Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wenbo Guo is active.

Publication


Featured researches published by Wenbo Guo.


knowledge discovery and data mining | 2017

Adversary Resistant Deep Neural Networks with an Application to Malware Detection

Qinglong Wang; Wenbo Guo; Kaixuan Zhang; Alexander G. Ororbia; Xinyu Xing; Xue Liu; C. Lee Giles

Outside the highly publicized victories in the game of Go, there have been numerous successful applications of deep learning in the fields of information retrieval, computer vision, and speech recognition. In cybersecurity, an increasing number of companies have begun exploring the use of deep learning (DL) in a variety of security tasks with malware detection among the more popular. These companies claim that deep neural networks (DNNs) could help turn the tide in the war against malware infection. However, DNNs are vulnerable to adversarial samples, a shortcoming that plagues most, if not all, statistical and machine learning models. Recent research has demonstrated that those with malicious intent can easily circumvent deep learning-powered malware detection by exploiting this weakness. To address this problem, previous work developed defense mechanisms that are based on augmenting training data or enhancing model complexity. However, after analyzing DNN susceptibility to adversarial samples, we discover that the current defense mechanisms are limited and, more importantly, cannot provide theoretical guarantees of robustness against adversarial sampled-based attacks. As such, we propose a new adversary resistant technique that obstructs attackers from constructing impactful adversarial samples by randomly nullifying features within data vectors. Our proposed technique is evaluated on a real world dataset with 14,679 malware variants and 17,399 benign programs. We theoretically validate the robustness of our technique, and empirically show that our technique significantly boosts DNN robustness to adversarial samples while maintaining high accuracy in classification. To demonstrate the general applicability of our proposed method, we also conduct experiments using the MNIST and CIFAR-10 datasets, widely used in image recognition research.


computer and communications security | 2018

LEMNA: Explaining Deep Learning based Security Applications

Wenbo Guo; Dongliang Mu; Jun Xu; Purui Su; Gang Wang; Xinyu Xing

While deep learning has shown a great potential in various domains, the lack of transparency has limited its application in security or safety-critical areas. Existing research has attempted to develop explanation techniques to provide interpretable explanations for each classification decision. Unfortunately, current methods are optimized for non-security tasks ( e.g., image analysis). Their key assumptions are often violated in security applications, leading to a poor explanation fidelity. In this paper, we propose LEMNA, a high-fidelity explanation method dedicated for security applications. Given an input data sample, LEMNA generates a small set of interpretable features to explain how the input sample is classified. The core idea is to approximate a local area of the complex deep learning decision boundary using a simple interpretable model. The local interpretable model is specially designed to (1) handle feature dependency to better work with security applications ( e.g., binary code analysis); and (2) handle nonlinear local boundaries to boost explanation fidelity. We evaluate our system using two popular deep learning applications in security (a malware classifier, and a function start detector for binary reverse-engineering). Extensive evaluations show that LEMNAs explanation has a much higher fidelity level compared to existing methods. In addition, we demonstrate practical use cases of LEMNA to help machine learning developers to validate model behavior, troubleshoot classification errors, and automatically patch the errors of the target models.


arXiv: Learning | 2016

Learning Adversary-Resistant Deep Neural Networks.

Qinglong Wang; Wenbo Guo; Kaixuan Zhang; Alexander G. Ororbia; Xinyu Xing; C. Lee Giles; Xue Liu


arXiv: Learning | 2016

Using Non-invertible Data Transformations to Build Adversarial-Robust Neural Networks

Qinglong Wang; Wenbo Guo; Alexander G. Ororbia; Xinyu Xing; Lin Lin; C. Lee Giles; Xue Liu; Peng Liu; Gang Xiong


Archive | 2017

Towards Interrogating Discriminative Machine Learning Models.

Wenbo Guo; Kaixuan Zhang; Lin Lin; Sui Huang; Xinyu Xing


arXiv: Learning | 2016

Random Feature Nullification for Adversary Resistant Deep Architecture.

Qinglong Wang; Wenbo Guo; Kaixuan Zhang; Xinyu Xing; C. Lee Giles; Xue Liu


Archive | 2016

Using Non-invertible Data Transformations to Build Adversary-Resistant Deep Neural Networks.

Qinglong Wang; Wenbo Guo; Alexander G. Ororbia; Xinyu Xing; Lin Lin; C. Lee Giles; Xue Liu; Peng Liu; Gang Xiong


MATEC Web of Conferences | 2016

Spectral Clustering based Active Learning with Applications to Text Classification

Wenbo Guo; Chun Zhong; Yupu Yang


neural information processing systems | 2018

Explaining Deep Learning Models -- A Bayesian Non-parametric Approach

Wenbo Guo; Sui Huang; Yunzhe Tao; Xinyu Xing; Lin Lin


intelligent data analysis | 2018

Active learning support vector machines with low-rank transformation

Liang Gong; Wenbo Guo; Yupu Yang

Collaboration


Dive into the Wenbo Guo's collaboration.

Top Co-Authors

Avatar

Xinyu Xing

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

C. Lee Giles

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alexander G. Ororbia

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Kaixuan Zhang

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Lin Lin

Fred Hutchinson Cancer Research Center

View shared research outputs
Top Co-Authors

Avatar

Yupu Yang

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Peng Liu

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Sui Huang

Ohio State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge