Research Portfolio

My research vision: AI Model Inspector for AI Maintenance -- Make the robustness inspection pipeline for AI models as reliable, standard, and easy, as car maintenance. Check out our AI Maintenance paper and this article for details.

See our survey paper on Holistic Adversarial Robustness of Deep Learning Models

Best paper runner-up award at UAI 2022

Book on "Adversarial Robustness for Machine Learning" published by Elsevier

Adversarial Machine Learning: Attack, Defense, and Robustness Evaluation & Verification

ZOO (black-box attack via direct model queries)

[AI-Sec'17] https://arxiv.org/abs/1708.03999

EAD (L1 distortion based white-box attack)

[AAAI'18] https://arxiv.org/abs/1709.04114 [ICLR'18 Wksp] https://arxiv.org/abs/1710.10733[ICLR'18 Wksp] https://arxiv.org/abs/1803.09638[DSN'18 Wksp] https://arxiv.org/abs/1805.00310

Show-and-Fool: adversarial examples for neural image captioning systems

[ACL'18] https://arxiv.org/abs/1712.02051

Accuracy v.s. robustness tradeoff of contrastive learning methods

[NuerIPS'21] https://arxiv.org/abs/2111.01124

Accuracy v.s. robustness tradeoff of 18 ImageNet models 

Physical Adversarial T-Shirt

[ECCV'20] https://arxiv.org/abs/1910.11099

Accuracy v.s. robustness tradeoff of different vision transformers

https://arxiv.org/abs/2103.15670

AutoZOOM: query-efficient black-box adversarial attacking acceleration via dimensional reduction and zeroth-order optimization

Advanced zeroth order optimization = Query-efficient design of adversarial example generation process !

Robustness verification and evaluation for neural nets

Robustness certification for semantic perturbations

[CVPR'20] https://arxiv.org/abs/1912.09533

Adversarial attack on sparse regression

[GlobalSIP'18] https://arxiv.org/abs/1809.08706

HRS: Hierarchical random switching to strengthen the robustness of a trained based model

[IJCAI'19] https://arxiv.org/abs/1908.07116 

Detecting adversarial audio inputs using temporal dependency

[ICLR'19] https://arxiv.org/abs/1809.10875

DBA attack exploits the distributed learning nature of federated learning to distribute a global trigger (Trojan) pattern over malicious agents

[ICLR'20] https://openreview.net/forum?id=rkgyS0VFvr 

AI (Deep Learning) x [The Delta!]

AI x [Financial Applications]

A general framework of (deep) reinforcement learning for portfolio management with noisy and heterogeneous alternative data (e.g., stock prices + financial news)

[AAAI'20] https://arxiv.org/abs/2002.05780 

AI x [Model IP Protection]

A general and practical framework for model watermark embedding and remote verification, and fingerprinting

[MLSyS'21] https://arxiv.org/abs/2103.03701

[IJCAI'21] https://arxiv.org/abs/2105.07078

AI x [Scientific Discovery]

Machine learning guided molecule optimization with design constraints

[Nature Machine Intelligence] https://arxiv.org/abs/2011.01921

Network Reprogramming: Data-Efficient & Model-Agnostic Transfer Learning

See our survey paper on Model Reprogramming: Resource-Efficient Cross-Domain Machine Learning

Overview of model reprogramming framework: https://arxiv.org/abs/2202.10629

Reprogramming black-box machine learning systems

[ICML'20] https://arxiv.org/abs/2007.08714

Reprogramming human voice models for time series classification

[ICML'21] https://arxiv.org/abs/2106.09296

Community Detection: Theory and Algorithms

To be detectable, or not to be... Performance characterization of community detection

Communication detection in multi-layer networks

Event Propagation and Control in Networks

Information propagation in heterogeneous networks

Malware propagation via multiple paths

Tweet propagation and user language fields

Network Analytics and Graph Data Mining

Network Resilience

Optimization for Machine Learning and Signal Processing

(Last updated in Aug. 2022)