{"id":217,"date":"2021-04-14T15:17:32","date_gmt":"2021-04-14T19:17:32","guid":{"rendered":"https:\/\/cecas.clemson.edu\/ideas\/?p=217"},"modified":"2021-04-27T08:58:09","modified_gmt":"2021-04-27T12:58:09","slug":"protecting-internet-from-hackers-and-cyberbullies","status":"publish","type":"post","link":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/","title":{"rendered":"Protecting the internet from hackers and cyberbullies"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-sticky-container\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:10px;--awb-padding-right:0px;--awb-padding-bottom:10px;--awb-padding-left:0px;--awb-background-color:#000000;--awb-sticky-background-color:#000000 !important;--awb-flex-wrap:wrap;\" data-transition-offset=\"0\" data-scroll-offset=\"400\" data-sticky-small-visibility=\"1\" data-sticky-medium-visibility=\"1\" data-sticky-large-visibility=\"1\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/cecas.clemson.edu\/ideas\/\" target=\"_self\" aria-label=\"IDEAS-Header-Logo-100px-White\"><img decoding=\"async\" width=\"100\" height=\"31\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/IDEAS-Header-Logo-100px-White.svg\" alt class=\"img-responsive wp-image-689\"\/><\/a><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-padding-bottom:10px;--awb-padding-top-small:30px;--awb-padding-bottom-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_3_5 3_5 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.6\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#2e1a47;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:15px;--awb-margin-left-small:0px;--awb-font-size:44px;\"><h1 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Merriweather&quot;;font-style:normal;font-weight:900;margin:0;font-size:1em;line-height:46px;\">Protecting the internet from hackers and cyberbullies<\/h1><\/div><div class=\"fusion-text fusion-text-1 sm-text-align-left fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-font-size:13px;--awb-line-height:1;--awb-margin-top:0px;--awb-margin-bottom:10px;\"><p style=\"text-align: left;\"><strong><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-margin-right:10px;--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:50%;\"><img decoding=\"async\" width=\"100\" height=\"100\" title=\"paul-alongi\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/paul-alongi.jpg\" alt class=\"img-responsive wp-image-2198\" srcset=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/paul-alongi-66x66.jpg 66w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/paul-alongi.jpg 100w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/><\/span><\/div><span style=\"color: #333333;\">By Paul Alongi,<\/span><\/strong><span style=\"color: #333333;\"> Clemson University<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"1300\" height=\"766\" title=\"Feng-hero\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-hero.jpg\" alt class=\"img-responsive wp-image-1612\" srcset=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-hero-200x118.jpg 200w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-hero-400x236.jpg 400w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-hero-600x354.jpg 600w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-hero-800x471.jpg 800w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-hero-1200x707.jpg 1200w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-hero.jpg 1300w\" sizes=\"(max-width: 800px) 100vw, 1300px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-right:30px;--awb-padding-left:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:15px;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-font-size:12px;--awb-text-color:#686868;--awb-margin-bottom:0px;\"><p style=\"text-align: center;\"><strong>Feng Luo,<\/strong> Marvin J. Pinson, Jr. &#8217;46 Distinguished Professor<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#522d80;--awb-margin-top:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-margin-bottom-medium:15px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Roboto&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;line-height:1.4;\"><span class=\"fusion-dropcap dropcap\">F<\/span>eng Luo is using his expertise in artificial intelligence and deep learning to help keep the internet safe from hackers and cyberbullies. Luo serves as professor in Clemson University\u2019s School of Computing and director and founder of the Clemson Artificial Intelligence Research Institute, or AIRISE.<\/p><\/h3><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-font-size:16px;--awb-line-height:22.4px;--awb-text-color:#000000;\"><p>In one of Luo&#8217;s most recent projects, he and a group of collaborators developed a way of detecting malware attacks against internet-connected devices, such as cameras, that don\u2019t have enough memory for anti-virus software and other usual means of protection.<\/p>\n<p>When viruses strike, they use power. The system that the team developed, DeepPower, watches for power usage patterns and uses deep learning to infer whether an attack is happening inside the device. <span style=\"background-color: rgba(255, 255, 255, 0); font-family: var(--body_typography-font-family); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">They tried a prototype of DeepPower, using low-cost sensors and devices, to see how it would do against a real-world virus. They found that DeepPower was able to detect infection activities of different Internet-of-Things malware with high accuracy and without any changes to the monitored devices.<\/span><\/p>\n<p><span style=\"font-family: var(--body_typography-font-family); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing); background-color: rgba(255, 255, 255, 0);\">The team reported its findings in <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3320269.3384727\">\u201cDeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels,\u201d<\/a> a paper published in Proceedings of the 15th ACM Asia Conference on Computer and Communications Security<\/span><span style=\"font-family: var(--body_typography-font-family); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing); background-color: rgba(255, 255, 255, 0);\">.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling callout\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#2e1a47;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:40px;--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon fa-quote-left fas circle-no\" style=\"--awb-font-size:32px;--awb-align-self:center;--awb-margin-top:0px;--awb-margin-right:0px;--awb-margin-bottom:15px;--awb-margin-left:0px;\"><\/i><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two fusion-animated\" style=\"--awb-text-color:#ffffff;--awb-margin-top:0px;--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.5\" data-animationOffset=\"top-into-view\"><h2 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Merriweather&quot;;font-style:normal;font-weight:400;margin:0;\">The advantage we have here at Clemson is that we have a good environment for collaborations. We build interdisciplinary teams. That\u2019s what AIRISE is all about. Together, we can compete for grants and conduct the most impactful research.<\/h2><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#dbdbdb;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:16px;\"><h3 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Roboto&quot;;font-style:normal;font-weight:500;margin:0;font-size:1em;\"><strong>Feng Luo,<\/strong> Marvin J. Pinson, Jr. &#8217;46 Distinguished professor<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-padding-bottom:0px;--awb-padding-bottom-small:0px;--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\" style=\"--awb-font-size:16px;--awb-line-height:22.4px;--awb-text-color:#000000;\"><p>Luo has also teamed up with collaborators to protect social media users, especially young ones, against cyberbullying. The team developed a mobile cyberbullying defense system, MCDefender, that can effectively detect and prevent cyberbullying on social media.<\/p>\n<p>MCDefender uses pronunciation-based convolutional neural network architecture that pre-processes data.\u00a0It allows the system to detect cyberbullying, even if messages contain misspellings or words that may not be offensive individually but carry a potentially hurtful message when strung together. When the system detects cyberbullying, the would-be cyberbully gets a message encouraging him or her to think twice before hitting send. If the message is sent anyway, notifications could be sent to parents and other authorities.\u00a0Should the cyberbullying persist, the social media account of the person being cyberbullied could be blurred out so that no further harm could be inflicted.<\/p>\n<p>The team reported its results in <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3041008.3041013)\">\u201cMCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks,\u201d<\/a> a paper published in Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-padding-bottom:20px;--awb-padding-bottom-small:0px;--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:30px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"1000\" height=\"576\" title=\"Feng-Luo_026-X4\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-Luo_026-X4.jpg\" alt class=\"img-responsive wp-image-1667\" srcset=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-Luo_026-X4-200x115.jpg 200w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-Luo_026-X4-400x230.jpg 400w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-Luo_026-X4-600x346.jpg 600w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-Luo_026-X4-800x461.jpg 800w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Feng-Luo_026-X4.jpg 1000w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-font-size:16px;--awb-line-height:22.4px;--awb-text-color:#000000;\"><p>Looking to the future, Luo is working on systems that analyze photos and videos for signs of cyberbullying and search social media for hate speech.<\/p>\n<p>\u201cThe advantage we have here at Clemson is that we have a good environment for collaborations,\u201d Luo said. \u201cWe build interdisciplinary teams. That\u2019s what AIRISE is all about. Together, we can compete for grants and conduct the most impactful research.\u201d\u00a0 <i class=\"fb-icon-element-2 fb-icon-element fontawesome-icon fa-th fas circle-no fusion-text-flow\" style=\"--awb-iconcolor:#F56600;--awb-iconcolor-hover:#F56600;--awb-font-size:12px;--awb-margin-right:6px;\"><\/i><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers have developed a way of detecting malware attacks against cameras and other internet-connected devices that don\u2019t have enough memory for anti-virus software and other usual means of protection.<\/p>\n","protected":false},"author":10,"featured_media":530,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,24,19],"tags":[],"class_list":["post-217","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-research","category-spring-2021"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting the internet from hackers and cyberbullies - IDEAS Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting the internet from hackers and cyberbullies - IDEAS Magazine\" \/>\n<meta property=\"og:description\" content=\"Researchers have developed a way of detecting malware attacks against cameras and other internet-connected devices that don\u2019t have enough memory for anti-virus software and other usual means of protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/\" \/>\n<meta property=\"og:site_name\" content=\"IDEAS Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ClemsonCECAS\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-14T19:17:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-27T12:58:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/feng-luo-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Lee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Lee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"28 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/protecting-internet-from-hackers-and-cyberbullies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/protecting-internet-from-hackers-and-cyberbullies\\\/\"},\"author\":{\"name\":\"David Lee\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#\\\/schema\\\/person\\\/91743b9570d9b165ba222f4c693fb8a6\"},\"headline\":\"Protecting the internet from hackers and cyberbullies\",\"datePublished\":\"2021-04-14T19:17:32+00:00\",\"dateModified\":\"2021-04-27T12:58:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/protecting-internet-from-hackers-and-cyberbullies\\\/\"},\"wordCount\":5549,\"image\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/protecting-internet-from-hackers-and-cyberbullies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/feng-luo-thumbnail.jpg\",\"articleSection\":[\"Cybersecurity\",\"Research\",\"Spring 2021\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/protecting-internet-from-hackers-and-cyberbullies\\\/\",\"url\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/protecting-internet-from-hackers-and-cyberbullies\\\/\",\"name\":\"Protecting the internet from hackers and cyberbullies - IDEAS Magazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/protecting-internet-from-hackers-and-cyberbullies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/protecting-internet-from-hackers-and-cyberbullies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/feng-luo-thumbnail.jpg\",\"datePublished\":\"2021-04-14T19:17:32+00:00\",\"dateModified\":\"2021-04-27T12:58:09+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#\\\/schema\\\/person\\\/91743b9570d9b165ba222f4c693fb8a6\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/protecting-internet-from-hackers-and-cyberbullies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/protecting-internet-from-hackers-and-cyberbullies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/protecting-internet-from-hackers-and-cyberbullies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/feng-luo-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/feng-luo-thumbnail.jpg\",\"width\":1000,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/protecting-internet-from-hackers-and-cyberbullies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting the internet from hackers and cyberbullies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#website\",\"url\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/\",\"name\":\"IDEAS Magazine\",\"description\":\"The flagship Publication of the Clemson College of Engineering, Computing and Applied Sciences\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#\\\/schema\\\/person\\\/91743b9570d9b165ba222f4c693fb8a6\",\"name\":\"David Lee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g\",\"caption\":\"David Lee\"},\"url\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/author\\\/daveroblee\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting the internet from hackers and cyberbullies - IDEAS Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/","og_locale":"en_US","og_type":"article","og_title":"Protecting the internet from hackers and cyberbullies - IDEAS Magazine","og_description":"Researchers have developed a way of detecting malware attacks against cameras and other internet-connected devices that don\u2019t have enough memory for anti-virus software and other usual means of protection.","og_url":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/","og_site_name":"IDEAS Magazine","article_publisher":"https:\/\/www.facebook.com\/ClemsonCECAS","article_published_time":"2021-04-14T19:17:32+00:00","article_modified_time":"2021-04-27T12:58:09+00:00","og_image":[{"width":1000,"height":1000,"url":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/feng-luo-thumbnail.jpg","type":"image\/jpeg"}],"author":"David Lee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Lee","Est. reading time":"28 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/#article","isPartOf":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/"},"author":{"name":"David Lee","@id":"https:\/\/cecas.clemson.edu\/ideas\/#\/schema\/person\/91743b9570d9b165ba222f4c693fb8a6"},"headline":"Protecting the internet from hackers and cyberbullies","datePublished":"2021-04-14T19:17:32+00:00","dateModified":"2021-04-27T12:58:09+00:00","mainEntityOfPage":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/"},"wordCount":5549,"image":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/#primaryimage"},"thumbnailUrl":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/feng-luo-thumbnail.jpg","articleSection":["Cybersecurity","Research","Spring 2021"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/","url":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/","name":"Protecting the internet from hackers and cyberbullies - IDEAS Magazine","isPartOf":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/#primaryimage"},"image":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/#primaryimage"},"thumbnailUrl":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/feng-luo-thumbnail.jpg","datePublished":"2021-04-14T19:17:32+00:00","dateModified":"2021-04-27T12:58:09+00:00","author":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/#\/schema\/person\/91743b9570d9b165ba222f4c693fb8a6"},"breadcrumb":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/#primaryimage","url":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/feng-luo-thumbnail.jpg","contentUrl":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/feng-luo-thumbnail.jpg","width":1000,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cecas.clemson.edu\/ideas\/"},{"@type":"ListItem","position":2,"name":"Protecting the internet from hackers and cyberbullies"}]},{"@type":"WebSite","@id":"https:\/\/cecas.clemson.edu\/ideas\/#website","url":"https:\/\/cecas.clemson.edu\/ideas\/","name":"IDEAS Magazine","description":"The flagship Publication of the Clemson College of Engineering, Computing and Applied Sciences","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cecas.clemson.edu\/ideas\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cecas.clemson.edu\/ideas\/#\/schema\/person\/91743b9570d9b165ba222f4c693fb8a6","name":"David Lee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g","caption":"David Lee"},"url":"https:\/\/cecas.clemson.edu\/ideas\/author\/daveroblee\/"}]}},"_links":{"self":[{"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/posts\/217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/comments?post=217"}],"version-history":[{"count":25,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/posts\/217\/revisions"}],"predecessor-version":[{"id":1581,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/posts\/217\/revisions\/1581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/media\/530"}],"wp:attachment":[{"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/media?parent=217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/categories?post=217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/tags?post=217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}