{"id":118,"date":"2022-08-25T22:54:50","date_gmt":"2022-08-25T22:54:50","guid":{"rendered":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/?page_id=118"},"modified":"2024-03-28T13:46:07","modified_gmt":"2024-03-28T13:46:07","slug":"i-privacy-lab","status":"publish","type":"page","link":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/i-privacy-lab\/","title":{"rendered":"I-Privacy Lab"},"content":{"rendered":"<div class=\"CjVfdc\"><span class=\" jW0mOd\"><strong>General Information<\/strong><\/span><\/div>\n<p id=\"h.abirtsyiusdq_l\" class=\"CDt4Ke zfr3Q JYVBee\">The I-Privacy lab works to protect privacy for everyone who is surfing the Internet and entering the era of Internet of Things. We work on a variety of cutting-edge research topics such as mobile app security, location privacy, image privacy protection on social network, ransomware detection and defense, attacking and defending artificial intelligence, security and privacy issues in autonomous cars, security and privacy issues in big data processing. We have a group of talented graduate students and we offer different types of scholarship such as the following NSF SFS program.<\/p>\n<div class=\"CjVfdc\"><strong>Ongoing Research Projects<\/strong><\/div>\n<ul class=\"n8H08c UVNKR\">\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fengineering.missouri.edu%2F2021%2F08%2Fproposed-tool-would-give-users-control-of-social-media-images%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3FuSxHH5XnNY68X99glwVI\" target=\"_blank\" rel=\"noopener\"><strong>Broad-Spectrum Facial Image Protection with Provable Privacy Guarantees<\/strong><\/a><\/span><strong> (Funded by NSF)<\/strong><\/p>\n<\/li>\n<\/ul>\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\" style=\"padding-left: 30px\">The goal of this project is to overcome the following challenges which have not been well studied: (i) Privacy protection for human subjects and sensitive objects in the background of the images which are usually ignored by the existing works; (ii) Consideration of location-dependent image sensitivities whereby images taken at certain places (e.g., pubs, hospitals) may impact privacy of some people in the images who do not want their occurrences or co-occurrences at those locations to be known; (iii) Need for a comprehensive privacy model that can determine the extent to which the privacy protection mechanism reduces practical privacy risks; (iv) Enforcing the privacy protection that conforms with different privacy needs of multiple people in the same image.<\/p>\n<ul class=\"n8H08c UVNKR\">\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fengineering.missouri.edu%2F2020%2F10%2Fdetecting-deepfake-photos-videos-with-a-computerized-brain%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw0Y5_YkODKUDKS6WGHFQVyg\" target=\"_blank\" rel=\"noopener\"><strong>Self-Learning and Self-Evolving Detection of Altered, Deceptive Images and Videos<\/strong><\/a><\/span><strong> (Funded by NSF)<\/strong><\/p>\n<\/li>\n<\/ul>\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\" style=\"padding-left: 30px\">The objective of this project is to design an intelligent deepfake detector, namely DeepDetect, which will be capable of assessing the integrity of digital visual content and automatically detect fake images or videos in the real time to prevent them from spreading. The uniqueness of the proposed DeepDetect is its ability of self-learning and self-evolving to capture fake visual content generated by new (currently unknown) deepfake algorithms over time.<\/p>\n<ul class=\"n8H08c UVNKR\">\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fengineering.missouri.edu%2F2021%2F03%2Fno-more-red-lights-proposed-system-for-self-driving-cars-eliminates-need-to-stop%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1GbcLec-zbiWSILRAeX6m3\" target=\"_blank\" rel=\"noopener\"><strong>Information Management and Security Protection for Internet of Vehicles<\/strong><\/a><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\" style=\"padding-left: 30px\">In this project, we aim to develop comprehensive message routing solution to provide the fundamental support of information management for the Internet of vehicles. We have designed approaches that deliver messages via a self-organized moving-zone-based architecture formed using pure vehicle-to-vehicle communication and integrates moving object modeling and indexing techniques to vehicle management. It can significantly reduce the communication overhead while providing higher delivery rates. For the successful roll out of IoV applications, we also need to ensure the identity and location privacy of the participating vehicles, for which we are working on a suite of security and privacy protection mechanisms.<\/p>\n<p dir=\"ltr\"><strong>Post Doctoral Research Associate:<\/strong>\u00a0 Ali Allami, expert on secure multi-party computation<\/p>\n<div class=\"CjVfdc\"><strong>Current Students<\/strong><\/div>\n<ol class=\"n8H08c BKnRcf\">\n<li>Chaoquan C. (PhD), work on &#8220;image privacy protection&#8221;.<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Ke L. (PhD) , work on &#8220;voice authentication attacks and defense&#8221;.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Tyler N. (PhD), work on &#8220;location privacy protection&#8221;.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">Alian Y. (PhD), work on &#8220;Internet of vehicles&#8221;.<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Cameron B. (PhD), work on &#8220;fake voice generation and detection&#8221;.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Ian M.\u00a0 (PhD), work on &#8220;deepfake generation and detection&#8221;.<\/p>\n<\/li>\n<li>Jay B. (PhD), work on &#8220;deepfake detection&#8221;.<\/li>\n<li><span class=\"Q84Kk ujrct s5zQy\"><span class=\"o4zjZ ujrct lpc-hoverTarget\" role=\"button\"><span class=\"OZZZK\">Alex E. (PhD), work on &#8220;location privacy protection&#8221;. <\/span><\/span><\/span><\/li>\n<\/ol>\n<p><strong>Former Students (10 PhD and 7 MS thesis students have already graduated from our lab. )<br \/>\n<\/strong><\/p>\n<div class=\"CjVfdc\"><strong>NSF Scholarship for Service (SFS) Program<\/strong><\/div>\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">The SFS scholarship is a prestigious scholarship funded by National Science Foundation (NSF) to sponsor excellent students to pursue study in the filed of cybersecurity. There have been more than 2000 SFS scholars national wide. SFS graduates are currently serving in various government agencies and national labs. It is worth noting that more than 140 federal agencies are hiring SFS scholars. NSF is also organizing special job fairs for SFS scholars only. Government jobs offer excellent job security, employee benefits, paid vacations, regular working hours, etc. The job placement rate of SFS graduates are nearly 100%.<\/p>\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Through the SFS program, we will provide grants to students studying in the field of cybersecurity. Each scholarship recipient must complete either a M.S. or a Ph.D. degree on Computer Science. Rising juniors and seniors, and current M.S. and Ph.D. students who are U.S. citizens are eligible either as undergraduates through the MS degree, or PhD degree.<\/p>\n<div id=\"h.6vx5fnvk483k\" class=\"GV3q8e aP9Z7e\"><\/div>\n<div class=\"CjVfdc\">\n<div class=\"PPhIP rviiZ\"><\/div>\n<\/div>\n<div class=\"CjVfdc\"><strong>Scholarship Benefits:<\/strong><\/div>\n<ul class=\"n8H08c UVNKR\">\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Full tuition fees of scholarship recipients will be covered.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Each recipient will receive monthly stipend at the following rate: <strong>$22.5K\/year<\/strong> for senior students who will continue their graduate. study; <strong>$35K\/year<\/strong> for MS or PhD students. The recipients will be funded for up to three years.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Each recipient can reimburse up to $6000\/year for professional development (e.g., attending conferences and job fairs).<\/p>\n<\/li>\n<\/ul>\n<div id=\"h.rdidmvonxu29\" class=\"GV3q8e aP9Z7e\"><\/div>\n<div class=\"CjVfdc\">\n<div class=\"PPhIP rviiZ\"><\/div>\n<\/div>\n<div class=\"CjVfdc\"><strong>Eligibility:<\/strong><\/div>\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Students interested in participating in the SFS program must be:<\/p>\n<ul class=\"n8H08c UVNKR\">\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">A United States citizen or permanent resident<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">A full time senior, MS, or PhD student<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Able to meet selection criteria for federal government employment. Final job placement may require a security clearance, so each scholarship recipient may be required to undergo the background investigation required to obtain such a clearance.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Competitive students will have a strong GPA (&gt;=3.5\/4.0) or government\/national lab internship experience<\/p>\n<\/li>\n<\/ul>\n<div class=\"CjVfdc\">\n<div class=\"PPhIP rviiZ\"><\/div>\n<\/div>\n<div class=\"CjVfdc\"><strong>Recipient Responsibilities:<\/strong><\/div>\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">In return for receiving scholarship benefits, each scholarship recipient incurs two obligations:<\/p>\n<ul class=\"n8H08c UVNKR\">\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">During the summers while enrolled in the program, each student must find an internship position at an <span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fcybercorps%2Ffiles%2FFederal%2520Executive%2520%26%2520Non-Executive%2520Agencies.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw2DR8zYBSLQAPco5tG5aNsj\" target=\"_blank\" rel=\"noopener\">executive federal agency<\/a> <\/span>(or other approved federal agency). Numerous resources are available to assist students in identifying and applying for internships.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Upon graduation, each student will be required to work in a qualified position for an <span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fcybercorps%2Ffiles%2FFederal%2520Executive%2520%26%2520Non-Executive%2520Agencies.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw2DR8zYBSLQAPco5tG5aNsj\" target=\"_blank\" rel=\"noopener\">executive federal agency<\/a><\/span> (or other approved federal agency). The work requirement time period matches the supported time period. For example, a full two-year scholarship requires two years of federal employment. Each student is responsible for identifying, applying for, and securing a qualified position. Numerous resources are available including an annual job fair specifically for SFS students as well as the assistance of the Office of Personnel Management (OPM) which oversees permanent placement for scholarship students. Nearly 100% former SFS scholars have successfully fulfilled this requirement. Failing this service obligation will result in reimbursement of full amount of scholarship (including tuition, fees, stipend, professional development cost, health insurance, book allowance) received with possible interests.<\/p>\n<\/li>\n<\/ul>\n<div class=\"CjVfdc\">\n<div class=\"PPhIP rviiZ\"><\/div>\n<\/div>\n<div class=\"CjVfdc\"><strong>Application Process:<\/strong><\/div>\n<div class=\"CjVfdc\">\n<div class=\"PPhIP rviiZ\"><\/div>\n<\/div>\n<div class=\"CjVfdc\">Students who are interested in applying for the Scholarship for Service Program must complete the following documents.<\/div>\n<ul class=\"n8H08c UVNKR\">\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">An <strong>application form<\/strong> (send an email request to Dr. Lin)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Most current resume and\/or curriculum vitae<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Transcripts from all colleges or universities attended<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">A statement of purpose detailing academic, professional, and personal goals, and how participation in the Scholarship for Service Program will help achieve these goals<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Two names of references who are faculty, staff or your former employers<\/p>\n<\/li>\n<\/ul>\n<div class=\"CjVfdc\">\n<div class=\"PPhIP rviiZ\"><\/div>\n<\/div>\n<div class=\"CjVfdc\"><strong>Application Deadline:<\/strong><\/div>\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">SFS application is always open until the positions are filled. To allow sufficient time for evaluation and paper work, please submit your application at least a couple of months earlier before the semester that you wish your scholarship to begin.<\/p>\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><strong>Please email your application package to Dr. Dan Lin (dan.lin @ vanderbilt. edu)<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>General Information The I-Privacy lab works to protect privacy for everyone who is surfing the Internet and entering the era of Internet of Things. We work on a variety of cutting-edge research topics such as mobile app security, location privacy, image privacy protection on social network, ransomware detection and defense, attacking and defending artificial intelligence, [&hellip;]<\/p>\n","protected":false},"author":393,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"tags":[],"class_list":["post-118","page","type-page","status-publish","hentry"],"acf":[],"ACF":false,"_links":{"self":[{"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/pages\/118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/users\/393"}],"replies":[{"embeddable":true,"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/comments?post=118"}],"version-history":[{"count":9,"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/pages\/118\/revisions"}],"predecessor-version":[{"id":206,"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/pages\/118\/revisions\/206"}],"wp:attachment":[{"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/media?parent=118"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/tags?post=118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}