<node id="609858">
  <nid>609858</nid>
  <type>news</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1534442393</created>
  <changed>1534449334</changed>
  <title><![CDATA[Students Seek "People’s Choice" Votes in National Privacy Engineering Contest]]></title>
  <body><![CDATA[<p>A team of students from the Colleges of Computing, Engineering, and Sciences is asking for your vote. They&rsquo;re concerned about privacy &ndash; but not at the polls. They&rsquo;re campaigning to protect personal data from unnecessary disclosure during research and also to protect researchers&rsquo; access to meaningful data.</p>

<p>They&rsquo;re one of four national finalists for the People&rsquo;s Choice award of $5,000 in a contest by the National Institute of Standards and Technology (NIST) Public Safety Communications Research Division (PSCR) and TopCoder, called &ldquo;<a href="https://www.herox.com/UnlinkableDataChallenge">The Unlinkable Data Challenge: Advancing Methods in Differential Privacy</a>.&rdquo;</p>

<p>The big problem? Dramatic increases in computing power make it possible to combine and utilize data from multiple sources which may contain sensitive information about individuals. Once unrelated datasets are combined, previously &ldquo;private&rdquo; facts can be linked to easily identify the person behind them. A <a href="https://dataprivacylab.org/people/sweeney/index.html">2002 study by Latanya Sweeney</a> of Harvard&rsquo;s Data Privacy Lab found that the combination of just three &ldquo;quasi-identifiers&rdquo; (date of birth, five-digit postal code, and gender) could uniquely identify 87 percent of the U.S. population. Making minor changes to birth dates and other personally identifiable information still does not provide adequate protection against linkage attacks.</p>

<p>Contest organizers say this valid privacy concern is unfortunately limiting the use of data for research. Privacy engineers have been asked to create a new solution.</p>

<p>&ldquo;Our proposed solution is to generate differentially private synthetic data using Generative Adversarial Networks (GANs),&quot; explains <a href="http://cyber.gatech.edu/faculty/rachel-cummings"><strong>Rachel Cummings</strong></a>, assistant professor in the H. Milton Stewart School of Industrial and Systems Engineering at Georgia Tech, and organizer of the Georgia Tech team. &ldquo;This synthetic data can then be used for a variety of analysis tasks, including classification, regression, clustering, and answering unknown research questions. If the synthetic data are statistically similar to the original (sensitive) data, then analysis on the synthetic data should be accurate with respect to the original database.&rdquo;</p>

<p>She says it can be achieved by privately training neural networks inside a GAN to generate new data points (drawn from the same distribution as the original data).</p>

<p>&ldquo;By generating synthetic data privately, any future analysis on the data also would be private, due to the post-processing guarantees of differential privacy,&rdquo; she says.</p>

<p>The idea builds from previous work on differentially private GANs to add further optimizations that will enhance performance across a wide variety of data types and analysis tasks.</p>

<p>The team includes: <strong>Digvijay Boob</strong> (PhD ISyE-ACO), <strong>Uthaipon Tantitongpipat</strong> (PhD CS-ACO), <strong>Kyle Zimmerman</strong> (MS Cybersecurity), <strong>Dhamma Kimpara</strong> (BS Math), and <strong>Chris Waites</strong> (BS CS).&nbsp; Students are members of Cummings&rsquo; weekly privacy reading group, and they worked together over the summer to submit their idea to the NIST contest.</p>

<p>In addition to the $5,000 People&#39;s Choice Award, the Georgia Tech team is eligible for a $40,000 Judges&#39; Choice Award and, if successful, would advance to future rounds with the potential to win an additional $140,000 toward their research.</p>

<p><strong>Voting is live now through Aug. 28</strong>: <a href="https://www.herox.com/UnlinkableDataChallenge">https://www.herox.com/UnlinkableDataChallenge</a></p>

<p>&nbsp;</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2018-08-16T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[A team of privacy engineering students from the Colleges of Computing, Engineering, and Sciences proposes a new way to protect personal data used in research.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>A Georgia Tech team is one of four national finalists working toward as much as $45,000 from the National Institute of Standards and Technology (NIST) and TopCoder in a contest called &ldquo;The Unlinkable Data Challenge: Advancing Methods in Differential Privacy.&quot;</p>
]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="609865">
            <nid>609865</nid>
            <type>image</type>
            <title><![CDATA[Prof. Rachel Cummings and Dhamma Kimpara]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>232259</fid>
                  <filename><![CDATA[Cummings IMG_2082.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/Cummings%20IMG_2082.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Cummings%20IMG_2082.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[tara.labouff@iisp.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Tara La Bouff, <a href="http://mailto:tara.labouff@iisp.gatech.edu">tara.labouff@iisp.gatech.edu,</a> 404.769.5408</p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Institute and Campus]]>
      </item>
          <item>
        <![CDATA[Student and Faculty]]>
      </item>
          <item>
        <![CDATA[Student Research]]>
      </item>
          <item>
        <![CDATA[Research]]>
      </item>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
          <item>
        <![CDATA[Engineering]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>129</tid>
        <value><![CDATA[Institute and Campus]]></value>
      </item>
          <item>
        <tid>134</tid>
        <value><![CDATA[Student and Faculty]]></value>
      </item>
          <item>
        <tid>8862</tid>
        <value><![CDATA[Student Research]]></value>
      </item>
          <item>
        <tid>135</tid>
        <value><![CDATA[Research]]></value>
      </item>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
          <item>
        <tid>145</tid>
        <value><![CDATA[Engineering]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>3221</tid>
        <value><![CDATA[privacy]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
