14 research outputs found

    Detection and Prevention of Abuse in Online Social Networks

    Get PDF
    Adversaries leverage social networks to collect sensitive data about regular users and target them with abuse that includes fake news, cyberbullying, malware distribution, and propaganda. Such behavior is more effective when performed by the social network friends of victims. In two preliminary user studies we found that 71 out of 80 participants have at least 1 Facebook friend with whom (1) they never interact, either in Facebook or in real life, or whom they believe is (2) likely to abuse their posted photos or status updates, or (3) post offensive, false or malicious content. Such friend abuse is often considered to be outside the scope of online social network defenses. Several of our studies suggest that (1) perceived Facebook friend abuse as well as stranger friends are a significant problem; (2) users lack the knowledge or ability to address this problem themselves; and (3) when helped and educated, users are often willing to take defensive actions against abusive existing and pending friends, and strangers. Motivated by the rich, private information of users that is available to the Facebook friends, often the entry point of this vulnerability is the pending friends. In an exploratory study with a number of participants, we found that participants not only tend to accept invitations from perfect strangers but can even invent a narrative of common background to motivate their choice. Further, based on our conjecture that Facebook\u27s interface encourages users to accept pending friends, we develop new interfaces that seek to encourage users to explore the background of their pending friends and also to train them to avoid suspicious friends. The efficacy and implementation simplicity of the proposed modifications suggest that Facebook\u27s unwillingness to protect its users from abusive strangers is deliberate. This dissertation explores the friend abuse problem in online social networks like Facebook. We introduce two novel approaches to prevent friend abuse problem in Facebook. (1) First, we introduce AbuSniff which can detect already existing abusive friends in Facebook, and prevent the abusive friend from doing abuse by taking some protective actions against them. (2) Second, we introduce FLock to address the problem of abuse prevention during the time of friend invitation: by educating and training the Facebook users about the abusive friend from the list of pending friend invitations, and introducing new User Interface to help users reject the potentially abusive friend invitation, thus protecting the user from abuse in advance

    AbuSniff: Automatic Detection and Defenses Against Abusive Facebook Friends

    Full text link
    Adversaries leverage social network friend relationships to collect sensitive data from users and target them with abuse that includes fake news, cyberbullying, malware, and propaganda. Case in point, 71 out of 80 user study participants had at least 1 Facebook friend with whom they never interact, either in Facebook or in real life, or whom they believe is likely to abuse their posted photos or status updates, or post offensive, false or malicious content. We introduce AbuSniff, a system that identifies Facebook friends perceived as strangers or abusive, and protects the user by unfriending, unfollowing, or restricting the access to information for such friends. We develop a questionnaire to detect perceived strangers and friend abuse.We introduce mutual Facebook activity features and show that they can train supervised learning algorithms to predict questionnaire responses. We have evaluated AbuSniff through several user studies with a total of 263 participants from 25 countries. After answering the questionnaire, participants agreed to unfollow and restrict abusers in 91.6% and 90.9% of the cases respectively, and sandbox or unfriend non-abusive strangers in 92.45% of the cases. Without answering the questionnaire, participants agreed to take the AbuSniff suggested action against friends predicted to be strangers or abusive, in 78.2% of the cases. AbuSniff increased the participant self-reported willingness to reject invitations from strangers and abusers, their awareness of friend abuse implications and their perceived protection from friend abuse.Comment: 12TH INTERNATIONAL AAAI CONFERENCE ON WEB AND SOCIAL MEDIA (ICWSM-18), 10 page

    A novel index-based decision support toolkit for safe reopening following a generalized lockdown in low and middle-income countries

    Get PDF
    While the effectiveness of lockdowns to reduce Coronavirus Disease-2019 (COVID-19) transmission is well established, uncertainties remain on the lifting principles of these restrictive interventions. World Health Organization recommends case positive rate of 5% or lower as a threshold for safe reopening. However, inadequate testing capacity limits the applicability of this recommendation, especially in the low-income and middle-income countries (LMICs). To develop a practical reopening strategy for LMICs, in this study, we first identify the optimal timing of safe reopening by exploring accessible epidemiological data of 24 countries during the initial COVID-19 surge. We find that a safe opening can occur two weeks after the crossover of daily infection and recovery rates while maintaining a negative trend in daily new cases. Epidemiologic SIRM model-based example simulation supports our findings. Finally, we develop an easily interpretable large-scale reopening (LSR) index, which is an evidence-based toolkit—to guide/inform reopening decision for LMICs

    A novel index-based decision support toolkit for safe reopening following a generalized lockdown in low and middle-income countries

    Get PDF
    While the effectiveness of lockdowns to reduce Coronavirus Disease-2019 (COVID-19) transmission is well established, uncertainties remain on the lifting principles of these restrictive interventions. World Health Organization recommends case positive rate of 5% or lower as a threshold for safe reopening. However, inadequate testing capacity limits the applicability of this recommendation, especially in the low-income and middle-income countries (LMICs). To develop a practical reopening strategy for LMICs, in this study, we first identify the optimal timing of safe reopening by exploring accessible epidemiological data of 24 countries during the initial COVID-19 surge. We find that a safe opening can occur two weeks after the crossover of daily infection and recovery rates while maintaining a negative trend in daily new cases. Epidemiologic SIRM model-based example simulation supports our findings. Finally, we develop an easily interpretable large-scale reopening (LSR) index, which is an evidence-based toolkit-to guide/inform reopening decision for LMICs

    Case Studies on X-Ray Imaging, MRI and Nuclear Imaging

    Full text link
    The field of medical imaging is an essential aspect of the medical sciences, involving various forms of radiation to capture images of the internal tissues and organs of the body. These images provide vital information for clinical diagnosis, and in this chapter, we will explore the use of X-ray, MRI, and nuclear imaging in detecting severe illnesses. However, manual evaluation and storage of these images can be a challenging and time-consuming process. To address this issue, artificial intelligence (AI)-based techniques, particularly deep learning (DL), have become increasingly popular for systematic feature extraction and classification from imaging modalities, thereby aiding doctors in making rapid and accurate diagnoses. In this review study, we will focus on how AI-based approaches, particularly the use of Convolutional Neural Networks (CNN), can assist in disease detection through medical imaging technology. CNN is a commonly used approach for image analysis due to its ability to extract features from raw input images, and as such, will be the primary area of discussion in this study. Therefore, we have considered CNN as our discussion area in this study to diagnose ailments using medical imaging technology.Comment: 14 pages, 3 figures, 4 tables; Acceptance of the chapter for the Springer book "Data-driven approaches to medical imaging

    Active Learning on Medical Image

    Full text link
    The development of medical science greatly depends on the increased utilization of machine learning algorithms. By incorporating machine learning, the medical imaging field can significantly improve in terms of the speed and accuracy of the diagnostic process. Computed tomography (CT), magnetic resonance imaging (MRI), X-ray imaging, ultrasound imaging, and positron emission tomography (PET) are the most commonly used types of imaging data in the diagnosis process, and machine learning can aid in detecting diseases at an early stage. However, training machine learning models with limited annotated medical image data poses a challenge. The majority of medical image datasets have limited data, which can impede the pattern-learning process of machine-learning algorithms. Additionally, the lack of labeled data is another critical issue for machine learning. In this context, active learning techniques can be employed to address the challenge of limited annotated medical image data. Active learning involves iteratively selecting the most informative samples from a large pool of unlabeled data for annotation by experts. By actively selecting the most relevant and informative samples, active learning reduces the reliance on large amounts of labeled data and maximizes the model's learning capacity with minimal human labeling effort. By incorporating active learning into the training process, medical imaging machine learning models can make more efficient use of the available labeled data, improving their accuracy and performance. This approach allows medical professionals to focus their efforts on annotating the most critical cases, while the machine learning model actively learns from these annotated samples to improve its diagnostic capabilities.Comment: 12 pages, 8 figures; Acceptance of the chapter for the Springer book "Data-driven approaches to medical imaging

    Generative Adversarial Networks for Data Augmentation

    Full text link
    One way to expand the available dataset for training AI models in the medical field is through the use of Generative Adversarial Networks (GANs) for data augmentation. GANs work by employing a generator network to create new data samples that are then assessed by a discriminator network to determine their similarity to real samples. The discriminator network is taught to differentiate between actual and synthetic samples, while the generator system is trained to generate data that closely resemble real ones. The process is repeated until the generator network can produce synthetic data that is indistinguishable from genuine data. GANs have been utilized in medical image analysis for various tasks, including data augmentation, image creation, and domain adaptation. They can generate synthetic samples that can be used to increase the available dataset, especially in cases where obtaining large amounts of genuine data is difficult or unethical. However, it is essential to note that the use of GANs in medical imaging is still an active area of research to ensure that the produced images are of high quality and suitable for use in clinical settings.Comment: 13 pages, 6 figures, 1 table; Acceptance of the chapter for the Springer book "Data-driven approaches to medical imaging
    corecore