SlideShare a Scribd company logo
Australia’s National Science Agency
Emerging Technologies in
Synthetic Representation
and Digital Twin
Dr/Prof Liming Zhu, Research Director
CSIRO’s Data61
Digital Twins & Synthetic Representations
Digital Twin – virtual representation of a
physical object or system
Synthetic Representation
• digital vs non-digital
• authentic vs obfuscated
Emerging Tech
• Federated Learning/Simulation
• Securely connected DT and SR
• Sharing without Access
• Desensitised & Synthetic Data
• Energy-domain Example
Example: Spatially-enabled Digital Twins
2 |
Platform implementations informing perspectives include:
• National Map https://nationalmap.gov.au/
• VIC Spatial Digital Twin https://vic.digitaltwin.terria.io/
• NSW Spatial Digital Twin https://nsw.digitaltwin.terria.io/
• QLD Spatial Digital Twin https://qld.digitaltwin.terria.io/
Ecosystem Enablers for Urban Scale Digital Twins:
• Trusted/Secure data sharing, standards, powerful visualisation
Data61’s Spatially-Enabled Digital Twin
3 |
‘Reality Mesh’ / 3D Imagery
Lidar Underground, Utilities Live traffic & public transport Volumetric cadastre
Strata cadastre
Buildings
Building Information Models
Data Types, including Synthetic Data
4 |
Vision: Securely Connected Digital Twins
The National Digital Twin will
not be a single large model but
an ecosystem of securely
connected digital twins which
can enable system of system
analysis.
5 |
Future and Data61’s focus
• Support advancement in
trusted data sharing
• Federated analytics
• Data use without sharing
• Federated data/model
• Synthetic + desensitised data
• Cross-domain security
• data, model and simulation
Connected Representation/DT Enabler
Source: Diagram 6, Framework for Spatially Enabled Digital Twins:
Information Paper, CSIRO Data61, Australia.
6 |
When there are cultural, legislative, security
restrictions to sharing, consider alternatives!
Federated Model:
• No centralised data repositories and simulation
• Edge Simulation, AI and Analytics
Scientific Approaches
• Zero-knowledge proofs, homomorphic
encryption, secure-multi-party computation
Sharing without Access - Federated Learning/Simulation
From limited access to full encryption during use
7 |
Other Case Studies at Data61
• Edge analytics/simulation of devices
• Bank + Telco for fraud analytics
• Two gov departments for joint insights
Data61 work: SK Lo, Q Lu, L Zhu, HY Paik, X Xu, C Wang: Architectural patterns for the
design of federated learning systems, Journal of Systems and Software (2021)
Data61 work: SK Lo, Q Lu, HY Paik, L Zhu, FLRA: A Reference Architecture for Federated
Learning Systems, European Conference on Software Architecture (2021)
Analytics/Simulation to Data: Data Airlock
Not Data to Analytics/Simulation
• Analytics/Simulation requests to
data -> Insights back
• No data sharing
• Automated vetting of insights
• Case Studies: Major government
agency
8 |
Data is kept away in vaults.
All analytics models and simulation results are vetted.
Safe Data Sharing: Provable Desensitization & Synthetic Data
Quantified risks assessment, mitigation and compliance, synthetic data sets
§ Provably desensitized data sharing/release for joint analytics and simulation
§ Synthetic datasets that balance authenticity and obfustication
§ Quantified risks and mitigation
§ Case Studies: Worked with 30+ Gov agencies
R4: Re-identification Risks Ready-Reckoner
9 |
Synthetic Representation/DT of Supply Chains
Critical Infrastructure Protection & Resilience
Cross-sector solutions & supply chains
New resilience tactics, controllability, trusted supply chain
Cyber + Physical Security
Supply Chain
Integrity
Cyber-physical integrity
Cross-chain data sharing
Certificate tech
Supply Chain
Risk Analytics
Robustness + Resilience
Risk frameworks
Software/AI
Supply Chain
SBOM/AI-SBOM
Vulnerability Impact
Trustworthy AI
10 |
Major Collaborations & Partners
• ..
• ..
• ..
Supply Chain Analytics
Key science
• Graph theory + Bayesian networks +
Optimisation + Simulation
• Deep domain/sector knowledge
Risk assessment framework
• Resilience
• Robustness
• Reliability
11 |
Example Gov/Industry Projects
• Energy, Water, Food
• Telecommunications
• Ports
• Defence infrastructure
• …
Major Collaborations & Partners
• ..
• ..
• ..
• ..
Software Supply Chain
Key Science
• Vulnerability detection + dependency
analysis + dark patterns (via ML+ NLP+ knowledge graph)
• AI-SBOM, trustworthy AI in data + model +
code supply chain
Example Gov/Industry Projects
• Secure & Modular IoT (for supply chain)
• US Army public software vulnerability scan
• ~20+ projects/dual-use tech with DST
[1] In sync with US DoD Responsible AI implementation pathways; NSF-CSIRO Call https://www.csiro.au/NSF-AI
12 |
Critical Infrastructure Protection &
Resilience
Cross-sector solutions & supply chains
New resilience tactics, Digital Twin, trusted supply chain
Cyber + Physical Security
Example: Energy Critical Infrastructure
Digital Twin &
Synthetic
Representations
13 |
Attacks to Critical Infrastructures
Source: https://airbus-cyber-security.com/
14 |
Energy Infrastructure Digital Twin for Cybersecurity
15 |
Source: https://jpt.spe.org/control-room-future Source: http://www.age.co.za
Sources: https://www.reutersevents.com/nuclear/digital-twin-
technology-identified-key-increased-safety-and-efficiency
https://www.smart2zero.com/news/digital-twin-helps-protect-smart-
energy-grid
Panels Intelligent UIs Digital Twins
5G/6G provide hyperconnectivity at terabit scales, making digital twin based energy management systems feasible
Future Control/Simulation Rooms
16 |
Device-level Simulator and Testing
Software Platform
Model
Attack scenario simulation Hardware Emulation
17 |
Energy System-Level Simulation & Testing
Critical Infrastructure Protection & Resilience
Cross-sector solutions & supply chains
New resilience tactics, controllability, trusted supply chain
Cyber + Physical Security
Model-driven Engineering
18 |
Collaborate with D61 on DT/Synthetic Representation
Collaborate on
innovation projects
with D61+ Network
(including 30+ Unis)
active
Trial and license the
enabling
technologies
Form deep
partnership via
shared technology
roadmaps
Join major
initiatives such as
critical
infrastructure
digital twins
Contact:
Liming.Zhu@data61.csiro.au
Wilma.James@data61.csiro.au
Pick a model & start today!
19 |
Thanks!
Form Defence-
Data61-Industry (inc.
SMEs) partnership

More Related Content

Similar to Emerging Technologies in Synthetic Representation and Digital Twin

Digital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxDigital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptx
Vinay Ms
 
Smart Cities and Data Analytics: Challenges and Opportunities
Smart Cities and Data Analytics: Challenges and Opportunities Smart Cities and Data Analytics: Challenges and Opportunities
Smart Cities and Data Analytics: Challenges and Opportunities
PayamBarnaghi
 
Digital twin technology - seminar presentation
Digital twin technology - seminar presentationDigital twin technology - seminar presentation
Digital twin technology - seminar presentation
1js20ec036ksspoorthi
 
Thesis Defense MBI
Thesis Defense MBIThesis Defense MBI
Thesis Defense MBI
Juan Hernandez
 
Enabling the physical world to the Internet and potential benefits for agricu...
Enabling the physical world to the Internet and potential benefits for agricu...Enabling the physical world to the Internet and potential benefits for agricu...
Enabling the physical world to the Internet and potential benefits for agricu...
Andreas Kamilaris
 
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Rick Holgate
 
General introduction to IoTCrawler
General introduction to IoTCrawlerGeneral introduction to IoTCrawler
General introduction to IoTCrawler
IoTCrawler
 
Internet of Things and Large-scale Data Analytics
Internet of Things and Large-scale Data Analytics Internet of Things and Large-scale Data Analytics
Internet of Things and Large-scale Data Analytics
PayamBarnaghi
 
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and SecurityDistributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Department of Computer Science, Aalto University
 
Ticer summer school_24_aug06
Ticer summer school_24_aug06Ticer summer school_24_aug06
Ticer summer school_24_aug06
SayDotCom.com
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
Charith Perera
 
Cloud computing
Cloud computingCloud computing
Cloud computing
CliffSugermen
 
The Analytics and Data Science Landscape
The Analytics and Data Science LandscapeThe Analytics and Data Science Landscape
The Analytics and Data Science Landscape
Philip Bourne
 
Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61
Liming Zhu
 
information system.pptx
information system.pptxinformation system.pptx
information system.pptx
AmarSalih4
 
Challenges for Standardization Cloud Computing and Big Data IOT
Challenges for Standardization Cloud Computing and Big Data IOTChallenges for Standardization Cloud Computing and Big Data IOT
Challenges for Standardization Cloud Computing and Big Data IOT
Subha421414
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Hector Del Castillo, CPM, CPMM
 
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud Systems
Hong-Linh Truong
 
Blockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity DeploymentBlockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity Deployment
Anil John
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Geoffrey Fox
 

Similar to Emerging Technologies in Synthetic Representation and Digital Twin (20)

Digital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxDigital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptx
 
Smart Cities and Data Analytics: Challenges and Opportunities
Smart Cities and Data Analytics: Challenges and Opportunities Smart Cities and Data Analytics: Challenges and Opportunities
Smart Cities and Data Analytics: Challenges and Opportunities
 
Digital twin technology - seminar presentation
Digital twin technology - seminar presentationDigital twin technology - seminar presentation
Digital twin technology - seminar presentation
 
Thesis Defense MBI
Thesis Defense MBIThesis Defense MBI
Thesis Defense MBI
 
Enabling the physical world to the Internet and potential benefits for agricu...
Enabling the physical world to the Internet and potential benefits for agricu...Enabling the physical world to the Internet and potential benefits for agricu...
Enabling the physical world to the Internet and potential benefits for agricu...
 
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
 
General introduction to IoTCrawler
General introduction to IoTCrawlerGeneral introduction to IoTCrawler
General introduction to IoTCrawler
 
Internet of Things and Large-scale Data Analytics
Internet of Things and Large-scale Data Analytics Internet of Things and Large-scale Data Analytics
Internet of Things and Large-scale Data Analytics
 
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and SecurityDistributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
 
Ticer summer school_24_aug06
Ticer summer school_24_aug06Ticer summer school_24_aug06
Ticer summer school_24_aug06
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
The Analytics and Data Science Landscape
The Analytics and Data Science LandscapeThe Analytics and Data Science Landscape
The Analytics and Data Science Landscape
 
Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61
 
information system.pptx
information system.pptxinformation system.pptx
information system.pptx
 
Challenges for Standardization Cloud Computing and Big Data IOT
Challenges for Standardization Cloud Computing and Big Data IOTChallenges for Standardization Cloud Computing and Big Data IOT
Challenges for Standardization Cloud Computing and Big Data IOT
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud Systems
 
Blockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity DeploymentBlockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity Deployment
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
 

More from Liming Zhu

AI Transformation A Clash with Human Expertise
AI TransformationA Clash with Human ExpertiseAI TransformationA Clash with Human Expertise
AI Transformation A Clash with Human Expertise
Liming Zhu
 
Deciphering AI: Human Expertise in the Age of Evolving AI
Deciphering AI: Human Expertise in the Age of Evolving AIDeciphering AI: Human Expertise in the Age of Evolving AI
Deciphering AI: Human Expertise in the Age of Evolving AI
Liming Zhu
 
GenAI in Research with Responsible AI
GenAI in Researchwith Responsible AIGenAI in Researchwith Responsible AI
GenAI in Research with Responsible AI
Liming Zhu
 
AI Unveiled: From Current State to Future Frontiers
AI Unveiled: From Current State to Future FrontiersAI Unveiled: From Current State to Future Frontiers
AI Unveiled: From Current State to Future Frontiers
Liming Zhu
 
Software Architecture for Foundation Model-Based Systems
Software Architecture for Foundation Model-Based SystemsSoftware Architecture for Foundation Model-Based Systems
Software Architecture for Foundation Model-Based Systems
Liming Zhu
 
AI Transformation
AI TransformationAI Transformation
AI Transformation
Liming Zhu
 
Generative-AI-in-enterprise-20230615.pdf
Generative-AI-in-enterprise-20230615.pdfGenerative-AI-in-enterprise-20230615.pdf
Generative-AI-in-enterprise-20230615.pdf
Liming Zhu
 
Trends & Innovation in Cyber and Digitaltech
Trends & Innovationin Cyber and DigitaltechTrends & Innovationin Cyber and Digitaltech
Trends & Innovation in Cyber and Digitaltech
Liming Zhu
 
Responsible/Trustworthy AI in the Era of Foundation Models
Responsible/Trustworthy AI in the Era of Foundation Models Responsible/Trustworthy AI in the Era of Foundation Models
Responsible/Trustworthy AI in the Era of Foundation Models
Liming Zhu
 
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AIICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
Liming Zhu
 
RegTech for IR - Opportunities and Lessons
RegTech for IR - Opportunities and LessonsRegTech for IR - Opportunities and Lessons
RegTech for IR - Opportunities and Lessons
Liming Zhu
 
Responsible AI The Australian Approach
Responsible AIThe Australian ApproachResponsible AIThe Australian Approach
Responsible AI The Australian Approach
Liming Zhu
 
Cyber technologies for SME growth – Barriers and Solutions
Cyber technologies for SME growth – Barriers and SolutionsCyber technologies for SME growth – Barriers and Solutions
Cyber technologies for SME growth – Barriers and Solutions
Liming Zhu
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
Liming Zhu
 
Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments
Liming Zhu
 
Dependable Operation - Performance Management and Capacity Planning Under Con...
Dependable Operation - Performance Management and Capacity Planning Under Con...Dependable Operation - Performance Management and Capacity Planning Under Con...
Dependable Operation - Performance Management and Capacity Planning Under Con...
Liming Zhu
 
Dependable Operations
Dependable OperationsDependable Operations
Dependable Operations
Liming Zhu
 
Modelling and Analysing Operation Processes for Dependability
Modelling and Analysing Operation Processes for Dependability Modelling and Analysing Operation Processes for Dependability
Modelling and Analysing Operation Processes for Dependability
Liming Zhu
 
Cloud API Issues: an Empirical Study and Impact
Cloud API Issues: an Empirical Study and ImpactCloud API Issues: an Empirical Study and Impact
Cloud API Issues: an Empirical Study and Impact
Liming Zhu
 

More from Liming Zhu (19)

AI Transformation A Clash with Human Expertise
AI TransformationA Clash with Human ExpertiseAI TransformationA Clash with Human Expertise
AI Transformation A Clash with Human Expertise
 
Deciphering AI: Human Expertise in the Age of Evolving AI
Deciphering AI: Human Expertise in the Age of Evolving AIDeciphering AI: Human Expertise in the Age of Evolving AI
Deciphering AI: Human Expertise in the Age of Evolving AI
 
GenAI in Research with Responsible AI
GenAI in Researchwith Responsible AIGenAI in Researchwith Responsible AI
GenAI in Research with Responsible AI
 
AI Unveiled: From Current State to Future Frontiers
AI Unveiled: From Current State to Future FrontiersAI Unveiled: From Current State to Future Frontiers
AI Unveiled: From Current State to Future Frontiers
 
Software Architecture for Foundation Model-Based Systems
Software Architecture for Foundation Model-Based SystemsSoftware Architecture for Foundation Model-Based Systems
Software Architecture for Foundation Model-Based Systems
 
AI Transformation
AI TransformationAI Transformation
AI Transformation
 
Generative-AI-in-enterprise-20230615.pdf
Generative-AI-in-enterprise-20230615.pdfGenerative-AI-in-enterprise-20230615.pdf
Generative-AI-in-enterprise-20230615.pdf
 
Trends & Innovation in Cyber and Digitaltech
Trends & Innovationin Cyber and DigitaltechTrends & Innovationin Cyber and Digitaltech
Trends & Innovation in Cyber and Digitaltech
 
Responsible/Trustworthy AI in the Era of Foundation Models
Responsible/Trustworthy AI in the Era of Foundation Models Responsible/Trustworthy AI in the Era of Foundation Models
Responsible/Trustworthy AI in the Era of Foundation Models
 
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AIICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
 
RegTech for IR - Opportunities and Lessons
RegTech for IR - Opportunities and LessonsRegTech for IR - Opportunities and Lessons
RegTech for IR - Opportunities and Lessons
 
Responsible AI The Australian Approach
Responsible AIThe Australian ApproachResponsible AIThe Australian Approach
Responsible AI The Australian Approach
 
Cyber technologies for SME growth – Barriers and Solutions
Cyber technologies for SME growth – Barriers and SolutionsCyber technologies for SME growth – Barriers and Solutions
Cyber technologies for SME growth – Barriers and Solutions
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
 
Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments
 
Dependable Operation - Performance Management and Capacity Planning Under Con...
Dependable Operation - Performance Management and Capacity Planning Under Con...Dependable Operation - Performance Management and Capacity Planning Under Con...
Dependable Operation - Performance Management and Capacity Planning Under Con...
 
Dependable Operations
Dependable OperationsDependable Operations
Dependable Operations
 
Modelling and Analysing Operation Processes for Dependability
Modelling and Analysing Operation Processes for Dependability Modelling and Analysing Operation Processes for Dependability
Modelling and Analysing Operation Processes for Dependability
 
Cloud API Issues: an Empirical Study and Impact
Cloud API Issues: an Empirical Study and ImpactCloud API Issues: an Empirical Study and Impact
Cloud API Issues: an Empirical Study and Impact
 

Recently uploaded

Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 

Recently uploaded (20)

Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 

Emerging Technologies in Synthetic Representation and Digital Twin

  • 1. Australia’s National Science Agency Emerging Technologies in Synthetic Representation and Digital Twin Dr/Prof Liming Zhu, Research Director CSIRO’s Data61
  • 2. Digital Twins & Synthetic Representations Digital Twin – virtual representation of a physical object or system Synthetic Representation • digital vs non-digital • authentic vs obfuscated Emerging Tech • Federated Learning/Simulation • Securely connected DT and SR • Sharing without Access • Desensitised & Synthetic Data • Energy-domain Example Example: Spatially-enabled Digital Twins 2 |
  • 3. Platform implementations informing perspectives include: • National Map https://nationalmap.gov.au/ • VIC Spatial Digital Twin https://vic.digitaltwin.terria.io/ • NSW Spatial Digital Twin https://nsw.digitaltwin.terria.io/ • QLD Spatial Digital Twin https://qld.digitaltwin.terria.io/ Ecosystem Enablers for Urban Scale Digital Twins: • Trusted/Secure data sharing, standards, powerful visualisation Data61’s Spatially-Enabled Digital Twin 3 |
  • 4. ‘Reality Mesh’ / 3D Imagery Lidar Underground, Utilities Live traffic & public transport Volumetric cadastre Strata cadastre Buildings Building Information Models Data Types, including Synthetic Data 4 |
  • 5. Vision: Securely Connected Digital Twins The National Digital Twin will not be a single large model but an ecosystem of securely connected digital twins which can enable system of system analysis. 5 |
  • 6. Future and Data61’s focus • Support advancement in trusted data sharing • Federated analytics • Data use without sharing • Federated data/model • Synthetic + desensitised data • Cross-domain security • data, model and simulation Connected Representation/DT Enabler Source: Diagram 6, Framework for Spatially Enabled Digital Twins: Information Paper, CSIRO Data61, Australia. 6 |
  • 7. When there are cultural, legislative, security restrictions to sharing, consider alternatives! Federated Model: • No centralised data repositories and simulation • Edge Simulation, AI and Analytics Scientific Approaches • Zero-knowledge proofs, homomorphic encryption, secure-multi-party computation Sharing without Access - Federated Learning/Simulation From limited access to full encryption during use 7 | Other Case Studies at Data61 • Edge analytics/simulation of devices • Bank + Telco for fraud analytics • Two gov departments for joint insights Data61 work: SK Lo, Q Lu, L Zhu, HY Paik, X Xu, C Wang: Architectural patterns for the design of federated learning systems, Journal of Systems and Software (2021) Data61 work: SK Lo, Q Lu, HY Paik, L Zhu, FLRA: A Reference Architecture for Federated Learning Systems, European Conference on Software Architecture (2021)
  • 8. Analytics/Simulation to Data: Data Airlock Not Data to Analytics/Simulation • Analytics/Simulation requests to data -> Insights back • No data sharing • Automated vetting of insights • Case Studies: Major government agency 8 | Data is kept away in vaults. All analytics models and simulation results are vetted.
  • 9. Safe Data Sharing: Provable Desensitization & Synthetic Data Quantified risks assessment, mitigation and compliance, synthetic data sets § Provably desensitized data sharing/release for joint analytics and simulation § Synthetic datasets that balance authenticity and obfustication § Quantified risks and mitigation § Case Studies: Worked with 30+ Gov agencies R4: Re-identification Risks Ready-Reckoner 9 |
  • 10. Synthetic Representation/DT of Supply Chains Critical Infrastructure Protection & Resilience Cross-sector solutions & supply chains New resilience tactics, controllability, trusted supply chain Cyber + Physical Security Supply Chain Integrity Cyber-physical integrity Cross-chain data sharing Certificate tech Supply Chain Risk Analytics Robustness + Resilience Risk frameworks Software/AI Supply Chain SBOM/AI-SBOM Vulnerability Impact Trustworthy AI 10 |
  • 11. Major Collaborations & Partners • .. • .. • .. Supply Chain Analytics Key science • Graph theory + Bayesian networks + Optimisation + Simulation • Deep domain/sector knowledge Risk assessment framework • Resilience • Robustness • Reliability 11 | Example Gov/Industry Projects • Energy, Water, Food • Telecommunications • Ports • Defence infrastructure • …
  • 12. Major Collaborations & Partners • .. • .. • .. • .. Software Supply Chain Key Science • Vulnerability detection + dependency analysis + dark patterns (via ML+ NLP+ knowledge graph) • AI-SBOM, trustworthy AI in data + model + code supply chain Example Gov/Industry Projects • Secure & Modular IoT (for supply chain) • US Army public software vulnerability scan • ~20+ projects/dual-use tech with DST [1] In sync with US DoD Responsible AI implementation pathways; NSF-CSIRO Call https://www.csiro.au/NSF-AI 12 | Critical Infrastructure Protection & Resilience Cross-sector solutions & supply chains New resilience tactics, Digital Twin, trusted supply chain Cyber + Physical Security
  • 13. Example: Energy Critical Infrastructure Digital Twin & Synthetic Representations 13 |
  • 14. Attacks to Critical Infrastructures Source: https://airbus-cyber-security.com/ 14 |
  • 15. Energy Infrastructure Digital Twin for Cybersecurity 15 |
  • 16. Source: https://jpt.spe.org/control-room-future Source: http://www.age.co.za Sources: https://www.reutersevents.com/nuclear/digital-twin- technology-identified-key-increased-safety-and-efficiency https://www.smart2zero.com/news/digital-twin-helps-protect-smart- energy-grid Panels Intelligent UIs Digital Twins 5G/6G provide hyperconnectivity at terabit scales, making digital twin based energy management systems feasible Future Control/Simulation Rooms 16 |
  • 17. Device-level Simulator and Testing Software Platform Model Attack scenario simulation Hardware Emulation 17 |
  • 18. Energy System-Level Simulation & Testing Critical Infrastructure Protection & Resilience Cross-sector solutions & supply chains New resilience tactics, controllability, trusted supply chain Cyber + Physical Security Model-driven Engineering 18 |
  • 19. Collaborate with D61 on DT/Synthetic Representation Collaborate on innovation projects with D61+ Network (including 30+ Unis) active Trial and license the enabling technologies Form deep partnership via shared technology roadmaps Join major initiatives such as critical infrastructure digital twins Contact: Liming.Zhu@data61.csiro.au Wilma.James@data61.csiro.au Pick a model & start today! 19 | Thanks! Form Defence- Data61-Industry (inc. SMEs) partnership