natural language processing / en Commonwealth Cyber Initiative (CCI) researchers address multidisciplinary challenges /news/2022-01/commonwealth-cyber-initiative-cci-researchers-address-multi-disciplinary-challenges <span>Commonwealth Cyber Initiative (CCI) researchers address multidisciplinary challenges</span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Wed, 01/26/2022 - 15:19</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/hpurohit" hreflang="und">Hemant Purohit</a></div> <div class="field__item"><a href="/profiles/eoster" hreflang="und">Eric Osterweil</a></div> <div class="field__item"><a href="/profiles/dbarbara" hreflang="und">Daniel Barbará</a></div> <div class="field__item"><a href="/profiles/vmotti" hreflang="und">Vivian Genaro Motti</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span>Whether you are an experienced software developer, a teen texting on a smartphone, or an older adult checking a bank statement, cybersecurity is part of your life. Humans and computers interact every minute of every day and cybersecurity is there to keep information safe and actions private. But normal human behavior can compromise safety and privacy.</span></span></p> <p><span><span>For the next 12 months, researchers funded by the <a href="https://cci-novanode.org" title="CCI Nova Node">Commonwealth Cyber Initiative’s </a>(CCI) Northern Virginia Node (NoVa Node) will be exploring the impact of human behavior on cybersecurity systems. Divided into six teams, the researchers will seek to leverage the power of their academic expertise in the social sciences, and related fields. The teams include faculty from the Colleges <a href="https://cec.gmu.edu" title="College of Engineering and Computing">of Engineering and Computing</a>, <a href="https://chss.gmu.edu" title="College of Humanities and Social Sciences">Humanities and Social Sciences</a>, <a href="https://cehd.gmu.edu" title="College of Education and Human Development">Education and Human Development</a>, and the School of Business. Each team will explore a different aspect of the problem as they aim to translate those understandings into solutions or areas for additional investigation that can impact the welfare of Virginians.</span></span></p> <p> </p> <p><strong><span><span><span><span>“Human-Centric Training for Privacy and Security Controls: Bridging the Awareness Gap for Diverse Populations”</span></span></span></span></strong></p> <p><span><span>PI: Vivian Genero Motti, College of Engineering and Computing (CEC), AV; Co-PIs: <span><span>Samy El-Tawab, and Ahmad Salman, <a href="https://isc.jmu.edu/programs/academic-programs/integrated-science-and-engineering" title="College of Integrated Sciences and Engineering">College of Integrated Sciences, James Madison University</a></span></span></span></span></p> <p><span><span><span>If you retired from the workforce 25 years ago, before Wi-Fi, online shopping, banking, or smartphones, you are likely more vulnerable to cyberattacks. In fact, older adults face a disproportionate risk of suffering cyberattacks; still, they do not have access to resources and educational materials suitable to meet their needs related to human behavior and privacy protection.</span></span></span></p> <p><span><span><span>Vivian Motti and her team want to do something about that. They plan to reach out to underrepresented users and characterize their level of awareness about cybersecurity. Motti and her team believe that gaining a better understanding of these populations will help inform educational content development, providing content, language, and design aspects that are all suitable to their specific user profiles. </span></span></span></p> <p><span><span><span>“By adopting a user-centric design approach, this project will ensure that cybersecurity training meets users' needs for minority groups. By involving older adults front and center in the research agenda, we will establish training contents that are appropriate to their level of understanding,” says Motti.  Also, besides following the training contents and retaining what they learn, they will be able to act and prevent potential attacks that could pose privacy risks.</span></span></span></p> <p> </p> <p><strong><span><span><span>“Impact of Human Behavior in a Mixed Traffic Environment”</span></span></span></strong></p> <p><span><span><span>PI:</span> <span>Linghan Zhang, CEC</span><span>; Co-PIs: </span><span>Nirup Menon, School of Business, Nupoor Ranade, College of Humanities and Social Sciences (CHSS), </span></span></span></p> <p><span><span><span>As autonomous vehicles become more prevalent and mingle with human-driven vehicles this mixed traffic environment may comprise both. In mixed traffic, the behaviors of human drivers are unpredictable and can lead to situations that confuse autonomous vehicles and cause adverse events for both. </span></span></span></p> <p><span><span><span>The CCI NoVa Node’s research in autonomous vehicles (AVs) has already garnered attention from vehicle manufacturers such as Ford, Cadillac, and Daimler-Benz. Linghan Zhang and her team aim to extend that research by studying their use in mixed traffic.</span></span></span></p> <p><span><span><span>According to Linghan, the team’s goal is to reflect driving reality through a multi-vehicle simulation in mixed traffic, using driving conditions that have led to real-world collisions in the past. She says, “Prior research only focuses on a single user’s behavior, and the data collected is mainly limited to surveys and interviews. With objective driving data missing, prior experiments did not reflect on-road driving reality.” </span></span></span><span><span> </span></span></p> <p><span><span><span>This project could achieve valuable and meaningful data on how human driver behaviors affect other components in mixed driving environments, especially in security- and safety-critical contexts when human errors are inevitable as well as uncover what humans need to know while driving alongside AVs. The team expects that the results will be significant for autonomous vehicle implementation and policymaking. </span></span></span></p> <p> </p> <p><span><span><strong><span>“Towards Building Cyber-Security Resilience in a COVID-Induced Virtual Workplace” </span></strong></span></span></p> <p><span><span><span>PI: Amitava Dutta; Co-PI: Pallab Sanyal, School of Business, AV</span></span></span></p> <p><span><span><span>Before COVID-19 rocked our world, individuals and businesses were already increasing their online presence. The pandemic accelerated the speed forcing a change. People who were not comfortable in the online environment were made to go online and people who were already comfortable expanded their online presence to areas that they had previously conducted in person.</span></span></span></p> <p><span><span><span>“In short, COVID-19 has caused a shift from organizational ecosystems to a virtual workplace for employees, which has opened multiple vectors for cyberattacks,” says Amitava Duta, professor at the School of Business. “Our research focuses on the behavioral and organizational aspects of cybersecurity and is motivated by the ongoing transformations following the onset of the COVID-19 pandemic.”</span></span></span></p> <p><span><span><span>In their project, the team will investigate the significant changes in online behavior following the onset of the COVID-19 pandemic are. They expect their insights will help organizations build greater cyber-security resilience in a virtual workplace.  </span></span></span></p> <p><span><span><span>Because Washington, D.C. and Northern Virginia are home to prominent financial services organizations these businesses would have a strong interest in strengthening their cybersecurity posture to address its behavioral aspects. Soon, Amazon will also have a significant presence and retail online sales is another area frequently targeted by cybercriminals. If organizations would be willing to provide data on customer behavior on their website, the models developed from the team’s work could be refined and tailored for an important application domain.</span></span></span></p> <p> </p> <p><strong><span><span><span><span>“Characterizing and Countering User Security Fatigue in Password Enhancement through Deep Learning”</span></span></span></span></strong></p> <p><span><span><span>PI: Gerald Matthews, CHSS, AV; Co-PIs: Giuseppe Anteniese and Daniel Barbará, CEC, AV</span></span></span></p> <p><span><span><span>If you already have a demanding job, you might think maintaining security is an additional burden, and not keep up with cybersecurity best practices such as updating or changing your passwords. </span></span></span></p> <p><span><span><span>Professor Giuseppe Ateniese has designed a tool for enhancing password strength, based on a deep learning approach, but psychological factors may limit the adoption and impact of the tool. Everyone can be vulnerable to security fatigue and lax cybersecurity practices can have major societal consequences—threats to national security, financial losses to individuals and organizations, and invasion of privacy. </span></span></span></p> <p><span><span><span>Introducing security tools powered by Artificial Intelligence, when successful, will counteract typical human fallibilities and promote safety in computer systems across government, industry, and personal use. This project investigates the effect of security fatigue on the use of Anteniese’s tool. It will also explore strategies for mitigating fatigue and supporting user engagement. </span></span></span></p> <p><span><span><span>The team believes that enhancing employees' ability and motivation to maintain effective security protocols has immediate economic benefits and the research has the potential to suggest design features of security tools that can support commercialization as well as training protocols.</span></span></span></p> <p> </p> <p><span><span><span>“<strong>Enabling Invisible Security and Privacy for Resilient Human-Centric Cybersecurity Systems</strong>”</span></span></span></p> <p><span><span><span>PI: Eric Osterweil, CEC, AV; Co-PI: Matt Canham, CHSS, AV</span></span></span></p> <p><span><span><span>For decades, cryptography has been one of cybersecurity’s most essential tools. While its utility is certain, its complexity limits its use for non-experts. The result—non-experts fall prey to cybercriminals for many reasons including lack of knowledge, incorrect thought processes, and the inability to invest adequate time and resources to implement proper data protection.</span></span></span></p> <p><span><span><span>Eric Osterweil and his co-investigator Matt Canham hope to change that through their work with the CCI NoVa Node. “This project will seed a critical foundation for adaptive cybersecurity protections for human users’ end-to-end encryption (E2EE) needs. The results from this project will be used as foundations for enhancing a core staple of Internet communications (email) and future advances in prescriptive protections for Cybersecurity Threat Intelligence (CTI) information sharing,” says Osterweil. </span></span></span></p> <p><span><span><span>The CTI industry continues to grow, with companies, federal agencies, and international communities relying on CTI. In Virginia, where federal agencies and their partners routinely conduct transactions over email, this is especially true. Their view is that building human usable E2EE protections and extending those to adaptive CTI will be directly relevant to operational cybersecurity projects and needs throughout the industry and public sectors in Virginia. </span></span></span></p> <p><span><span><span>The pair believes that a key benefit to the Commonwealth will include course-related exposure of this material to the students at AV. “Students will be able to showcase both the results of this work and their own derived qualifications to benefit their entry into local industry and jumpstart their ascension to professional careers,” says Osterweil. </span></span></span></p> <p><span><span> </span></span></p> <p><strong><span><span><span><span><span>"Characterizing Biases in Automated Scam Detection Tools for Social Media to Aid Individuals with Developmental Disabilities"</span></span> </span></span></span></strong></p> <p><span><span><span><span><span>PI: Hemant Purohit, CEC; Co-PIs: Géraldine Walther, CHHS; Matt Peterson, CHHS; YooSun Chung, CEHD </span></span></span></span></span></p> <p><span><span><span><span>Designers of scam detection tools often focus on improving the computational accuracy of the methods, especially those with state-of-the-art Natural Language Processing (NLP) and Machine Learning (ML)-based techniques, but their understanding of the diverse human behavior can be limited. This project aims to build a foundation for inclusive cybersecurity technologies to protect individuals with disabilities from online scams using a unique interdisciplinary collaborative approach between computing and non-computing researchers. </span></span></span></span></p> <p><span><span><span><span>Specifically, the team’s objective is to uncover the biases in the existing scam detection techniques for social media using NLP and ML methods. “We will conduct Eye Tracking analyses using a labeled scam dataset of social media posts from existing literature on online cybersecurity and study the differences between the attention patterns of individuals with and without developmental disabilities when perceiving scam posts,” says Hemant Purohit. </span></span></span></span></p> <p><span><span><span><span>The project hopes to gain insights that will support cybersecurity training development for reducing online fraud for individuals with special education needs. At the same time, the researchers want to identify limitations in automated scam detection tools and help create more effective cybersecurity tools that can protect user groups in our communities.   </span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/7961" hreflang="en">Artificial Intellgence</a></div> <div class="field__item"><a href="/taxonomy/term/14746" hreflang="en">cryptography</a></div> <div class="field__item"><a href="/taxonomy/term/511" hreflang="en">coronavirus; covid-19</a></div> <div class="field__item"><a href="/taxonomy/term/12576" hreflang="en">Social Media</a></div> <div class="field__item"><a href="/taxonomy/term/9011" hreflang="en">natural language processing</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Wed, 26 Jan 2022 20:19:34 +0000 Martha Bushong 64136 at Computer science expert using natural language processing to improve equality in language technologies /news/2021-02/computer-science-expert-using-natural-language-processing-improve-equality-language <span>Computer science expert using natural language processing to improve equality in language technologies </span> <span><span lang="" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Anonymous (not verified)</span></span> <span>Wed, 02/17/2021 - 09:24</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Computer science researcher Antonis Anastasopoulos uses his love for computer science, language, and linguistics to improve equality in language technologies. </p> <p>When people ask Siri, Alexa, or Google Assistant a question, they expect the programs to understand them, but that is not always the case, he says. </p> <figure role="group" class="align-right"><div alt="Antonis standing outside, facing the camera. " data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="{"image_style":"","image_link":"","svg_render_as_image":1,"svg_attributes":{"width":"","height":""}}" data-entity-type="media" data-entity-uuid="b68865f0-4e5e-4129-9b01-725002eccb53" title="Antonis" data-langcode="en" class="embedded-entity"> <img src="/sites/g/files/yyqcgq291/files/2021-02/PROF-Antonis%20mug%20shot.jpg" alt="Antonis standing outside, facing the camera. " title="Antonis" typeof="foaf:Image" /></div> <figcaption>Antonis Anastaspopoulos, photo provided.</figcaption></figure><p>A person’s language, accent, dialect, and even gender can have an impact, preventing the system from interpreting them correctly, says Anastasopoulos, an assistant professor in the <a href="https://cs.gmu.edu/" target="_blank">Department of Computer Science</a> and an expert in natural language processing, which is how computers attempt to process and understand human languages.</p> <p> “The systems don’t work equally well for everyone,” says Anastasopoulos, who speaks Greek (his native language), English, German, Swedish, Italian, and some Spanish.</p> <p>He is one of several co-principal investigators who received a new National Science Foundation-Amazon grant for their research, “Quantifying and Mitigating Disparities in Language Technologies.”</p> <p>In the fall, Anastasopoulos also won a <a href="https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fai.googleblog.com%2F2020%2F10%2Fannouncing-2020-award-for-inclusion.html&data=04%7C01%7C%7C4be23ba5d58c4004bb4108d8cc7bd8bc%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C637484179573247108%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=eDhvvWhPdEmRC8pEgHe1Xvo9XDGxltdXdg0wtA1dWxg%3D&reserved=0" target="_blank">Google 2020 Award for Inclusion Research</a> for a project on how accent and dialect impact language technologies.</p> <p>For the NSF grant, he and experts from Carnegie Mellon University and the University of Washington are studying areas where there is bias in language technologies and measuring the discrepancies. Then they will attempt to mitigate the inequalities.</p> <p>“We want to measure the extent to which the diversity of language affects the utility that speakers get from language technologies,” Anastasopoulos says. “We will focus on automatic translation and speech recognition since they are perhaps the most commonly used language technologies throughout the world.”</p> <p>His research will apply to all languages. It’s important to look deeply into languages for differences because languages are flexible and diverse, he says. “There are many regional variations that are different from the standard.”</p> <p>He also recently received a $350,000 grant from the National Endowment for the Humanities (NEH) to build optical character recognition tools to convert scanned images of text to a machine-readable format for endangered languages.</p> <p>“We are working on training machine-learning models to process images and texts in the books and documents of indigenous languages from central and South America so that these works can be made accessible to everyone,” he says. “We are building technologies to study those languages computationally.”</p> <p>Anastasopoulos is also part of a prestigious group of machine-translation researchers, including experts from Facebook, Google, Amazon, and Microsoft, who are creating automatic tools that translate COVID-19-related content for communities where people don’t speak the languages most often used by large health organizations, including the World Health Organization.</p> <p> “We are working closely with Translators without Borders. So far, we have produced terminologies for more than 200 languages and a large dataset for 35 languages, some of them extremely under-served by the current solution.”</p> <p> </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/6171" hreflang="en">computing</a></div> <div class="field__item"><a href="/taxonomy/term/9011" hreflang="en">natural language processing</a></div> </div> </div> </div> </div> </div> Wed, 17 Feb 2021 14:24:56 +0000 Anonymous 97891 at