Category: Publications

Home / Publications
Post

InVEST: Intelligent visual email search and triage

Jay Koven, Enrico Bertini, Luke Dubois, and Nasir Memon Large email data sets are often the focus of criminal and civil investigations. This has created a daunting task for investigators due to the extraordinary size of many of these collections. Our work offers an interactive visual analytic alternative to the current, manually intensive methodology used...

Post

The Right to be Forgotten in the Media: A Data-Driven Study

Minhui Xue, Gabriel Magno, Evandro Cunha, Virgilio Almeida, and Keith W. Ross Due to the recent “Right to be Forgotten” (RTBF) ruling, for queries about an individual, Google and other search engines now delist links to web pages that contain “inadequate, irrelevant or no longer relevant, or excessive” information about that individual. In this paper...

Post

Student research highlight: Secure and resilient distributed machine learning under adversarial environments

Rui Zhang and Quanyan Zhu Machine learning algorithms, such as support vector machines (SVMs), neutral networks, and decision trees (DTs) have been widely used in data processing for estimation and detection. They can be used to classify samples based on a model built from training data. However, under the assumption that training and testing samples come...

Post

Do You Trust Your Chip?

Ozgur Sinanoglu This talk will cover various forms of threats that the electronic chip supply chain is up against, as well as defenses against these threats. The talk will elucidate the development of CAD algorithms/tools for this newly emerging field by mostly leveraging principles from other more mature research domains.

Post

Profiling Underground Merchants Based on Network Behavior

Srikanth Sundaresan, Damon McCoy, Sadia Afroz, and Vern Paxson Online underground forums serve a key role in facilitating information exchange and commerce between gray market or even cybercriminal actors. In order to streamline bilateral communication to complete sales, merchants often publicly post their IM contact details, such as their Skype handle. Merchants that publicly post...