Research Projects

Misinformation and Misbehavior Mitigation

Misinformation Sharing Preferences of Social Media Users (in progress)

Joint work with Lan Jiang at UIUC

We identify the correlation between user profiles and misinformation sharing preferences, as a first step toward improving misinformation classifiers.

Fact-tampering Attacks against Fake News Detection

Joint work with Justin Hsu at Wisconsin, Huankang Guan at Wuhan University, and Meghana Moorthy Bhat at Ohio State

News plays a significant role in shaping people's beliefs and opinions. Fake news has always been a problem and quite a few detection methods have been proposed to combat fake news. However, they focus mainly on linguistic aspects of an article without any fact checking. We argue that fact-tampering fake news can escape such detection and under-written real news can be wrongly flagged. Through experiments on Fakebox, a state-of-the-art fake news detector, we show that fact tampering attacks (fact distortion, subject-object exchange and cause confounding) can be effective. To address such weaknesses, we argue that fact checking should be adopted in conjunction with linguistic analysis, so as to truly separate fake news from real news. A crowdsourced knowledge graph is proposed as a straw man solution to collecting timely facts about news events.

  • Paper 1: "Fake News Detection via NLP is Vulnerable to Adversarial Attacks" (ICAART)
  • Paper 2: "Fake News Detection via NLP Becomes Harder" (WiML Workshop)

Fake Node Attacks against Rumor Detection based on Bi-directional GCN

Undergraduate thesis, advised by Chenliang Li at Wuhan University

Some recent work tried to detect rumor in social media with graph convolutional networks (GCN). GCN can better capture propagation features of rumor compared to models solely based on linguistic characteristics, achieving SOTA performance. However, GCN is vulnerable to adversarial attacks. As a result, rumor sources are able to escape GCN-based detection with the manipulation of adversaries. One example escape strategy is to create some robot accounts which seem to be "uninfected" as the rumor source's followers. We propose an attack which successfully subvert bi-directional GCN based rumor detector by 4%.

Mitigating Cheating Behavior in Online Games

Joint work with Song Liang and Boya Yin at Tencent

Some users deliberately act badly and throw a game in order to be matched with weaker opponents later, making their teammates frustrated. We use machine learning algorithms (LSTM, XGBoost) and expert rules to mitigate such misbehavior, creating a better environment for players.

Adversarial Machine Learning

Certified Defense against Adversarial Examples

Joint work with Furong Huang and Jiahao Su at Maryland, and Huimin Zeng at TU Munich

Machine learning models have been shown to be vulnerable to adversarial examples. Tiny perturbation in the input can result in totally different predictions. For example, by adding noise to a "panda" picture, the adversary can force the model to recognize it as a "truck". In this project, we try to achieve provable robustness against adversarial examples (a.k.a. certified defense).
Current methods suffer from either high computational complexity or loose relaxation. To solve the issues, we propose a technique called latent space encoding which is a much lighter mechanism. More specifically, we map clean data and adversaries into a latent space, and provably reduce the divergence between the latent distributions. Experiments on MNIST show that our method achieves certified robustness without a large drop in accuracy.

  • Paper: "Certified Defense of Adversarial Examples via Latent Space Encoding" (in submission)


Decentralized Finance (in progress)

Joint work with Yang Wang at UIUC

We research incentive designs of DeFi projects. We also research security and privacy practices of smart contract developers.

Social Media and Video Streaming for Life

Information Seeking and Consumption Practices of Older Adults During COVID-19 (in progress)

Joint work with Yang Wang at UIUC

We conduct semi-structured interviews with older adults in China to understand their information seeking and consumption practices during the COVID-19 pandemic. The study could inform future information systems design for this group of people.

Foodshow Watching for Life Management

Joint work with Xianghua Ding and Xinru Tang at Fudan University, and Yunan Chen at UC Irvine

We conduct semi-structured interviews to understand foodshow watching practices of Chinese users. It turns out that eating-related UGV play important roles in daily life management. They are well integrated into viewers' daily lives, shaping eating and sleeping behaviors, relieving stress, and providing comfort.

  • Paper: "Watching for Life: Eating Shows and Daily Life Management" (in submission)

Video Streaming for Active Ageing

Joint work with Xinru Tang and Xianghua Ding at Fudan University

We conduct semi-structured interviews to understand older adults' usage of online video streaming platforms such as Douyin. We find that online streaming enables a form of active ageing by providing great motivations and opportunities for older adults to present themselves to a broad audience, interact with others, and engage in various types of learning.

  • Paper: "Active Entertainment and Beyond: A Study of the Use of Short Video Streaming Platforms among Older Adults" (in submission)