Skip to menu Skip to content Skip to footer
Dr Priyanka Singh
Dr

Priyanka Singh

Email: 

Overview

Background

I am a passionate researcher with a background in computer science and a strong commitment to leveraging technology for the betterment of society. I hold a PhD in Image Forensics and have had the privilege of conducting postdoctoral research at prestigious institutions such as SUNY Albany and Dartmouth College, where I had the opportunity to collaborate closely with Prof. Hany Farid.

During my postdoc at Dartmouth College, I focused my research efforts on addressing a critical societal issue - real-time child pornography detection. This research not only garnered recognition within the academic community but also earned praise from luminaries like Prof. Ramesh Raskar at MIT, who invited me to share my insights through a talk at MIT.

I primarily works in the area of Cyber Security, Digital Forensics, Privacy and Security Aspects, Homomorphic Encryption and Cloud Computing.

As I continue my research journey, I remain committed to making a positive impact through innovation and collaboration. I am excited about the opportunities that lie ahead and the potential for technology to create a safer and more inclusive world.

Availability

Dr Priyanka Singh is:
Available for supervision

Qualifications

  • Bachelor of Information Technology, Uttar Pradesh Technical University
  • Masters (Research) of Image Processing, Motilal Nehru National Institute of Technology
  • Doctor of Philosophy of Image Processing, Motilal Nehru National Institute of Technology

Research interests

  • Towards Mitigation of AI Based Attacks

    The adoption of Artificial Intelligence (AI) has made a paradigmatic shift in the cybersecurity challenges. On the positive side, AI enables faster detection of anomalies, automated responses to attacks, and predictive threat modeling. This helps organisations to proactively combat cyber threats and minimise the impact of attacks. On the contrary, the integration of AI also opens new avenues for adversaries. Cybercriminals are increasingly leveraging AI to craft sophisticated attacks, such as automated phishing schemes, deepfake technology, and AI-driven malware that can adapt to traditional defence mechanisms. The existing cybersecurity frameworks lack adequate update to address this sophistication.

  • Facilitating confidential and effective Cyber Threat Intelligence sharing

    Cyber Threat Intelligence (CTI) data is shared 24/7 between industry organisations and government agencies to provide incident responders real-time information about attackers' tactics and origins. Theoretically, this collaborative approach uplifts sectors’ cyber resilience but in reality, CTI sharing is often done inefficiently and ineffectively due to organisations' reticence to share full information which may unknowingly reveal organisational data (e.g., to competing or unknown entities within the community). This project aims to urgently address these challenges through a secure, collaborative CTI sharing approach with robust privacy protection built for AI-driven cybersecurity systems facilitating swift sector-wide incident response.

  • Security and Privacy of Large Language Models

    As Large Language Models (LLMs) become increasingly pervasive in applications ranging from natural language understanding to creative content generation, the need for robust privacy protections becomes more critical. These models, which are trained on vast amounts of data, raise significant concerns regarding data security, user privacy, and ethical implications. This project aims to explore the privacy challenges inherent in LLMs, addressing both technical and legal dimensions while highlighting best practices for privacy-preserving AI development.

  • Combat Propagation of Dis/Misinformation on Social Media

    Disinformation refers to deliberate misleading of people by manipulating narrative or facts. The unprecedented propagation of disinformation on social media can influence one’s mindset and cause an adverse impact on the society. AI-enabled tracking of the entire pipeline of disinformation by identifying the source, the target audience, the hidden agenda, the media of propagation, and the kind of influence can potentially combat this problem by reverse-identification of the origin of disinformation narratives and helping authorities to address the falsification problem.

  • From Prediction to Explanation: Multimodal, Explainable, and Interactive Deepfake Detection Framework for Non-Expert Users

    The proliferation of deepfake technologies poses urgent challenges and serious risks to digital integrity, particularly within critical sectors such as forensics, journalism, and the legal system. While existing detection systems have made significant progress in classification accuracy, they typically function as black-box models-offering limited transparency and minimal support for human reasoning. This lack of interpretability hinders their usability in real-world decision-making contexts, especially for non-expert users.

Research impacts

My work focusses on using cutting-edge technology to tackle real-world challenges, particularly in the realm of online safety and security. I am driven by the belief that responsible and ethical technology can play a transformative role in protecting the most vulnerable in our society.

Works

Search Professor Priyanka Singh’s works on UQ eSpace

73 works between 2012 and 2025

41 - 60 of 73 works

2018

Conference Publication

SecureCMerge: Secure PDF Merging Over Untrusted Servers

Sharma, Neha, Singh, Priyanka and Atrey, Pradeep K. (2018). SecureCMerge: Secure PDF Merging Over Untrusted Servers. 1st IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), Miami, FL United States, 10-12 April 2018. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/mipr.2018.00087

SecureCMerge: Secure PDF Merging Over Untrusted Servers

2018

Conference Publication

GeoSClean: secure cleaning of GPS trajectory data using anomaly detection

Patil, Vikram, Singh, Priyanka, Parikh, Shivam and Atrey, Pradeep K. (2018). GeoSClean: secure cleaning of GPS trajectory data using anomaly detection. 1st IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), Miami, FL USA, 10-12 April 2018. New York, NY USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/mipr.2018.00037

GeoSClean: secure cleaning of GPS trajectory data using anomaly detection

2018

Conference Publication

Client Side Secure Image Deduplication Using DICE Protocol

Agarwala, Ashish, Singh, Priyanka and Atrey, Pradeep K. (2018). Client Side Secure Image Deduplication Using DICE Protocol. 1st IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), Miami, FL United States, 10-12 April 2018. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/mipr.2018.00089

Client Side Secure Image Deduplication Using DICE Protocol

2018

Journal Article

Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system

Singh, Priyanka, Raman, Balasubramanian and Misra, Manoj (2018). Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system. Multimedia Tools and Applications, 77 (10), 12581-12605. doi: 10.1007/s11042-017-4906-4

Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system

2018

Conference Publication

SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud

Pandey, Aishwary K., Singh, Priyanka, Agarwal, Nishant and Raman, Balasubramanian (2018). SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud. 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), Miami, FL United States, 10-12 April 2018. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/mipr.2018.00085

SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud

2018

Journal Article

Don't just sign use brain too: a novel multimodal approach for user identification and verification

Saini, Rajkumar, Kaur, Barjinder, Singh, Priyanka, Kumar, Pradeep, Roy, Partha Pratim, Raman, Balasubramanian and Singh, Dinesh (2018). Don't just sign use brain too: a novel multimodal approach for user identification and verification. Information Sciences, 430, 163-178. doi: 10.1016/j.ins.2017.11.045

Don't just sign use brain too: a novel multimodal approach for user identification and verification

2018

Journal Article

A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares

Singh, Priyanka, Raman, Balasubramanian and Misra, Manoj (2018). A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Processing, 142, 301-319. doi: 10.1016/j.sigpro.2017.06.015

A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares

2018

Journal Article

Reversible data hiding based on Shamir's secret sharing for color images over cloud

Singh, Priyanka and Raman, Balasubramanian (2018). Reversible data hiding based on Shamir's secret sharing for color images over cloud. Information Sciences, 422, 77-97. doi: 10.1016/j.ins.2017.08.077

Reversible data hiding based on Shamir's secret sharing for color images over cloud

2017

Conference Publication

S3Email: A Method for Securing Emails from Service Providers

Singh, Priyanka, Arora, Shashank, Williamson, Kaliel and Atrey, Pradeep K. (2017). S3Email: A Method for Securing Emails from Service Providers. IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, Canada, 5-8 October 2017. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/SMC.2017.8122941

S3Email: A Method for Securing Emails from Service Providers

2017

Conference Publication

DICE: A Dual Integrity Convergent Encryption Protocol for Client Side Secure Data Deduplication

Agarwala, Ashish, Singh, Priyanka and Atrey, Pradeep K. (2017). DICE: A Dual Integrity Convergent Encryption Protocol for Client Side Secure Data Deduplication. IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, Canada, 5-8 October 2017. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/SMC.2017.8122942

DICE: A Dual Integrity Convergent Encryption Protocol for Client Side Secure Data Deduplication

2017

Conference Publication

GeoSecure: Towards Secure Outsourcing of GPS Data over Cloud

Patil, Vikram, Parikh, Shivam, Singh, Priyanka and Atrey, Pradeep K. (2017). GeoSecure: Towards Secure Outsourcing of GPS Data over Cloud. 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV United States, 9-11 October 2017. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/cns.2017.8228699

GeoSecure: Towards Secure Outsourcing of GPS Data over Cloud

2017

Journal Article

A secured robust watermarking scheme based on majority voting concept for rightful ownership assertion

Singh, Priyanka and Raman, Balasubramanian (2017). A secured robust watermarking scheme based on majority voting concept for rightful ownership assertion. Multimedia Tools and Applications, 76 (20), 21497-21517. doi: 10.1007/s11042-016-4006-x

A secured robust watermarking scheme based on majority voting concept for rightful ownership assertion

2017

Journal Article

A secure image sharing scheme based on SVD and Fractional Fourier Transform

Singh, Priyanka, Raman, Balasubramanian and Misra, Manoj (2017). A secure image sharing scheme based on SVD and Fractional Fourier Transform. Signal Processing: Image Communication, 57, 46-59. doi: 10.1016/j.image.2017.04.012

A secure image sharing scheme based on SVD and Fractional Fourier Transform

2017

Journal Article

Prediction of advertisement preference by fusing EEG response and sentiment analysis

Gauba, Himaanshu, Kumar, Pradeep, Roy, Partha Pratim, Singh, Priyanka, Dogra, Debi Prosad and Raman, Balasubramanian (2017). Prediction of advertisement preference by fusing EEG response and sentiment analysis. Neural Networks, 92, 77-88. doi: 10.1016/j.neunet.2017.01.013

Prediction of advertisement preference by fusing EEG response and sentiment analysis

2017

Conference Publication

CryptFine: Towards secure cloud based filtering in encrypted domain

Rajput, Amitesh Singh, Singh, Priyanka and Raman, Balasubramanian (2017). CryptFine: Towards secure cloud based filtering in encrypted domain. Conference on ISEA Asia Security and Privacy (ISEASP), Surat, India, 29 January - 1 February 2017. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ISEASP.2017.7976985

CryptFine: Towards secure cloud based filtering in encrypted domain

2017

Journal Article

Rotation and script independent text detection from video frames using sub pixel mapping

Mittal, Anshul, Roy, Partha Pratim, Singh, Priyanka and Raman, Balasubramanian (2017). Rotation and script independent text detection from video frames using sub pixel mapping. Journal of Visual Communication and Image Representation, 46, 187-198. doi: 10.1016/j.jvcir.2017.03.002

Rotation and script independent text detection from video frames using sub pixel mapping

2017

Journal Article

Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System

Singh, Priyanka, Raman, Balasubramanian, Agarwal, Nishant and Atrey, Pradeep K. (2017). Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System. ACM Transactions on Multimedia Computing, Communications, and Applications, 13 (3), 1-23. doi: 10.1145/3077140

Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System

2017

Journal Article

Toward encrypted video tampering detection and localization based on POB number system over cloud

Singh, Priyanka, Raman, Balasubramanian and Agarwal, Nishant (2017). Toward encrypted video tampering detection and localization based on POB number system over cloud. IEEE Transactions on Circuits and Systems for Video Technology, 28 (9), 2116-2130. doi: 10.1109/tcsvt.2017.2716828

Toward encrypted video tampering detection and localization based on POB number system over cloud

2017

Journal Article

Reversible data hiding for rightful ownership assertion of images in encrypted domain over cloud

Singh, Priyanka and Raman, Balasubramanian (2017). Reversible data hiding for rightful ownership assertion of images in encrypted domain over cloud. AEUe: International Journal of Electronics and Communication, 76, 18-35. doi: 10.1016/j.aeue.2017.03.005

Reversible data hiding for rightful ownership assertion of images in encrypted domain over cloud

2017

Conference Publication

A deep learning frame-work for recognizing developmental disorders

Shukla, Pushkar, Gupta, Tanu, Saini, Aradhya, Singh, Priyanka and Balasubramanian, Raman (2017). A deep learning frame-work for recognizing developmental disorders. 17th IEEE Winter Conference on Applications of Computer Vision (WACV), Santa Rosa, CA United States, 24-31 March 2017. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/wacv.2017.84

A deep learning frame-work for recognizing developmental disorders

Funding

Current funding

  • 2024 - 2026
    A Paradigmatic Shift in Public Service Delivery: Accessible, Inclusive and Secure DPI (AICCTP grant administered by Indian Council for Research on International Economic Relations)
    Australia-India Cyber and Critical Technology Partnership
    Open grant

Supervision

Availability

Dr Priyanka Singh is:
Available for supervision

Looking for a supervisor? Read our advice on how to choose a supervisor.

Available projects

  • Research projects

    • Investigating vulnerabilities of Split Learning/Federated Learning/Split-Fed Learning Models

    • Defenses to build Robust Deep Learning Models

    • Image/Audio/Video Forensic Techniques to Detect Doctored Images/Deep Fakes

    • Privacy Preserving Frameworks for Various Applications

    • Geo-hashing and Location Based Services

Supervision history

Current supervision

  • Doctor Philosophy

    Advancing cyberworthiness via integration of AI and Model-Based Systems Engineering (MBSE)

    Principal Advisor

    Other advisors: Professor Ryan Ko

  • Doctor Philosophy

    Understanding Privacy Concerns About Living in Smart Cities and Enhancing Privacy Awareness

    Principal Advisor

    Other advisors: Professor Xue Li

  • Doctor Philosophy

    Privacy preservation with Large Language Models

    Principal Advisor

    Other advisors: Professor Xue Li

  • Master Philosophy

    Effective and versatile multimodal fusion

    Principal Advisor

    Other advisors: Professor Xue Li

  • Master Philosophy

    Mapping Emerging Narratives Composed of False Information

    Associate Advisor

    Other advisors: Professor Xue Li

  • Doctor Philosophy

    Behaviour-Oriented Tracking of Disinformation

    Associate Advisor

    Other advisors: Dr Ruihong Qiu, Professor Xue Li

  • Doctor Philosophy

    AI planner for autonomous cyber defence for operational technologies (OT)

    Associate Advisor

    Other advisors: Professor Ryan Ko

  • Doctor Philosophy

    Weighted Ensembles for Different machine learning model that support non-data-sharing / vertical partition

    Associate Advisor

    Other advisors: Professor Xue Li

  • Doctor Philosophy

    Empowering Recommender Systems via User Behaviour Simulation

    Associate Advisor

    Other advisors: Professor Xue Li

Media

Enquiries

For media enquiries about Dr Priyanka Singh's areas of expertise, story ideas and help finding experts, contact our Media team:

communications@uq.edu.au