Difference between revisions of "Main Page"

Jump to navigationJump to search
Line 16: Line 16:
* [https://www.cs.drexel.edu/~mb553/jstylo-0.0.1.tar.gz JStylo]
* [https://www.cs.drexel.edu/~mb553/jstylo-0.0.1.tar.gz JStylo]
* [https://www.cs.drexel.edu/~mb553/anonymouth-0.0.1.tar.gz Anonymouth]
* [https://www.cs.drexel.edu/~mb553/anonymouth-0.0.1.tar.gz Anonymouth]
* [https://www.cs.drexel.edu/~mb553/drexel-amt-corpus.tar.gz Drexel AMT Adversarial Stylometry Corpus (45 Authors)]
* [https://www.cs.drexel.edu/~mb553/drexel-amt-corpus.tar.gz Drexel AMT Adversarial Stylometry Corpus] (45 Authors, 6500 words per author minimum)
* [https://www.cs.drexel.edu/~mb553/brennan-greenstadt-corpus.tar.gz Brennan-Greenstadt Adversarial Stylometry Corpus (12 Authors)]
* [https://www.cs.drexel.edu/~mb553/brennan-greenstadt-corpus.tar.gz Brennan-Greenstadt Adversarial Stylometry Corpus] (12 Authors, 5000 words per author minimum)
== Recent News ==
== Recent News ==

Revision as of 06:36, 29 December 2011


Privacy, Security and Automation Lab

Welcome to PSAL, Drexel University's Privacy, Security, and Automation Laboratory. We research topics at the intersection between artificial intelligence, privacy and security, and human-computer interaction.

Check out the navigation sidebar for some basic information about who we are and what we are working on.

PI : Rachel Greenstadt (greenie at cs dot drexel dot edu)

JStylo / Anonymouth / Corpus Releases (28C3)

Below are the links to the public alpha releases of JStylo and Anonymouth as well as separate downloads for each of the corpora we are releasing today. Note that if you download JStylo or Anonymouth they include these corpora and you do not need to re-download them.

Note: It is strongly recommended that you increase your java heap size when running JStylo and Anonymouth.

Recent News

  • We will again be accepting participants for our Authorship Recognition Study soon.
  • Sadia Afroz has a paper with Knarig Arabshian, Peter Danielsen at AAAI Symposia 2012 on LexOnt: A Semi-automatic Ontology Creation Tool for Programmable Web.
  • We have released our first adversarial stylometry corpus. It contains 12 of the 15 authors who made up the corpus used in "Practical Attacks Against Authorship Recognition Techniques." If you use this corpus in your research, please cite:
Michael Brennan and Rachel Greenstadt. Practical Attacks Against Authorship Recognition Techniques in Proceedings of the Twenty-First Conference on Innovative Applications of Artificial Intelligence (IAAI), Pasadena, California, July 2009.
  • Rachel Greenstadt will be participating in the 2010 Workshop on Security and Human Behavior (speaking on community filtering in online communities) June 28-29.
  • Rachel Greenstadt will be speaking at Future Challenges of Network Security (FNCS) in Prague on June 23 on Mixed Initiative Security Agents.
  • Rachel Greenstadt and Michael Brennan have a poster at AAMAS on the Thursday, May 13 session (B-39). Come ask us questions about "Using Machine Learning to Augment Collaborative Filtering of Community Discussions"
  • Michael Brennan passed his candidacy exam on "Current Trends and New Directions in Stylometry." He is now PSAL's first Ph.D. candidate.
  • Rachel Greenstadt is offering a new graduate level course on security. CS 645 will be offered Wednesday evenings and online.
  • Sadia Afroz was selected to present her anti-phishing research in the ACM Student Research Competition at the Grace Hopper conference. tech report.
  • Michael Brennan and Rachel Greenstadt's IAAI paper on foiling authorship recognition techniques [pdf] was featured in the New Scientist.