AI and Security
In this area, we study security and privacy issues from two perspectives. On one hand, we study how to employ AI techniques to improve system, network, and application security and privacy. On the other hand, we study the security and privacy of AI techniques/systems themselves. Some previous and ongoing research includes: (1) Adversarial Learning, in domains of image, audio, text, etc.; (2) Machine Learning (include Deep / Federated / Distributed Learning) Security and Privacy; (3) Verifiable and Certifiable Machine Learning; (4) Deep Learning Interpretability and Model Robustness Quantification; and (5) Secure Multi-Party Computing and Learning.
Software and System Security
In this area, we study the security issues of various software and systems. Some previous and ongoing research includes: (1) Smart Fuzzing; (2) AI-aided Program Analysis; (3) ICS Security; (4) Blockchain; and (5) Vulnerability Mining and Analysis.
Computer Vision (CV)
In this area, we study human centered computer vision and applications. The commonly engaged techniques include Generative and Adversarial Network (GAN), deep learning, graph neural network, Lie Group, machine learning, as well as other related techniques. Some previous and ongoing research incudes: (1) Fake Human Motion Generation and Detection; (2) Future Motion Prediction; (3) Human and Animal Pose Estimation; (4) Action Recognition; and (5) Indoor Localization Using Scene Images.
In this area, we study the understanding of common multimedia data, such as video, image, text, etc. The commonly employed techniques include Computer Vision (CV), Natural Language Processing (NLP), Deep Learning, as well as other related techniques. Some previous and ongoing research includes: (1) Cross-modality Retrieval; (2) Temporal Action/Activity Localization by Natural Language; (3) Image/Video Captioning; (4) Visual Question Answering; and (5) Content based Video Recommendation.
Big Data Mining and Analysis
In this area, we focus on mining knowledge from massive data and understanding the evolution and characteristics of interested systems. Some previous and ongoing research includes: (1) Social Network Computing and Analytics and (2) Graph and Network Embedding.