Vahid Behzadan

According to our database1, Vahid Behzadan authored at least 41 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Sandwich attack: Multi-language Mixture Adaptive Attack on LLMs.
CoRR, 2024

The Power in Communication: Power Regularization of Communication for Autonomy in Cooperative Multi-Agent Reinforcement Learning.
CoRR, 2024

2023
TaCo: Enhancing Cross-Lingual Transfer for Low-Resource Languages in LLMs through Translation-Assisted Chain-of-Thought Processes.
CoRR, 2023

Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

A Theory of Mind Approach as Test-Time Mitigation Against Emergent Adversarial Communication.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

2022
A Novel Approach for Synthetic Reduced Nearest-Neighbor Leveraging Neural Networks.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Stochastic Induction of Decision Trees with Application to Learning Haar Trees.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Adversarial Label-Poisoning Attacks and Defense for General Multi-Class Models Based on Synthetic Reduced Nearest Neighbor.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Hybrid Deep Learning Model for Fake News Detection in Social Networks (Student Abstract).
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Security and Privacy Issues in Intelligent Transportation Systems: Classification and Challenges.
IEEE Intell. Transp. Syst. Mag., 2021

Adversarial Reinforcement Learning Framework for Benchmarking Collision Avoidance Mechanisms in Autonomous Vehicles.
IEEE Intell. Transp. Syst. Mag., 2021

Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP).
CoRR, 2021

Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors.
CoRR, 2021

Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter Network.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Combating Human Trafficking via Automatic OSINT Collection, Validation and Fusion.
Proceedings of the Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media, 2021

State-Wise Adaptive Discounting from Experience (SADE): A Novel Discounting Scheme for Reinforcement Learning (Student Abstract).
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Adversarial Attacks on Deep Algorithmic Trading Policies.
CoRR, 2020

Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Founding The Domain of AI Forensics.
Proceedings of the Workshop on Artificial Intelligence Safety, 2020

2019
Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies.
CoRR, 2019

Analysis and Improvement of Adversarial Training in DQN Agents With Adversarially-Guided Exploration (AGE).
CoRR, 2019

RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Watermarking of DRL Policies with Sequential Triggers.
Proceedings of the Workshop on Artificial Intelligence Safety 2019 co-located with the 28th International Joint Conference on Artificial Intelligence, 2019

Adversarial Exploitation of Policy Imitation.
Proceedings of the Workshop on Artificial Intelligence Safety 2019 co-located with the 28th International Joint Conference on Artificial Intelligence, 2019

A novel approach for detection and ranking of trendy and emerging cyber threat events in Twitter streams.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

TrolleyMod v1.0: An Open-Source Simulation and Data-Collection Platform for Ethical Decision Making in Autonomous Vehicles.
Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 2019

Emergence of Addictive Behaviors in Reinforcement Learning Agents.
Proceedings of the Workshop on Artificial Intelligence Safety 2019 co-located with the Thirty-Third AAAI Conference on Artificial Intelligence 2019 (AAAI-19), 2019

2018
The Faults in Our Pi Stars: Security Issues and Open Challenges in Deep Reinforcement Learning.
CoRR, 2018

A Psychopathological Approach to Safety Engineering in AI and AGI.
Proceedings of the Computer Safety, Reliability, and Security, 2018

Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space Noise.
Proceedings of the Computer Safety, Reliability, and Security, 2018

Adversarial Exploitation of Emergent Dynamics in Smart Cities.
Proceedings of the IEEE International Smart Cities Conference, 2018

Corpus and Deep Learning Classifier for Collection of Cyber Threat Indicators in Twitter Stream.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Whatever Does Not Kill Deep Reinforcement Learning, Makes It Stronger.
CoRR, 2017

Models and Framework for Adversarial Attacks on Complex Adaptive Systems.
CoRR, 2017

Cyber-Physical Attacks on UAS Networks- Challenges and Open Research Problems.
CoRR, 2017

Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2017

A Game-Theoretic Model for Analysis and Design of Self-organization Mechanisms in IoT.
Proceedings of the Game Theory for Networks - 7th International EAI Conference, 2017

On Fighting Fire with Fire: Strategic Destabilization of Terrorist Networks.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Adaptive beam nulling in multihop ad hoc networks against a jammer in motion.
Comput. Networks, 2016

2015
Enhancement of spectrum utilization in non-contiguous DSA with online defragmentation.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Performance of Adaptive Beam Nulling in Multihop Ad-Hoc Networks under Jamming.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015


  Loading...