{"id":222,"date":"2021-04-15T15:18:49","date_gmt":"2021-04-15T19:18:49","guid":{"rendered":"https:\/\/cecas.clemson.edu\/ideas\/?p=222"},"modified":"2021-04-27T10:55:41","modified_gmt":"2021-04-27T14:55:41","slug":"shaping-the-future-of-ai-and-cybersecurity","status":"publish","type":"post","link":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/","title":{"rendered":"Shaping the future of AI and cybersecurity"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-sticky-container\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:10px;--awb-padding-right:0px;--awb-padding-bottom:10px;--awb-padding-left:0px;--awb-background-color:#000000;--awb-sticky-background-color:#000000 !important;--awb-flex-wrap:wrap;\" data-transition-offset=\"0\" data-scroll-offset=\"400\" data-sticky-small-visibility=\"1\" data-sticky-medium-visibility=\"1\" data-sticky-large-visibility=\"1\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/cecas.clemson.edu\/ideas\/\" target=\"_self\" aria-label=\"IDEAS-Header-Logo-100px-White\"><img decoding=\"async\" width=\"100\" height=\"31\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/IDEAS-Header-Logo-100px-White.svg\" alt class=\"img-responsive wp-image-689\"\/><\/a><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility shaping-future-hero\" style=\"--awb-background-position:center top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:3%;--awb-background-image:url(&quot;https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/laptop-hero-945px-tall.jpg&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_3_5 3_5 fusion-flex-column fusion-flex-align-self-flex-end fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"0.6\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-end fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-top:0px;--awb-margin-bottom:20px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:15px;--awb-margin-left-small:0px;--awb-font-size:60px;\"><h1 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Roboto&quot;;font-style:normal;font-weight:100;margin:0;font-size:1em;line-height:50px;\">Shaping the future of AI and cybersecurity<\/h1><\/div><div class=\"fusion-text fusion-text-1 fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-font-size:13px;--awb-line-height:1;--awb-margin-top:0px;--awb-margin-bottom:35px;\"><p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>By Paul Alongi,<\/strong> Clemson University<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#8560b3;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h2 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Roboto&quot;;font-style:normal;font-weight:500;margin:0;font-size:1em;line-height:1.2;\">Innovations at Clemson University are helping protect devices from hackers, kids from cyberbullies and social media users from privacy intrusions.<\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container hundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-background-position:center top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:3%;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-end\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-end fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1000\" height=\"526\" title=\"laptop-mobile\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/laptop-mobile.jpg\" alt class=\"img-responsive wp-image-1446\" srcset=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/laptop-mobile-200x105.jpg 200w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/laptop-mobile-400x210.jpg 400w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/laptop-mobile-600x316.jpg 600w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/laptop-mobile-800x421.jpg 800w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/laptop-mobile.jpg 1000w\" sizes=\"(max-width: 800px) 100vw, 1000px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-end fusion-animated\" style=\"--awb-padding-right:30px;--awb-padding-left:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"0.6\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-end fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-top:0px;--awb-margin-right:30px;--awb-margin-bottom:20px;--awb-margin-left:30px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:15px;--awb-margin-left-small:0px;--awb-font-size:60px;\"><h1 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Roboto&quot;;font-style:normal;font-weight:100;margin:0;font-size:1em;line-height:50px;\">Shaping the future of AI and cybersecurity<\/h1><\/div><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-font-size:13px;--awb-line-height:1;--awb-margin-top:15px;--awb-margin-bottom:15px;\"><p style=\"text-align: center;\"><strong><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-margin-right:10px;--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\" style=\"border-radius:50%;\"><img decoding=\"async\" width=\"100\" height=\"100\" title=\"paul-alongi\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/paul-alongi.jpg\" alt class=\"img-responsive wp-image-2198\" srcset=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/paul-alongi-66x66.jpg 66w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/paul-alongi.jpg 100w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/><\/span><\/div><span style=\"color: #ffffff;\">By Paul Alongi,<\/span><\/strong><span style=\"color: #ffffff;\"> Clemson University<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#8560b3;--awb-margin-top:0px;--awb-margin-right:30px;--awb-margin-bottom:0px;--awb-margin-left:30px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h2 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Roboto&quot;;font-style:normal;font-weight:500;margin:0;font-size:1em;line-height:1.2;\">Innovations at Clemson University are helping protect devices from hackers, kids from cyberbullies and social media users from privacy intrusions.<\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-bottom:50px;--awb-padding-top-small:10px;--awb-padding-bottom-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_5_6 5_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:83.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.304%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.304%;--awb-width-medium:83.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:2.304%;--awb-spacing-left-medium:2.304%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3 awb-text-cols fusion-text-columns-3\" style=\"--awb-font-size:16px;--awb-line-height:22.4px;--awb-columns:3;--awb-column-spacing:2em;--awb-column-min-width:400px;\"><p><span class=\"fusion-dropcap dropcap merriweather-dropcap\"><strong>C<\/strong><\/span>lemson University researchers are bringing together two of the computing world\u2019s most in-demand fields&#8211; cybersecurity and artificial intelligence to help protect internet users from a wide range of threats.<\/p>\n<p>Two of the most recent highlights involve <strong>Feng Luo<\/strong> and <strong>Bart Knijnenburg,<\/strong> both faculty members in the School of Computing.<\/p>\n<p>Luo and his team have developed a system, DeepPower, that detects malware attacks against internet-connected devices, such as cameras, that are too small for anti-virus software. He and his collaborators have also created MCDefender, which works to detect and prevent cyberbullying on social media.<\/p>\n<p>Knijnenburg and his team have developed a system that learns internet users\u2019 privacy preferences and recommends privacy settings similar to how Netflix recommends movies. It would help eliminate the need to read pages of privacy policies or click through privacy settings that for some people can be difficult to find.<\/p>\n<p><strong>Amy Apon,<\/strong> the C. Tycho Howle Director of the School of Computing, said the Luo and Knijnenburg work are examples of the innovative research happening in the school.<\/p>\n<p>\u201cClemson University\u2019s School of Computing is at the forefront of research at the intersection of cybersecurity and artificial intelligence,\u201d she said. \u201cWe are working across disciplines and institutions to find solutions in some of the most challenging fields, including Internet of Things, cyberbullying and privacy. Further, we are adding talent in cybersecurity and artificial intelligence and are recruiting multiple new faculty members. In the School of Computing, we are shaping the future.\u201d\u00a0 <i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon fa-th fas circle-no fusion-text-flow\" style=\"--awb-iconcolor:#f56600;--awb-iconcolor-hover:#f56600;--awb-font-size:12px;--awb-margin-right:6px;\"><\/i><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling callout\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#2e1a47;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:40px;--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-2 fb-icon-element fontawesome-icon fa-quote-left fas circle-no\" style=\"--awb-font-size:32px;--awb-align-self:center;--awb-margin-top:0px;--awb-margin-right:0px;--awb-margin-bottom:15px;--awb-margin-left:0px;\"><\/i><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two fusion-animated\" style=\"--awb-text-color:#ffffff;--awb-margin-top:0px;--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.5\" data-animationOffset=\"top-into-view\"><h2 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Merriweather&quot;;font-style:normal;font-weight:400;margin:0;\">We are working across disciplines and institutions to find solutions in some of the most challenging fields, including Internet of Things, cyberbullying and privacy.<\/h2><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#dbdbdb;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:16px;\"><h3 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Roboto&quot;;font-style:normal;font-weight:500;margin:0;font-size:1em;\">Amy Apon, C. Tycho Howle Director of the School of Computing<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:center top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-bottom:50px;--awb-padding-top-small:35px;--awb-padding-right-small:20px;--awb-padding-bottom-small:10px;--awb-padding-left-small:20px;--awb-margin-bottom-small:0px;--awb-background-color:#111111;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_3_4 3_4 fusion-flex-column fusion-flex-align-self-flex-end\" style=\"--awb-bg-size:cover;--awb-width-large:75%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.56%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.56%;--awb-width-medium:75%;--awb-order-medium:0;--awb-spacing-right-medium:2.56%;--awb-spacing-left-medium:2.56%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-end fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#8560b3;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h2 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Roboto&quot;;font-style:normal;font-weight:500;margin:0;font-size:1em;line-height:1.2;\">Read more about the work of Luo and Knijnenburg.<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:50%;--awb-order-small:0;--awb-spacing-right-small:3.84%;--awb-spacing-left-small:3.84%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-margin-bottom:15px;--awb-max-width:400px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/\" target=\"_self\" aria-label=\"feng-luo-thumbnail\"><img decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/feng-luo-thumbnail.jpg\" alt class=\"img-responsive wp-image-530\" srcset=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/feng-luo-thumbnail-200x200.jpg 200w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/feng-luo-thumbnail-400x400.jpg 400w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/feng-luo-thumbnail-600x600.jpg 600w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/feng-luo-thumbnail-800x800.jpg 800w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/feng-luo-thumbnail.jpg 1000w\" sizes=\"(max-width: 800px) 100vw, 600px\" \/><\/a><\/span><\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ffffff;--awb-margin-top:1%;--awb-margin-bottom:20px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-link-color:#ffffff;--awb-font-size:20px;\"><h3 class=\"fusion-title-heading title-heading-center\" style=\"margin:0;font-size:1em;line-height:1.1;\"><a href=\"https:\/\/cecas.clemson.edu\/ideas\/protecting-internet-from-hackers-and-cyberbullies\/\" class=\"awb-custom-text-color awb-custom-text-hover-color\" target=\"_self\">Protecting the internet from hackers and cyberbullies<\/a><\/h3><\/div><div class=\"fusion-text fusion-text-4 fusion-text-no-margin\" style=\"--awb-font-size:12px;--awb-text-color:#d3d3d3;--awb-margin-top:.5%;--awb-margin-bottom:10px;\"><p style=\"text-align: center;\"><strong>Feng Luo<\/strong><br \/>\nMarvin J. Pinson, Jr. \u201946 Distinguished Professor<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:50%;--awb-order-small:0;--awb-spacing-right-small:3.84%;--awb-spacing-left-small:3.84%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-margin-bottom:15px;--awb-max-width:400px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/\" target=\"_self\" aria-label=\"bkatted\"><img decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/bkatted.jpg\" alt class=\"img-responsive wp-image-544\" srcset=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/bkatted-200x200.jpg 200w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/bkatted-400x400.jpg 400w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/bkatted-600x600.jpg 600w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/bkatted-800x800.jpg 800w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/bkatted.jpg 1000w\" sizes=\"(max-width: 800px) 100vw, 600px\" \/><\/a><\/span><\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ffffff;--awb-margin-top:1%;--awb-margin-bottom:20px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-link-color:#ffffff;--awb-font-size:20px;\"><h3 class=\"fusion-title-heading title-heading-center\" style=\"margin:0;font-size:1em;line-height:1.1;\"><a href=\"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/\" class=\"awb-custom-text-color awb-custom-text-hover-color\" target=\"_self\">Protecting privacy online<\/a><\/h3><\/div><div class=\"fusion-text fusion-text-5 fusion-text-no-margin\" style=\"--awb-font-size:12px;--awb-text-color:#d3d3d3;--awb-margin-top:.5%;--awb-margin-bottom:10px;\"><p style=\"text-align: center;\"><strong>Bart Knijnenburg<\/strong><br \/>\nAssistant Professor<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Clemson University researchers are bringing together two of the computing world\u2019s most in-demand fields&#8211; cybersecurity and artificial intelligence to help protect internet users from a wide range of threats.<\/p>\n","protected":false},"author":10,"featured_media":534,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,24,19],"tags":[],"class_list":["post-222","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-research","category-spring-2021"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Shaping the future of AI and cybersecurity - IDEAS Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shaping the future of AI and cybersecurity - IDEAS Magazine\" \/>\n<meta property=\"og:description\" content=\"Clemson University researchers are bringing together two of the computing world\u2019s most in-demand fields-- cybersecurity and artificial intelligence to help protect internet users from a wide range of threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"IDEAS Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ClemsonCECAS\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-15T19:18:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-27T14:55:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/cyber-intro-thumbnail-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Lee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Lee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"33 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/shaping-the-future-of-ai-and-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/shaping-the-future-of-ai-and-cybersecurity\\\/\"},\"author\":{\"name\":\"David Lee\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#\\\/schema\\\/person\\\/91743b9570d9b165ba222f4c693fb8a6\"},\"headline\":\"Shaping the future of AI and cybersecurity\",\"datePublished\":\"2021-04-15T19:18:49+00:00\",\"dateModified\":\"2021-04-27T14:55:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/shaping-the-future-of-ai-and-cybersecurity\\\/\"},\"wordCount\":6596,\"image\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/shaping-the-future-of-ai-and-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/cyber-intro-thumbnail-2.jpg\",\"articleSection\":[\"Cybersecurity\",\"Research\",\"Spring 2021\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/shaping-the-future-of-ai-and-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/shaping-the-future-of-ai-and-cybersecurity\\\/\",\"name\":\"Shaping the future of AI and cybersecurity - IDEAS Magazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/shaping-the-future-of-ai-and-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/shaping-the-future-of-ai-and-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/cyber-intro-thumbnail-2.jpg\",\"datePublished\":\"2021-04-15T19:18:49+00:00\",\"dateModified\":\"2021-04-27T14:55:41+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#\\\/schema\\\/person\\\/91743b9570d9b165ba222f4c693fb8a6\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/shaping-the-future-of-ai-and-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/shaping-the-future-of-ai-and-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/shaping-the-future-of-ai-and-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/cyber-intro-thumbnail-2.jpg\",\"contentUrl\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/cyber-intro-thumbnail-2.jpg\",\"width\":1000,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/shaping-the-future-of-ai-and-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shaping the future of AI and cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#website\",\"url\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/\",\"name\":\"IDEAS Magazine\",\"description\":\"The flagship Publication of the Clemson College of Engineering, Computing and Applied Sciences\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#\\\/schema\\\/person\\\/91743b9570d9b165ba222f4c693fb8a6\",\"name\":\"David Lee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g\",\"caption\":\"David Lee\"},\"url\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/author\\\/daveroblee\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shaping the future of AI and cybersecurity - IDEAS Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Shaping the future of AI and cybersecurity - IDEAS Magazine","og_description":"Clemson University researchers are bringing together two of the computing world\u2019s most in-demand fields-- cybersecurity and artificial intelligence to help protect internet users from a wide range of threats.","og_url":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/","og_site_name":"IDEAS Magazine","article_publisher":"https:\/\/www.facebook.com\/ClemsonCECAS","article_published_time":"2021-04-15T19:18:49+00:00","article_modified_time":"2021-04-27T14:55:41+00:00","og_image":[{"width":1000,"height":1000,"url":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/cyber-intro-thumbnail-2.jpg","type":"image\/jpeg"}],"author":"David Lee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Lee","Est. reading time":"33 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/"},"author":{"name":"David Lee","@id":"https:\/\/cecas.clemson.edu\/ideas\/#\/schema\/person\/91743b9570d9b165ba222f4c693fb8a6"},"headline":"Shaping the future of AI and cybersecurity","datePublished":"2021-04-15T19:18:49+00:00","dateModified":"2021-04-27T14:55:41+00:00","mainEntityOfPage":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/"},"wordCount":6596,"image":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/cyber-intro-thumbnail-2.jpg","articleSection":["Cybersecurity","Research","Spring 2021"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/","url":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/","name":"Shaping the future of AI and cybersecurity - IDEAS Magazine","isPartOf":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/cyber-intro-thumbnail-2.jpg","datePublished":"2021-04-15T19:18:49+00:00","dateModified":"2021-04-27T14:55:41+00:00","author":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/#\/schema\/person\/91743b9570d9b165ba222f4c693fb8a6"},"breadcrumb":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/#primaryimage","url":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/cyber-intro-thumbnail-2.jpg","contentUrl":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/cyber-intro-thumbnail-2.jpg","width":1000,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/cecas.clemson.edu\/ideas\/shaping-the-future-of-ai-and-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cecas.clemson.edu\/ideas\/"},{"@type":"ListItem","position":2,"name":"Shaping the future of AI and cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/cecas.clemson.edu\/ideas\/#website","url":"https:\/\/cecas.clemson.edu\/ideas\/","name":"IDEAS Magazine","description":"The flagship Publication of the Clemson College of Engineering, Computing and Applied Sciences","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cecas.clemson.edu\/ideas\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cecas.clemson.edu\/ideas\/#\/schema\/person\/91743b9570d9b165ba222f4c693fb8a6","name":"David Lee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g","caption":"David Lee"},"url":"https:\/\/cecas.clemson.edu\/ideas\/author\/daveroblee\/"}]}},"_links":{"self":[{"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/posts\/222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/comments?post=222"}],"version-history":[{"count":59,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/posts\/222\/revisions"}],"predecessor-version":[{"id":2740,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/posts\/222\/revisions\/2740"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/media\/534"}],"wp:attachment":[{"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/media?parent=222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/categories?post=222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/tags?post=222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}