<node id="614048">
  <nid>614048</nid>
  <type>event</type>
  <uid>
    <user id="27707"><![CDATA[27707]]></user>
  </uid>
  <created>1541709949</created>
  <changed>1541709949</changed>
  <title><![CDATA[PhD Proposal by Shang-Tse Chen]]></title>
  <body><![CDATA[<p>Ph.D. Thesis&nbsp;Proposal&nbsp;Announcement</p>

<p>&nbsp;</p>

<p>Title: AI-infused Security: Robust Defense by Bridging Theory and Practice</p>

<p>&nbsp;</p>

<p>Shang-Tse Chen</p>

<p>Computer Science PhD Student</p>

<p>School of Computational Science and Engineering</p>

<p>College of Computing</p>

<p>Georgia Institute of Technology</p>

<p><a href="https://www.cc.gatech.edu/~schen351">https://www.cc.gatech.edu/~schen351</a></p>

<p>&nbsp;</p>

<p>Date: Friday, November 16th, 2018</p>

<p>Time: 11:30am to 1:30pm (EDT)</p>

<p>Location: KACB 1123</p>

<p>&nbsp;</p>

<p>Committee:</p>

<p>----------------</p>

<p>Dr. Polo Chau (Advisor, School of Computational Science and Engineering, Georgia Institute of Technology)</p>

<p>Dr. Maria-Florina Balcan (Co-advisor, School of Computer Science, Carnegie Mellon University)</p>

<p>Dr. Wenke Lee (School of Computer Science, Georgia Institute of Technology)</p>

<p>Dr. Le Song (School of Computational Science and Engineering, Georgia Institute of Technology)</p>

<p>Dr. Kevin A. Roundy (Symantec Research Labs)</p>

<p>Dr.&nbsp;Cory Cornelius (Intel Labs)</p>

<p>&nbsp;</p>

<p>Abstract:</p>

<p>----------------</p>

<p>The advances in Artificial Intelligence (AI) has made far-reaching impact in almost every industry. Cybersecurity in particular is one of the important fields that AI has revolutionized. However, while AI has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge. The goal of this proposed thesis is to develop next-generation strong cybersecurity defenses by uniquely combining techniques from AI, cybersecurity, and algorithmic game theory. Our multi-faceted contributions push the frontiers in each area and the intersection.</p>

<p>These contributions can be categorized into the following four inter-related research thrusts:</p>

<p>&nbsp;</p>

<p>(1) <strong>Theory-guided Decision Making</strong>:&nbsp;</p>

<p>We develop new theories that guide defense resources allocation to guard against unexpected attacks and catastrophic events, using a novel online decision-making framework that compels players to employ &quot;diversified&quot; mixed strategies.</p>

<p>&nbsp;</p>

<p>(2)&nbsp; <strong>Robust Distributed Machine Learning</strong>:&nbsp;</p>

<p>We develop a communication-efficient distributed boosting algorithm with strong theoretical guarantees in the agnostic learning setting where the data can contain arbitrary noise.</p>

<p>&nbsp;</p>

<p>(3) <strong>Adversarial Attack and Defense</strong>:</p>

<p>We develop ShapeShifter, a physical adversarial attack that fools the state-of-the-art deep-learning-based object detector.</p>

<p>We propose to design efficient methods to protect deep neural networks from such kinds of adversarial attacks.</p>

<p>&nbsp;</p>

<p>(4) <strong>Enterprise Cyber Threat Detection</strong>: We show how AI can be used in real enterprise environment by designing a novel framework called &quot;Virtual Product&quot; to predict potential enterprise cyber threats from telemetry data.&nbsp;</p>

<p>&nbsp;</p>

<p>This thesis research will make multiple important contributions.&nbsp; First, it improves people&#39;s understanding of the capabilities and limitations of AI under adversarial circumstances. Second, it offers guiding principles for future research on how to empower security-critical applications by effectively combining AI, cybersecurity, and algorithmic game theory. Third, our machine learning algorithms are scalable and general, and thus can be used in a wide range of applications.</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[AI-infused Security: Robust Defense by Bridging Theory and Practice]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2018-11-16T11:30:00-05:00]]></value>
      <value2><![CDATA[2018-11-16T13:30:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>102851</tid>
        <value><![CDATA[Phd proposal]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
