal | Profile | Social media analytics: a real-time machine learning approach |
Cong Thanh | Le | Profile | Automated Software Bug Fixing |
Pilar Selene | Linares Arévalo | Profile | Refinement types to simplify verification |
Li | Profile | Type-Based Complexity Analysis for Higher-Order Functional Programs | |
Stephen | Luan | Profile | The application of Large Language Models in Cyber Security |
Luca | Morandini | Profile | Applicaiton of Large Language Models to the Geospatial Domain |
Saeed | Nasehibasharzad | Profile | A high performance and near real-time integrated driving navigation and traffic controlling system |
Huy | Nguyen | Profile | Encoding additional natural language artefacts for better code representation |
Thanh-Dat | Nguyen | Profile | Machine learning for program synthesis |
Thanh Hoa | Nguyen | Profile | Serverless Quantum Cloud Computing |
Lianglu | Pan | Profile | Automated vulnerability and flaw detection in network communications |
Kalyani | Penyala | Profile | Machine learning-based Management of Data Centre Resources for Green Cloud Computing |
Tianyu | Qi | Profile | Optimization of Data Processing and Resource Management for Distributed Stream Processing Systems |
Tian | Qiu | Profile | Automated Program Synthesis for Security Testing |
Murtaza | Rangwala | Profile | Blockchain-based Decentralized Data Storage for Secure Microservices in Fog Computing |
Landadinee | Rathuwadu | Profile | Self-Driving Databases: Statistical Sampling for Efficient Cost Estimation |
Larissa | Salerno | Profile | Software installation in third-party software ecosystems |
Tharindu Bandara | Saryakara Hewage | Profile | Learning-centric Resource Management in Energy-efficient Cloud Computing |
Elisa | Shioji | Profile | Rules as code: Can privacy be automated? |
Kwangsuk | Song | Profile | Storage systems management in cloud computing environments |
Xiao | Sun | Profile | TBA |
Kanwal Aslam | Syed | Profile | Hash based post quantum cryptography on FPGA |
Samuel | Thomas | Profile | Designing Efficient Algorithms for Big Data |
Chenhao | Tong | Profile | Multi-agent Distributed Autonomous System Optimisation using Reinforcement Learning |
Faxing | Wang | Profile | Removing trust assumptions for distributed zero-knowledge proofs |
Lingfei | Wang | Profile | High performance event detection and tracking in social media |
Peiyong | Wang | Profile | Quantum Computing |
Zhe | Wang | Profile | Privacy-oriented Deployment of Health Application in Distributed Clouds |
Zhiyu | Wang | Profile | A New Approach for Efficient Deployment of Applications in Edge Cloud |
Ziren | Xiao | Profile | Runtime optimisation of distributed systems using reinforcement learning |
Zhibo | Xu | Profile | Towards Efficient and Privacy-preserving Deep Graph Learning |
Pengbo | Yan | Profile | Scalable, Principled Vulnerability Detection via Insecurity Logics |
Wenqi | Yan | Profile | Towards Effective and Efficient Parallel Fuzzing |
Hongwei | Yin | Profile | Real-time Action Recognition in Sports Games through Deep Learning on Mobile Devices |
Shen | Zhan | Profile | Enhancing Employability Assessment for Engineering Students and Graduates: A Multi-Stakeholder Perspective |
Zhiyuan | Zhang | Profile | Investigating and mitigating performance interference of shared execution in browsers |
Zhuo | Zhang | Profile | Efficient algorithms for solving problems on massive data |
Jie | Zhao | Profile | Autonomous workload management in federated cloud computing environments |
Zihan | Yang | Profile | Deep learning in applications with limited data and computation resources |
Zhuowei | Zhao | Profile | Learning-based algorithms with non-trivial theoretical guarantees for solving problems on massive data |
Mike | Zhuang | Profile | Does the law make sense? Behavioral-Psychological tests of the Social Media Addiction Reduction (SMART) Act |