Vahid Behzadan

Profile Picture of Vahid Behzadan
Title
Assistant Professor
Department
Electrical and Computer Engineering and Computer Science
Institution
University of New Haven

Education

  • Ph.D. Computer Science

Research Interests

Adversarial Machine Learning   Artificial Intelligence   Multi Agent Systems  

  View all research interests

Biography

Not mentioned yet

Homepages

Contact Information

Not mentioned yet.
Research
Not mentioned yet. (?)
List of Publications (59)
In 2024
59

Sandwich attack: Multi-language mixture adaptive attack on llms. B Upadhayay, V Behzadan arXiv preprint arXiv:2404.07242, 2024.

Found on Publication Page
58

The Power in Communication: Power Regularization of Communication for Autonomy in Cooperative Multi-Agent Reinforcement Learning. N Piazza, V Behzadan, S Sarkadi arXiv preprint arXiv:2404.06387, 2024.

Found on Publication Page
57

Cognitive Overload Attack: Prompt Injection for Long Context. B Upadhayay, V Behzadan, A Karbasi arXiv preprint arXiv:2410.11272, 2024.

Found on Publication Page
In 2023
56

Short Review on Supervised Learning Under Adversarial Label Poisoning and Clean-Label Data Poisoning. P Tavllali, V Behzadan 2023 Congress in Computer Science, Computer Engineering, & Applied Computing ..., 2023.

Found on Publication Page
55

A theory of mind approach as test-time mitigation against emergent adversarial communication. N Piazza, V Behzadan arXiv preprint arXiv:2302.07176, 2023.

Found on Publication Page
54

TaCo: Enhancing Cross-Lingual Transfer for Low-Resource Languages in LLMs through Translation-Assisted Chain-of-Thought Processes. B Upadhayay, V Behzadan arXiv preprint arXiv:2311.10797, 2023.

Found on Publication Page
53

Limitations of Theory of Mind Defenses against Deception in Multi-Agent Systems. N Piazza, V Behzadan, S Sarkadi .

Found on Publication Page
52

Reinforcement Learning Approach to Evaluation and Decision-Support of Lockdown Policies for Epidemic Outbreaks. MS Suwal, M Soltanolkottabi, V Behzadan IIE Annual Conference. Proceedings, 1-6, 2023.

Found on Publication Page
51

Adversarial stimuli: Attacking brain-computer interfaces via perturbed sensory events. B Upadhayay, V Behzadan 2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC ..., 2023.

Found on Publication Page
In 2022
50

Effects of Maternal Nutrient Restriction and Melatonin Supplementation on Cardiomyocyte Cell Development Parameters Using Machine Learning Techniques. M Mazinani, ZE Contreras-Correa, V Behzadan, S Gopal, CO Lemley Animals 12 (14), 1818, 2022.

Found on Publication Page
49

Hybrid deep learning model for fake news detection in social networks (student abstract). B Upadhayay, V Behzadan Proceedings of the AAAI Conference on Artificial Intelligence 36 (11), 13067 ..., 2022.

Found on Publication Page
48

A Novel Approach for Synthetic Reduced Nearest-Neighbor Leveraging Neural Networks. A Alizadeh, P Tavallali, V Behzadan, A Ranganath, M Singhal 2022 21st IEEE International Conference on Machine Learning and Applications ..., 2022.

Found on Publication Page
47

Stochastic Induction of Decision Trees with Application to Learning Haar Trees. A Alizadeh, M Singhal, V Behzadan, P Tavallali, A Ranganath 2022 21st IEEE International Conference on Machine Learning and Applications ..., 2022.

Found on Publication Page
46

Adversarial label-poisoning attacks and defense for general multi-class models based on synthetic reduced nearest neighbor. P Tavallali, V Behzadan, A Alizadeh, A Ranganath, M Singhal 2022 IEEE International Conference on Image Processing (ICIP), 3717-3722, 2022.

Found on Publication Page
In 2021
45

Tracing relevant twitter accounts active in cyber threat intelligence domain by exploiting content and structure of twitter network. A Bose, SG Sundari, V Behzadan, WH Hsu 2021 IEEE International Conference on Intelligence and Security Informatics ..., 2021.

Found on Publication Page
44

State-wise adaptive discounting from experience (sade): A novel discounting scheme for reinforcement learning (student abstract). M Zinzuvadiya, V Behzadan Proceedings of the AAAI Conference on Artificial Intelligence 35 (18), 15953 ..., 2021.

Found on Publication Page
43

Combating Human Trafficking via Automatic OSINT Collection, Validation and Fusion. B Upadhayay, ZAM Lodhia, V Behzadan, W Haven ICWSM Workshops, 2021.

Found on Publication Page
42

Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP). N Piazza, V Behzadan arXiv preprint arXiv:2109.14678, 2021.

Found on Publication Page
41

Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors. P Tavallali, V Behzadan, P Tavallali, M Singhal arXiv preprint arXiv:2102.05867, 2021.

Found on Publication Page
40

Adversarial Attacks on Deep Algorithmic Trading Policies. N Piazza, Y Faghan, V Behzadan, A Fathi .

Found on Publication Page
In 2020
39

Sentimental liar: Extended corpus and deep learning models for fake claim classification. B Upadhayay, V Behzadan 2020 IEEE International Conference on Intelligence and Security Informatics ..., 2020.

Found on Publication Page
38

Founding The Domain of AI Forensics. V Behzadan, IM Baggili SafeAI@ AAAI, 31-35, 2020.

Found on Publication Page
37

Adversarial attacks on deep algorithmic trading policies. Y Faghan, N Piazza, V Behzadan, A Fathi arXiv preprint arXiv:2010.11388, 2020.

Found on Publication Page
In 2019
36

Security and privacy issues in intelligent transportation systems: Classification and challenges. D Hahn, A Munir, V Behzadan IEEE Intelligent Transportation Systems Magazine 13 (1), 181-196, 2019.

Found on Publication Page
35

Adversarial reinforcement learning framework for benchmarking collision avoidance mechanisms in autonomous vehicles. V Behzadan, A Munir IEEE Intelligent Transportation Systems Magazine 13 (2), 236-241, 2019.

Found on Publication Page
34

Sequential triggers for watermarking of deep reinforcement learning policies. V Behzadan, W Hsu arXiv preprint arXiv:1906.01126, 2019.

Found on Publication Page
33

A novel approach for detection and ranking of trendy and emerging cyber threat events in twitter streams. A Bose, V Behzadan, C Aguirre, WH Hsu Proceedings of the 2019 IEEE/ACM International Conference on Advances in ..., 2019.

Found on Publication Page
32

Adversarial exploitation of policy imitation. V Behzadan, W Hsu arXiv preprint arXiv:1906.01121, 2019.

Found on Publication Page
31

Analysis and improvement of adversarial training in dqn agents with adversarially-guided exploration (age). V Behzadan, W Hsu arXiv preprint arXiv:1906.01119, 2019.

Found on Publication Page
30

Founding the domain of AI forensics. I Baggili, V Behzadan arXiv preprint arXiv:1912.06497, 2019.

Found on Publication Page
29

Rl-based method for benchmarking the adversarial resilience and robustness of deep reinforcement learning policies. V Behzadan, W Hsu Computer Safety, Reliability, and Security: SAFECOMP 2019 Workshops, ASSURE ..., 2019.

Found on Publication Page
28

Trolleymod v1. 0: An open-source simulation and data-collection platform for ethical decision making in autonomous vehicles. V Behzadan, J Minton, A Munir Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 391-395, 2019.

Found on Publication Page
27

Security of deep reinforcement learning. V Behzadan Kansas State University, 2019.

Found on Publication Page
In 2018
26

Technical Report on the CleverHans v2.1.0 Adversarial Examples Library. N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ... arXiv preprint arXiv:1610.00768v6 10, 2018.

Found on Publication Page
25

Corpus and deep learning classifier for collection of cyber threat indicators in twitter stream. V Behzadan, C Aguirre, A Bose, W Hsu 2018 IEEE International Conference on Big Data (Big Data), 5002-5007, 2018.

Found on Publication Page
24

The faults in our pi stars: Security issues and open challenges in deep reinforcement learning. V Behzadan, A Munir arXiv preprint arXiv:1810.10369, 2018.

Found on Publication Page
23

Mitigation of policy manipulation attacks on deep q-networks with parameter-space noise. V Behzadan, A Munir Computer Safety, Reliability, and Security: SAFECOMP 2018 Workshops, ASSURE ..., 2018.

Found on Publication Page
22

Emergence of addictive behaviors in reinforcement learning agents. V Behzadan, RV Yampolskiy, A Munir arXiv preprint arXiv:1811.05590, 2018.

Found on Publication Page
21

A psychopathological approach to safety engineering in ai and agi. V Behzadan, A Munir, RV Yampolskiy Computer Safety, Reliability, and Security: SAFECOMP 2018 Workshops, ASSURE ..., 2018.

Found on Publication Page
20

Technical report on the cleverhans v2. 1.0 adversarial examples library. arXiv. N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ... arXiv preprint arXiv:1610.00768, 2018.

Found on Publication Page
19

Adversarial exploitation of emergent dynamics in smart cities. V Behzadan, A Munir 2018 IEEE International Smart Cities Conference (ISC2), 1-8, 2018.

Found on Publication Page
In 2017
18

Whatever does not kill deep reinforcement learning, makes it stronger. V Behzadan, A Munir arXiv preprint arXiv:1712.09344, 2017.

Found on Publication Page
17

Vulnerability of deep reinforcement learning to policy induction attacks. V Behzadan, A Munir Machine Learning and Data Mining in Pattern Recognition: 13th International ..., 2017.

Found on Publication Page
16

Cyber-physical attacks on uas networks-challenges and open research problems. V Behzadan arXiv preprint arXiv:1702.01251, 2017.

Found on Publication Page
15

A game-theoretic model for analysis and design of self-organization mechanisms in iot. V Behzadan, B Rekabdar Game Theory for Networks: 7th International EAI Conference, GameNets 2017 ..., 2017.

Found on Publication Page
14

Models and framework for adversarial attacks on complex adaptive systems. V Behzadan, A Munir arXiv preprint arXiv:1709.04137, 2017.

Found on Publication Page
13

On Fighting Fire with Fire: Strategic Destabilization of Terrorist Networks. V Behzadan, A Nourmohammadi, M Gunes, M Yuksel Proceedings of the 2017 {IEEE/ACM} International Conference on Advances in ..., 2017.

Found on Publication Page
In 2016
12

Adaptive beam nulling in multihop ad hoc networks against a jammer in motion. S Bhunia, V Behzadan, PA Regis, S Sengupta Computer Networks 109, 50-66, 2016.

Found on Publication Page
11

Real-time inference of topological sStructure and vulnerabilities for adaptive jamming against covert ad hoc networks. V Behzadan University of Nevada, Reno, 2016.

Found on Publication Page
In 2015
10

Performance of adaptive beam nulling in multihop ad-hoc networks under jamming. S Bhunia, V Behzadan, PA Regis, S Sengupta 2015 IEEE 17th International Conference on High Performance Computing and ..., 2015.

Found on Publication Page
9

Enhancement of spectrum utilization in non-contiguous dsa with online defragmentation. S Bhunia, V Behzadan, S Sengupta MILCOM 2015-2015 IEEE Military Communications Conference, 432-437, 2015.

Found on Publication Page
In 2011
8

A novel utilization of cluster-tree wireless sensor networks for situation awareness in smart grids. MS Ebrahimi, MH Daraei, V Behzadan, A Khajooeizadeh, SA Behrostaghi, ... 2011 IEEE PES Innovative Smart Grid Technologies, 1-5, 2011.

Found on Publication Page
Unspecified
7

A note on binary classifiers. V Behzadan, O Hijab .

Found on Publication Page
6

Generalized Hyperbolic Discounting for Delay-Sensitive Reinforcement Learning. RF Ali, J Woods, RA Southern, T Smith, V Behzadan, W Hsu Finding the Frame: An RLC Workshop for Examining Conceptual Frameworks, 0.

Found on Publication Page
5

Hyperbolic Discounting in Multi-Agent Reinforcement Learning. RF Ali, J Woods, E Seraj, K Duong, V Behzadan, W Hsu Finding the Frame: An RLC Workshop for Examining Conceptual Frameworks, 0.

Found on Publication Page
4

Technical report on the cleverhans v2. 1.0 adversarial examples library (2018). N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ... arXiv preprint arXiv:1610.00768, 0.

Found on Publication Page
3

Synthetic Reduced Nearest Neighbor Model for Regression. P Tavallali, V Behzadan, M Singhal .

Found on Publication Page
2

Ebrahimi, Mohammadreza 169, 181 Eren, Maksim 53 Esaki, Hiroshi 80 Evans, Samuel 271. A Abbasi, SMA Abbasi, M Abdelsalam, YS Abdulsalam, J Abreu, ... .

Found on Publication Page
1

International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2020) FOSINT-SI 2020 Symposium Organizing Committee. R Alhajj, P Shakarian, U Gla sser, F Spezzano, M Tayebi, D Caragea, ... .

Found on Publication Page
Search Profiles
Colleagues
Profile Picture of Paul Klee
University of New Haven
Profile Picture of Nina Barretts
University of New Haven
Profile Picture of Amanda R. Bozack
University of New Haven
People Also Viewed
Profile Picture of Mary Danisi
Cornell University
Profile Picture of Omar Elabd
University of Illinois Urbana-Champaign
Profile Picture of Maria Kalaitzandonakes
University of Illinois Urbana-Champaign
Recommended Grants