The ACTION Institute's mission is to innovate the fields of AI and Security.

The Institute shares with both the scientific community and the industry publications, software repositories, datasets, and other artifacts. 

DeepCASE source code 

"github logo"View on GitHub

The MABEL dataset

 

The DeepCASE dataset

 

Publications

 

 

Cognitive Bias-Aware Dissemination Strategies for Opinion Dynamics with External Information Sources

Abdullah Al Maruf, Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Radha Poovendran

22nd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2023), May 2023.

May 1, 2023

Read More

 

 

Approximation and non-parametric estimation of functions over high-dimensional spheres via deep ReLU networks

Namjoon Suh, Tian-Yi Zhou, Xiaoming Huo

 In The Eleventh International Conference on Learning Representations. 2022.

May 1, 2023

Read More

 

 

Improved rate of first order algorithms for entropic optimal transport

Yiling Luo, Yiling Xie, Xiaoming Huo

In International Conference on Artificial Intelligence and Statistics, pp. 2723-2750. PMLR, 2023.

April 25, 2023

Read More

 

 

Watch Out for Updates: Understanding the Effects of Model Explanation Updates in AI-Assisted Decision Making

Xinru Wang, Ming Yin

Proceedings of ACM CHI'23, Hamburg, Germany.

April 23, 2023

Read More

 

 

Accelerate the warm-up stage in the Lasso computation via a homotopic approach

Yujie Zhao, Xiaoming Huo

Computational Statistics & Data Analysis 184 (2023): 107747

April 7, 2023

Read More

 

 

Solving a special type of optimal transport problem by a modified Hungarian algorithm

Xie, Yiling, Luo, Yiling , Huo, Xiaoming

Transactions on Machine Learning Research (TMLR), Published online

March 1, 2023

Read More

 

 

Solving a special type of optimal transport problem by a modified Hungarian algorithm

Yiling Xie, Yiling Luo, Xiaoming Huo

Transactions on Machine Learning Research (TMLR), Published online.

 

March 1, 2023

Read More

 

 

Adversarial Policies Beat Superhuman Go AIs

Tony T. Wang, Adam Gleave, Tom Tseng, Nora Belrose, Kellin Pelrine, Joseph Miller, Michael D Dennis, Yawen Duan, Viktor Pogrebniak, Sergey Levine, Stuart Russell

February 18, 2023

Read More

 

 

A Theoretical Study on Solving Continual Learning

Gyuhak Kim, Changnan Xiao, Tatsuya Konishi, Zixuan Ke, Bing Liu

Proceedings of Thirty-sixth Conference on Neural Information Processing Systems (NeurIPS-2022), Nov. 28 - Dec. 9, 2022.

November 28, 2022

Read More

 

 

An Efficient One-Class SVM for Novelty Detection in IoT

Kun Yang, Samory Kpotufe, Nick Feamster

Transactions on Machine Learning Research, 11(2022).

November 14, 2022

Read More

 

 

DEEPCASE: Semi-Supervised Contextual Analysis of Security Events

Thijs Ede, Hojjat Aghakhani, Noah Spahn, Riccardo Bortolameotti, Marco Cova, Andrea Continella, Maarten Steen, Andreas Peter, Christopher Kruegel, Giovanni Vigna

Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA.

May 23, 2022

Read More

 

 

Agent-Temporal Attention for Reward Redistribution in Episodic MultiAgent Reinforcement Learning

Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran

Proc. of the 21st International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2022), Online, May 2022.

May 9, 2022

Read More

 

 

Co-evolution of Opinion and Social Tie Dynamics Towards Structural Balance

Haotian Wang, Feng Luo, Jie Gao

Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA’22), 3362-3388, January 9 – 12, 2022.

January 9, 2022

Read More

 

 

New Directions in Automated Traffic Analysis

Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal

In ACM Conference on Computer and Communications Security (CCS).

November 13, 2021

Read More

 

 

ATLAS: A Sequence-based Learning Approach for Attack Investigation

Abdulellah Alsaheel , Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu

Proceedings of the 30th USENIX Security Symposium.

August 11, 2021

Read More

 

 

DeepReflect: Discovering Malicious Functionality through Binary Reconstruction

Evan Downing, Kyuhong Park, Yisroel Mirsky, Wenke Lee

In Proceedings of the 2021 USENIX Security Symposium.

August 11, 2021

Read More

 

 

Application-Driven Privacy-Preserving Data Publishing with Correlated Attributes

Aria Rezaei, Chaowei Xiao, Jie Gao, Bo Li, Sirajum Munir

Proceedings of the 18th International Conference on Embedded Wireless Systems and Networks (EWSN 2021), February 17-19, 2021.
Received the Best Paper Award.

February 17, 2021

Read More

 

 

Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries

Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian

In 29th USENIX Security Symposium. Boston, MA. August 12–14, 2020.

August 12, 2020

Read More

 

 

A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats

Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran

IEEE Transactions on Automatic Control, December 2020.

February 24, 2020

Read More

 

 

Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection

Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song

Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 363-376).

October 30, 2017

Read More

 

 

Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers

Weilin Xu, Yanjun Qi, David Evans

Network and Distributed System Security Symposium (NDSS). San Diego, CA. 21-24 February 2016.

February 21, 2016

Read More

 

 

Unifying logic and probability

Stuart Russell

Communications of the ACM, 58(7), 88-97, 2015.

June 25, 2015

Read More