Difference between revisions of "Main Page"

From PSAL
Jump to navigationJump to search
(Recent News)
(Recent News)
Line 14: Line 14:
  
 
== Recent News ==
 
== Recent News ==
 +
 +
* PSAL and the Drexel Computer Science Department are hosting a [http://www.rhok.org Random Hacks of Kindness] event on June 4th and 5th, 2011 (plus a reception on June 3rd). You can find more details and register at the [http://rhokphiladelphia.eventbrite.com RHoK Philadelphia registration page]. It's free! Also, check out this article on [http://technicallyphilly.com/2011/05/19/random-hacks-of-kindness-hackathon-led-by-michael-brennan-sponsored-by-drexel-university-and-technically-philly Technically Philly] about the event.
 +
 +
* Michael Brennan gave a talk in April at Indiana University's Center for Applied Cyber Security entitled [http://www.youtube.com/watch?v=99-1J8vv_Ps Adversarial Stylometry: Attacking Authorship Recognition to Preserve Privacy and Anonymity].
  
 
* We have released our first [https://psal.cs.drexel.edu/attack_corpus.zip adversarial stylometry corpus]. It contains 12 of the 15 authors who made up the corpus used in "Practical Attacks Against Authorship Recognition Techniques."  If you use this corpus in your research, please cite:
 
* We have released our first [https://psal.cs.drexel.edu/attack_corpus.zip adversarial stylometry corpus]. It contains 12 of the 15 authors who made up the corpus used in "Practical Attacks Against Authorship Recognition Techniques."  If you use this corpus in your research, please cite:
Line 31: Line 35:
 
* Rachel Greenstadt is giving a seminar talk on [http://www.cs.uwaterloo.ca/odyssey/event/1026 Privacy & Stylometry: Exploring the Limitations and Potential of Automated Authorship Recognition] at the University of Waterloo at 13:30 pm on May 7.
 
* Rachel Greenstadt is giving a seminar talk on [http://www.cs.uwaterloo.ca/odyssey/event/1026 Privacy & Stylometry: Exploring the Limitations and Potential of Automated Authorship Recognition] at the University of Waterloo at 13:30 pm on May 7.
  
* Mike Brennan passed his candidacy exam on "Current Trends and New Directions in Stylometry."  He is now PSAL's first Ph.D. candidate.
+
* Michael Brennan passed his candidacy exam on "Current Trends and New Directions in Stylometry."  He is now PSAL's first Ph.D. candidate.
  
 
* Rachel Greenstadt will chair the [http://www.aisec.info 3rd Workshop on Artificial Intelligence and Security (AISec)] at [http://www.sigsac.org/ccs/CCS2010/ the 17th ACM Computer and Communications Security Conference (CCS 2010)] taking place October 4-8 in Chicago.
 
* Rachel Greenstadt will chair the [http://www.aisec.info 3rd Workshop on Artificial Intelligence and Security (AISec)] at [http://www.sigsac.org/ccs/CCS2010/ the 17th ACM Computer and Communications Security Conference (CCS 2010)] taking place October 4-8 in Chicago.
Line 37: Line 41:
 
* Rachel Greenstadt is offering a new graduate level course on security.  [http://www.cs.drexel.edu/~greenie/cs645 CS 645] will be offered Wednesday evenings and online.
 
* Rachel Greenstadt is offering a new graduate level course on security.  [http://www.cs.drexel.edu/~greenie/cs645 CS 645] will be offered Wednesday evenings and online.
  
* Mike Brennan spoke on [http://events.ccc.de/congress/2009/Fahrplan/events/3468.en.html Privacy and Stylometry: Practical Attacks on Authorship Recognition Techniques] at the [http://events.ccc.de/congress/2009/wiki/index.php/Welcome 26th Chaos Communication Congress] in Berlin.  [http://events.ccc.de/congress/2009/Fahrplan/attachments/1485_Mike%20Brennan%20-%20Privacy%20and%20Stylometry.ppt slides] [http://mirror.fem-net.de/CCC/26C3/mp4/26c3-3468-de-privacy__stylometry.mp4 mp4]
+
* Michael Brennan spoke on [http://events.ccc.de/congress/2009/Fahrplan/events/3468.en.html Privacy and Stylometry: Practical Attacks on Authorship Recognition Techniques] at the [http://events.ccc.de/congress/2009/wiki/index.php/Welcome 26th Chaos Communication Congress] in Berlin.  [http://events.ccc.de/congress/2009/Fahrplan/attachments/1485_Mike%20Brennan%20-%20Privacy%20and%20Stylometry.ppt slides] [http://mirror.fem-net.de/CCC/26C3/mp4/26c3-3468-de-privacy__stylometry.mp4 mp4]
  
 
* We presented a paper on [http://www.cs.drexel.edu/~greenie/aisec2009.pdf Mixed Initiative Security Agents] at the [http://www.aisec.info 2nd Workshop on Artificial Intelligence (AISec) at ACM CCS] on November 9, 2009.
 
* We presented a paper on [http://www.cs.drexel.edu/~greenie/aisec2009.pdf Mixed Initiative Security Agents] at the [http://www.aisec.info 2nd Workshop on Artificial Intelligence (AISec) at ACM CCS] on November 9, 2009.
Line 45: Line 49:
 
* Paul Snyder, Rachel Greenstadt, and Giuseppe Valetto presented [https://www.cs.drexel.edu/files/valetto/myconet-saso2009.pdf Myconet: A Fungi-inspired Model for Superpeer-based Peer-to-Peer Overlay Topologies] at [http://radlab.cs.berkeley.edu/saso2009/ Self-Adaptive and Self-Organizing Systems (SASO 2009)].
 
* Paul Snyder, Rachel Greenstadt, and Giuseppe Valetto presented [https://www.cs.drexel.edu/files/valetto/myconet-saso2009.pdf Myconet: A Fungi-inspired Model for Superpeer-based Peer-to-Peer Overlay Topologies] at [http://radlab.cs.berkeley.edu/saso2009/ Self-Adaptive and Self-Organizing Systems (SASO 2009)].
  
* Mike Brennan gave presentations on authorship recognition and privacy at [http://petsymposium.org/2009/hotpets.php HotPETs] and [https://har2009.org/ Hacking at Random].
+
* Michael Brennan gave presentations on authorship recognition and privacy at [http://petsymposium.org/2009/hotpets.php HotPETs] and [https://har2009.org/ Hacking at Random].
  
* Mike Brennan and Rachel Greenstadt's [http://www.aaai.org/Conferences/IAAI/iaai.php IAAI] paper on foiling authorship recognition techniques [http://www.cs.drexel.edu/~greenie/brennan_paper.pdf [pdf]] was featured in the [http://www.newscientist.com/article/dn17639-writing-style-fingerprint-tool-easily-fooled.html New Scientist].
+
* Michael Brennan and Rachel Greenstadt's [http://www.aaai.org/Conferences/IAAI/iaai.php IAAI] paper on foiling authorship recognition techniques [http://www.cs.drexel.edu/~greenie/brennan_paper.pdf [pdf]] was featured in the [http://www.newscientist.com/article/dn17639-writing-style-fingerprint-tool-easily-fooled.html New Scientist].
  
 
* Rachel Greenstadt and Bill Regli received an NSF grant to build a research exchange program with the [http://agents.felk.cvut.cz/ Agent Technology Center] at [http://www.cvut.cz/en?set_language=en Czech Technical University (CTU)] in Prague.
 
* Rachel Greenstadt and Bill Regli received an NSF grant to build a research exchange program with the [http://agents.felk.cvut.cz/ Agent Technology Center] at [http://www.cvut.cz/en?set_language=en Czech Technical University (CTU)] in Prague.

Revision as of 14:41, 24 May 2011

Welcome to PSAL, Drexel University's Privacy, Security, and Automation Laboratory.

We research topics at the intersection between artificial intelligence, privacy and security, and human-computer interaction.

Check out the navigation sidebar for some basic information about who we are and what we are working on.

PI : Rachel Greenstadt (greenie at cs dot drexel dot edu)

Authorship Recognition Study - Participants Needed

Authorship Recognition Study Web Form

This should take between 30 to 50 minutes of your time. The goals of this research are to discover how well current methods of authorship recognition perform when faced with with human adversaries who are deliberately trying to circumvent them, and to develop that can be used to study both future methods of authorship recognition and methods of circumventing them. A corpus of the results will be released to the public to help all researchers. Thanks for your help.

Recent News

  • We have released our first adversarial stylometry corpus. It contains 12 of the 15 authors who made up the corpus used in "Practical Attacks Against Authorship Recognition Techniques." If you use this corpus in your research, please cite:
Michael Brennan and Rachel Greenstadt. Practical Attacks Against Authorship Recognition Techniques in Proceedings of the Twenty-First Conference on Innovative Applications of Artificial Intelligence (IAAI), Pasadena, California, July 2009.
  • Rachel Greenstadt will be participating in the 2010 Workshop on Security and Human Behavior (speaking on community filtering in online communities) June 28-29.
  • Rachel Greenstadt will be speaking at Future Challenges of Network Security (FNCS) in Prague on June 23 on Mixed Initiative Security Agents.
  • Rachel Greenstadt and Michael Brennan have a poster at AAMAS on the Thursday, May 13 session (B-39). Come ask us questions about "Using Machine Learning to Augment Collaborative Filtering of Community Discussions"
  • Michael Brennan passed his candidacy exam on "Current Trends and New Directions in Stylometry." He is now PSAL's first Ph.D. candidate.
  • Rachel Greenstadt is offering a new graduate level course on security. CS 645 will be offered Wednesday evenings and online.
  • Sadia Afroz was selected to present her anti-phishing research in the ACM Student Research Competition at the Grace Hopper conference. tech report.
  • Michael Brennan and Rachel Greenstadt's IAAI paper on foiling authorship recognition techniques [pdf] was featured in the New Scientist.