Division of Computer and Network Systems (CNS)
group_project
Submitted by Brendan Nyhan on Wed, 08/07/2019 - 11:31am
Social media now play an important role in exposing people to information about a wide range of topics ranging from entertainment to hard news and political debate. What can be seen on these platforms is heavily influenced by algorithms that are designed to select the most engaging and relevant content for each user. By seeking to maximize engagement, these algorithms may inadvertently amplify factually dubious or poor quality information that reinforces users' existing beliefs. In doing so, these algorithms could reduce the diversity of information to which users are exposed.
group_project
Submitted by Marco Gaboardi on Wed, 08/07/2019 - 11:30am
Data-driven technology is having an impressive impact on society but privacy concerns restrict the way data can be used and released. Differential privacy has emerged as a leading notion supporting efficient and accurate data analyses that respect privacy. But designing and implementing efficient differentially private data analyses with high utility can be challenging and error prone. Even privacy experts have released code with bugs or designed incorrect algorithms.
group_project
Submitted by Giovanni Luca Cia... on Wed, 08/07/2019 - 11:28am
Social media now play an important role in exposing people to information about a wide range of topics ranging from entertainment to hard news and political debate. What can be seen on these platforms is heavily influenced by algorithms that are designed to select the most engaging and relevant content for each user. By seeking to maximize engagement, these algorithms may inadvertently amplify factually dubious or poor quality information that reinforces users' existing beliefs. In doing so, these algorithms could reduce the diversity of information to which users are exposed.
group_project
Submitted by Liyue Fan on Wed, 08/07/2019 - 11:25am
Social and behavioral research has a long history of collecting digitized data. With more and more studies incorporating participants' smartphone sensor and usage data, individual privacy has become a serious concern. Although researchers are trained to exercise confidentiality, sensitive information can be inferred from the smartphone data about the participants and their environment (e.g., families and communities). Without a systematic solution to address privacy concerns, participants may withdraw and request removal of their data from studies.
group_project
Submitted by Yanfang Ye on Wed, 08/07/2019 - 11:24am
As the Internet becomes increasingly ubiquitous, it offers a low-risk harbor for cybercrime -- illegal activities such as hacking and online scams. Cybercrime is increasingly enabled by an online underground ecosystem, within which are anonymous forums and so-called dark web platforms for cybercriminals to exchange knowledge and trade in illicit products and services.
group_project
Submitted by Jonathan Bell on Wed, 08/07/2019 - 11:22am
Code injection vulnerabilities are a class of security vulnerabilities that have been exploited increasingly often, including in the high-profile 2017 Equifax breach as well as in many recent attacks on our country's election and financial systems. These vulnerabilities are very tricky to detect, and there are no existing automated techniques to protect critical software from being released with these dangerous flaws. This project is developing new and transformative approaches for detecting code injection vulnerabilities in complex, large-scale systems.
group_project
Submitted by alexbardas on Wed, 08/07/2019 - 11:22am
Network and Security Operations Centers (SOCs) are central components of modern enterprise networks. SOCs manage network operations, defend against cyber threats, and maintain regulatory compliance. Typically, management and SOC operators use monitoring software and metrics, such as open and closed tickets, to manage SOC efficiency. These metrics may fail to represent the real effectiveness of the SOC and the security posture of the network.
group_project
Submitted by Bradley Fidler on Wed, 08/07/2019 - 11:20am
Network and Security Operations Centers (SOCs) are central components of modern enterprise networks. SOCs manage network operations, defend against cyber threats, and maintain regulatory compliance. Typically, management and SOC operators use monitoring software and metrics, such as open and closed tickets, to manage SOC efficiency. These metrics may fail to represent the real effectiveness of the SOC and the security posture of the network.
group_project
Submitted by Blase Ur on Wed, 08/07/2019 - 11:19am
Computing is transitioning from single-user devices, such as laptops and phones, to the Internet of Things (IoT), in which numerous users interact with a particular device, such as an Amazon Echo or Internet-connected door lock. The desired level of access to particular capabilities, such as ordering items using a shared voice assistant, likely differs across members of a household (e.g., children and parents).
group_project
Submitted by korolova on Wed, 08/07/2019 - 11:17am
Individuals generate enormous amounts of personal data that are subsequently collected and stored by organizations and governments. The data powers many innovative applications in areas such as web services, health care, and transportation, but they also increase privacy risks. Differential privacy, a framework to rigorously reason about privacy properties of algorithms, holds tremendous promise for enabling privacy-preserving yet useful data analyses. However, its adoption has been limited to entities with massive user bases.