Search Results for author: Luyao Niu

Found 17 papers, 4 papers with code

Fault Tolerant Neural Control Barrier Functions for Robotic Systems under Sensor Faults and Attacks

1 code implementation28 Feb 2024 Hongchao Zhang, Luyao Niu, Andrew Clark, Radha Poovendran

Control barrier function (CBF)-based approaches have been proposed to guarantee the safety of robotic systems.

ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs

1 code implementation19 Feb 2024 Fengqing Jiang, Zhangchen Xu, Luyao Niu, Zhen Xiang, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran

In this paper, we propose a novel ASCII art-based jailbreak attack and introduce a comprehensive benchmark Vision-in-Text Challenge (ViTC) to evaluate the capabilities of LLMs in recognizing prompts that cannot be solely interpreted by semantics.

GPT-3.5 GPT-4

SafeDecoding: Defending against Jailbreak Attacks via Safety-Aware Decoding

1 code implementation14 Feb 2024 Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bill Yuchen Lin, Radha Poovendran

Our results show that SafeDecoding significantly reduces the attack success rate and harmfulness of jailbreak attacks without compromising the helpfulness of responses to benign user queries.

Chatbot Code Generation

Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors

no code implementations12 Feb 2024 Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran

We propose and analyze an adaptive adversary that can retrain a Trojaned DNN and is also aware of SOTA output-based Trojaned model detectors.

Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning

no code implementations10 Jan 2024 Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran

Our results show that the global model learned with Brave in the presence of adversaries achieves comparable classification accuracy to a global model trained in the absence of any adversary.

Federated Learning Image Classification +1

Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications

no code implementations7 Nov 2023 Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran

Successful exploits of the identified vulnerabilities result in the users receiving responses tailored to the intent of a threat initiator.

Code Completion GPT-3.5 +1

MDTD: A Multi Domain Trojan Detector for Deep Neural Networks

1 code implementation30 Aug 2023 Arezoo Rajabi, Surudhi Asokraj, Fengqing Jiang, Luyao Niu, Bhaskar Ramasubramanian, Jim Ritcey, Radha Poovendran

An adversary carrying out a backdoor attack embeds a predefined perturbation called a trigger into a small subset of input samples and trains the DNN such that the presence of the trigger in the input results in an adversary-desired output class.

Backdoor Attack

Risk-Aware Distributed Multi-Agent Reinforcement Learning

no code implementations4 Apr 2023 Abdullah Al Maruf, Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Radha Poovendran

We then propose a distributed MARL algorithm called the CVaR QD-Learning algorithm, and establish that value functions of individual agents reaches consensus.

Decision Making Multi-agent Reinforcement Learning +1

LDL: A Defense for Label-Based Membership Inference Attacks

no code implementations3 Dec 2022 Arezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran

Overfitted models have been shown to be susceptible to query-based attacks such as membership inference attacks (MIAs).

Abstraction-Free Control Synthesis to Satisfy Temporal Logic Constraints under Sensor Faults and Attacks

no code implementations22 Aug 2022 Luyao Niu, Zhouchi Li, Andrew Clark

We develop a class of fault-tolerant finite time convergence control barrier functions (CBFs) to guarantee that a dynamical system reaches a set within finite time almost surely in the presence of malicious attacks.

Barrier Certificate based Safe Control for LiDAR-based Systems under Sensor Faults and Attacks

no code implementations11 Aug 2022 Hongchao Zhang, Shiyu Cheng, Luyao Niu, Andrew Clark

We prove that the synthesized control input guarantees system safety using control barrier certificates.

Game of Trojans: A Submodular Byzantine Approach

no code implementations13 Jul 2022 Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran

The results show that (i) with Submodular Trojan algorithm, the adversary needs to embed a Trojan trigger into a very small fraction of samples to achieve high accuracy on both Trojan and clean samples, and (ii) the MM Trojan algorithm yields a trained Trojan model that evades detection with probability 1.

Safety-Critical Control Synthesis for Unknown Sampled-Data Systems via Control Barrier Functions

no code implementations28 Sep 2021 Luyao Niu, Hongchao Zhang, Andrew Clark

By satisfying the constructed CBF constraint at each sampling time, we guarantee the unknown sampled-data system is safe for all time.

A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries

no code implementations3 Aug 2021 Luyao Niu, Dinuka Sahabandu, Andrew Clark, Radha Poovendran

In this paper, we study the controlled islanding problem of a power system under disturbances introduced by a malicious adversary.

Reinforcement Learning Beyond Expectation

no code implementations29 Mar 2021 Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Radha Poovendran

In this paper, we consider a setting where an autonomous agent has to learn behaviors in an unknown environment.

reinforcement-learning Reinforcement Learning (RL)

LQG Reference Tracking with Safety and Reachability Guarantees under Unknown False Data Injection Attacks

no code implementations28 Feb 2021 Zhouchi Li, Luyao Niu, Andrew Clark

For each possible set of compromised sensors, we maintain a state estimator disregarding the sensors in that set, and calculate the optimal LQG control input at each time based on this estimate.

Cannot find the paper you are looking for? You can Submit a new open access paper.