- Research Program Mentor
PhD Doctor of Philosophy candidate
Computer Science, Security and Machine Learning, AI, Accessibilty in Computer Science, HCI, Robotics, Art- film photography, visual arts
Exploratory Research Paper
Deepfakes, Voice mimic attacks, etc. are all made possible because of the leakage of personal information. But what type of data is needed to implement such an attack? How much information about an individual is needed? More importantly, where does this data come from? Project formation: chose a motivating attack (i.e. voice cloning, face cloning, motion cloning) and perform a literature review to determine what type of data is needed to mount the attack. Then explore where this information can be collected from: examine common application/systems that might collect this type of data and investigate its security/privacy policies. This project is most likely thought of in terms of facial recognition, where photos can be easily scraped from public profile photos on the web. But where might systems collect voice data? motion data (i.e mimicking an individual's walk)? Even data capturing how a person speaks (what words, phrases, etc. represent them and their writing style) In this project you will write a research paper identifying and exploring in-depth an area of current privacy concern. You will gain skills reading top-tier research papers and discovering how to *independently* find a research are of interest. This project can easily be expanded in scope for future projects.