The ACTION Institute's mission is to innovate the fields of AI and Security.
The Institute shares with both the scientific community and the industry publications, software repositories, datasets, and other artifacts.
Software Repositories
DeepCASE source code
Datasets
The MABEL dataset
The DeepCASE dataset
Publications
Sentiment Analysis in the Era of Large Language Models: A Reality Check
Wenxuan Zhang, Yue Deng, Bing Liu, Sinno Jialin Pan , Lidong Bing
In Proceedings of findings of 2024 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL-2024, findings), Mexico City, Mexico, June 16–21, 2024
June 16, 2024 Read More
ArtPrompt: ASCII art-based jailbreak attacks against aligned LLMs
Jiang, F., Xu, Z., Niu, L., Xiang, Z., Li, Bo, Poovendran, Radha
ICLR Workshop on Secure and Trustworthy Large Language Models (ICLR SeT-LLM), Vienna, Austria
June 6, 2024 Read More
Does It Matter Who Said It? Exploring the Impact of Deepfake-Enabled Profiles On User Perception Towards Disinformation
Margie Ruffin, Haeseung Seo, Aiping Xiong, Gang Wang
In Proceedings of The International AAAI Conference on Web and Social Media (ICWSM), Buffalo, NY, June 3 - 6, 2024
June 3, 2024 Read More
Markov Chain Monte Carlo for Koopman-based Optimal Control
Hespanha, J., Camsari, K.
IEEE Control Systems Letters, vol. 8, pp. 1901-1906
June 1, 2024 Read More
RL-ARNE: A Reinforcement Learning Algorithm for Computing Average Reward Nash Equilibrium of Nonzero Sum Stochastic Games
D. Sahabandu, S. Moothedath, J. Allen, L. Bushnell, W. Lee, Poovendran, Radha
IEEE Transactions on Automatic Control ( Volume: 69, Issue: 11, November 2024), pp. 7824 - 7831
May 21, 2024 Read More
Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach
Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran
IEEE Transactions on Automatic Control
DOI: 10.1109/TAC.2024.3403675
May 21, 2024 Read More
Trojanpuzzle: Covertly poisoning code-suggestion models
Aghakhani, Hojjat, Dai, Wei, Manoel, Andre, Fernandes, Xavier, Kharkar, Anant, Kruegel, Christopher, Vigna, Giovanni, Evans, David, Zorn, Ben, Sim, Robert
Proceedings of 2024 IEEE Security and Privacy Symposium (S&P 2024) San Francisco, California
May 20, 2024 Read More
Are Adversarial Phishing Webpages a Threat in Reality? Understanding the Users’ Perception of Adversarial Webpages
Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang
In Proceedings of The ACM Web Conference (WWW), Singapore, May 13-17, 2024
May 13, 2024 Read More
It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias
Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, Gang Wang
In Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI), Honolulu, HI, May 11-16, 2024
Badchain: Backdoor chain-of-thought prompting for large language models
Zhen Xiang, Fengqing Jiang, Zidi Xiong, Bhaskar Ramasubramanian, Radha Poovendran, Bo Li
In Proceedings of the Twelfth International Conference on Learning Representations (ICLR 2024), Vienna, Austria, May 7-11, 2024
May 7, 2024 Read More
Effective and Efficient Federated Tree Learning on Hybrid Data
Qinbin Li, Chulin Xie, Xiaojun Xu, Xiaoyuan Liu, Ce Zhang, Bo Li, Bingsheng He, and Dawn Song
In Proceedings of the Twelfth International Conference on Learning Representations (ICLR 2024), Vienna, Austria May 7-11, 2024
May 7, 2024 Read More
COLEP: Certifiably Robust Learning-Reasoning Conformal Prediction via Probabilistic Circuits.
Mintong Kang, Nezihe Merve Gürel, Linyi Li, Bo Li
In Proceedings of the Twelfth International Conference on Learning Representations (ICLR 2024), Vienna, Austria May 7-11, 2024
May 7, 2024 Read More
GNNX-BENCH: Unravelling the utility of perturbation-based gnn explainers through in-depth benchmarking
Mert Kosan, Samidha Verma, Burouj Armgaan, Khushbu Pahwa, Ambuj Singh, Sourav Medya, Sayan Ranu
In Proceedings of the Twelfth International Conference on Learning Representations (ICLR 2024), Vienna, Austria May 7-11, 2024
May 7, 2024 Read More
Tensor trust: Interpretable prompt injection attacks from an online game
Sam Toyer, Olivia Watkins, Ethan Adrian Mendes, Justin Svegliato, Luke Bailey, Tiffany Wang, Isaac Ong , Karim Elmaaroufi , Pieter Abbeel, Trevor Darrell, Alan Ritter, Stuart Russell
In Proceedings of the Twelfth International Conference on Learning Representations (ICLR 2024), Vienna, Austria, May 7-11, 2024
May 7, 2024 Read More
SafeDecoding: Defending against jailbreak attacks via safety-aware decoding
Xu, Z., Jiang, F., Niu, L., Jia, J., Li, Bo, Poovendran, Radha
ICLR Workshop on Secure and Trustworthy Large Language Models (ICLR SeT-LLM), Vienna, AustriaMay 6, 2024
Read More
Generalization Bounds for Magnitude-Based Pruning via Sparse Matrix Sketching
Etash Kumar Guha, Prasanjit Dubey, Xiaoming Huo
In Proceedings of the Twelfth International Conference on Learning Representations (ICLR 2024) Workshop Bridging the Gap Between Practice and Theory in Deep Learning (BGPT), Vienna, Austria, May 6 - 11, 2024
May 6, 2024 Read More
Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models?
Yu-Lin Tsai, Chia-Yi Hsu, Chulin Xie, Chih-Hsun Lin, Jia-You Chen, Bo Li, Pin-Yu Chen, Chia-Mu Yu, Chun-Ying Huang
In Proceedings of the Twelfth International Conference on Learning Representations (ICLR 2024), Vienna, Austria, May 7-11, 2024
Defending against transfer attacks from public models
Chawin Sitawarin , Jaewon Chang, David Huang, Wesson Altoyan, David Wagner
International Conference on Learning Representations (ICLR 2024), Vienna, Austria, May 6-11, 2024
May 6, 2024 Read More
Multi-Modal Continual Pre-Training For Audio Encoders
Gyukah Kim, Ho-Hsiang Wu, Luca Bondi, Bing Liu
In ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 691-695. IEEE, 2024.
April 14, 2024 Read More
Sok: Pitfalls in evaluating black-box attacks
Fnu Suya, Anshuman Suri, Tingwei Zhang, Jingtao Hong, Yuan Tian, David Evans
In 2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), pp. 387-407. IEEE, 2024.
April 9, 2024 Read More
Regulating advanced artificial agents
Michael K. Cohen, Noam Kolt, Yoshua Bengio, Gillian K. Hadfield, Stuart Russell
Science 384, no. 6691 (2024): 36-38.
April 5, 2024 Read More
Does more advice help? the effects of second opinions in AI-assisted decision making
Zhuoran Lu, Dakuo Wang, Ming Yin
Proceedings of the ACM on Human-Computer Interaction 8, no. CSCW1 (2024): 1-31.
April 1, 2024 Read More
Enhancing AI-Assisted Group Decision Making through LLM-Powered Devil's Advocate
Chun-Wei Chiang, Zhuoran Lu, Zhuoyan Li, Ming Yin
In Proceedings of the 29th International Conference on Intelligent User Interfaces, pp. 103-119. 2024.
March 18, 2024 Read More
Composite Active Learning: Towards Multi-Domain Active Learning with Theoretical Guarantees
Guang-Yuan Hao, Hengguan Huang, Haotian Wang, Jie Gao, Hao Wang
In Proceedings of the 38th AAAI Conference on Artificial Intelligence (AAAI-24), Vancouver, Canada, February 20-27, 2024
February 27, 2024 Read More
DGCluster: A Neural Framework for Attributed Graph Clustering via Modularity Maximization
Aritra Bhowmick, Mert Kosan, Zexi Huang, Ambuj Singh, Sourav Medya
In Proceedings of the 38th AAAI Conference on Artificial Intelligence (AAAI-24), Vancouver, Canada, February 20-27, 2024
February 20, 2024 Read More
Decoding AI's Nudge: A Unified Framework to Predict Human Behavior in AI-assisted Decision Making
Zhuoyan Li, Zhuoran Lu, Ming Yin
In Proceedings of the 38th AAAI Conference on Artificial Intelligence (AAAI-24), Vancouver, Canada, February 20-27, 2024
February 20, 2024 Read More
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation
Sonam Bhardwaj, Adrian Shuai Li, Mayank Dave, Elisa Bertino
Computers & Security (2024): 103769.
February 19, 2024 Read More
Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications
Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran
Published at NeurIPS 2023 Workshop on Instruction Tuning and Instruction Following, December 2023.
December 10, 2023 Read More
What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?
Fnu Suya, Xiao Zhang, Yuan Tian, David Evans
37th Conference on Neural Information Processing Systems (NeurIPS 2023).
December 10, 2023 Read More
Fed-Game: A Game-Theoretic Defense Against Backdoor Attacks in Federated Learning
J. Jia, Z. Yuan, D. Sahabandu, L. Niu, A. Rajabi, B. Ramasubramanian, Bo Li, Radha Poovendran
37th Conference on Neural Information Processing Systems (NeurIPS 2023)
December 10, 2023 Read More