Overview
Background
I am a passionate researcher with a background in computer science and a strong commitment to leveraging technology for the betterment of society. I hold a PhD in Image Forensics and have had the privilege of conducting postdoctoral research at prestigious institutions such as SUNY Albany and Dartmouth College, where I had the opportunity to collaborate closely with Prof. Hany Farid.
During my postdoc at Dartmouth College, I focused my research efforts on addressing a critical societal issue - real-time child pornography detection. This research not only garnered recognition within the academic community but also earned praise from luminaries like Prof. Ramesh Raskar at MIT, who invited me to share my insights through a talk at MIT.
I primarily works in the area of Cyber Security, Digital Forensics, Privacy and Security Aspects, Homomorphic Encryption and Cloud Computing.
As I continue my research journey, I remain committed to making a positive impact through innovation and collaboration. I am excited about the opportunities that lie ahead and the potential for technology to create a safer and more inclusive world.
Availability
- Dr Priyanka Singh is:
- Available for supervision
Fields of research
Qualifications
- Bachelor of Information Technology, Uttar Pradesh Technical University
- Masters (Research) of Image Processing, Motilal Nehru National Institute of Technology
- Doctor of Philosophy of Image Processing, Motilal Nehru National Institute of Technology
Research interests
-
Towards Mitigation of AI Based Attacks
The adoption of Artificial Intelligence (AI) has made a paradigmatic shift in the cybersecurity challenges. On the positive side, AI enables faster detection of anomalies, automated responses to attacks, and predictive threat modeling. This helps organisations to proactively combat cyber threats and minimise the impact of attacks. On the contrary, the integration of AI also opens new avenues for adversaries. Cybercriminals are increasingly leveraging AI to craft sophisticated attacks, such as automated phishing schemes, deepfake technology, and AI-driven malware that can adapt to traditional defence mechanisms. The existing cybersecurity frameworks lack adequate update to address this sophistication.
-
Facilitating confidential and effective Cyber Threat Intelligence sharing
Cyber Threat Intelligence (CTI) data is shared 24/7 between industry organisations and government agencies to provide incident responders real-time information about attackers' tactics and origins. Theoretically, this collaborative approach uplifts sectors’ cyber resilience but in reality, CTI sharing is often done inefficiently and ineffectively due to organisations' reticence to share full information which may unknowingly reveal organisational data (e.g., to competing or unknown entities within the community). This project aims to urgently address these challenges through a secure, collaborative CTI sharing approach with robust privacy protection built for AI-driven cybersecurity systems facilitating swift sector-wide incident response.
-
Security and Privacy of Large Language Models
As Large Language Models (LLMs) become increasingly pervasive in applications ranging from natural language understanding to creative content generation, the need for robust privacy protections becomes more critical. These models, which are trained on vast amounts of data, raise significant concerns regarding data security, user privacy, and ethical implications. This project aims to explore the privacy challenges inherent in LLMs, addressing both technical and legal dimensions while highlighting best practices for privacy-preserving AI development.
-
Combat Propagation of Dis/Misinformation on Social Media
Disinformation refers to deliberate misleading of people by manipulating narrative or facts. The unprecedented propagation of disinformation on social media can influence one’s mindset and cause an adverse impact on the society. AI-enabled tracking of the entire pipeline of disinformation by identifying the source, the target audience, the hidden agenda, the media of propagation, and the kind of influence can potentially combat this problem by reverse-identification of the origin of disinformation narratives and helping authorities to address the falsification problem.
-
From Prediction to Explanation: Multimodal, Explainable, and Interactive Deepfake Detection Framework for Non-Expert Users
The proliferation of deepfake technologies poses urgent challenges and serious risks to digital integrity, particularly within critical sectors such as forensics, journalism, and the legal system. While existing detection systems have made significant progress in classification accuracy, they typically function as black-box models-offering limited transparency and minimal support for human reasoning. This lack of interpretability hinders their usability in real-world decision-making contexts, especially for non-expert users.
Research impacts
My work focusses on using cutting-edge technology to tackle real-world challenges, particularly in the realm of online safety and security. I am driven by the belief that responsible and ethical technology can play a transformative role in protecting the most vulnerable in our society.
Works
Search Professor Priyanka Singh’s works on UQ eSpace
2018
Conference Publication
SecureCMerge: Secure PDF Merging Over Untrusted Servers
Sharma, Neha, Singh, Priyanka and Atrey, Pradeep K. (2018). SecureCMerge: Secure PDF Merging Over Untrusted Servers. 1st IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), Miami, FL United States, 10-12 April 2018. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/mipr.2018.00087
2018
Conference Publication
GeoSClean: secure cleaning of GPS trajectory data using anomaly detection
Patil, Vikram, Singh, Priyanka, Parikh, Shivam and Atrey, Pradeep K. (2018). GeoSClean: secure cleaning of GPS trajectory data using anomaly detection. 1st IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), Miami, FL USA, 10-12 April 2018. New York, NY USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/mipr.2018.00037
2018
Conference Publication
Client Side Secure Image Deduplication Using DICE Protocol
Agarwala, Ashish, Singh, Priyanka and Atrey, Pradeep K. (2018). Client Side Secure Image Deduplication Using DICE Protocol. 1st IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), Miami, FL United States, 10-12 April 2018. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/mipr.2018.00089
2018
Journal Article
Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system
Singh, Priyanka, Raman, Balasubramanian and Misra, Manoj (2018). Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system. Multimedia Tools and Applications, 77 (10), 12581-12605. doi: 10.1007/s11042-017-4906-4
2018
Conference Publication
SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud
Pandey, Aishwary K., Singh, Priyanka, Agarwal, Nishant and Raman, Balasubramanian (2018). SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud. 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), Miami, FL United States, 10-12 April 2018. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/mipr.2018.00085
2018
Journal Article
Don't just sign use brain too: a novel multimodal approach for user identification and verification
Saini, Rajkumar, Kaur, Barjinder, Singh, Priyanka, Kumar, Pradeep, Roy, Partha Pratim, Raman, Balasubramanian and Singh, Dinesh (2018). Don't just sign use brain too: a novel multimodal approach for user identification and verification. Information Sciences, 430, 163-178. doi: 10.1016/j.ins.2017.11.045
2018
Journal Article
A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares
Singh, Priyanka, Raman, Balasubramanian and Misra, Manoj (2018). A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Processing, 142, 301-319. doi: 10.1016/j.sigpro.2017.06.015
2018
Journal Article
Reversible data hiding based on Shamir's secret sharing for color images over cloud
Singh, Priyanka and Raman, Balasubramanian (2018). Reversible data hiding based on Shamir's secret sharing for color images over cloud. Information Sciences, 422, 77-97. doi: 10.1016/j.ins.2017.08.077
2017
Conference Publication
S3Email: A Method for Securing Emails from Service Providers
Singh, Priyanka, Arora, Shashank, Williamson, Kaliel and Atrey, Pradeep K. (2017). S3Email: A Method for Securing Emails from Service Providers. IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, Canada, 5-8 October 2017. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/SMC.2017.8122941
2017
Conference Publication
DICE: A Dual Integrity Convergent Encryption Protocol for Client Side Secure Data Deduplication
Agarwala, Ashish, Singh, Priyanka and Atrey, Pradeep K. (2017). DICE: A Dual Integrity Convergent Encryption Protocol for Client Side Secure Data Deduplication. IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, Canada, 5-8 October 2017. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/SMC.2017.8122942
2017
Conference Publication
GeoSecure: Towards Secure Outsourcing of GPS Data over Cloud
Patil, Vikram, Parikh, Shivam, Singh, Priyanka and Atrey, Pradeep K. (2017). GeoSecure: Towards Secure Outsourcing of GPS Data over Cloud. 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV United States, 9-11 October 2017. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/cns.2017.8228699
2017
Journal Article
A secured robust watermarking scheme based on majority voting concept for rightful ownership assertion
Singh, Priyanka and Raman, Balasubramanian (2017). A secured robust watermarking scheme based on majority voting concept for rightful ownership assertion. Multimedia Tools and Applications, 76 (20), 21497-21517. doi: 10.1007/s11042-016-4006-x
2017
Journal Article
A secure image sharing scheme based on SVD and Fractional Fourier Transform
Singh, Priyanka, Raman, Balasubramanian and Misra, Manoj (2017). A secure image sharing scheme based on SVD and Fractional Fourier Transform. Signal Processing: Image Communication, 57, 46-59. doi: 10.1016/j.image.2017.04.012
2017
Journal Article
Prediction of advertisement preference by fusing EEG response and sentiment analysis
Gauba, Himaanshu, Kumar, Pradeep, Roy, Partha Pratim, Singh, Priyanka, Dogra, Debi Prosad and Raman, Balasubramanian (2017). Prediction of advertisement preference by fusing EEG response and sentiment analysis. Neural Networks, 92, 77-88. doi: 10.1016/j.neunet.2017.01.013
2017
Conference Publication
CryptFine: Towards secure cloud based filtering in encrypted domain
Rajput, Amitesh Singh, Singh, Priyanka and Raman, Balasubramanian (2017). CryptFine: Towards secure cloud based filtering in encrypted domain. Conference on ISEA Asia Security and Privacy (ISEASP), Surat, India, 29 January - 1 February 2017. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ISEASP.2017.7976985
2017
Journal Article
Rotation and script independent text detection from video frames using sub pixel mapping
Mittal, Anshul, Roy, Partha Pratim, Singh, Priyanka and Raman, Balasubramanian (2017). Rotation and script independent text detection from video frames using sub pixel mapping. Journal of Visual Communication and Image Representation, 46, 187-198. doi: 10.1016/j.jvcir.2017.03.002
2017
Journal Article
Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System
Singh, Priyanka, Raman, Balasubramanian, Agarwal, Nishant and Atrey, Pradeep K. (2017). Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System. ACM Transactions on Multimedia Computing, Communications, and Applications, 13 (3), 1-23. doi: 10.1145/3077140
2017
Journal Article
Toward encrypted video tampering detection and localization based on POB number system over cloud
Singh, Priyanka, Raman, Balasubramanian and Agarwal, Nishant (2017). Toward encrypted video tampering detection and localization based on POB number system over cloud. IEEE Transactions on Circuits and Systems for Video Technology, 28 (9), 2116-2130. doi: 10.1109/tcsvt.2017.2716828
2017
Journal Article
Reversible data hiding for rightful ownership assertion of images in encrypted domain over cloud
Singh, Priyanka and Raman, Balasubramanian (2017). Reversible data hiding for rightful ownership assertion of images in encrypted domain over cloud. AEUe: International Journal of Electronics and Communication, 76, 18-35. doi: 10.1016/j.aeue.2017.03.005
2017
Conference Publication
A deep learning frame-work for recognizing developmental disorders
Shukla, Pushkar, Gupta, Tanu, Saini, Aradhya, Singh, Priyanka and Balasubramanian, Raman (2017). A deep learning frame-work for recognizing developmental disorders. 17th IEEE Winter Conference on Applications of Computer Vision (WACV), Santa Rosa, CA United States, 24-31 March 2017. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/wacv.2017.84
Funding
Current funding
Supervision
Availability
- Dr Priyanka Singh is:
- Available for supervision
Looking for a supervisor? Read our advice on how to choose a supervisor.
Available projects
-
Research projects
-
Investigating vulnerabilities of Split Learning/Federated Learning/Split-Fed Learning Models
-
Defenses to build Robust Deep Learning Models
-
Image/Audio/Video Forensic Techniques to Detect Doctored Images/Deep Fakes
-
Privacy Preserving Frameworks for Various Applications
-
Geo-hashing and Location Based Services
-
Supervision history
Current supervision
-
Doctor Philosophy
Advancing cyberworthiness via integration of AI and Model-Based Systems Engineering (MBSE)
Principal Advisor
Other advisors: Professor Ryan Ko
-
Doctor Philosophy
Understanding Privacy Concerns About Living in Smart Cities and Enhancing Privacy Awareness
Principal Advisor
Other advisors: Professor Xue Li
-
Doctor Philosophy
Privacy preservation with Large Language Models
Principal Advisor
Other advisors: Professor Xue Li
-
Master Philosophy
Effective and versatile multimodal fusion
Principal Advisor
Other advisors: Professor Xue Li
-
Master Philosophy
Mapping Emerging Narratives Composed of False Information
Associate Advisor
Other advisors: Professor Xue Li
-
Doctor Philosophy
Behaviour-Oriented Tracking of Disinformation
Associate Advisor
Other advisors: Dr Ruihong Qiu, Professor Xue Li
-
Doctor Philosophy
AI planner for autonomous cyber defence for operational technologies (OT)
Associate Advisor
Other advisors: Professor Ryan Ko
-
Doctor Philosophy
Weighted Ensembles for Different machine learning model that support non-data-sharing / vertical partition
Associate Advisor
Other advisors: Professor Xue Li
-
Doctor Philosophy
Empowering Recommender Systems via User Behaviour Simulation
Associate Advisor
Other advisors: Professor Xue Li
Media
Enquiries
For media enquiries about Dr Priyanka Singh's areas of expertise, story ideas and help finding experts, contact our Media team: