The ACTION Institute's mission is to innovate the fields of AI and Security.
The Institute shares with both the scientific community and the industry publications, software repositories, datasets, and other artifacts.
Software Repositories
DeepCASE source code
Datasets
The MABEL dataset
The DeepCASE dataset
Publications
Jasmine: Scale up JavaScript Static Security Analysis with Computation-Based Semantic Explanation
Xiao, Feng, Su, Zhongfu, Yang, Guangliang, Lee, Wenke
IEEE Symposium on Security and Privacy, San Francisco, CA
May 20, 2025 Read More
A Progressive Transformer for Unifying Binary Code Embedding and Knowledge Transfer
Lu, Hanxiao, Cai, Hongyu, Liang, Yiming, Bianchi, Antonio, Celik, Z. Berkay
Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) Quebec, Canada
March 4, 2025 Read More
Approximating Metric Magnitude of Point Sets
R. Andreeva, J. Ward, P. Skraba, J. Gao, R. Sarkar
The 39th Annual AAAI Conference on Artificial Intelligence, Philadelphia, Pennsylvania, USAFebruary 25, 2025
Read More
ChatBug: A Common Vulnerability of Aligned LLMs Induced by Chat Templates
Jiang, Fengqing, Xu, Zhangchen, Niu, Luyao, Lin, Bill Yuchen, Poovendran, Radha
The 39th Annual AAAI Conference on Artificial Intelligence, Philadelphia, Pennsylvania, USAFebruary 25, 2025
Read More
Continual Learning Using a Kernel-Based Method Over Foundation Models
Momeni, Saleh, Mazumder, Sahisnu, Liu, Bing
The 39th Annual AAAI Conference on Artificial Intelligence, Philadelphia, Pennsylvania, USA
February 25, 2025 Read More
A Large-Scale Measurement Study of the PROXY Protocol and its Security Implications
Stijn Pletinckx, Christopher Kruegel, Giovanni Vigna
In Proceedings of the 2025 Network and Distributed System Security (NDSS) Symposium, San Diego, CA.
February 24, 2025 Read More
Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples
Li, Adrian S., Iyengar, Arun, Kundu, Ashish, Bertino, Elisa
Proceedings of the 2025 Network and Distributed System Security (NDSS) Symposium, San Diego, CA.
February 24, 2025 Read More
Continual Learning Using Only Large Language Model Prompting
Qiu, Jiabao, Zixuan Ke, Liu, Bing
The 31st International Conference on Computational Linguistics (COLING-2025), Abu Dhabi, UAE
January 19, 2025 Read More
In-Context Continual Learning Assisted by an External Continual Learner
Momeni, Saleh, Mazumder, Sahisnu, Ke, Zixuan, Liu, Bing
The 31st International Conference on Computational Linguistics (COLING-2025), Abu Dhabi, UAEJanuary 19, 2025
Read More
Low Sensitivity Hopsets
Vikrant Ashvinkumar, Aaron Bernstein, Chengyuan Deng, Jie Gao, Nicole Wein
The 16th Innovations in Theoretical Computer Science (ITCS 2025), New York, NYJanuary 7, 2025
Read More
Open-World Continual Learning: Unifying Novelty Detection and Continual Learning
Kim, Gyuhak, Xiao, Changnan, Xiao, Changnan, Konishi, Tatsuya , Ke, Tatsuya, Liu, Bing
Artificial Intelligence, Journal 338January 1, 2025
Read More
High-Dimensional Multivariate Linear Regression with Weighted Nuclear Norm Regularization
Namjoon Suh, Li-Hsiang Lin, Xiaoming Huo
Journal of Computational and Graphical Statistics (2024): 1-12.
December 31, 2024 Read More
Adjusted Wasserstein Distributionally Robust Estimator in Statistical Learning
Yiling Xie , Xiaoming Huo
To appear in Journal of Machine Learning Research
December 31, 2024 Read More
Continual learning: Applications and the road forward
Eli Verwimp , Shai Ben-David , Matthias Bethge, Andrea Cossu, Alexander Gepperth, Tyler L. Hayes, Eyke Hüllermeier
To appear in Transaction on Machine Learning Research
December 31, 2024 Read More
Utilizing Human Behavior Modeling to Manipulate Explanations in AI-Assisted Decision Making: The Good, the Bad, and the Scary
Li, Zhuoyan, Yin, Ming
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)
December 9, 2024 Read More
BackdoorAlign: Mitigating Fine-tuning based Jailbreak Attack with Backdoor Enhanced Safety Alignment
Wang, Jiongxiao, Li, Jiazhao, Li, Yiquan, Qi, Xiangyu, Hu, Junjie, Li, Yixuan, McDaniel, Patrick, Chen, Muhao, Li, Bo, Xiao, Chaowei
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)December 9, 2024
Read More
Robust prompt optimization for defending language models against jailbreaking attacks
Zhou, Andy, Bo Li , Haohan Wang
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)
December 9, 2024 Read More
Replay-and-Forget-Free Graph Class-Incremental Learning: A Task Profiling and Prompting Approach
Niu, Chaoxi, Pang, Guansong, Chen, Ling, Liu, Bing
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)
December 9, 2024 Read More
When Your AIs Deceive You: Challenges of Partial Observability in Reinforcement Learning from Human Feedback
Lang, Leon, Foote, Davis, Russell, Stuart, Dragan, Anca, Jenner, Erik, Emmons, Scott
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)
December 9, 2024 Read More
Consistency Purification: Effective and Efficient Diffusion Purification towards Certified Robustness
Li, Yiquan, Chen, Zhongzhu, Jin, Kun, Wang, Jiongxiao, Li, Bo, Xiao, Chaowei
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)
December 9, 2024 Read More
RedCode: Risky Code Execution and Generation Benchmark for Code Agents
Guo, Chengquan, Liu, Xun, Xie, Chulin, Zhou, Andy, Zeng, Yi, Lin, Zinan, Song, Dawn, Li, Bo
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS) December 9, 2024
Read More
Neuc-MDS: Non-Euclidean Multidimensional Scaling Through Bilinear Forms
Deng, Chengyuan, Gao, Jie, Lu, Kevin, Luo, Feng, Sun, Hongbin, Xin, Cheng
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)
December 9, 2024 Read More
Physical ID-Transfer Attacks Against Multi-Object Tracking via Adversarial Trajectory
Wang, Chenyi, Man, Yanmao, Muller, Raymond, Li, Ming, Celik, Z. Berkay, Gerdes, Ryan, Petit, Jonathan
Annual Computer Security Applications Conference (ACSAC), pp. 1–15. Honolulu, HI
December 8, 2024 Read More
Enabling Asymptotic Truth Learning in a Social Network
Lu, Kevin, Chong, Jordan, Lu, Matt, Gao, Jie
Proceedings of the 20th Conference on Web and Internet Economics (WINE'24)
December 2, 2024 Read More
Cleangen: Mitigating backdoor attacks for generation tasks in large language models.
Li, Y., Xu, Z., Jiang, F., Niu, L., Sahabandu, D., Ramasubramanian, B., Poovendran, R.
Conference on Empirical Methods in Natural Language Processing (EMNLP), Miami, FL
November 12, 2024 Read More
Graphene: Infrastructure Security Posture Analysis with AI-generated Attack Graphs
Jin, Xin, Katsis, Charalampos, Sang, Fan, Sun, Jiahao, Bertino, Elisa, Kompella, Ramana Rao, Kundu, Ashish
The 10th IEEE International Conference on Collaboration and Internet Computing (short version of the paper). October 28, 2024
Read More
Mix and Match: Characterizing Heterogeneous Human Behavior in AI-assisted Decision Making
Lu, Zhuoran, Mahmood, Syed Hasan Amin, Li, Zhuoyan, Yin, Ming
Proceedings of the AAAI Conference on Human Computation and Crowdsourcing, Pittsburgh, PA.
October 16, 2024 Read More
RoboGuardZ: A Scalable Zero-Shot Framework for Detecting Zero-Day Malware in Robots
Kaur, Upinder, Celik, Z. Berkay, Voyles, Richard M.
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Abu Dhai, UAE
October 14, 2024 Read More
RoboCop: A Robust Zero-Day Cyber-Physical Attack Detection Framework for Robots
Kaur, Upinder, Celik, Z. Berkay, Voyles, Richard M.
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Abu Dhai, UAE
October 14, 2024 Read More
KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data
Zhou, Andy, Xu, Xiaojun, Raghunathan, Ramesh, Lal, Alok, Guan, Xinze, Yu, Bin, Li, Bo
Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, Salt Lake City, UT
October 14, 2024 Read More