The ACTION Institute's mission is to innovate the fields of AI and Security.
The Institute shares with both the scientific community and the industry publications, software repositories, datasets, and other artifacts.
Software Repositories
DeepCASE source code
Datasets
The MABEL dataset
The DeepCASE dataset
Publications
Cognitive Bias-Aware Dissemination Strategies for Opinion Dynamics with External Information Sources
Abdullah Al Maruf, Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Radha Poovendran
22nd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2023), May 2023.
May 1, 2023 Read More
Approximation and non-parametric estimation of functions over high-dimensional spheres via deep ReLU networks
Namjoon Suh, Tian-Yi Zhou, Xiaoming Huo
In The Eleventh International Conference on Learning Representations. 2022.
May 1, 2023 Read More
Improved rate of first order algorithms for entropic optimal transport
Yiling Luo, Yiling Xie, Xiaoming Huo
In International Conference on Artificial Intelligence and Statistics, pp. 2723-2750. PMLR, 2023.
April 25, 2023 Read More
Watch Out for Updates: Understanding the Effects of Model Explanation Updates in AI-Assisted Decision Making
Xinru Wang, Ming Yin
Proceedings of ACM CHI'23, Hamburg, Germany.
April 23, 2023 Read More
Accelerate the warm-up stage in the Lasso computation via a homotopic approach
Yujie Zhao, Xiaoming Huo
Computational Statistics & Data Analysis 184 (2023): 107747
April 7, 2023 Read More
Solving a special type of optimal transport problem by a modified Hungarian algorithm
Xie, Yiling, Luo, Yiling , Huo, Xiaoming
Transactions on Machine Learning Research (TMLR), Published online
March 1, 2023 Read More
Solving a special type of optimal transport problem by a modified Hungarian algorithm
Yiling Xie, Yiling Luo, Xiaoming Huo
Transactions on Machine Learning Research (TMLR), Published online.
March 1, 2023 Read More
Adversarial Policies Beat Superhuman Go AIs
Tony T. Wang, Adam Gleave, Tom Tseng, Nora Belrose, Kellin Pelrine, Joseph Miller, Michael D Dennis, Yawen Duan, Viktor Pogrebniak, Sergey Levine, Stuart Russell
February 18, 2023
Read More
A Theoretical Study on Solving Continual Learning
Gyuhak Kim, Changnan Xiao, Tatsuya Konishi, Zixuan Ke, Bing Liu
Proceedings of Thirty-sixth Conference on Neural Information Processing Systems (NeurIPS-2022), Nov. 28 - Dec. 9, 2022.
November 28, 2022 Read More
An Efficient One-Class SVM for Novelty Detection in IoT
Kun Yang, Samory Kpotufe, Nick Feamster
Transactions on Machine Learning Research, 11(2022).
November 14, 2022 Read More
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events
Thijs Ede, Hojjat Aghakhani, Noah Spahn, Riccardo Bortolameotti, Marco Cova, Andrea Continella, Maarten Steen, Andreas Peter, Christopher Kruegel, Giovanni Vigna
Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA.
May 23, 2022 Read More
Agent-Temporal Attention for Reward Redistribution in Episodic MultiAgent Reinforcement Learning
Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran
Proc. of the 21st International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2022), Online, May 2022.
May 9, 2022 Read More
Co-evolution of Opinion and Social Tie Dynamics Towards Structural Balance
Haotian Wang, Feng Luo, Jie Gao
Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA’22), 3362-3388, January 9 – 12, 2022.
January 9, 2022 Read More
New Directions in Automated Traffic Analysis
Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal
In ACM Conference on Computer and Communications Security (CCS).
November 13, 2021 Read More
ATLAS: A Sequence-based Learning Approach for Attack Investigation
Abdulellah Alsaheel , Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu
Proceedings of the 30th USENIX Security Symposium.
August 11, 2021 Read More
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction
Evan Downing, Kyuhong Park, Yisroel Mirsky, Wenke Lee
In Proceedings of the 2021 USENIX Security Symposium.
August 11, 2021 Read More
Application-Driven Privacy-Preserving Data Publishing with Correlated Attributes
Aria Rezaei, Chaowei Xiao, Jie Gao, Bo Li, Sirajum Munir
Proceedings of the 18th International Conference on Embedded Wireless Systems and Networks (EWSN 2021), February 17-19, 2021.
Received the Best Paper Award.
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian
In 29th USENIX Security Symposium. Boston, MA. August 12–14, 2020.
August 12, 2020 Read More
A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats
Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran
IEEE Transactions on Automatic Control, December 2020.
February 24, 2020 Read More
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song
Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 363-376).
October 30, 2017 Read More
Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers
Weilin Xu, Yanjun Qi, David Evans
Network and Distributed System Security Symposium (NDSS). San Diego, CA. 21-24 February 2016.
February 21, 2016 Read More
Unifying logic and probability
Stuart Russell
Communications of the ACM, 58(7), 88-97, 2015.
June 25, 2015 Read More