Please note the program, speaker and session details are subject to change. Please check this page regularly for updates. All times displayed are in AEDT.
All in-person sessions will be held at the UNSW Sydney, Kensington Campus.
For more details on the room locations and layout, please click on your session room name to be taken to the UNSW website.
Online Conferences:
To register for the online conferences, please access the registration page, and select “Online Only – AISC or HIKM Conferences”. Registration is free for the Online Conferences.
- The Australasian Information Security Conference (2024 AISC) – Online Only
- The Health Informatics and Knowledge Management Conference (2024 HIKM) – Online Only at https://zoom.us/j/9920072007
To view the HIKM Program please follow this link: https://hikm.org/hikm-2024/
Monday 29 January – AISC (Online Only)
AISC presenter details can be found here: https://sites.google.com/view/aisc2024/program?authuser=0
| 08:20 – 08:30 | Welcome and Opening Remarks
Prof Willy Susilo (Wollongong University) and Dr Nasrin Sohrabi (Deakin University) |
| 08:30 – 09:10 | Enhancing Security in Software
Prof Yang Xiang (Swinburne University) |
| 09:10 – 09:50 | The good, the bad, and the ugly: When PPG authentication meets AI
Dr Lei Pan (Deakin University) |
| 09:50 – 10:30 | Trusted Execution Environments Basics and Its Adoption in Machine Learning
Dr Shujie Cui (Monash University) |
| 10:30 – 11:10 | Security Challenges on Graph Neural Networks in MLaaS
A/Prof Xingliang Yuan (Melbourne University) |
| 11:10 – 11:50 | Public-Key Cryptography: What Have Been Done In the Past 50 Years?
Dr Fuchun Guo (Wollongong University) |
| 11:50 – 12:30 | Growing Security’s Big Tent
Dr Shaanan Cohney (Melbourne University) |
| 12:30 – 13:10 | Zero-Knowledge Proofs and Quantum-Safe Constructions
Dr Muhammed Esgin (Monash University) |
| 13:10 – 13:50 | Lunch Break |
| 13:50 – 14:30 | Secure Runtime Auditing & Guaranteed Device Healing in Low-end IoT Devices
Dr Norrathep Rattanavipanon (Prince of Songkla University) |
| 14:30 – 15:10 | Ultra-Resilient Blockchain Consensus and Beyond: Damysus and Fault Independence Challenges
A/Prof Jiangshan Yu (University of Sydney) |
| 15:10 – 15:50 | Enhancing Privacy and Security in Smart Cities: A Perspective from Intelligent Energy Management
Dr Wei Li (Univerity of Sydney) |
| 15:50 – 16:30 | Anonymous Blocklisting from Theory to Practice
Dr Xuoxia Yu (University of Wollongong) |
| 16:30 – 17:10 | Securing Industrial Systems in a Changing World: The Critical Role of Adaptive Intrusion Detection
Dr Abdullah Alsaedi (RMIT) |
| 17:10 – 17:50 | NativeVRF: A Simplified Decentralized Random Number Generator on EVM Blockchains
Dr Jakapan Suaboot (Prince of Songkla University) |
| 17:50 – 18:30 | Complexity and Simulation for Cybersecurity
Benjamin Turnbull (UNSW/ADFA) |
Tuesday 30 January
| 09:00 – 16:00 | Registration | Central Lecture Block | Ground Floor Foyer | |||
| Stream | Plenary | |||
| Room | O’Shane 105 | |||
| Session Chair | David Abramson | |||
| 09:30 – 09:45 | 2024 ACSW Official Opening and Welcome
David Abramson, President, CORE, Chair, 2024 ACSW |
|||
| 09:45 – 10:00 | CORE Award Presentations
David Abramson, President, CORE, Chair, 2024 ACSW |
|||
| Session Chair | Helen Huang | |||
| 10:00 – 11:00 | Learning with Noisy Labels
Tongliang Liu, University of Sydney, Winner, The CORE award for outstanding Research Contribution |
|||
| 11:00 – 11:30 | Morning Tea | Mathews Pavilions | |||
| Stream | ACE | ASESS | AusPDC | EnCore Talks – Computer Systems |
| Room | Mathews Theatre C | Mathews Theatre D | Mathews 307 | Mathews 309 |
| Session Chair | Nicole Herbert & Carolyn Seton | Fabian Gilson | Maria Rodriguez Read | Jian Yang |
| 11:30 – 12:00 | Using Program Comprehension Models to Teach Comprehensibility
Ewan Tempero |
Session 1: Requirements Engineering and Model-Driven Engineering
11:30 – 12:15 Requirements Engineering for Responsible AI 12:15 – 13:00 Low-code and Model-Driven Software Engineering |
Keynote: A Decade of Experiences Educating the Next Generation of Cloud Savvy Developers
|
OFence: Pairing Barriers to Find Concurrency Bugs in the Linux Kernel
Willy Zwaenepoel |
| 12:00 – 12:30 | Designing Problem Sessions for Algorithmic Subjects to Boost Student Confidence
André van Renssen |
Formalising the prevention of microarchitectural timing channels by operating systems
Robert Sison |
||
| 12:30 – 13:00 | A Literature-Informed Model for Code Style Principles to Support Teachers of Text-Based Programming
Diana Kirk |
Enhancing Time Series Data Predictions: A Survey of Augmentation Techniques and Model Performances
Alexander Victor, Ali Intizar |
Real-Time Scheduling with Predictions
Tianming Zhao |
|
| 13:00 – 14:00 | Lunch | Mathews Pavilions | |||
| Stream | Plenary | |||
| Room | O’Shane 105 | |||
| Session Chair | Rachel Cardell-Oliver | |||
| 14:00 – 14:30 | Scalable Methods for Time Series Classification
Angus Hugh Dempster, Monash University, Winner, The CORE award for the Australasian Distinguished Doctoral Dissertation |
|||
| Stream | ACE | ASESS | AusPDC | Workshop |
| Room | O’Shane 105 | Mathews Theatre D | Mathews 307 | Mathews 309 |
| Session Chair | Nicole Herbert & Carolyn Seton | Craig Anslow | Maria Rodrigues Read | Rachel Cardell-Oliver |
| 14:35 – 15:05 | Infusing Indigenous Perspectives into ICT Curriculum – Best Practitioner Paper
Nicole Herbert |
Session 2: Software Analysis
14:00 – 14:45 Hot Takes on Machine Learning for Program Analysis 14:45 – 15:30 Memory Safety and the Case for Modular VM Development
|
Tutorial: Practical Strategies:
Harnessing Reinforcement Learning for Effective Distributed System Management |
Building Genuine Educational Partnerships with Industry
Richard Buckland, University of New South Wales Rachel Cardell-Oliver, University of Western Australia |
| 15:05 – 15:35 | A Qualitative Study of Novice Experiences with Database Normalisation
Asanthika Imbulpitiya, Jacqueline Whalley |
|||
| 15:35 – 16:00 | Afternoon Tea | Mathews Pavilions | |||
| Stream | ACE | ASESS | AusPDC | Workshop |
| Room | O’Shane 105 | Mathews Theatre D | Mathews 307 | Mathews 309 |
| Session Chair | Nicole Herbert & Carolyn Seton | Omar Haggag | Maria Rodrigues Read | Rachel Cardell-Oliver |
| 16:00 – 16:30 | Decoding Logic Errors: A Comparative Study on Bug Detection by Students and Large Language Models
Stephen MacNeil |
Session 3: PhD research
16:00 – 16:45 PhD Lightning Talks 16:45 – 17:30 PhD Posters session
|
Blockchain-based Framework for Housing Establishments Support Services
Amirmohammad Pasdar |
Building Genuine Educational Partnerships with Industry – Continued
Richard Buckland, University of New South Wales Rachel Cardell-Oliver, University of Western Australia |
| 16:30 – 17:00 | The Effects of Generative AI on Computing Students’ Help-Seeking Preferences
Irene Hou |
Predicting and Avoiding Dog Barking Behaviour through Deep Learning
Richard Sinnott |
||
| 17:00 – 17:30 | A Comparative Study of AI-Generated (GPT-4) and Human-crafted MCQs in Programming Education
Chris Bogart |
|||
Wednesday 31 January
| 09:00 – 16:00 | Registration | Mathews Building – Ground Floor Foyer | |||
| Stream | Plenary | |||
| Room | Mathews Theatre B | |||
| Session Chair | Maurice Pagnucco | |||
| 09:30 – 10:30 | Swimming with the data: Philately will get you everywhere
Michael W. Godfrey, University of Waterloo |
|||
| 10:30 – 11:00 | Lightning Talks
Trading Privacy, Bandwith and Accuracy in Algorithmic Machine Learning Wen Hu, University of New South Wales Jiawei Hu, University of New South Wales |
|||
| 11:00 – 11:30 | Morning Tea & Posters | Mathews Pavilions
Posters: AI-Based Hybrid Predictive Models for Missing Energy Consumption Data Imputation. FlowZero: Zero-Shot Text-to-Video Synthesis with LLM-Driven Dynamic Scene Syntax Synthetic Data vs. Encoded Data: Which Method to Choose in Privacy-Preserving Downstream Analysis? High angular diffusion tensor imaging estimation from minimal evenly distributed diffusion gradient directions – Poster PDF BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning |
|||
| Stream | ACE | ASESS | AusPDC | EnCore Talks – Algorithms |
| Room | Mathews Theatre B | Mathews Theatre D | Mathews 307 | Mathews 309 |
| Session Chair | Nicole Herbert & Carolyn Seton | Fabian Gilson | Adel N. Toosi | Alistair Moffat |
| 11:30 – 12:00 | Incremental Development and CS1 Student Outcomes and Behaviors
Jaxton Winder |
Session 4: Empirical Software Engineering
11:30 – 12:15 Assessing the Progression of Software Engineering Competencies 12:15 – 13:00 Understanding Agile Software Development – Insights from Empirical Analysis of the Swiss Agile Studies |
Keynote: Navigating Patterns and Anti-patterns in Research Technology Adoption for Speed and EffectivenessMatt Greensmith |
Reconnecting the Estranged Relationships: Optimizing the Influence Propagation in Evolving Networks
Dr Taotao Cai |
| 12:00 – 12:30 | Testing Programming Aptitude through Commonsense Computing
Svana Esche |
Linear elasticity equations with uncertainties
Quoc Le Gia |
||
| 12:30 – 13:00 | A Static Analysis Tool in CS1: Student Usage and Perceptions
Michelle Craig |
Indoor Localization of Resource-Constrained IoT Devices Using Wi-Fi Fingerprinting and Convolutional Neural Network.
Inoj Neupane |
Generalized Out-of-distribution Detection: Theory and Algorithm
Feng Liu |
|
| 13:00 – 14:00 | Lunch & Posters | Mathews Pavilions
Posters: AI-Based Hybrid Predictive Models for Missing Energy Consumption Data Imputation. FlowZero: Zero-Shot Text-to-Video Synthesis with LLM-Driven Dynamic Scene Syntax Synthetic Data vs. Encoded Data: Which Method to Choose in Privacy-Preserving Downstream Analysis? High angular diffusion tensor imaging estimation from minimal evenly distributed diffusion gradient directions – Poster PDF BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning |
|||
| Stream | Plenary | |||
| Room | Mathews Theatre B | |||
| Session Chair | Alistair Moffat | |||
| 14:00 – 14:30 | Learnings from Australia and New Zealand Grant Assessments
John Grundy, Monash University, Winner, The CORE Distinguished Service Award |
|||
| Stream | ACE | ASESS | AusPDC | EnCore Talks – Cyber Security |
| Room | Mathews Theatre B | Mathews Theatre D | Mathews 307 | Mathews 309 |
| Session Chair | Nicole Herbert & Carolyn Seton | Craig Anslow | Maria Rodriguez Read and Adel N. Toosi | Salil Kanhere |
| 14:35 – 15:05 | Navigating the IT Skills Gap: Cultivating Job-Ready Graduates
Nicole Herbert |
Session 5: Mobile Security
14:45 – 15:30 Demystifying security and compatibility issues in Android Apps |
Panel Discussion on Exploring the Future of Parallel and Distributed Computing in the Era of Machine Learning | Reconstruction Attack on Differential Private Trajectory Protection Mechanisms
Salil Kanhere |
| 15:05 – 15:35 | Educator Experiences of Low Overhead Student Project Risk Management
Diana Kirk |
A Novel Analysis of Utility in Privacy Pipelines, Using Kronecker Products and Quantitative Information Flow
Natasha Fernandes |
||
| 15:35 – 16:00 | Afternoon Tea & Posters | Mathews Pavilions
Posters: AI-Based Hybrid Predictive Models for Missing Energy Consumption Data Imputation. FlowZero: Zero-Shot Text-to-Video Synthesis with LLM-Driven Dynamic Scene Syntax Synthetic Data vs. Encoded Data: Which Method to Choose in Privacy-Preserving Downstream Analysis? High angular diffusion tensor imaging estimation from minimal evenly distributed diffusion gradient directions – Poster PDF BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning |
|||
| Stream | ACE | ASESS | AusPDC | Workshop |
| Room | Mathews Theatre B | Mathews Theatre D | Mathews 307 | Mathews 309 |
| Session Chair | Nicole Herbert & Carolyn Seton | Omar Haggag | Maria Rodriguez Read | Rachel Cardell-Oliver |
| 16:00 – 16:30 | More Robots are Coming: Large Multimodal Models (ChatGPT) can Solve Visually Diverse Images of Parsons Problems
Irene Hou |
Session 6: PhD Journey, Diversity, and Inclusion
16:00 – 16:45 ENGclusion: setting up a longitudinal study 16:45 – 17:30 The PhD Journey |
Tutorial: Building an emulated testbed for edge computing and intent-based networking | Improving ARC Success Rates for Computer Science research: How we could do better
Robert Mun, Former ARC Executive Director, Engineering and Information Science, 2018-2023 Leon Sterling, University of Melbourne Rachel Cardell-Oliver, University of Western Australia |
| 16:30 – 17:00 | Patterns of Student Help-Seeking When Using a Large Language Model-Powered Programming Assistant
Paul Denny, Brad Sheese |
Lessons Learnt in Developing and Supporting Infrastructures for Australian Urban and Built Environment Research
Richard Sinnott |
||
| 17:00 – 17:30 | “It’s not like Jarvis, but it’s pretty close!” – Examining ChatGPT’s Usage among Undergraduate Students in Computer Science
Jagat Sesh Challa, Dhruv Kumar |
Concluding Remarks | ||
| 18:15 – 21:45 | ACSW Dinner | The Lounge, UNSW
Level 11, Library (F21), Library Rd, UNSW Sydney, Kensington NSW 2052 |
|||
Thursday 1 February
| 08:30 – 16:00 | Registration | Mathews Building – Ground Floor Foyer | |||
| Stream | Plenary | |||
| Room | Mathews Theatre B | |||
| Session Chair | David Abramson | |||
| 08:45 – 09:30 | Getting to safe and responsible AI: What policies are needed?
Lyria Bennett Moses, UNSW Allens Hub for Technology, Law and Innovation |
|||
| Session Chair | Claudia Szabo | |||
| 09:30 – 10:30 | Lessons from the field: a loose guide to teaching novice programming
Jacqueline Whalley, Auckland University of Technology, Winner, The CORE Teaching Award |
ASESS | ||
| Mathews Theatre D
Session Chair: Fabian Gilson |
||||
| Session 7: Programming Languages and Software Analysis
09:30 – 10:15 Rust Programming Language Tim McNamara 10:15 – 11:00 How to Talk to Strange Programs and Find Bugs Rahul Gopinath
|
||||
| 10:30 – 11:00 | Lightning Talks
Xin Yu, University of Queensland Kaustubh Kundu, Monash University Wei Li, The University of Sydney Causal Inference-based Root Cause Analysis of Incidents of Microservice Systems |
|||
| 11:00 – 11:30 | Morning Tea & Posters | Mathews Pavilions
Posters: Vulnerability Aspects Extraction and Discrepancies Detection across Heterogeneous Threat Intelligence Secure Shuffling and its Impact on D-privacy – Poster PDF Local Clustering on Hypergraphs Predicting Gene Expression in Breast Cancer Using BrST-Net and Spatial Transcriptomics Blockchain Evaluation – Poster PDF Iris: Passive Visible Light Positioning using Light Spectral Information |
|||
| Stream | ACE | ASESS | EnCore Talks – Data Science and Information Systems | Workshop |
| Room | Mathews Theatre B | Mathews Theatre D | Mathews 307 | Mathews 309 |
| Session Chair | Nicole Herbert & Carolyn Seton | Craig Anslow | Paul Hunter | Geoff Webb |
| 11:30 – 12:00 | Evaluating LLM-generated Worked Examples in an Introductory Programming Course – Best Research Paper
Andrew Luxton-Reilly |
Session 8: Software Engineering & AI
11:30 – 12:15 Automated Testing of AI-based systems 12:15 – 13:00 The Pivotal Role of Software Engineering and DevOps in Responsible AI |
Iris: Passive Visible Light Positioning Using Light Spectral Information
Jiawei Hu |
Workshop on Generative AI, Problems, Risks, Opportunities and Responses
Geoff Webb, Monash University Data Futures Institute |
| 12:00 – 12:30 | Next-Step Hint Generation for Introductory Programming Using Large Language Models
Hieke Keuning |
On-Board Federated Learning in Orbital Edge Computing
Rodrigo Neves Calheiros |
||
| 12:30 – 13:00 | More Than Meets the AI: Evaluating the performance of GPT-4 on Computer Graphics assessment questions – Best Student Paper
Haoran Feng |
Taming the Domain Shift in Multi-source Learning for Energy Disaggregation
Wei Li |
||
| 13:00 – 14:00 | Lunch & Posters | Mathews Pavilions
Posters: Vulnerability Aspects Extraction and Discrepancies Detection across Heterogeneous Threat Intelligence Secure Shuffling and its Impact on D-privacy – Poster PDF Local Clustering on Hypergraphs Predicting Gene Expression in Breast Cancer Using BrST-Net and Spatial Transcriptomics Blockchain Evaluation – Poster PDF Iris: Passive Visible Light Positioning using Light Spectral Information |
|||
| Stream | ACE | ASESS | EnCore Talks – Information Systems and Software Engineering | |
| Room | Mathews Theatre B | Mathews Theatre D | Mathews 307 | |
| Session Chair | Nicole Herbert & Carolyn Seton | Omar Haggag | Marium Malik | |
| 14:00 – 14:30 | Transfer of Learning from Metaverse to Blockchain for Secondary Students: Implementation and Effectiveness Evaluation
Alven C. Y. Leung |
Session 9: Software Security
14:00 – 14:45 Demystifying the Evolution of IoT Malware 14:45 – 15:30 The Hitchhiker’s Guide to Fuzzer Coverage Metrics |
OptIForest: Optimal Isolation Forest for Anomaly Detection
Xuyun Zhang |
|
| 14:30 – 15:00 | Tartare: Automatic Generation of C Pointer Statements and Feedback
Géraldine Brieven |
GT-TSCH: Game-Theoretic Distributed TSCH Scheduler for Low-Power IoT Networks
Omid Tavallaie |
||
| 15:00 – 15:30 | ACE Closing and Annual Business Meeting (Australasian SIGCSE Chapter) | Towards Reliable AI: Adequacy Metrics for Ensuring the Quality of System-level Testing of Autonomous Vehicles
Aldeida Aleti |
||
| 15:30 – 16:00 | Afternoon Tea & Posters | Mathews Pavilions
Posters: Vulnerability Aspects Extraction and Discrepancies Detection across Heterogeneous Threat Intelligence Secure Shuffling and its Impact on D-privacy – Poster PDF Local Clustering on Hypergraphs Predicting Gene Expression in Breast Cancer Using BrST-Net and Spatial Transcriptomics Blockchain Evaluation – Poster PDF Iris: Passive Visible Light Positioning using Light Spectral Information |
|||
| Stream | ASESS | |||
| Room | Mathews Theatre D | |||
| Session Chair | Fabian Gilson | |||
| 16:00 – 16:30 | Session 10: Software Security and Analysis
16:00 – 16:45 The Limitations of Software Composition Analysis 16:45 – 17:30 Personalised Guidelines, for Design, Implementation, and Evaluation of Anti-phishing Interventions 17:30 – 17:45 Closing & Farewell |
|||
| 16:30 – 17:00 | ||||
| 17:00 – 17:30 | ||||