Grant Year: 2019

January 14, 2020

Secure Machine Learning

We will study how to harden machine learning classifiers against adversarial attack. We will explore general mechanisms for making deep-learning classifiers more robust against attack, with a special focus on security for autonomous vehicles. Current schemes fail badly in the presence of an attacker who is trying to fool or…

January 14, 2020

The Cybersecurity of “Smart” Infrastructure Systems

Urban infrastructure such as water and sanitation systems, subways, power grids, and flood defense systems are crucial for social and economic life yet are vulnerable to natural hazards that could disrupt services, such as earthquakes or floods. New sensor systems can potentially provide early warnings of problems, and thus help…

January 14, 2020

Privacy-preserving and Decentralized Federated Learning

Machine learning technology is developing rapidly and has been continuously changing our daily life. However, a major limiting factor that hinders many machine learning tasks is the need of huge and diverse training data. Crowdsourcing has been shown effective to collect data labels with a centralized server. The emergence of…

January 14, 2020

Towards Efficient Data Economics: Decentralized Data Marketplace and Smart Pricing Models

Advances in machine learning and artificial intelligence have demonstrated enormous potential for building intelligent systems and growing knowledge bases. However, the current data marketplaces are not efficient enough to facilitate long-term technological and economic advancements. An efficient data market would allow participants to strategically sell or purchase data and get…

January 14, 2020

Privacy for Always-Listening Devices

Microphone-equipped Internet of Things devices, and smart voice assistants specifically, offer the promise of great convenience, yet pose grave privacy challenges. The aim of our research is to understand the privacy implications of voice as a sensitive data source and develop techniques to help users protect their privacy from these…

January 14, 2020

Hackers vs. Testers: Understanding Software Vulnerability Discovery Processes

Security vulnerabilities pose a grave danger to the integrity of any system because they can undermine almost any protection mechanism or safeguard. As such, finding vulnerabilities before the software gets deployed is a critical task in any current software development cycle. A vital tool has recently emerged in the arsenal…

January 14, 2020

Engaging Expert Stakeholders about the Future of Menstrual Biosensing Technology

Networked sensor technologies are increasingly present in daily life. While promising improved health and efficiency, they also introduce far-reaching issues around cybersecurity, privacy, autonomy, and consent that can be difficult to predict or resist. This project will examine menstrual tracking technologies as a case for understanding the current and near-future…

January 14, 2020

Factors Affecting Trust Among Vulnerable Populations

This project aims to understand the trust dynamics and the factors affecting trust for vulnerable populations like human rights defenders, activists, and journalists who document and upload sensitive media, as well as people who receive this media in order to use it as evidence. The researchers will work to understand…

January 14, 2020

Re-imagining Password Management for Low-Technology Proficiency Users

Passwords and login information control access to some of the most important aspects of life, such as banking and finances, medical services, and other sensitive personal information. According to Pew Research, 44% of online adults ages 30 to 64 say they have a hard time keeping track of their passwords….

January 14, 2020

Coordinated Entry System Research and Development for Alameda County’s Continuum of Care

Governments are increasingly using technology to allocate scarce social service resources, like housing services. In collaboration with Alameda County’s Continuum of Care, this project will use qualitative research methods (i.e. interviews, participatory design, and usability testing) to conduct a needs assessment and system recommendation around “matching” unhoused people to appropriate…