{"611761":{"#nid":"611761","#data":{"type":"news","title":"Liao Named Runner-Up for ACM SIGSAC Doctoral Dissertation Award","body":[{"value":"\u003Cp\u003EXiaojing Liao has been named as a runner-up for the 2018 ACM SIGSAC Doctoral Dissertation Award. Liao is a 2017 Ph.D. graduate of the Georgia Tech School of Electrical and Computer Engineering (ECE), and she is now an assistant professor in the Department of Computer Science at Indiana University-Bloomington.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ELiao will be honored at the ACM Conference on Computer and Communications Security, which will take place October 15-19, 2018 in Toronto, Canada. While at Georgia Tech, she was a member of the Communications Assurance and Performance Group and was advised by Raheem Beyah, who holds the Motorola Foundation Professorship and is the associate chair for Strategic Initiatives and Innovation in ECE.\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe title of Liao\u0026rsquo;s Ph.D. thesis is \u0026quot;Towards Automatically Evaluating Security Risks and Providing Cyber Intelligence.\u0026rdquo;\u0026nbsp;Cybercrimes often leave human-readable text traces\u0026nbsp;such as web content or forum posts for interacting with their targets (defrauding victims, advertising illicit products to intended customers) or coordinating with criminals in an attack. Such text content is a goldmine for understanding\u0026nbsp;how a cybercrime happens, the perpetrator\u0026rsquo;s strategies, capabilities and infrastructures, and even the ecosystem of the underground business.\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn Liao\u0026#39;s dissertation, how to automatically discover such text traces and intelligently use them are studied to fight against cybercrimes. This dissertation systematically analyzes the semantic inconsistency present in the communication between criminals and their\u0026nbsp;targets using Natural Language Processing (NLP) techniques, customizing\u0026nbsp;them to various security settings. Such techniques will lead to more effective and timely control of the cybercrimes, detecting ongoing large-scale campaigns, and hitting cybercrimes at their weak links. The dissertation research results were published in top-tier conferences, as well as recognized for their highly practical impacts, as\u0026nbsp;noted by widespread coverage in the popular media, including\u0026nbsp;\u003Cem\u003EThe New York Times\u003C\/em\u003E\u0026nbsp;and CNN.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EGeorgia Tech ECE alumna\u0026nbsp;Xiaojing Liao has been named as a runner-up for the 2018 ACM SIGSAC Doctoral Dissertation Award.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech ECE alumna\u00a0Xiaojing Liao has been named as a runner-up for the 2018 ACM SIGSAC Doctoral Dissertation Award."}],"uid":"27241","created_gmt":"2018-09-20 20:02:51","changed_gmt":"2018-09-20 20:03:25","author":"Jackie Nemeth","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2018-09-20T00:00:00-04:00","iso_date":"2018-09-20T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"611760":{"id":"611760","type":"image","title":"Xiaojing Liao","body":null,"created":"1537473287","gmt_created":"2018-09-20 19:54:47","changed":"1537473287","gmt_changed":"2018-09-20 19:54:47","alt":"photograph of Xiaojing Liao","file":{"fid":"232899","name":"Xiaojing Liao.jpg","image_path":"\/sites\/default\/files\/images\/Xiaojing%20Liao.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/Xiaojing%20Liao.jpg","mime":"image\/jpeg","size":5896,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Xiaojing%20Liao.jpg?itok=9TK1l7wF"}}},"media_ids":["611760"],"groups":[{"id":"1255","name":"School of Electrical and Computer Engineering"}],"categories":[{"id":"129","name":"Institute and Campus"},{"id":"130","name":"Alumni"},{"id":"134","name":"Student and Faculty"},{"id":"8862","name":"Student Research"},{"id":"135","name":"Research"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"145","name":"Engineering"}],"keywords":[{"id":"172886","name":"Xiaojing Liao"},{"id":"67741","name":"Raheem Beyah"},{"id":"109","name":"Georgia Tech"},{"id":"166855","name":"School of Electrical and Computer Engineering"},{"id":"179167","name":"ACM Conference on Computer and Communications Security"},{"id":"67761","name":"Communications Assurance and Performance Group"},{"id":"1404","name":"Cybersecurity"},{"id":"6956","name":"cybercrime"},{"id":"179168","name":"text traces"},{"id":"179169","name":"Natural Language Processing Techniques"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39481","name":"National Security"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJackie Nemeth\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESchool of Electrical and Computer Engineering\u003C\/p\u003E\r\n\r\n\u003Cp\u003E404-894-2906\u003C\/p\u003E\r\n","format":"limited_html"}],"email":["jackie.nemeth@ece.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}