Group Photo

About

The 2018 IUPUI REU Workshop will showcase the research projects conducted during the 2018 NSF/DoD Research Experience for Undergraduates (REU) program at Indiana University-Purdue University Indianapolis. The focus of the workshop is data science and cybersecurity. The workshop will be hosted in ET-202 on August 3rd from 9:00 a.m. to 12:30 p.m.

Presenters


Alexander Eberly & Khaled Graham

An Analysis of Secret Image Sharing Techniques and Their Application to Biometric Data Protection

Alexander Z. Eberly1, Khaled M. Graham2
1Computer Information Technology, Indiana University - Purdue University Indianapolis; 2Computer Information Science, Missouri Southern State University


Abstract:



Protecting the privacy of digital biometric data stored in a database has become increasingly more critical in the last decade. The purpose of this study is to analyze the security vulnerabilities of various methods of encoding and decoding user biometric authentication data. Biometric data can include any uniquely identifying biological traits, such as fingerprint, iris, face, gait, or voice verification. This paper summarizes benefits and concerns of several different types of privacy preservation techniques, including visual cryptography and secret image sharing, on facial recognition software. This analysis provides an overview of the most effective techniques for securing user biometric data stored in a database, as well as algorithms for how each method may be implemented.

Mentor: Xukai Zou, Department of Computer and Information Technology, Indiana University - Purdue University Indianapolis;


Kaitlyn Hardin

Analyzing the Dynamic Movement Between Lower Limbs Using Smart Phone Sensors

Kaitlyn A. Hardin1
1Department of Electrical Engineering and Computer Science, School of Engineering and Architecture, Howard University


Abstract:



Motion sensing is a valuable tool to help analyze the movement between objects, and its integration in everyday life is increasingly more apparent. Using motion sensing to analyze health is beneficial and important to health-related advancements. For many individuals, post-surgery healing is necessary for his or her proficient health status. When surgery is conducted on the lower limbs, physical therapy is administered to gauge and evaluate the healing process. However, there is a need for improvement when determining if the healing process is complete. With the aid of motion sensing, sensors available in a standard smartphone can analyze the movement between lower limbs. By accessing the two sensors, accelerometer and gyroscope, we will accurately measure the variances, differentiations, and commonalties between the lower limbs using various features in a machine learning program and effectively determine if the healing process is satisfactory or unsatisfactory.

Mentor: Xiaonan Guo, Department of Computing Engineering and Technology, School of Engineering and Technology, IUPUI


Maia Iyer

Incorporating Sentence Dependencies into Semantic Word Vector Models for Medical Text Processing

Maia Iyer1, Xiao Luo2
Technology,Indiana University-Purdue University Indianapolis


Abstract:



Natural language processing has been split into two subfields: semantic and syntactic analysis. Semantic processing deals with creating vector representations for each word. The goal is for the vectors to be dense, and that relationships between words is made clear by their vectors. For example, the recently discovered additive property word vectors have (e.g., 'man' + 'royal' = 'king') making analogy problems answerable through these word vector models. The hope for medical language processing is to make more complex relations extractable—for instance causal relations or symptomatic relations. Syntactic processing, on the other hand, deals with gleaning textual information from the structure of the sentence. A currently popular method of syntactic processing is dependency parsing, where connections are explicitly drawn between different words in a phrase or clause, where one word modifies the other. Generally, between these two subfields, there is not much cross-application. The aim of this research paper is to incorporate dependency analysis into a word vector model's training phase to see if this improves the model and its representation of different medical terms. To do so, the Skip-Gram model, a state-of-the-art semantic parser published through word2vec, is modified to grab sentence dependencies and create word pairs based on the dependency pairs. A qualitative word similarity analysis compares the original and modified models.

Mentor: Xiao Luo, Department of CIT, Purdue School of Engineering and Technology, Indiana University-Purdue University Indianapolis


Paul Jacobs

Securing Card not Present (CNP) Transactions

Paul Jacobs1
1Department of Computer Science, Purdue School of Science Indiana University-Purdue University Indianapolis


Abstract:



With the implementation of EMV with in-person transactions, the rate of in-person credit card fraud has declined, while the rate of fraud with card-not-present transactions (CNP) has taken off. In order to combat this new dynamic, I have designed a system which utilizes already secure payment systems such as Apple Pay and Google Pay in order to create a way for secure CNP transactions over the Internet. The system uses a module in development from Google which enables bluetooth connections between websites and devices which support Bluetooth Low Energy mode. In this system, a website prompts the user to pair a device. Once the user chooses his device, the website then begins the transaction by transmitting a request for card details from the device’s payment system (Apple Pay, Google Pay, etc) which is returned by if the user verifies the transactions and his identity with a fingerprint. This system contrasts with the current system in which static data is entered into each and every website through which online payments are made. By stealing this information through various methods, a malicious actor can use the credit card information without any further authentication of identity at the point of sale. Implementation of this system allows for the reduction of online credit fraud which greatly decreases the ability of thieves to commit credit card fraud.

Mentor: Xiaonan Guo, Department of Computer and Information Technology, Purdue School of Engineering and Technology,IUPUI


Erick E. Bernal Martinez & Bella (Eunjeong) Oh

Evading Deep Neural Network and Random Forest Classifiers by Altering Graphlet Frequency Distribution Vectors

Erick E. Bernal Martinez1Bellah Oh2
1Department of Computer Science, School of Science, Indiana University-Purdue University Indianapolis


Abstract:



Machine Learning is a subject which has garnered attention in recent years. Particularly, Deep Neural Networks have been found to be quite useful in tasks such as facial recognition, image classification, self-driving vehicles, etcetera. With this rise in Machine Learning popularity, there has also been a rise in a branch of research known as Adversarial Machine Learning, which focuses on finding potential flaws and solutions encountered with the usage of said algorithms. In this literature, we attempt to attack a Deep Neural Network tasked with malware/benign-ware classification through a series of methods. We compare results attained through poisoning algorithms presented on prior works, while under the assumption the adversary has minimal attacking capabilities. Finally, we explore potential solutions to our attack methodology and draw conclusions from our findings.

Mentors: Feng Li, Purdue School of Engineering and Technology, Indiana University-Purdue University Indianapolis; Xiao Luo, Purdue School of Engineering and Technology, Indiana University-Purdue University Indianapolis


Heather Totten

Advanced Sensor-Assisted Facial Recognition Technique to Improve Mobile Authentication

Heather Totten1
1Department of Computer Science, Westmont College


Abstract:



While facial recognition techniques have become widely used for mobile authentication, common implementations remain vulnerable to attacks such as 2D media attacks and virtual camera attacks. The proposed solution aims to improve security by utilizing the camera to record video to implement nose-angle detection and facial recognition, the accelerometer to compare movements with shakes detected in the video recording, and the proximity sensor to compare distances with accelerometer movements and feature changes in the video. The method is practical, as it does not require any additional hardware for common mobile devices, and it should prove efficient and secure against common attacks on facial recognition.

Mentor: Xiaonan Guo, Department of Computer and Information Technology, Purdue School of Engineering and Technology, IUPUI


Siming Zou & Luke Schoeberle

Building Concept Hierarchies in the Computer Science Discipline with Representation Learning

Siming Zou1, Luke Schoeberle2
1Mobile Cloud Security REU, Cornell University; 2Mobile Cloud Security REU, Iowa State University


Abstract:



With the national initiative of “Computer Science for All”, it is very important to understand and catalog the concepts and subconcepts of Computer Science discipline in a principled manner. However, there are no existing efforts that achieve this goal. In this research we develop methods for extracting computer science keywords from a large collection of computer science journal article and conference paper abstracts. We then develop methods for identifying relations among these keywords. We are particularly interested in the following relations: isA, part-of, and evolved-to. Using these relations as a guide, we will build representation vectors of all Computer Science keywords, which will subsequently be used for building concepts, and subconcept of computer science discipline at a large-scale.

Mentor: Professor Mohammad Al Hasan, Department of Computer & Information Science, Purdue School of Science, IUPUI