[ skip to content ]

Toggle Mobile Menu

CCNI LabCybersecurity Research in a Multidisciplinary Environment

More Information about this image

Block chain network and programming concept on technology background

REU Site: Deep Learning Driven Cybersecurity Research


Introduction

Cybersecurity is a priority area of national need. As a multidisciplinary field, cybersecurity requires that the professionals have knowledge and skills in various disciplines. In this REU site program, students from multiple disciplines, such as computer science, computer engineering, criminal justice, information technology, and psychology, will explore a variety of cybersecurity topics, using Deep Learning or AI as a main methodology. The REU program is also enriched through various seminars, social activities, and field trips to Naval Base Norfolk, and Navy Cyber Defense Operation Command (NCDOC). The REU site program offers unique multidisciplinary learning and research opportunities for undergraduate students in an inherently multidisciplinary cybersecurity discipline. Each student will be able to select his/her preferred mentor and work with the mentor to select an REU research project based on his/her interests and background. The students will master research methodologies and obtain valuable research experiences in an area of critical national need, and also better prepare for graduate studies.

Qualifications

  • U.S. citizen or permanent resident
  • Must be an undergraduate student during the program period (Graduation date after the program period)
  • Preferred GPA 3.0+
  • Students from all disciplines or majors will be considered

Requirements

  • Perform at least 30 hours/week research with the mentor for 10 weeks,
    starting from May 31, 2022
  • Attend weekly research meeting and other events
  • Write a research report and create a poster at the end of the program

Support

  • $7,200 for stipends and food
  • Free on-campus housing for 10 weeks and travel support
    (conditioned on that the REU program is hosted on-site at
    ODU)

Program Period

10 weeks, from May 31 to August 5, 2022

How to Apply

Deadline: The applications will be reviewed on a rolling basis. You will need to have a google or gmail account to log in, in order to upload the following documents in the application process.
i) Resume: list education (post secondary), academic and research achievement (honor, awards, etc.),
research experience, skills, and other special qualifications if any.

ii) The transcripts from the post secondary institutions you have attended. Unofficial transcripts are
acceptable for the application. If you are selected to join the program, the official transcripts will be needed.

iii) Cover letter (optional): describe your interest in cybersecurity, your career goal, etc.

After you have resume and transcripts ready, please click the following link to start your application. You will have the opportunity to select three prefered mentors during the application. Hence you are suggested to review the research areas of the mentors below, and make your selection. You will work with your mentor to select a research project in the beginning of the REU program (early June). Please feel free to reach out to the mentor or Dr. Xin if you have any questions.

Start Application

In addition, please request a recommendation letter from a professor of your college. You
can either upload in the application form, or arrange to send it to the
program director Dr. Xin (cxin@odu.edu).


Faculty Mentors




Past REU Students Publications

  1. R. Burks, K. Islam, Y. Lu and J. Li, "Data Augmentation with Generative Models for Improved
    Malware Detection:A Comparative Study," in Proc. IEEE Annual Ubiquitous Computing,
    Electronics and Mobile Communication Conference (UEMCON), 2019, New York City, NY
  2. S. Liu, W. He, and X. Tian, "Research on Security Visualization: A Survey," in Proc. 59th
    Annual IACIS Conference, Oct. 2019, Clearwater Beach, FL (IACIS Jay Liebowitz Best Student
    Research Paper Award)
  3. B. Payne, B. Hawkins, C. Xin, "Using Labeling Theory as a Guide to Examine the Patterns,
    Characteristics, and Sanctions Given to Cybercrimes," American Journal of Criminal Justice,
    vol. 44(2), pp. 230-247, Apr. 2019
  4. A. A. Cain, M. E. Edwards, and J.D. Still, "An exploratory study of cyber hygiene behaviors
    and knowledge," Journal of Information Security and Applications, vol. 42, pp. 36-45, Oct.
    2018 (Impact Factor: 1.65)
  5. A. Davenport, S. Shetty, X. Liang, "Attack Surface Analysis of Permissioned Blockchain
    Platforms for Smart Cities," in Proc. IEEE International Smart Cities Conference (ISC2), Sep.
    2018, Kansas City, MO
  6. A. Kepto, B. Payne, C. Xin, "Hacks and Cybersecurity Set Backs-An Analysis of Organizational
    Hacks from 2015-2018," in Proc. Annual Conference of the Southern Criminal Justice
    Association, 2018, New Orleans, LA
  7. H. Wiggins, B. Payne, C. Xin , "An Inside Look at Inside Breachers," in Proc. Annual
    Conference of the Southern Criminal Justice Association, 2018, New Orleans, LA
  8. C. Logan, W. He, "Comparing security risks to PayPal transactions in the United States and
    Mexico", in Proc. 18th Global Information Technology Management Association (GITMA)
    World Conference, July 2018, Mexico City, Mexico
  9. B. Hawkins, B. Payne, C. Xin, "An Examination of the Patterns, Characteristics, and
    Sanctions Given to Cybercrimes: Street Crime, White-Collar Crime, International Crime, or
    All of the Above," in Proc. Academy of Criminal Justice Science (ACJS) Annual Conference,
    2017, New Orleans, LA
  10. D. Bussey, A. Glandon, L. Vidyaratne, M. Alam and K. M. Iftekharuddin, "CNN Transfer
    Learning for Robust Face Recognition in NAO Humanoid Robot," in Proc. IEEE Symposium
    Series on Computational Intelligence (IEEE SSCI), 2017, Honolulu, HI
  11. M. Chowdhury, F. Dowuona-Hammond, G. Konowicz, J. Li, C. Xin, and H. Wu , "A low-shot
    Deep Learning Approach for Improved Intrusion Detection," in Proc. IEEE Annual
    Ubiquitous Computing, Electronics

Past REU Projects

The REU project is selected together by the student and the mentor based on the student interests and background. The following is a list of selected past REU projects.

  • Measurement of Energy Impact on Blockchain Technologies: Cryptocurrency Mining
  • Visualization and Prevention of Backdoor Attacks in CNN model
  • Person Identification from Skeleton Data via a Convolutional Co-occurrence Feature Learning Network
  • Using Torchattacks to Improve the Robustness of Models with Adversarial Training
  • The Effect of the Coronavirus on Cyberbullying Research Methods
  • Deep Learning Based Malware Classification Using Variational Autoencoders(VAE)
  • Cybersecurity and Cybercrime: a Multi-Level Analysis
  • Application of Homomorphic Encryption on Mesh Smoothing
  • Generalized Deep Learning Model for Automated Threat Detection
  • AccPhantom: An Accelerometer Side-Channel Attack Approach Utilizing Connectionist Temporal Classification on Recurrent Neural Networks
  • Continuous Authentication of Smartphone users: Touchscreen interactions
  • Despect: A Framework for the Creation of Microarchitectural Datasets
  • Data Augmentation with Generative Models for Improved Malware Detection: A Comparative Study
  • Radio Frequency Toolbox for Detection and Classification of Drones
  • Deep Learning Malware Detection using End-to-end Training
  • An Insider Look at Your Insider Threat: An Analysis of Insider Breaches
  • Twitter Social Bots: DIY Grassroots Campaign
  • Improve Security in Smart Drones
  • Transfer Learning for CNN based Robust Face Recognition in NAO Humanoid Robot
  • Comparing Security Risks to PayPal Transactions in the United States and Mexico
  • Inferring Web Browsing Usage Over Encrypted Data Traffic
  • Intrusion Detection using Machine Learning
  • Cybercriminals and the Punishment
  • Malicious Skill Design for Privacy Intrusion against Amazon Alexa Devices
  • Cyber Hygiene Knowledge and Behaviors of End Users

Information for Accepted Students