Division of Computer and Network Systems (CNS)

group_project

Visible to the public SaTC: CORE: Frontier: Collaborative: End-to-End Trustworthiness of Machine-Learning Systems

This frontier project establishes the Center for Trustworthy Machine Learning (CTML), a large-scale, multi-institution, multi-disciplinary effort whose goal is to develop scientific understanding of the risks inherent to machine learning, and to develop the tools, metrics, and methods to manage and mitigate them. The center is led by a cross-disciplinary team developing unified theory, algorithms and empirical methods within complex and ever-evolving ML approaches, application domains, and environments.

group_project

Visible to the public SaTC: CORE: Frontier: Collaborative: End-to-End Trustworthiness of Machine-Learning Systems

This frontier project establishes the Center for Trustworthy Machine Learning (CTML), a large-scale, multi-institution, multi-disciplinary effort whose goal is to develop scientific understanding of the risks inherent to machine learning, and to develop the tools, metrics, and methods to manage and mitigate them. The center is led by a cross-disciplinary team developing unified theory, algorithms and empirical methods within complex and ever-evolving ML approaches, application domains, and environments.

group_project

Visible to the public SaTC: CORE: Frontier: Collaborative: End-to-End Trustworthiness of Machine-Learning Systems

This frontier project establishes the Center for Trustworthy Machine Learning (CTML), a large-scale, multi-institution, multi-disciplinary effort whose goal is to develop scientific understanding of the risks inherent to machine learning, and to develop the tools, metrics, and methods to manage and mitigate them. The center is led by a cross-disciplinary team developing unified theory, algorithms and empirical methods within complex and ever-evolving ML approaches, application domains, and environments.

group_project

Visible to the public SaTC: CORE: Frontier: Collaborative: End-to-End Trustworthiness of Machine-Learning Systems

This frontier project establishes the Center for Trustworthy Machine Learning (CTML), a large-scale, multi-institution, multi-disciplinary effort whose goal is to develop scientific understanding of the risks inherent to machine learning, and to develop the tools, metrics, and methods to manage and mitigate them. The center is led by a cross-disciplinary team developing unified theory, algorithms and empirical methods within complex and ever-evolving ML approaches, application domains, and environments.

group_project

Visible to the public SaTC: CORE: Frontier: Collaborative: End-to-End Trustworthiness of Machine-Learning Systems

This frontier project establishes the Center for Trustworthy Machine Learning (CTML), a large-scale, multi-institution, multi-disciplinary effort whose goal is to develop scientific understanding of the risks inherent to machine learning, and to develop the tools, metrics, and methods to manage and mitigate them. The center is led by a cross-disciplinary team developing unified theory, algorithms and empirical methods within complex and ever-evolving ML approaches, application domains, and environments.

group_project

Visible to the public TWC SBE: Medium: Collaborative: Dollars for Hertz: Making Trustworthy Spectrum Sharing Technically and Economically Viable

The critical role of spectrum as a catalyst for economic growth was highlighted in the 2010 National Broadband Plan (NBP). A challenge for the NBP is realizing optimal spectrum sharing in the presence of interference caused by rogue transmissions from any source, but particularly secondary users who share the spectrum. This complex problem straddles wireless technology, industrial economics, international standards, and regulatory policy.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Towards Robust Machine Learning Systems

Machine learning techniques, particularly deep neural networks, are increasingly integrated into safety and security-critical applications such as autonomous driving, precision health care, intrusion detection, malware detection, and spam filtering. A number of studies have shown that these models can be vulnerable to adversarial evasion attacks where the attacker makes small, carefully crafted changes to normal examples in order to trick the model into making incorrect decisions.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Secure Distributed Coded Computations for IoT: An Information Theoretic & Network Approach

The Internet of Things (IoT) is emerging as a new Internet paradigm connecting an exponentially increasing number of smart IoT devices and sensors. IoT applications include smart cities, transportation systems, mobile healthcare and smart grid, to name a few. Unlocking the full power of IoT requires analyzing and processing large amounts of data collected by the IoT devices through computationally intensive algorithms that are typically run in the cloud.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Enabling Long-Term Security and Privacy through Retrospective Data Management

Online data storage, everything from past conversations to tax returns to playdate invitations, may be retained at full fidelity for years or decades. Although the data being saved in online archives does not change, the personal and social contexts surrounding them do. Those life changes may necessitate changing or deleting stored data but, unfortunately, the vast quantity of data in users' online archives makes manual management infeasible.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Understanding and Discovering Illicit Online Business Through Automatic Analysis of Online Text Traces

Unlawful online business often leaves behind human-readable text traces for interacting with its targets (e.g., defrauding victims, advertising illicit products to intended customers) or coordinating among the criminals involved. Such text content is valuable for detecting various types of cybercrimes and understanding how they happen, the perpetrator's strategies, capabilities and infrastructures and even the ecosystem of the underground business.