Bhaskar Ramasubramanian

Orcid: 0000-0002-2166-7838

According to our database1, Bhaskar Ramasubramanian authored at least 42 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Modeling and Designing Non-Pharmaceutical Interventions in Epidemics: A Submodular Approach.
IEEE Control. Syst. Lett., 2024

A Method for Fast Autonomy Transfer in Reinforcement Learning.
CoRR, 2024

Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors.
CoRR, 2024

Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization.
CoRR, 2024

CANLP: NLP-Based Intrusion Detection System for CAN.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

EDC: Effective and Efficient Dialog Comprehension For Dialog State Tracking.
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), 2024

BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Who is Responsible? Explaining Safety Violations in Multi-Agent Cyber-Physical Systems.
Proceedings of the International Conference on Assured Autonomy, 2024

CleanGen: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

POSTER: Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

POSTER: Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Risk-Aware Distributed Multi-Agent Reinforcement Learning.
Proceedings of the American Control Conference, 2024

ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

2023
Robust Satisfaction of Metric Interval Temporal Logic Objectives in Adversarial Environments.
Games, 2023

BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

FedGame: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Learning Dissemination Strategies for External Sources in Opinion Dynamic Models with Cognitive Biases.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

MDTD: A Multi-Domain Trojan Detector for Deep Neural Networks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Cognitive Bias-Aware Dissemination Strategies for Opinion Dynamics with External Information Sources.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

LDL: A Defense for Label-Based Membership Inference Attacks.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Resilience to denial-of-service and integrity attacks: A structured systems approach.
Eur. J. Control, 2022

Game of Trojans: A Submodular Byzantine Approach.
CoRR, 2022

Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning.
CoRR, 2022

Shaping Advice in Deep Reinforcement Learning.
CoRR, 2022

Privacy-Preserving Reinforcement Learning Beyond Expectation.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

Agent-Temporal Attention for Reward Redistribution in Episodic Multi-Agent Reinforcement Learning.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

2021
Secure Control in Partially Observable Environments to Satisfy LTL Specifications.
IEEE Trans. Autom. Control., 2021

Shaping Advice in Deep Multi-Agent Reinforcement Learning.
CoRR, 2021

Reinforcement Learning Beyond Expectation.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

2020
Notions of Centralized and Decentralized Opacity in Linear Systems.
IEEE Trans. Autom. Control., 2020

Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Safety-Critical Online Control with Adversarial Disturbances.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Potential-Based Advice for Stochastic Policy Learning.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Secure Control under Partial Observability with Temporal Logic Constraints.
Proceedings of the 2019 American Control Conference, 2019

2017
Opacity for switched linear systems: Notions and characterization.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

2016
A framework for opacity in linear systems.
Proceedings of the 2016 American Control Conference, 2016

Structural resilience of cyberphysical systems under attack.
Proceedings of the 2016 American Control Conference, 2016

A framework for decentralized opacity in linear systems.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
Convex Methods for Rank-Constrained Optimization Problems.
Proceedings of the 2015 Proceedings of the Conference on Control and its Applications, 2015


  Loading...