{"id":"https://openalex.org/W7127397653","doi":"https://doi.org/10.48550/arxiv.2602.01834","title":"Concept-Based Dictionary Learning for Inference-Time Safety in Vision Language Action Models","display_name":"Concept-Based Dictionary Learning for Inference-Time Safety in Vision Language Action Models","publication_year":2026,"publication_date":"2026-02-02","ids":{"openalex":"https://openalex.org/W7127397653","doi":"https://doi.org/10.48550/arxiv.2602.01834"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.01834","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124926617","display_name":"Siqi Wen","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wen, Siqi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124886608","display_name":"Shu Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Shu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124944012","display_name":"Shaopeng Fu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fu, Shaopeng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124949670","display_name":"Jingfeng Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Jingfeng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124901926","display_name":"Lijie Hu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hu, Lijie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5124900296","display_name":"Di Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Di","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5124926617"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.6855999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.6855999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11714","display_name":"Multimodal Machine Learning Applications","score":0.1525000035762787,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.04270000010728836,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.8529000282287598},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.5365999937057495},{"id":"https://openalex.org/keywords/embodied-cognition","display_name":"Embodied cognition","score":0.5181999802589417},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.48429998755455017},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4729999899864197},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.4447000026702881},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4442000091075897}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.8529000282287598},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6823999881744385},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.5365999937057495},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5340999960899353},{"id":"https://openalex.org/C100609095","wikidata":"https://www.wikidata.org/wiki/Q1335050","display_name":"Embodied cognition","level":2,"score":0.5181999802589417},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.48429998755455017},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4729999899864197},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.4447000026702881},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4442000091075897},{"id":"https://openalex.org/C2983448237","wikidata":"https://www.wikidata.org/wiki/Q1078276","display_name":"Language understanding","level":2,"score":0.4189999997615814},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.39989998936653137},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3912999927997589},{"id":"https://openalex.org/C2778712577","wikidata":"https://www.wikidata.org/wiki/Q3505966","display_name":"Retraining","level":2,"score":0.38609999418258667},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.3334999978542328},{"id":"https://openalex.org/C2777601683","wikidata":"https://www.wikidata.org/wiki/Q6499736","display_name":"Vocabulary","level":2,"score":0.30799999833106995},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.2939000129699707},{"id":"https://openalex.org/C27415008","wikidata":"https://www.wikidata.org/wiki/Q7256382","display_name":"Psychological intervention","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C194995250","wikidata":"https://www.wikidata.org/wiki/Q531136","display_name":"Affordance","level":2,"score":0.26980000734329224},{"id":"https://openalex.org/C2780665704","wikidata":"https://www.wikidata.org/wiki/Q959298","display_name":"Intervention (counseling)","level":2,"score":0.2669999897480011},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26330000162124634}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.01834","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.01834","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.01834","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.01834","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"score":0.46929118037223816,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"},{"score":0.44695204496383667,"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Vision":[0],"Language":[1],"Action":[2],"(VLA)":[3],"models":[4],"close":[5],"the":[6,52,91,124,144],"perception":[7],"action":[8],"loop":[9],"by":[10,116],"translating":[11],"multimodal":[12],"instructions":[13],"into":[14],"executable":[15],"behaviors,":[16],"but":[17],"this":[18,142],"very":[19],"capability":[20],"magnifies":[21],"safety":[22,70,150],"risks:":[23],"jailbreaks":[24],"that":[25,105],"merely":[26],"yield":[27],"toxic":[28],"text":[29],"in":[30,37],"LLMs":[31],"can":[32],"trigger":[33],"unsafe":[34],"physical":[35],"actions":[36],"embodied":[38,153],"systems.":[39],"Existing":[40],"defenses":[41],"alignment,":[42],"filtering,":[43],"or":[44,50],"prompt":[45],"hardening":[46],"intervene":[47],"too":[48],"late":[49],"at":[51],"wrong":[53],"modality,":[54],"leaving":[55],"fused":[56],"representations":[57],"exploitable.":[58],"We":[59],"introduce":[60],"a":[61,95],"concept":[62,84,148],"based":[63,149],"dictionary":[64],"learning":[65,73],"framework":[66,125],"for":[67,152],"inference":[68,146],"time":[69,147],"control.":[71],"By":[72],"sparse,":[74],"interpretable":[75],"dictionaries":[76],"from":[77],"hidden":[78],"activations,":[79],"our":[80,106,140],"method":[81,151],"identifies":[82],"harmful":[83],"directions":[85],"and":[86,102,128,133,158],"attenuates":[87],"risky":[88],"components":[89],"when":[90],"estimated":[92],"risk":[93],"exceeds":[94],"threshold.":[96],"Experiments":[97],"on":[98],"Libero-Harm,":[99],"BadRobot,":[100],"RoboPair,":[101],"IS-Bench":[103],"show":[104],"approach":[107],"achieves":[108],"state-of-the-art":[109],"defense":[110],"performance,":[111],"cutting":[112],"attack":[113],"success":[114],"rates":[115],"over":[117],"70\\%":[118],"while":[119],"maintaining":[120],"task":[121],"success.":[122],"Crucially,":[123],"is":[126,143],"plug-in":[127],"model-agnostic,":[129],"requiring":[130],"no":[131],"retraining":[132],"integrating":[134],"seamlessly":[135],"with":[136],"diverse":[137],"VLAs.":[138],"To":[139],"knowledge,":[141],"first":[145],"systems,":[154],"advancing":[155],"both":[156],"interpretability":[157],"safe":[159],"deployment":[160],"of":[161],"VLA":[162],"models.":[163]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-04T00:00:00"}
