Skip to main content

Showing 1–31 of 31 results for author: Ramasubramanian, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.23977  [pdf, other

    cs.CV cs.AI cs.LG

    VisualSphinx: Large-Scale Synthetic Vision Logic Puzzles for RL

    Authors: Yichen Feng, Zhangchen Xu, Fengqing Jiang, Yuetai Li, Bhaskar Ramasubramanian, Luyao Niu, Bill Yuchen Lin, Radha Poovendran

    Abstract: Vision language models (VLMs) are expected to perform effective multimodal reasoning and make logically coherent decisions, which is critical to tasks such as diagram understanding and spatial problem solving. However, current VLM reasoning lacks large-scale and well-structured training datasets. To bridge this gap, we propose VisualSphinx, a first-of-its-kind large-scale synthetic visual logical… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

    Comments: Project page at https://visualsphinx.github.io/

  2. arXiv:2505.21605  [pdf, ps, other

    cs.LG cs.AI cs.CR

    SOSBENCH: Benchmarking Safety Alignment on Scientific Knowledge

    Authors: Fengqing Jiang, Fengbo Ma, Zhangchen Xu, Yuetai Li, Bhaskar Ramasubramanian, Luyao Niu, Bo Li, Xianyan Chen, Zhen Xiang, Radha Poovendran

    Abstract: Large language models (LLMs) exhibit advancing capabilities in complex tasks, such as reasoning and graduate-level question answering, yet their resilience against misuse, particularly involving scientifically sophisticated risks, remains underexplored. Existing safety benchmarks typically focus either on instructions requiring minimal knowledge comprehension (e.g., ``tell me how to build a bomb")… ▽ More

    Submitted 14 June, 2025; v1 submitted 27 May, 2025; originally announced May 2025.

    Comments: Project Page: https://sosbench.github.io/

  3. arXiv:2505.20196  [pdf, other

    cs.AI cs.LG

    Temporal Sampling for Forgotten Reasoning in LLMs

    Authors: Yuetai Li, Zhangchen Xu, Fengqing Jiang, Bhaskar Ramasubramanian, Luyao Niu, Bill Yuchen Lin, Xiang Yue, Radha Poovendran

    Abstract: Fine-tuning large language models (LLMs) is intended to improve their reasoning capabilities, yet we uncover a counterintuitive effect: models often forget how to solve problems they previously answered correctly during training. We term this phenomenon temporal forgetting and show that it is widespread across model sizes, fine-tuning methods (both Reinforcement Learning and Supervised Fine-Tuning… ▽ More

    Submitted 26 May, 2025; originally announced May 2025.

  4. arXiv:2505.14625  [pdf, ps, other

    cs.LG cs.AI cs.CL

    TinyV: Reducing False Negatives in Verification Improves RL for LLM Reasoning

    Authors: Zhangchen Xu, Yuetai Li, Fengqing Jiang, Bhaskar Ramasubramanian, Luyao Niu, Bill Yuchen Lin, Radha Poovendran

    Abstract: Reinforcement Learning (RL) has become a powerful tool for enhancing the reasoning abilities of large language models (LLMs) by optimizing their policies with reward signals. Yet, RL's success relies on the reliability of rewards, which are provided by verifiers. In this paper, we expose and analyze a widespread problem--false negatives--where verifiers wrongly reject correct model outputs. Our in… ▽ More

    Submitted 22 May, 2025; v1 submitted 20 May, 2025; originally announced May 2025.

  5. arXiv:2505.09384  [pdf, ps, other

    cs.CR

    CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations

    Authors: Denis Donadel, Kavya Balasubramanian, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran

    Abstract: Despite being a legacy protocol with various known security issues, Controller Area Network (CAN) still represents the de-facto standard for communications within vehicles, ships, and industrial control systems. Many research works have designed Intrusion Detection Systems (IDSs) to identify attacks by training machine learning classifiers on bus traffic or its properties. Actions to take after de… ▽ More

    Submitted 14 May, 2025; originally announced May 2025.

    Comments: 23rd International Conference on Applied Cryptography and Network Security

  6. arXiv:2502.12143  [pdf, other

    cs.AI

    Small Models Struggle to Learn from Strong Reasoners

    Authors: Yuetai Li, Xiang Yue, Zhangchen Xu, Fengqing Jiang, Luyao Niu, Bill Yuchen Lin, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Large language models (LLMs) excel in complex reasoning tasks, and distilling their reasoning capabilities into smaller models has shown promise. However, we uncover an interesting phenomenon, which we term the Small Model Learnability Gap: small models ($\leq$3B parameters) do not consistently benefit from long chain-of-thought (CoT) reasoning or distillation from larger models. Instead, they per… ▽ More

    Submitted 22 February, 2025; v1 submitted 17 February, 2025; originally announced February 2025.

  7. arXiv:2407.20466  [pdf, other

    cs.LG cs.AI

    A Method for Fast Autonomy Transfer in Reinforcement Learning

    Authors: Dinuka Sahabandu, Bhaskar Ramasubramanian, Michail Alexiou, J. Sukarno Mertoguno, Linda Bushnell, Radha Poovendran

    Abstract: This paper introduces a novel reinforcement learning (RL) strategy designed to facilitate rapid autonomy transfer by utilizing pre-trained critic value functions from multiple environments. Unlike traditional methods that require extensive retraining or fine-tuning, our approach integrates existing knowledge, enabling an RL agent to adapt swiftly to new settings without requiring extensive computa… ▽ More

    Submitted 29 July, 2024; originally announced July 2024.

  8. arXiv:2406.12257  [pdf, other

    cs.AI cs.CR

    CleanGen: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models

    Authors: Yuetai Li, Zhangchen Xu, Fengqing Jiang, Luyao Niu, Dinuka Sahabandu, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: The remarkable performance of large language models (LLMs) in generation tasks has enabled practitioners to leverage publicly available models to power custom applications, such as chatbots and virtual assistants. However, the data used to train or fine-tune these LLMs is often undisclosed, allowing an attacker to compromise the data and inject backdoors into the models. In this paper, we develop… ▽ More

    Submitted 27 March, 2025; v1 submitted 18 June, 2024; originally announced June 2024.

    Comments: This paper is presented at EMNLP 2024

  9. arXiv:2402.11753  [pdf, other

    cs.CL cs.AI

    ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs

    Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Zhen Xiang, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran

    Abstract: Safety is critical to the usage of large language models (LLMs). Multiple techniques such as data filtering and supervised fine-tuning have been developed to strengthen LLM safety. However, currently known techniques presume that corpora used for safety alignment of LLMs are solely interpreted by semantics. This assumption, however, does not hold in real-world applications, which leads to severe v… ▽ More

    Submitted 7 June, 2024; v1 submitted 18 February, 2024; originally announced February 2024.

    Comments: To appear in ACL 2024

  10. arXiv:2402.08695  [pdf, other

    cs.CR cs.LG

    Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors

    Authors: Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran

    Abstract: We propose and analyze an adaptive adversary that can retrain a Trojaned DNN and is also aware of SOTA output-based Trojaned model detectors. We show that such an adversary can ensure (1) high accuracy on both trigger-embedded and clean samples and (2) bypass detection. Our approach is based on an observation that the high dimensionality of the DNN parameters provides sufficient degrees of freedom… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

  11. arXiv:2402.01114  [pdf, other

    cs.LG cs.AI cs.CR

    Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization

    Authors: Arezoo Rajabi, Reeya Pimple, Aiswarya Janardhanan, Surudhi Asokraj, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Transfer learning (TL) has been demonstrated to improve DNN model performance when faced with a scarcity of training samples. However, the suitability of TL as a solution to reduce vulnerability of overfitted DNNs to privacy attacks is unexplored. A class of privacy attacks called membership inference attacks (MIAs) aim to determine whether a given sample belongs to the training dataset (member) o… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  12. arXiv:2401.12242  [pdf, other

    cs.CR cs.LG

    BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models

    Authors: Zhen Xiang, Fengqing Jiang, Zidi Xiong, Bhaskar Ramasubramanian, Radha Poovendran, Bo Li

    Abstract: Large language models (LLMs) are shown to benefit from chain-of-thought (COT) prompting, particularly when tackling tasks that require systematic reasoning processes. On the other hand, COT prompting also poses new vulnerabilities in the form of backdoor attacks, wherein the model will output unintended malicious content under specific backdoor-triggered conditions during inference. Traditional me… ▽ More

    Submitted 19 January, 2024; originally announced January 2024.

    Comments: Accepted to ICLR2024

  13. arXiv:2308.15673  [pdf, other

    cs.CR cs.LG

    MDTD: A Multi Domain Trojan Detector for Deep Neural Networks

    Authors: Arezoo Rajabi, Surudhi Asokraj, Fengqing Jiang, Luyao Niu, Bhaskar Ramasubramanian, Jim Ritcey, Radha Poovendran

    Abstract: Machine learning models that use deep neural networks (DNNs) are vulnerable to backdoor attacks. An adversary carrying out a backdoor attack embeds a predefined perturbation called a trigger into a small subset of input samples and trains the DNN such that the presence of the trigger in the input results in an adversary-desired output class. Such adversarial retraining however needs to ensure that… ▽ More

    Submitted 2 September, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

    Comments: Accepted to ACM Conference on Computer and Communications Security (ACM CCS) 2023

  14. arXiv:2304.02005  [pdf, other

    cs.AI cs.MA eess.SY

    Risk-Aware Distributed Multi-Agent Reinforcement Learning

    Authors: Abdullah Al Maruf, Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Radha Poovendran

    Abstract: Autonomous cyber and cyber-physical systems need to perform decision-making, learning, and control in unknown environments. Such decision-making can be sensitive to multiple factors, including modeling errors, changes in costs, and impacts of events in the tails of probability distributions. Although multi-agent reinforcement learning (MARL) provides a framework for learning behaviors through repe… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

  15. arXiv:2212.01688  [pdf, other

    cs.LG cs.CR

    LDL: A Defense for Label-Based Membership Inference Attacks

    Authors: Arezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: The data used to train deep neural network (DNN) models in applications such as healthcare and finance typically contain sensitive information. A DNN model may suffer from overfitting. Overfitted models have been shown to be susceptible to query-based attacks such as membership inference attacks (MIAs). MIAs aim to determine whether a sample belongs to the dataset used to train a classifier (membe… ▽ More

    Submitted 16 December, 2022; v1 submitted 3 December, 2022; originally announced December 2022.

    Comments: to appear in ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2023)

  16. arXiv:2207.05937  [pdf, other

    cs.LG cs.CR cs.GT

    Game of Trojans: A Submodular Byzantine Approach

    Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Machine learning models in the wild have been shown to be vulnerable to Trojan attacks during training. Although many detection mechanisms have been proposed, strong adaptive attackers have been shown to be effective against them. In this paper, we aim to answer the questions considering an intelligent and adaptive adversary: (i) What is the minimal amount of instances required to be Trojaned by a… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

    Comments: Submitted to GameSec 2022

  17. arXiv:2203.15506  [pdf, other

    cs.CR cs.AI cs.LG

    Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning

    Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Machine learning (ML) models that use deep neural networks are vulnerable to backdoor attacks. Such attacks involve the insertion of a (hidden) trigger by an adversary. As a consequence, any input that contains the trigger will cause the neural network to misclassify the input to a (single) target class, while classifying other inputs without a trigger correctly. ML models that contain a backdoor… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

    Comments: Submitted to conference

  18. arXiv:2203.10165  [pdf, other

    cs.LG cs.AI cs.CR eess.SY

    Privacy-Preserving Reinforcement Learning Beyond Expectation

    Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran

    Abstract: Cyber and cyber-physical systems equipped with machine learning algorithms such as autonomous cars share environments with humans. In such a setting, it is important to align system (or agent) behaviors with the preferences of one or more human users. We consider the case when an agent has to learn behaviors in an unknown environment. Our goal is to capture two defining characteristics of humans:… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

    Comments: Submitted to conference. arXiv admin note: text overlap with arXiv:2104.00540

  19. arXiv:2202.09489  [pdf, other

    cs.MA cs.AI cs.LG

    Shaping Advice in Deep Reinforcement Learning

    Authors: Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Reinforcement learning involves agents interacting with an environment to complete tasks. When rewards provided by the environment are sparse, agents may not receive immediate feedback on the quality of actions that they take, thereby affecting learning of policies. In this paper, we propose to methods to augment the reward signal from the environment with an additional reward termed shaping advic… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

    Comments: Submitted to journal special issue. arXiv admin note: substantial text overlap with arXiv:2103.15941, arXiv:1907.08823

  20. arXiv:2201.04612  [pdf, other

    cs.MA cs.AI cs.LG

    Agent-Temporal Attention for Reward Redistribution in Episodic Multi-Agent Reinforcement Learning

    Authors: Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: This paper considers multi-agent reinforcement learning (MARL) tasks where agents receive a shared global reward at the end of an episode. The delayed nature of this reward affects the ability of the agents to assess the quality of their actions at intermediate time-steps. This paper focuses on developing methods to learn a temporal redistribution of the episodic reward to obtain a dense reward si… ▽ More

    Submitted 12 January, 2022; originally announced January 2022.

    Comments: Extended version of paper accepted for Oral Presentation at the International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), 2022

  21. arXiv:2109.01224  [pdf, other

    eess.SY cs.CR

    Resilience to Denial-of-Service and Integrity Attacks: A Structured Systems Approach

    Authors: Bhaskar Ramasubramanian, M. A. Rajan, M. Girish Chandra, Rance Cleaveland, Steven I. Marcus

    Abstract: The resilience of cyberphysical systems to denial-of-service (DoS) and integrity attacks is studied in this paper. The cyberphysical system is modeled as a linear structured system, and its resilience to an attack is interpreted in a graph theoretical framework. The structural resilience of the system is characterized in terms of unmatched vertices in maximum matchings of the bipartite graph and c… ▽ More

    Submitted 2 September, 2021; originally announced September 2021.

    Comments: Accepted to the European Journal of Control

  22. arXiv:2104.00540  [pdf, other

    cs.LG cs.AI eess.SY math.OC

    Reinforcement Learning Beyond Expectation

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Radha Poovendran

    Abstract: The inputs and preferences of human users are important considerations in situations where these users interact with autonomous cyber or cyber-physical systems. In these scenarios, one is often interested in aligning behaviors of the system with the preferences of one or more human users. Cumulative prospect theory (CPT) is a paradigm that has been empirically shown to model a tendency of humans t… ▽ More

    Submitted 29 March, 2021; originally announced April 2021.

  23. arXiv:2103.15941  [pdf, other

    cs.LG cs.AI eess.SY

    Shaping Advice in Deep Multi-Agent Reinforcement Learning

    Authors: Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Multi-agent reinforcement learning involves multiple agents interacting with each other and a shared environment to complete tasks. When rewards provided by the environment are sparse, agents may not receive immediate feedback on the quality of actions that they take, thereby affecting learning of policies. In this paper, we propose a method called Shaping Advice in deep Multi-agent reinforcement… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

  24. arXiv:2009.09511  [pdf, other

    eess.SY cs.CR cs.LG math.OC

    Safety-Critical Online Control with Adversarial Disturbances

    Authors: Bhaskar Ramasubramanian, Baicen Xiao, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the control of safety-critical dynamical systems in the presence of adversarial disturbances. We seek to synthesize state-feedback controllers to minimize a cost incurred due to the disturbance, while respecting a safety constraint. The safety constraint is given by a bound on an H-inf norm, while the cost is specified as an upper bound on the H-2 norm of the system. We consider… ▽ More

    Submitted 20 September, 2020; originally announced September 2020.

    Comments: Paper accepted to the Conference on Decision and Control (CDC), 2020

  25. arXiv:2007.13272  [pdf, other

    eess.SY cs.CR cs.LO math.OC

    Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: A cyber-physical system (CPS) is expected to be resilient to more than one type of adversary. In this paper, we consider a CPS that has to satisfy a linear temporal logic (LTL) objective in the presence of two kinds of adversaries. The first adversary has the ability to tamper with inputs to the CPS to influence satisfaction of the LTL objective. The interaction of the CPS with this adversary is m… ▽ More

    Submitted 26 July, 2020; originally announced July 2020.

    Comments: Accepted to the IEEE Conference on Decision and Control (CDC), 2020

  26. arXiv:2007.12501  [pdf, other

    eess.SY cs.CR cs.GT cs.LO

    Secure Control in Partially Observable Environments to Satisfy LTL Specifications

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the synthesis of control policies for an agent that has to satisfy a temporal logic specification in a partially observable environment, in the presence of an adversary. The interaction of the agent (defender) with the adversary is modeled as a partially observable stochastic game. The goal is to generate a defender policy to maximize satisfaction of a given temporal logic speci… ▽ More

    Submitted 4 November, 2020; v1 submitted 22 July, 2020; originally announced July 2020.

    Comments: Provisionally accepted to the IEEE Transactions on Automatic Control. arXiv admin note: text overlap with arXiv:1903.06873

  27. arXiv:2001.06781  [pdf, other

    cs.AI

    FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback

    Authors: Baicen Xiao, Qifan Lu, Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: Reinforcement learning has been successful in training autonomous agents to accomplish goals in complex environments. Although this has been adapted to multiple settings, including robotics and computer games, human players often find it easier to obtain higher rewards in some environments than reinforcement learning algorithms. This is especially true of high-dimensional state spaces where the re… ▽ More

    Submitted 19 January, 2020; originally announced January 2020.

    Comments: Accepted as Full Paper to International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS) 2020

  28. arXiv:1910.12282  [pdf, other

    eess.SY cs.GT cs.LO

    Linear Temporal Logic Satisfaction in Adversarial Environments using Secure Control Barrier Certificates

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the satisfaction of a class of temporal properties for cyber-physical systems (CPSs) over a finite-time horizon in the presence of an adversary, in an environment described by discrete-time dynamics. The temporal logic specification is given in safe-LTL_F, a fragment of linear temporal logic over traces of finite length. The interaction of the CPS with the adversary is modeled a… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

    Comments: Proc. of GameSec2019 (to appear). This version corrects a typo in the simulation, and clarifies some ambiguous material from the Proceedings version

  29. arXiv:1907.08823  [pdf, other

    cs.LG cs.AI eess.SY stat.ML

    Potential-Based Advice for Stochastic Policy Learning

    Authors: Baicen Xiao, Bhaskar Ramasubramanian, Andrew Clark, Hannaneh Hajishirzi, Linda Bushnell, Radha Poovendran

    Abstract: This paper augments the reward received by a reinforcement learning agent with potential functions in order to help the agent learn (possibly stochastic) optimal policies. We show that a potential-based reward shaping scheme is able to preserve optimality of stochastic policies, and demonstrate that the ability of an agent to learn an optimal policy is not affected when this scheme is augmented to… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

    Comments: Accepted to the IEEE Conference on Decision and Control, 2019

  30. arXiv:1903.06873  [pdf, other

    eess.SY cs.CR cs.LO

    Secure Control under Partial Observability with Temporal Logic Constraints

    Authors: Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the synthesis of control policies for an agent that has to satisfy a temporal logic specification in a partially observable environment, in the presence of an adversary. The interaction of the agent (defender) with the adversary is modeled as a partially observable stochastic game. The search for policies is limited to over the space of finite state controllers, which leads to a… ▽ More

    Submitted 15 March, 2019; originally announced March 2019.

    Comments: To appear at the American Control Conference, 2019

  31. Notions of Centralized and Decentralized Opacity in Linear Systems

    Authors: Bhaskar Ramasubramanian, Rance Cleaveland, Steven I. Marcus

    Abstract: We formulate notions of opacity for cyberphysical systems modeled as discrete-time linear time-invariant systems. A set of secret states is $k$-ISO with respect to a set of nonsecret states if, starting from these sets at time $0$, the outputs at time $k$ are indistinguishable to an adversarial observer. Necessary and sufficient conditions to ensure that a secret specification is $k$-ISO are estab… ▽ More

    Submitted 15 March, 2019; originally announced March 2019.

    Comments: Provisionally accepted to the IEEE Transactions on Automatic Control