Main Page

From PSAL

Jump to: navigation, search

Privacy, Security and Automation Lab

Welcome to PSAL, Drexel University's Privacy, Security, and Automation Laboratory. We research on topics at the intersection between artificial intelligence, privacy and security, and human-computer interaction.

Check out the navigation sidebar for some basic information about who we are and what we are working on.

PI : Rachel Greenstadt (greenie at cs dot drexel dot edu)

JStylo / Anonymouth / Corpus Releases

Below are the links to the public alpha releases of JStylo and Anonymouth as well as separate downloads for each of the corpora we are releasing today. Note that if you download JStylo or Anonymouth they include these corpora and you do not need to re-download them.

Note: It is strongly recommended that you increase your java heap size when running JStylo and Anonymouth.

If you use this corpus in your research, please cite:

Michael Brennan, Sadia Afroz, and Rachel Greenstadt. 2012. Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity. ACM Trans. Inf. Syst. Secur. 15, 3, Article 12 (November 2012).

Michael Brennan and Rachel Greenstadt. Practical Attacks Against Authorship Recognition Techniques in Proceedings of the Twenty-First Conference on Innovative Applications of Artificial Intelligence (IAAI), Pasadena, California, July 2009.

JStylo / Anonymouth

If you use this software in your research, please cite:

Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization. Andrew W.E. McDonald, Sadia Afroz, Aylin Caliskan, Ariel Stolerman and Rachel Greenstadt. Privacy Enhancing Technologies Symposium (PETS 2012), Vigo, Spain, July 2012

Recent News

  • Paper accepted at WPES 2014. Aylin Caliskan-Islam, Jonathan Walsh, and Rachel Greenstadt. Privacy Detective: Detecting Private Information and Collective Privacy Behavior in a Large Social Network. Workshop on Privacy in the Electronic Society (WPES 2014).
  • Paper accepted at HotPets 2014. Blogs and Twitter Feeds: A Stylometric Environmental Impact Study. Rebekah Overdorf, Travis Dutko, Rachel Greenstadt.

Sadia Afroz, Aylin Caliskan-Islam, Ariel Stolerman, Rachel Greenstadt, Damon McCoy.

1. Active linguistic authentication revisited: Real-time stylometric evaluation towards multi-modal decision fusion. Stolerman, A., Fridman, A., Greenstadt, R., Brennan, P. and Juola, P.

2. Classify, but Verify: Breaking the Closed-World Assumption in Stylometric Authorship Attribution. Stolerman, A., Overdorf, R., Afroz, S. and Greenstadt, R.

Sadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt. Blog.

This work has been featured in

1. Linguistics identifies anonymous users,

2. Stylometric analysis to track anonymous users in the underground

3. on Slashdot news, on Hacker news

4. Why hackers should be afraid of how they write

5. On Schneier on Security blog

  • Congratulations to Dr. Brennan, PSAL's first PhD graduate.
  • Michael Brennan won the best presentation award at HotPETS 2012 for "Perspectives on Academic Impact from Inside the Federal Trade Commission."
  • "Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization." won the best student paper award at PETS 2012.
  • Paper got accepted to PETS 2012. "Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization." Andrew W.E. McDonald, Sadia Afroz, Aylin Caliskan, Ariel Stolerman and Rachel Greenstadt. The 12th Privacy Enhancing Technologies Symposium.
  • We will again be accepting participants for our Authorship Recognition Study soon.
  • Sadia Afroz has a paper with Knarig Arabshian, Peter Danielsen at AAAI Spring Symposia 2012 on LexOnt: A Semi-automatic Ontology Creation Tool for Programmable Web.
  • We have released our first adversarial stylometry corpus. It contains 12 of the 15 authors who made up the corpus used in "Practical Attacks Against Authorship Recognition Techniques." If you use this corpus in your research, please cite:
Michael Brennan and Rachel Greenstadt. Practical Attacks Against Authorship Recognition Techniques in Proceedings of the Twenty-First Conference on Innovative Applications of Artificial Intelligence (IAAI), Pasadena, California, July 2009.
  • Rachel Greenstadt will be participating in the 2010 Workshop on Security and Human Behavior (speaking on community filtering in online communities) June 28-29.
  • Rachel Greenstadt will be speaking at Future Challenges of Network Security (FNCS) in Prague on June 23 on Mixed Initiative Security Agents.
  • Rachel Greenstadt and Michael Brennan have a poster at AAMAS on the Thursday, May 13 session (B-39). Come ask us questions about "Using Machine Learning to Augment Collaborative Filtering of Community Discussions"
  • Michael Brennan passed his candidacy exam on "Current Trends and New Directions in Stylometry." He is now PSAL's first Ph.D. candidate.
  • Rachel Greenstadt is offering a new graduate level course on security. CS 645 will be offered Wednesday evenings and online.
  • Sadia Afroz was selected to present her anti-phishing research in the ACM Student Research Competition at the Grace Hopper conference. tech report.
  • Michael Brennan and Rachel Greenstadt's IAAI paper on foiling authorship recognition techniques [pdf] was featured in the New Scientist.
Personal tools