I am a 23-year-old graduate student studying Social Network Security & Optimization at the University of Florida under Dr. My T. Thai. My start in computing came on a rainy day in 2004, when I began learning HTML. Since then, I've studied Computer Science at the Universities of Kentucky and Florida, interned at IBM and spent countless hours building skills on personal projects.
In college, I worked as a CS & Math tutor, as an undergraduate assistant for Dr. Nathan Jacobs studying Computer Vision, and as an intern in IBM's ExtremeBlue and normal internship programs on PaaS networking and data visualization. This variety of experience allowed me to commit to pursuing a doctorate immediately out of my Bachelor's program, with the eventual goal of getting a tenure-track professorship at an R1 university.
Outside of work, I keep busy with gaming and martial arts. I have been practicing Brazilian Jiu-Jitsu for about a year, and dabbled in a variety of arts during high-school and college. In the digital realm, my usual genres of entertainment are strategy, role-playing, and especially the intersection of the two. Additionally, I am almost always juggling side projects that with topics ranging from mathematical modeling of games to the system-level implementation of a window system.
My research is centered on the social part of social networks. I aim to use techniques drawn from computing and related fields and use them to try to understand user behavior, and then to use this understanding to improve algorithms that operate on social networks. My main areas of focus are:
A wide range of online activities exploit a combination of human psychology and limited tools available to users. For example: bots may exploit assumptions about friend-of-friend relationships to harvest private information, or attackers may take advantage of user trust and platform pseudonymity to magnify harassment. Study of these problems is crucial to protect the integrity of the social networks and the privacy of their users.
Most current literature on computational social networks makes assumptions about user behavior. In some cases, these are backed up by studies of user behavior. Other times, the assumptions are based on anecdotal understanding. Increasing the quality and quantity of features modeled will have a cascading effect, allowing future work to avoid building on misunderstanding of user behavior.
Objective: To develop a program that could learn to play Hearthstone by watching the screen (not memory scraping or other such methods).
Trained a HOG-based object detector to detect minions on the board using dlib.
Built a data collector for Twitch.tv which can automatically download videos for game streams.
Built a web service in Clojure that allows claiming a social media account by submission of a cryptographic signature.
Built a web service in Python and ClojureScript that scrapes existing forums and displays the results in an infinitely scrolling page for easier viewing.
Built a Clojure program to scrape the League of Legends API and construct a graph of social connections.
The graph represents likelihood of two players being friends, showing how information could potentially be leaked by the API. (There is no call to get a user's friend list)
University of Florida
August 2015 - Present
Working on Social Network Security/Optimization under Dr. My Thai.
Software Engineering Intern (AppScan Source),
May 2015 - August 2015
Developed a dataflow visualization from concept to complete prototype.
Specialized the visualization for use by developers in fixing security vulnerabilities.
Undergraduate Research Assistant,
University of Kentucky
May 2013 - May 2014, August 2014 - May 2015
Assisted with Computer Vision research under Dr. Nathan Jacobs
Helped with data collection, model construction, and model training for research papers. Primarily worked in Python and used Caffe for deep-learning.
ExtremeBlue Technical Intern,
May 2014 - August 2014
Designed and built a service for IBM’s Bluemix PaaS offering that enables users to manage & analyze traffic flowing to their application.
Researched competing search engine offerings, prepared comparative analysis and recommendation based on intended use case.
Used IBM’s DataPower appliance as a control point to enforce traffic policies and ElasticSearch with Kibana to provide rapid feedback on policies.
Managed tooling and built continuous deployment pipeline using Jenkins.
University of Kentucky
January 2014 - April 2014, August 2014 - November 2014
Provided free, public tutoring in Computer Science and Math to undergraduate students.