avatar

Shirin Nilizadeh

[Shirin Nilizadeh]

Assistant Professor, Computer Science and Engineering
Last Updated: June 14, 2021
about me

Research Interests

Research Interests
Shirin Nilizadeh is interested in topics related to computer security and privacy in the context of systems and social networks using techniques from machine learning and big data analytics. In particular, her research has two main aspects: (a) designing techniques and building systems to protect security and privacy of users and to give users more control over their data; and,  (b) analyzing data to identify and characterize new security and privacy threats, and to capture insights and quantify aspects of human online behavior reacting to the existing threats.

Biography

Biography

Shirin Nilizadeh is an Assistant Professor at the Department of Computer Science and Engineering, University of Texas at Arlington. She received her Ph.D. in Security Informatics from the Indiana University Bloomington. For her dissertation on Privacy-aware Decentralized Architectures for Socially Networked Systems, she received a two-year fellowship from the School of Informatics and Computing. Following her doctorate, she was a Post-Doctoral Researcher in SecLab at UC Santa Barbara from 2015-2017, and then in CyLab at Carnegie Mellon University from 2017-2018. She has been a program committee member for several security and privacy conferences and workshops, and a journal reviewer for four prestigious publications.

Appointments

Appointments

    • Dec 2017 to Aug 2018 Post-doctoral Researcher
      Computer Science and Engineering, Carnegie Mellon University Silicon Valley (Moffett Field, CA, United States)
    • Aug 2015 to Nov 2017 Post-doctoral Researcher
      Computer Science and Engineering, University of California Santa Barbara (Santa Barbara, CA, United States)
    • Oct 2014 to July 2015 Post-doctoral Researcher
      School of Informatics and Computing, Indiana University Bloomington (Bloomington, IN, United States)
    • Aug 2009 to July 2014 Research Assistant
      School of Informatics and Computing, Indiana University Bloomington (Bloomington, IN, United States)
    • May 2013 to Aug 2013 Summer Intern
      Information Science Institute (ISI), University of Southern California (Marina Del Rey, CA, United States)
    • June 2012 to Aug 2012 Summer Intern
      Center for Complex Networks and Systems Research (CNetS), Indiana University Bloomington (Bloomington, IN, United States)
    • Jan 2012 to May 2012 Instructor Assistant
      School of Informatics and Computing, Indiana University Bloomington
    • June 2008 to May 2009 Lecturer
      Computer Engineering, Islamic Azad University, Najafabad Branch (Najafabad, Iran (Islamic Republic Of))

Memberships

    • 2017 to 2019 Association for Computing Machinery, SIGCSE
    • 2017 to 2019 Association for Computing Machinery, SIGSAC

Awards and Honors

    •  2017 Travel grant for attending Grace Hopper Celebration of Women in Computing sponsored by Computer Science Department, University of California, Santa Barbara
    •  2016 Travel grant sponsored by The 37th IEEE Symposium on Security and Privacy
    •  2015 Travel grant sponsored by Sackler Colloquium Drawing Causal Inference from Big Data
    •  2014 Travel grant sponsored by Women in CyberSecurity Conference
    •  2014 Travel grant to attend the Indiana Celebration of Women in Computing (InWIC) sponsored by Microsoft
    •  2013 Travel grant sponsored by International Workshop on Cyber Crime (IWCC)
    •  2012 Best Graduate Research Poster sponsored by Indiana Women In Computing (InWIC)
    •  2012 Travel grant sponsored by The 21st USENIX Security Symposium
    •  2012 Travel grant to attend the Indiana Celebration of Women in Computing (InWIC) sponsored by Microsoft
    •  2011 Fellowship for Women’s Institute in Summer Enrichment (WISE) program sponsored by NSF-TRUST
    •  2011 Travel grant sponsored by The ACM Conference on Computer and Communications Security (CCS)
    •  2010 Runner up for the Best Graduate Research Poster award sponsored by Indiana Women In Computing (InWIC)
    •  2010 Travel grant sponsored by The Workshop on Privacy in the Electronic Society (WPES)
    •  2010 Travel grant to attend the Indiana Celebration of Women in Computing (InWIC) sponsored by Microsoft
    •  2009 Two years of Research Fellowship sponsored by School of Informatics and Computing, Indiana University

Support & Funding

Support & Funding

This data is entered manually by the author of the profile and may duplicate data in the Sponsored Projects section.
    • Sept 2019 to May 2021 Convergence Accelerator Phase I (RAISE): Credible Open Knowledge Network sponsored by  -  $999870
      (Funded)

Publications


      2019
      • Journal Article
        Race and the beauty premium: Mechanical Turk workers' evaluations of Twitter accounts
        [Groggel, Anne, Nilizadeh, Shirin, Ahn, Yong-Yeol, Kapadia, Apu, Rojas, Fabio]. Information, Communication and Society. 22(5), 709-716. "Taylor and Francis". DOI: http://dx.doi.org/10.1080/1369118X.2018.1543443

      In Process
      • Conference Proceeding
        Misinformation about Cyber Security and Privacy on Social Media
        [Singhal, Mohit, Nilizadeh, Shirin]. The ACM Conference on Computer and Communications Security (CCS) 2021.
        https://www.sigsac.org/ccs/CCS2021/ In Preparation; Not Yet Submitted.
      • Conference Proceeding
        StyleGAN for Face Obfuscation?
        [Moosavi Khorzooghi, Seyyed Mohammad Sadegh , Nilizadeh, Shirin]. The ACM Conference on Computer and Communications Security (CCS) 2021. In Preparation; Not Yet Submitted.
      • Conference Proceeding
        Countermeasures for Audio Event Detection Systems against Adversarial Attacks
        [Dos Santos, Rodrigo Augusto Silva , Nilizadeh, Shirin]. The 30th USENIX Security Symposium.
        https://www.usenix.org/conference/usenixsecurity21 Revising to Resubmit.
      • Conference Proceeding
        The Effect of Racial Diversity on Hate Speech
        [Groggel, Anne , Ageze, Raey, Vivekanand, Ananth, Nilizadeh, Shirin]. 16th International Conference on Weblogs and Social Media (ICWSM 2022). In Preparation; Not Yet Submitted.
      • Conference Proceeding
        A Study of User-Reliance on Anti-Phishing Reports
        [Saha Roy, Sayak , Singhal, Mohit, Nilizadeh, Shirin]. The ACM Conference on Computer and Communications Security (CCS) 2021.
        https://www.sigsac.org/ccs/CCS2021/ Revising to Resubmit.
      • Conference Proceeding
        Privacy Attacks in Social Media using Face Recognition Services on Public Videos: A Case Study with YouTube
        [Ortega, James Rechard , Nilizadeh, Shirin]. Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2021.
        https://www.ndss-symposium.org/ndss2021/cfp-madweb-workshop/ Submitted.
      • Conference Proceeding
        What Remains Uncaught?: Characterizing Sparsely Detected Malicious URLs on Twitter
        [Saha Roy, Sayak , Karanjit, Unique, Nilizadeh, Shirin]. Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2021. Submitted.
      • Conference Proceeding
        Toxicity Begets Toxicity: The Effects of Toxicity on Twitter Conversations
        [Salehabadi, Nazanin, Groggel, Anne, Saha Roy, Sayak, Singhal, Mohit, Nilizadeh, Shirin]. The Web Conference (WWW).
        https://www2021.thewebconf.org/ Submitted.

      2020
      • Conference Proceeding
        Measuring and Characterizing Hate Speech on News Websites
        [Zannettou, Savvas, ElSherief, Mai, Belding, ElizabethM, Nilizadeh, Shirin, Stringhini, Gianluca]. 12th ACM Conference on Web Science (WebSci '20). 125-134. "ACM". DOI: http://dx.doi.org/https://doi.org/10.1145/3394231.3397902

      2019
      • Conference Proceeding
        Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis
        [Nilizadeh, Shirin, Aghakhani, Hojjat, Gustafson, Eric, Kruegel, Christopher, Vigna, Giovanni]. Companion Proceedings of The 2019 World Wide Web Conference. 1288-1289. "ACM ". DOI: http://dx.doi.org/10.1145/3308560.3316477
      • Conference Proceeding
        Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis
        The World Wide Web Conference
        [Nilizadeh, Shirin, Aghakhani, Hojjat, Gustafson, Eric, Kruegel, Christopher, Vigna, Giovanni]. 3108--3115.

      2018
      • Conference Proceeding
        Peer to Peer Hate: Hate Speech Instigators and Their Targets
        [ElSherief, Mai, Nilizadeh, Shirin, Nguyen, Dana , Vigna, Giovanni , Belding, Elizabeth]. "In proceedings of the 12th International AAAI Conference on Web and Social Media (ICWSM '18)".
      • Conference Proceeding
        Detecting Deceptive Reviews using Generative Adversarial Networks
        [Nilizadeh, Shirin]. "The 1st Deep Learning and Security Workshop".

      2017
      • Conference Proceeding
        Poised: Spotting twitter spam off the beaten paths
        Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
        [Nilizadeh, Shirin, Labr\`eche, Fran\ccois, Sedighian, Alireza, Zand, Ali, Fernandez, Jos\'e, Kruegel, Christopher, Stringhini, Gianluca, Vigna, Giovanni]. 1159--1174. "Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security".

      2016
      • Conference Proceeding
        Twitter's Glass Ceiling: The Effect of Perceived Gender on Online Visibility.
        ICWSM
        [Nilizadeh, Shirin, Groggel, Anne, Lista, Peter, Das, Srijita, Ahn, Yong-Yeol, Kapadia, Apu, Rojas, Fabio]. 289--298. "THE 10TH INTERNATIONAL AAAI CONFERENCE ON WEB AND SOCIAL MEDIA (ICWSM-16)".

      2014
      • Conference Proceeding
        Community-Enhanced De-anonymization of Online Social Networks
        The 21st ACM Conference on Computer and Communications Security
        [Nilizadeh, Shirin, Kapadia, Apu, Ahn, Yong-Yeol]. "The 21st ACM Conference on Computer and Communications Security".

      2013
      • Conference Proceeding
        Craigslist scams and community composition: Investigating online fraud victimization
        2013 IEEE Security and Privacy Workshops
        [Garg, Vaibhav, Niliadeh, Shirin]. 123--126.

      2012
      • Conference Proceeding
        Cachet: a decentralized architecture for privacy preserving social networking with caching
        Proceedings of the 8th international conference on Emerging networking experiments and technologies
        [Nilizadeh, Shirin, Jahid, Sonia, Mittal, Prateek, Borisov, Nikita, Kapadia, Apu]. 337--348.
      • Conference Proceeding
        DECENT: A decentralized architecture for enforcing privacy in online social networks
        Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on
        [Jahid, Sonia, Nilizadeh, Shirin, Mittal, Prateek, Borisov, Nikita, Kapadia, Apu]. 326--332.

      2011
      • Conference Proceeding
        Pythia: a privacy aware, peer-to-peer network for social search
        Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
        [Nilizadeh, Shirin, Alam, Naveed, Husted, Nathaniel, Kapadia, Apu]. 43--48.

      2014
      • Other
        Privacy-aware decentralized architectures for socially networked systems
        [Nilizadeh, Shirin]. "Indiana University".

      2011
      • Technical Report
        A Decentralized Architecture for Enforcing Privacy in Online Social Networks
        [Jahid, Sonia, Kapadia, Apu, Borisov, Nikita, Nilizadeh, Shirin, Mittal, Prateek].

Presentations

    • May  2019
      Nilizadeh, Shirin (Author & Presenter), "Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis", San Fransisco. (May 15, 2019).
    • May  2019
      Nilizadeh, Shirin (Author & Presenter), "Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis". (May 13, 2019).
    •  2017
      Nilizadeh, Shirin, "POISED: Spotting Twitter Spam Off the Beaten Paths". ( , 2017).
    •  2017
      Nilizadeh, Shirin, "POISED: Spotting Twitter Spam Off the Beaten Paths". ( , 2017).
    •  2017
      Nilizadeh, Shirin, "Twitter’s Glass Ceiling: The E↵ect of Perceived Gender on Online Visibility". ( , 2017).
    •  2015
      Nilizadeh, Shirin, "Twitter’s Reaction on Revelations about Government’s Internet Surveillance program". ( , 2015).
    •  2014
      Nilizadeh, Shirin, "Community-Enhanced De-anonymization of Online Social Networks". ( , 2014).
    •  2013
      Nilizadeh, Shirin, "Privacy-aware Decentralized Architectures for Socially Networked Systems". ( , 2013).
    •  2010
      Nilizadeh, Shirin, "Pythia: A Privacy Aware, Peer-to-Peer Network for Social Search". ( , 2010).
    •  2007
      Nilizadeh, Shirin, "Linear Approximations Representation of Moamagar Block Cipher". ( , 2007).

Students Supervised

    • Present
      Dissertation Committee Chair
      Ana Aleksandric,
    • Present
      Dissertation Committee Chair
      Sayak Saha Roy,
    • Present
      Dissertation Committee Member
      Ashish Jaiswal,
    • Present
      Dissertation Committee Chair
      Rodrigo Augusto Silva Dos Santos,
    • Present
      Dissertation Committee Chair
      Mohit Singhal,
    • Present
      Dissertation Committee Chair
      Sadegh Moosavi,
    • Present
      Master's Thesis Committee Chair
      Anahita Samadi, (Computer Science and Engineer)
      Generating Adversarial Text against Recruiting Applications
    • Present
      Dissertation Committee Member
      Mingyan Xiao,
    • Present
      Dissertation Committee Member
      Zeyu Zhang,
    • Present
      Dissertation Committee Member
      Mohammad Zakizadehghariehali,
    • Present
      Dissertation Committee Member
      Damian Jimenez,
    • Dec 2020
      Master's Thesis Committee Chair
      Anahita Samadi,
    • July 2020
      Master's Thesis Committee Chair
      Sayak Saha Roy,
    • May 2020
      Master's Thesis Committee Member
      Akash Lohani,
    • May 2020
      Master's Thesis Committee Member
      Md Shadekur Rahman,
    • May 2020
      Directed Individual/Independent Study
      Kelly Scott French,
    • May 2020
      Undergraduate Supervised Research
      Juan Diego Gonzalez German,
    • Apr 2020
      Master's Thesis Committee Member
      Saket Gupta,
    • Dec 2019
      Master's Thesis Committee Chair
      Nazanin Salehabadi, (Computer Science and Engineer)
      Generative Models for Hate Speech Content Creation
    • Dec 2019
      Master's Thesis Committee Chair
      James Ortega, (Computer Science and Engineer)
      Adversarial Privacy Attacks on Online Shared Videos
    • Aug 2019
      Master's Thesis Committee Member
      Rohitshankar Mishra, (Computer Science and Engineer)
      A Dynamic Multi-Threaded Queuing Mechanism for Reducing the Inter-Process Communication Latency on Multi-Core Chips
    • May 2019
      Directed Individual/Independent Study
      Iftakhar Ahmed, (Computer Science and Engineer)
      Differential Fuzzing for IoT programs
    • May 2019
      Doctoral Diagnostic Committee Member
      Shimon Rothschild,
    • Apr 2019
      Doctoral Diagnostic Committee Member
      Damian Jimenez, (Computer Science and Engineer)
    • Apr 2019
      Master's Thesis Committee Member
      Sarthak Majithia, (Computer Science and Engineer)
      Claim Portal
    • Mar 2019
      Doctoral Diagnostic Committee Member
      Haotian Zhang, (Computer Science and Engineer)

Courses

      • CSE 6397-010 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Summer - Eleven Week - 2021
      • CSE 6699-010 DISSERTATION
        (Course Id: 102615)
        Spring - Regular Academic Session - 2021
      • CSE 4380-004 INFORMATION SECURITY
        (Course Id: 111686)
        Spring - Regular Academic Session - 2021 Download Syllabus
      • CSE 4380-005 INFORMATION SECURITY
        (Course Id: 111686)
        Spring - Regular Academic Session - 2021
      • CSE 5380-004 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2021
      • CSE 5380-005 INFORMATION SECURITY 1
        (Course Id: 111054)
        Spring - Regular Academic Session - 2021
      • CSE 6397-010 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Spring - Regular Academic Session - 2021
      • CSE 6697-010 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102614)
        Spring - Regular Academic Session - 2021
      • CSE 6388-002 SPEC TOPS ADV INFO SECURITY
        (Course Id: 110981)
        Spring - Regular Academic Session - 2021 Download Syllabus
      • CSE 5388-002 SPEC TOPS INFORMATION SECURITY
        (Topic: Data-Driven Security & Privacy | Course Id: 110973)
        Spring - Regular Academic Session - 2021
      • CSE 6699-010 DISSERTATION
        (Course Id: 102615)
        Fall - Regular Academic Session - 2020
      • CSE 4380-001 INFORMATION SECURITY
        (Course Id: 111686)
        Fall - Regular Academic Session - 2020 Download Syllabus
      • CSE 4380-002 INFORMATION SECURITY
        (Course Id: 111686)
        Fall - Regular Academic Session - 2020 Download Syllabus
      • CSE 4380-003 INFORMATION SECURITY
        (Course Id: 111686)
        Fall - Regular Academic Session - 2020 Download Syllabus
      • CSE 5698-010 MASTER'S THESIS II
        (Course Id: 102571)
        Fall - Regular Academic Session - 2020
      • CSE 6397-010 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Fall - Regular Academic Session - 2020
      • CSE 6697-010 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102614)
        Fall - Regular Academic Session - 2020
      • CSE 4391-007 INDIVIDUAL PROJECTS
        (Course Id: 102488)
        Spring - Regular Academic Session - 2020
      • CSE 5698-010 MASTER'S THESIS II
        (Course Id: 102571)
        Spring - Regular Academic Session - 2020
      • CSE 6397-010 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Spring - Regular Academic Session - 2020
      • CSE 6697-010 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102614)
        Spring - Regular Academic Session - 2020
      • CSE 6388-002 SPEC TOPS ADV INFO SECURITY
        (Topic: Data-Driven Security & Privacy | Course Id: 110981)
        Spring - Regular Academic Session - 2020 Download Syllabus
      • CSE 5388-002 SPEC TOPS INFORMATION SECURITY
        (Topic: Data-Driven Security & Privacy | Course Id: 110973)
        Spring - Regular Academic Session - 2020 Download Syllabus
      • CSE 5393-010 DIRECTED STUDY IN COMPUTER SCI
        (Course Id: 102562)
        Fall - Regular Academic Session - 2019
      • CSE 4380-001 INFORMATION SECURITY
        (Course Id: 111686)
        Fall - Regular Academic Session - 2019 Download Syllabus
      • CSE 4380-002 INFORMATION SECURITY
        (Course Id: 111686)
        Fall - Regular Academic Session - 2019
      • CSE 4380-003 INFORMATION SECURITY
        (Course Id: 111686)
        Fall - Regular Academic Session - 2019
      • CSE 5698-010 MASTER'S THESIS II
        (Course Id: 102571)
        Fall - Regular Academic Session - 2019
      • CSE 6397-010 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Fall - Regular Academic Session - 2019
      • CSE 6697-010 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102614)
        Fall - Regular Academic Session - 2019
      • CSE 5698-010 MASTER'S THESIS II
        (Course Id: 102571)
        Summer - Eleven Week - 2019
      • CSE 6397-010 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Spring - Regular Academic Session - 2019
      • CSE 6697-010 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102614)
        Spring - Regular Academic Session - 2019
      • CSE 6388-002 SPEC TOPS ADV INFO SECURITY
        (Topic: Data-Driven Security & Privacy | Course Id: 110981)
        Spring - Regular Academic Session - 2019 Download Syllabus
      • CSE 5388-002 SPEC TOPS INFORMATION SECURITY
        (Topic: Data-Driven Security & Privacy | Course Id: 110973)
        Spring - Regular Academic Session - 2019
      • CSE 4380-005 INFORMATION SECURITY
        (Course Id: 111686)
        Fall - Regular Academic Session - 2018 Download Syllabus
      • CSE 4380-006 INFORMATION SECURITY
        (Course Id: 111686)
        Fall - Regular Academic Session - 2018 Download Syllabus
      • CSE 5380-003 INFORMATION SECURITY 1
        (Course Id: 111054)
        Fall - Regular Academic Session - 2018 Download Syllabus
      • CSE 5380-004 INFORMATION SECURITY 1
        (Course Id: 111054)
        Fall - Regular Academic Session - 2018 Download Syllabus
      • CSE 6397-033 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102609)
        Fall - Regular Academic Session - 2018
      • CSE 6697-033 RESEARCH IN COMPUTER SCIENCE
        (Course Id: 102614)
        Fall - Regular Academic Session - 2018

Service to the University

    • Nov 2018 to  Present Program Organizer
      Outreach programs committee
    • Oct 2018 to  Present Committee Member
      Ph.D. Admissions committee
    • Oct 2020 to  Feb 2021 Program Organizer
      OurCS@SFW and SCRF 2021
      Dr. Chengkai, I and others received funding from the Google Explore program for this year to hold OurCS@DFW and SCRF for the second year. I will continue my role as one of the event organizers, and also will hold a research workshop during this event.


    • May 2019 to  Feb 2020 Program Organizer
      OurCS@SFW and SCRF 2020
      I am committed to broaden participation of women and underrepresented in computing research. In Summer 2019, in a collaborative work with Dr. Chengkai Li and others, I applied and received two education grants for engaging undergraduate female students into research: first, NCWIT Academic Alliance Seed Fund, which organized a one-day UTA Student Computing Research Festival, SCRF, for recruiting and retaining women and underrepresented students into systems and networking research, featuring research competition and student work exhibition; and second, funding by Google Explore CSR program, which organized a three-day research-focused workshop, called OurCS@DFW.


Service to the Profession

    • Oct 2020 to  Present
      Program committee
      The 30th USENIX Security Symposium (USENIX Security '21)
      This is one of the four top security conferences, which receives about 1000 submissions per year and the acceptance rate is about 16%. I reviewed 8 papers for Fall submission. There will be one more submission deadline in Winter.
    • 2019 to  Present
      Reviewer, Journal Article
      Transactions on the Web
      Transactions on the Web (TWEB) is a journal publishing refereed articles reporting the results of research on Web content, applications, use, and related enabling technologies.
    • May 2019 to  2020
      Reviewer, Journal Article
      Computers and Security
    • Apr 2019 to  Dec 2020
      Reviewer, Journal Article
      Transactions on Software Engineering
    • July 2020 to  Sept 2020
      Committee Member
      The Workshop on Privacy in the Electronic Society (WPES 2020).
      One of the top conferences in Information Privacy.

      The Information Revolution has thoroughly transformed society. One of the major implications of this technological shift has been a massive increase in the collection, sharing, and analysis of personal data. The goal of this workshop is to discuss the privacy problems that result as well as their solutions. This will be the 19th occurrence of this annual forum, which is held in conjunction with the ACM CCS conference.
    • July 2020 to  Aug 2020
      Reviewer, Conference Paper
      Symposium on Electronic Crime Research (eCrime) 2020
      Program committee. Reviewed 4 papers.
    • June 2020 to  Aug 2020
      Committee Member
      MLHat’20 KDD workshop
      MLHat: The First International Workshop on Deployable Machine Learning for Security Defense, co-located with 25TH ACM SIGKDD Conference on Knowledge Discovery and Data Mining
    • Mar 2020 to  July 2020
      Reviewer, Conference Paper
      The 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)
      Since its inception in 1997, the International Symposium on Research in Attacks, Intrusions and Defenses (RAID) has established itself as a venue where leading researchers and practitioners from academia, industry, and the government are given the opportunity to present novel research in a unique venue to an engaged and lively community.
      The conference is known for the quality and thoroughness of the reviews of the papers submitted, the desire to build a bridge between research carried out in different communities, and the emphasis given on the need for sound experimental methods and measurement to improve the state of the art in cybersecurity.
    • Feb 2020 to  Apr 2020
      Program committee
      The 29th USENIX Security Symposium (USENIX Security '20)
      This is one of the four top security conferences, which receives about 1000 submissions per year and the acceptance rate is about 16%. I reviewed 16 paper submissions in Winter 2020.
    • Nov 2019 to  Dec 2019
      Reviewer, Journal Article
      PLOS ONE
    • Sept 2019 to  Oct 2019
      Review panel for the Secure and Trustworthy Cyberspace (SaTC) program
      NSF
    • Nov 2018 to  June 2019
      Committee Member
      The 2nd International Conference on Data Intelligence and Security (ICDIS) 2019
    • Jan 2019 to  May 2019
      Committee Member
      International Workshop on Misinformation, Computational Fact-Checking and Credible Web
    • Feb 2019 to  Mar 2019
      Reviewer, Conference Paper
      The 14th APWG Annual Symposium on Electronic Crime Research (eCrime) 2019
    • Past to  2018
      Committee Member
      the 17th Workshop on Privacy in the Electronic Society (WPES 2018).
    • 2016 to  2018
      Committee Member
      The Privacy Enhancing Technologies Symposium (PETS)
    • Past to  2017
      Committee Member
      The ACM Asia Conference on Computer and Communications Security
    • Past to  2017
      Reviewer, Journal Article
      Transactions on Dependable and Secure Computing
    • Past to  2017
      Committee Member
      World Wide Web Conference
    • Past to  2016
      Reviewer, Journal Article
      Journal of Computer Science and Technology
    • Past to  2015
      Reviewer, Journal Article
      Human-centric Computing and Information Sciences
    • 2015 to  2015
      Reviewer, Journal Article
      Transactions on Information Forensics and Security