Code/model for papers from my lab:
2025
Frontier AI’s Impact on the Cybersecurity Landscape
Wenbo Guo , Yujin Potter†, Tianneng Shi, Zhun Wang, Andy Zhang, Dawn Song
AI in Cybersecurity
benchmarks
SecCodePLT: A Unified Platform for Evaluating the Security of Code GenAI
Yuzhou Nie, Zhun Wang, Yu Yang, Ruizhe Jiang, Yuheng Tang, Xander Davies, Yarin Gal, Bo Li, Wenbo Guo , Dawn
Song
CodeGen LLM Security
Benchmark (Used by enterprise)
Co-PatcheR: Collaborative Software Patching with Component-specific Small Reasoning Models
Yuheng Tang, Hongwei Li, Kaijie Zhu, Michael Yang, Yangruibo Ding, Wenbo Guo
Top 2 open-weighted models on SWE-bench-verified
ReLeak: RL-based Red-teaming for LLM Privacy Leakage
Yuzhou Nie, Zhun Wang, Ye Yu, Xian Wu, Xuandong Zhao, Nathaniel D. Bastian, Wenbo Guo , Dawn Song
In Conference on Language Modeling (COLM )
PatchPilot: A Cost-Efficient Software Engineering Agent with Early Attempts on Formal Verification
Hongwei Li, Yuheng Tang, Shiqi Wang, Wenbo Guo
In International Conference on Machine Learning (ICML )
Top 5 open-sourced tools on SWE-bench-verified
MELON: Provable Defense Against Indirect Prompt Injection Attacks in AI Agents
Kaijie Zhu, Xianjun Yang, Jindong Wang, Wenbo Guo , William Yang Wang
In International Conference on Machine Learning (ICML )
Mind the Inconspicuous: Revealing the Hidden Weakness in Aligned LLMs’ Ethical Boundaries
Jiahao Yu, Haozheng Luo, Yao-Chieh Hu, Yan Chen, Wenbo Guo , Han Liu, Xinyu Xing
In USENIX Security Symposium (USENIX Security )
F-Fidelity: A Robust Framework for Faithfulness Evaluation of Explainable AI
Xu Zheng, Farhad Shirani, Zhuomin Chen, Chaohao Lin, Wei Cheng, Wenbo Guo , Dongsheng Luo
In International Conference on Learning Representations (ICLR )
2024
When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search
Xuan Chen, Yuzhou Nie, Wenbo Guo , Xiangyu Zhang
In Annual Conference on Neural Information Processing Systems (NeurIPS )
DFBA: Data Free Backdoor Attacks
Bochuan Cao, Jinyuan Jia, Chuxuan Hu, Wenbo Guo , Zhen Xiang, Jinghui Chen, Bo Li, Dawn Song
In Annual Conference on Neural Information Processing Systems (NeurIPS )
BandFuzz: A Practical Framework for Collaborative Fuzzing with Reinforcement Learning
Wenxuan Shi, Hongwei Li, Jiahao Yu, Wenbo Guo , Xinyu Xing
In International Workshop on Search-Based and Fuzz Testing (SBFT )
Ranked Top 1
FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi Protocols
Hongbo Wen, Hanzhi Liu, Jiaxin Song, Yanju Chen, Wenbo Guo , Yu Feng
In ACM Conference on Computer and Communications Security (CCS )
GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning
Ravindu De Silva, Wenbo Guo , Nicola Ruaro, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna
In USENIX Security Symposium (USENIX Security )
Code
SHINE: Shielding Backdoors in Deep Reinforcement Learning
Zhuowen Yuan, Wenbo Guo , Jinyuan Jia, Bo Li, Dawn Song
In International Conference on Machine Learning (ICML )
Code
BOXRR-23: 4.7 Million Motion Capture Recordings from 105,000 VR Users
Vivek Nair, Wenbo Guo , Rui Wang, James F. O'Brien, Louis Rosenberg, Dawn Song
In IEEE Conference on Virtual Reality and 3D User Interfaces (VR )
Dataset
TextGuard: Provable Defense against Backdoor Attacks on Text Classification
Hengzhi Pei, Jinyuan Jia, Wenbo Guo , Bo Li, Dawn Song
In The Conference on Network and Distributed System Security Symposium (NDSS )
Code
2023
BIRD: Generalizable Backdoor Detection and Removal for Deep Reinforcement Learning
Xuan Chen, Wenbo Guo , Guanhong Tao, Xiangyu Zhang, Dawn Song
In Annual Conference on Neural Information Processing Systems (NeurIPS )
Code
StateMask: Explaining Deep Reinforcement Learning through State Mask
Zelei Cheng, Xian Wu, Jiahao Yu, Wenhai Sun, Wenbo Guo , Xinyu Xing
In Annual Conference on Neural Information Processing Systems (NeurIPS )
Code
RAVE: Enabling safety verification for realistic deep reinforcement learning systems
Wenbo Guo , Taesung Lee, Kevin Eykholt, Jiyong Jang
In Multi-Agent Security Workshop at NeurIPS
In Search of netUnicorn: A Data-Collection Platform to Develop Generalizable ML Models for Network Security
Problems
Roman Beltiukov, Wenbo Guo , Arpit Gupta, Walter Willinger
In ACM Conference on Computer and Communications Security (CCS )
Code
Unique Identification of 50,000+ Virtual Reality Users from Head & Hand Motion Data
Vivek Nair, Wenbo Guo , Justus Mattern, Rui Wang, James F. O'Brien, Louis Rosenberg, Dawn Song
In USENIX Security Symposium (USENIX Security )
Code
(
Press release: Fox , Bloomberg
)
PATROL: Provable Defense against Adversarial Policy in Two-player Games
Wenbo Guo , Xian Wu, Lun Wang, Xinyu Xing, Dawn Song
In USENIX Security Symposium (USENIX Security )
Code
AIRS: Explanation for Deep Reinforcement Learning based Security Applications
Jiahao Yu, Wenbo Guo , Qi Qin, Gang Wang, Ting Wang, Xinyu Xing
In USENIX Security Symposium (USENIX Security )
Code
From Grim Reality to Practical Solution: Malware Classification in Real-World Noise
Xian Wu, Wenbo Guo , Jia Yan, Baris Coskun, Xinyu Xing
In IEEE Symposium on Security and Privacy (S&P )
Code
2022
2021
EDGE: Explaining Deep Reinforcement Learning Policies
Wenbo Guo , Xian Wu, Usmann Khan, Xinyu Xing
In Annual Conference on Neural Information Processing Systems (NeurIPS )
Code
Adversarial Policy Learning in Two-player Competitive Games
Wenbo Guo , Xian Wu, Sui Huang, Xinyu Xing
In The International Conference on Machine Learning (ICML )
Code
DANCE: Enhancing saliency maps using decoys
Yang Lu**, Wenbo Guo** , Xinyu Xing, William Stafford Noble
In The International Conference on Machine Learning (ICML )
Code
RNNRepair: Automatic RNN Repair via Model-based Analysis
Xiaofei Xie, Wenbo Guo , Lei Ma, Wei Le, Jian Wang, Lingjun Zhou, Xinyu Xing, Yang Liu
In The International Conference on Machine Learning (ICML )
Code
Adversarial Policy Training against Deep Reinforcement Learning
Wenbo Guo** , Xian Wu**, Hua Wei**, Xinyu Xing
In USENIX Security Symposium (USENIX Security )
Code
CADE: Detecting and Explaining Concept Drift Samples for Security Applications
Limin Yang, Wenbo Guo , Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang
In USENIX Security Symposium (USENIX Security )
Code
BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Lun Wang, Zaynah Javed, Xian Wu, Wenbo Guo , Xinyu Xing, Dawn Song
In International Joint Conference on Artificial Intelligence (IJCAI )
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data
Junjie Liang**, Wenbo Guo** , Tongbo Luo, Vasant Honavar, Gang Wang, Xinyu Xing
In The Network and Distributed System Security Symposium (NDSS )
Code
Data-driven analysis of the electronic-structure factors controlling the work functions of perovskites
oxides
Yihuang Xiong, Weinan Chen, Wenbo Guo , Hua Wei, Ismaila Dabo
Physical Chemistry Chemical Physics
2020
2019
RENN: Efficient Reverse Execution with Neural-network-assisted Alias Analysis
Dongliang Mu**, Wenbo Guo** , Alejandro Cuevas, Yueqi Chen, Jinxuan Gai, Xinyu Xing, Bing Mao, Chengyu Song
In IEEE/ACM International Conference on Automated Software Engineering (ASE )
Code
DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis
Wenbo Guo** , Dongliang Mu**, Xinyu Xing, Min Du, Dawn Song
In USENIX Security Symposium (USENIX Security )
Code
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
Ying Dong, Wenbo Guo , Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang
In USENIX Security Symposium (USENIX Security )
Code
2017-2018
Explaining Deep Learning Models -- A Bayesian Non-parametric Approach
Wenbo Guo , Sui Huang, Yunzhe Tao, Xinyu Xing, Lin Lin
In Annual Conference on Neural Information Processing Systems (NeurIPS )
Code
LEMNA: Explaining Deep Learning based Security Applications
Wenbo Guo , Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing
In ACM Conference on Computer and Communications Security (CCS )
Outstanding paper award
Code
Slides
Defending against Adversarial Samples without Security through Obscurity
Wenbo Guo , Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Sui Huang, Xue Liu, C. Lee Giles, Lin
Lin, Xinyu Xing.
In IEEE International Conference on Data Mining (ICDM )
Adversary Resistant Deep Neural Networks with an Application to Malware Detection
Wenbo Guo** , Qinglong Wang**, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles
In ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD )
↑