{"componentChunkName":"component---src-templates-blog-list-blog-list-js","path":"/blog/page/3","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Security of Machine Learning Models","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"security-of-machine-learning-models","authorId":"owen-christ","dateSlug":"2020-07-01T15:01:00.000Z"},"excerpt":"Security of Machine Learning Models With the immense amount of data produced every data, manual data analyse has become an impossible task…"}},{"node":{"frontmatter":{"categories":["Positions","cyber security"],"title":"Posters and Infographics","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"posters-and-infographics","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Posters and Infographics"}},{"node":{"frontmatter":{"categories":["Positions","cyber security"],"title":"Student Projects","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"student-projects","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Master of Computer Science Projects High-performance computing platform for DNA analysis The aim of the project is to build a forensic DNA…"}},{"node":{"frontmatter":{"categories":["Positions","cyber security"],"title":"Supervision","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"supervision","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Supervision"}},{"node":{"frontmatter":{"categories":["Positions","cyber security"],"title":"Talks and Slides","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"talks-and-slides","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Talks An introduction to the University of Adelaide"}},{"node":{"frontmatter":{"categories":["Positions","cyber security"],"title":"Collaboration","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAALABQDASIAAhEBAxEB/8QAFgABAQEAAAAAAAAAAAAAAAAAAAEE/8QAFAEBAAAAAAAAAAAAAAAAAAAAAP/aAAwDAQACEAMQAAAB3ygD/8QAFBABAAAAAAAAAAAAAAAAAAAAIP/aAAgBAQABBQJf/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPwE//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPwE//8QAFBABAAAAAAAAAAAAAAAAAAAAIP/aAAgBAQAGPwJf/8QAGBABAAMBAAAAAAAAAAAAAAAAAQARIEH/2gAIAQEAAT8hg3xM/wD/2gAMAwEAAgADAAAAEAAP/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPxA//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPxA//8QAGhABAAEFAAAAAAAAAAAAAAAAAREAICExQf/aAAgBAQABPxBwamlSMTrFv//Z","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"collaboration","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Collaboration"}}]}},"pageContext":{"limit":6,"skip":12,"currentPage":3,"numberOfPages":7,"breadcrumb":{"location":"/blog/page/3","crumbs":[{"pathname":"/","crumbLabel":"Home"},{"pathname":"/blog","crumbLabel":"blog"},{"pathname":"/blog/page","crumbLabel":"page"},{"pathname":"/blog/page/3","crumbLabel":"3"}]}}}}