News featuring Haohui Wang

Sanghani Center Student Spotlight: Haohui Wang

Graphic is from the paper “EvoluNet: Advancing Dynamic Non-IID Transfer Learning on Graphs”

Attendees at two major conferences this summer will be hearing about Haohui Wang’s research. 

Wang, a Ph.D. student advised by Dawei Zhou, will be traveling to Europe to present her collaborative work, “EvoluNet: Advancing Dynamic Non-IID Transfer Learning on Graphs,” at the 2024 International Conference on Machine Learning (ICML) in Vienna, Austria, in July; and ““Mastering Long-Tail Complexity on Graphs: Characterization, Learning, and Generalization” at the 2024 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining in Barcelona, Spain, in August. 

She will also present the ICML paper remotely at a Deloitte AI journal club, a group within Deloitte that discusses state-of-the-art AI techniques. 

“As a Sanghani Center student, I have had the excellent opportunity of working with leading researchers in the field of artificial intelligence,” said Wang. “The center’s interdisciplinary environment fosters collaboration with experts across various related areas, enhancing the real-world application of my research.”

Her research focuses on advancing machine learning techniques, particularly in the areas of transfer learning and long-tail learning, proposing a framework to improve model performance on both head and tail classes. Both papers she is presenting at the summer conferences consider the challenges related to data, especially in real-world scenarios where labeled data is scarce. 

“This makes our work applicable to various real-world scenarios, such as financial fraud detection. In financial transaction networks, while most transactions – such as credit card payments, and wire transfers – are normal, the rare occurrences of fraudulent transactions which include money laundering, synthetic identity transactions, are crucial to detect. We achieve improved detection by leveraging the models we have developed,” said Wang.

Her interest in this research area began during her undergraduate studies, particularly through coursework focused on finding the internal relationship and mechanism between daily things. 

“I found it enjoyable to leverage the power of data science to solve real-world problems. This interest deepened during my master’s studies, leading me to focus my research efforts in machine learning ever since,” she said.

Wang earned a bachelor of science degree from Shandong University and a master of science degree from Zhejiang University, both in China.

Projected to graduate in May 2027, Wang said she will explore any opportunities in academia or industry that provide an opportunity to continue her research.


Dawei Zhou receives Cisco Faculty Research Award to help combat destructive insider threats to cybersecurity

Dawei Zhou

Insider threats to cybersecurity can occur when an actor with authorized access to an organization’s network conducts malicious activities that may release the organization’s critical information that further results in severe consequences such as financial loss, system crashes, and national security challenges.

“These threats are on the rise and according to a recent cyber security survey, 27 percent of cybercrime incidents involved insiders,” said Dawei Zhou, an assistant professor in the Department of Computer Science; director of the VirginiaTech Learning on Graphs (VLOG) Lab and core faculty at the Sanghani Center for Artificial Intelligence and Data Analytics.

One of Zhou’s projects, “Combating Insider Threat: Identification, Monitoring, and Data Augmentation,” targets the challenging problem of how to combat insider threats. He recently received a 2023-2024 Cisco Faculty Research Award that will help support this research.

Zhou said his project uses multiple dynamic and heterogeneous data sources that include internal system logs, employee networks, and email exchange networks.

“Distinctly from other types of terror attacks, insider threats exhibit several unique challenges like  rarity, non-separability, label scarcity, dynamicity, and heterogeneity, making it extremely difficult to catch them in time for a successful counter-attack,” said Zhou. 

He explains: Rarity means that the absolute number of such insiders is extremely small, especially compared with the total number of employees in a large organization or company; non-separability means that the insiders are very good at camouflaging themselves to make them indistinguishable from normal ones and thus able bypass the detection system; label scarcity means that the annotation process of insiders is labor-extensive and time-consuming; dynamicity refers to the time-evolving nature of the raw input data sources as well as the behaviors of insiders; and heterogeneity refers to the heterogeneous data coming from various sources and in various formats.  

“Although different insiders are often conscious and good at camouflaging themselves, they might share some common traits if examined under the proper lens” he said.

With this in mind, the project will try to combat insider threat via an interactive learning mechanism, building new theories and algorithms for the following learning tasks: 

  • Insider Identification: characterize the descriptive and essential properties of insiders and detect groups of insiders – such as traitors, masqueraders, and unintentional perpetrators — with common traits.

  • Insider Monitoring: track the evolution of insider behaviors over time and provide a visual system for analysis, annotation, and diagnosis.

  • Data Augmentation; sanitize input data by completing missing data and cleaning noisy data and generate synthetic insiders to alleviate the label scarcity issue. 

Computer science Ph.D. students Shuaicheng Zhang and Haohui Wang, who are advised by Zhou, will be working with him on the project. A third student, Weije Guan, will be joining the team in the Fall semester.

“We hope that the innovative approach we are taking will result in a better understanding of how to counterattack these threats and ultimately decrease the number of cybercrimes,” Zhou said.