The ACTION Institute's mission is to innovate the fields of AI and Security.
The Institute shares with both the scientific community and the industry publications, software repositories, datasets, and other artifacts.
Software Repositories
DeepCASE source code
Datasets
TOUCAN dataset
MABEL dataset
DeepCASE dataset
Publications
Low Sensitivity Hopsets
Vikrant Ashvinkumar, Aaron Bernstein, Chengyuan Deng, Jie Gao, Nicole Wein
The 16th Innovations in Theoretical Computer Science (ITCS 2025), New York, NYJanuary 7, 2025
Read More
Open-World Continual Learning: Unifying Novelty Detection and Continual Learning
Kim, Gyuhak, Xiao, Changnan, Xiao, Changnan, Konishi, Tatsuya , Ke, Tatsuya, Liu, Bing
Artificial Intelligence, Journal 338January 1, 2025
Read More
High-Dimensional Multivariate Linear Regression with Weighted Nuclear Norm Regularization
Namjoon Suh, Li-Hsiang Lin, Xiaoming Huo
Journal of Computational and Graphical Statistics (2024): 1-12.
December 31, 2024 Read More
Adjusted Wasserstein Distributionally Robust Estimator in Statistical Learning
Yiling Xie , Xiaoming Huo
To appear in Journal of Machine Learning Research
December 31, 2024 Read More
Continual learning: Applications and the road forward
Eli Verwimp , Shai Ben-David , Matthias Bethge, Andrea Cossu, Alexander Gepperth, Tyler L. Hayes, Eyke Hüllermeier
To appear in Transaction on Machine Learning Research
December 31, 2024 Read More
Boosting Alignment for Post-Unlearning Text-to-Image Generative Models
Myeongseob Ko, Henry Li, Zhun Wang, Jonathan Patsenker, Jiachen Tianhao Wang, Qinbin Li, Ming Jin, Dawn Song, Ruoxi Jia
Advances in Neural Information Processing Systems, vol. 37, pp. 85131-85154, NeurIPS 2024.
December 16, 2024 Read More
Collaborative Design between Intelligent Agents through Resource Sharing
Jules Chenou, Tonya Fields, Aurelia Williams
Computational Science and Computational Intelligence, Proceedings of the 11th International Conference, CSCI 2024, Las Vegas, NV, USA, December 11–13, 2024. Editors: Hamid R. Arabnia, Leonidas Deligiannidis, Copyright: 2025.December 11, 2024
Read More
Utilizing Human Behavior Modeling to Manipulate Explanations in AI-Assisted Decision Making: The Good, the Bad, and the Scary
Li, Zhuoyan, Yin, Ming
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)
December 9, 2024 Read More
BackdoorAlign: Mitigating Fine-tuning based Jailbreak Attack with Backdoor Enhanced Safety Alignment
Wang, Jiongxiao, Li, Jiazhao, Li, Yiquan, Qi, Xiangyu, Hu, Junjie, Li, Yixuan, McDaniel, Patrick, Chen, Muhao, Li, Bo, Xiao, Chaowei
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)December 9, 2024
Read More
Robust prompt optimization for defending language models against jailbreaking attacks
Zhou, Andy, Bo Li , Haohan Wang
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)
December 9, 2024 Read More
Replay-and-Forget-Free Graph Class-Incremental Learning: A Task Profiling and Prompting Approach
Niu, Chaoxi, Pang, Guansong, Chen, Ling, Liu, Bing
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)
December 9, 2024 Read More
When Your AIs Deceive You: Challenges of Partial Observability in Reinforcement Learning from Human Feedback
Lang, Leon, Foote, Davis, Russell, Stuart, Dragan, Anca, Jenner, Erik, Emmons, Scott
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)
December 9, 2024 Read More
Consistency Purification: Effective and Efficient Diffusion Purification towards Certified Robustness
Li, Yiquan, Chen, Zhongzhu, Jin, Kun, Wang, Jiongxiao, Li, Bo, Xiao, Chaowei
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)
December 9, 2024 Read More
RedCode: Risky Code Execution and Generation Benchmark for Code Agents
Guo, Chengquan, Liu, Xun, Xie, Chulin, Zhou, Andy, Zeng, Yi, Lin, Zinan, Song, Dawn, Li, Bo
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS) December 9, 2024
Read More
Neuc-MDS: Non-Euclidean Multidimensional Scaling Through Bilinear Forms
Deng, Chengyuan, Gao, Jie, Lu, Kevin, Luo, Feng, Sun, Hongbin, Xin, Cheng
The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS)
December 9, 2024 Read More
Physical ID-Transfer Attacks Against Multi-Object Tracking via Adversarial Trajectory
Wang, Chenyi, Man, Yanmao, Muller, Raymond, Li, Ming, Celik, Z. Berkay, Gerdes, Ryan, Petit, Jonathan
Annual Computer Security Applications Conference (ACSAC), pp. 1–15. Honolulu, HI
December 8, 2024 Read More
DEEPCAPA: Identifying malicious capabilities in Windows malware
Sastha Vasan, Hojjat Aghakhani, S. Ortolani, R. Vasilenko, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna
In Proc. Annu. Comput. Secur. Appl. Conf. (ACSAC), Dec. 2024, pp. 826–842.December 8, 2024
Read More
Enabling Asymptotic Truth Learning in a Social Network
Lu, Kevin, Chong, Jordan, Lu, Matt, Gao, Jie
Proceedings of the 20th Conference on Web and Internet Economics (WINE'24)
December 2, 2024 Read More
Cleangen: Mitigating backdoor attacks for generation tasks in large language models.
Li, Y., Xu, Z., Jiang, F., Niu, L., Sahabandu, D., Ramasubramanian, B., Poovendran, R.
Conference on Empirical Methods in Natural Language Processing (EMNLP), Miami, FL
November 12, 2024 Read More
XplainLLM: A Knowledge-Augmented Dataset for Reliable Grounded Explanations in LLMs
Zichen Chen, Jianda Chen, Ambuj K. Singh, Misha Sra
In Proc. Empirical Methods in Natural Language Processing (EMNLP), pp. 7578–7596, Miami, FL November 12-16, 2024November 12, 2024
Read More
Graphene: Towards Data-driven Holistic Security Posture Analysis using AI-generated Attack Graphs
Katsis, Charalampos, Jin, Xin, Sang, Fan, Sun, Jiahao, Bertino, Elisa, Kompella, Ramana Rao, Kundu, Ashish
The 10th IEEE International Conference on Collaboration and Internet Computing (CIC) (short version of the paper).
October 28, 2024 Read More
Mix and Match: Characterizing Heterogeneous Human Behavior in AI-assisted Decision Making
Lu, Zhuoran, Mahmood, Syed Hasan Amin, Li, Zhuoyan, Yin, Ming
Proceedings of the AAAI Conference on Human Computation and Crowdsourcing, Pittsburgh, PA.
October 16, 2024 Read More
RoboGuardZ: A Scalable Zero-Shot Framework for Detecting Zero-Day Malware in Robots
Kaur, Upinder, Celik, Z. Berkay, Voyles, Richard M.
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Abu Dhai, UAE
October 14, 2024 Read More
RoboCop: A Robust Zero-Day Cyber-Physical Attack Detection Framework for Robots
Kaur, Upinder, Celik, Z. Berkay, Voyles, Richard M.
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Abu Dhai, UAE
October 14, 2024 Read More
KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data
Zhou, Andy, Xu, Xiaojun, Raghunathan, Ramesh, Lal, Alok, Guan, Xinze, Yu, Bin, Li, Bo
Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, Salt Lake City, UT
October 14, 2024 Read More
Jatmo: Prompt Injection Defense by Task-Specific Finetuning
Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun , Basel Alomair, David Wagner
European Symposium on Research in Computer Security (ESORICS 2024), Bydgoszcz, Poland, September 16, 2024
September 16, 2024 Read More
Global Human-guided Counterfactual Explanations for Molecular Properties via Reinforcement Learning
D. Wang, A. Antoniades, K.-D. Luong, E. Zhang, M. Kosan, J. Li, A. K. Singh, W. Y. Wang, L. Li
In Proc. ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD), August, 2024, pp. 2991–3000.
August 25, 2024 Read More
WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in the Modern Web
Allen, Joey, Yang, Zheng, XIao, Feng, Landen, Matthew, Perdisci, Roberto, Lee, Wenke
33rd USENIX Security Symposium, Philadelphia, PA
August 14, 2024 Read More
GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning
De Silva, Ravindu, Guo, Wenbo, Ruaro, Nicola, Grishchenko, Ilya, Kruegel, Christopher, Vigna, Giovanni
33rd USENIX Security Symposium (USENIX Security 24), Philadelphia, PennsylvaniaAugust 14, 2024
Read More
ACE: A model poisoning attack on contribution evaluation methods in federated learning
Xu, Z., Jiang, F., Niu, L., Jia, J., Li, Bo, Poovendran, Radha
33rd USENIX Security Symposium (USENIX Security 24), Philadelphia, Pennsylvania
August 14, 2024 Read More