Research
Adversarial Machine Learning
Artificial Intelligence
Multi Agent Systems
Social Network Analysis
AI Safety
AI Security
Brain Computer Interface, Brain Computer Interfaces
Complex Adaptive Systems
Cybersecurity
Game Theory
Neurotechnology
Natural Language Processing
Nearest Neighbor
Adversarial Attacks, Adversarial Attack
Deep Reinforcement Learning
Epidemic Outbreaks
Learning Approach, Learning Approaches
Low Resource Languages
Short Review
Thought Processes
Combating Human Trafficking
Deep Learning Model, Deep Learning Models
Learning Techniques
Ai Forensics
Multi Agent Reinforcement Learning
Open Source Intelligence
Hoc Networks, Hoc Network
Autonomous Vehicles, Autonomous Vehicle
Spectrum Utilization
Real Time Inference
Addictive Behaviors
Adversarial Examples
Cyber Threat Indicators
Open Challenges
Safety Engineering
Security Issues
Smart Cities, Smart City
Adversarial Training
Intelligent Transportation Systems, Intelligent Transportation System
Privacy Issues
Open Research Problems
Physical Attacks
Situation Awareness, Situational Awareness
Smart Grid, Smart Grids
Wireless Sensor Networks, Wireless Sensor Network
List of Publications (59)
In 2024
59
Sandwich attack: Multi-language mixture adaptive attack on llms. B Upadhayay, V Behzadan arXiv preprint arXiv:2404.07242, 2024.
Found on Publication Page
58
The Power in Communication: Power Regularization of Communication for Autonomy in Cooperative Multi-Agent Reinforcement Learning. N Piazza, V Behzadan, S Sarkadi arXiv preprint arXiv:2404.06387, 2024.
Found on Publication Page
57
Cognitive Overload Attack: Prompt Injection for Long Context. B Upadhayay, V Behzadan, A Karbasi arXiv preprint arXiv:2410.11272, 2024.
Found on Publication Page
In 2023
56
Short Review on Supervised Learning Under Adversarial Label Poisoning and Clean-Label Data Poisoning. P Tavllali, V Behzadan 2023 Congress in Computer Science, Computer Engineering, & Applied Computing ..., 2023.
Found on Publication Page
55
A theory of mind approach as test-time mitigation against emergent adversarial communication. N Piazza, V Behzadan arXiv preprint arXiv:2302.07176, 2023.
Found on Publication Page
54
TaCo: Enhancing Cross-Lingual Transfer for Low-Resource Languages in LLMs through Translation-Assisted Chain-of-Thought Processes. B Upadhayay, V Behzadan arXiv preprint arXiv:2311.10797, 2023.
Found on Publication Page
53
Limitations of Theory of Mind Defenses against Deception in Multi-Agent Systems. N Piazza, V Behzadan, S Sarkadi .
Found on Publication Page
52
Reinforcement Learning Approach to Evaluation and Decision-Support of Lockdown Policies for Epidemic Outbreaks. MS Suwal, M Soltanolkottabi, V Behzadan IIE Annual Conference. Proceedings, 1-6, 2023.
Found on Publication Page
51
Adversarial stimuli: Attacking brain-computer interfaces via perturbed sensory events. B Upadhayay, V Behzadan 2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC ..., 2023.
Found on Publication Page
In 2022
50
Effects of Maternal Nutrient Restriction and Melatonin Supplementation on Cardiomyocyte Cell Development Parameters Using Machine Learning Techniques. M Mazinani, ZE Contreras-Correa, V Behzadan, S Gopal, CO Lemley Animals 12 (14), 1818, 2022.
Found on Publication Page
49
Hybrid deep learning model for fake news detection in social networks (student abstract). B Upadhayay, V Behzadan Proceedings of the AAAI Conference on Artificial Intelligence 36 (11), 13067 ..., 2022.
Found on Publication Page
48
A Novel Approach for Synthetic Reduced Nearest-Neighbor Leveraging Neural Networks. A Alizadeh, P Tavallali, V Behzadan, A Ranganath, M Singhal 2022 21st IEEE International Conference on Machine Learning and Applications ..., 2022.
Found on Publication Page
47
Stochastic Induction of Decision Trees with Application to Learning Haar Trees. A Alizadeh, M Singhal, V Behzadan, P Tavallali, A Ranganath 2022 21st IEEE International Conference on Machine Learning and Applications ..., 2022.
Found on Publication Page
46
Adversarial label-poisoning attacks and defense for general multi-class models based on synthetic reduced nearest neighbor. P Tavallali, V Behzadan, A Alizadeh, A Ranganath, M Singhal 2022 IEEE International Conference on Image Processing (ICIP), 3717-3722, 2022.
Found on Publication Page
In 2021
45
Tracing relevant twitter accounts active in cyber threat intelligence domain by exploiting content and structure of twitter network. A Bose, SG Sundari, V Behzadan, WH Hsu 2021 IEEE International Conference on Intelligence and Security Informatics ..., 2021.
Found on Publication Page
44
State-wise adaptive discounting from experience (sade): A novel discounting scheme for reinforcement learning (student abstract). M Zinzuvadiya, V Behzadan Proceedings of the AAAI Conference on Artificial Intelligence 35 (18), 15953 ..., 2021.
Found on Publication Page
43
Combating Human Trafficking via Automatic OSINT Collection, Validation and Fusion. B Upadhayay, ZAM Lodhia, V Behzadan, W Haven ICWSM Workshops, 2021.
Found on Publication Page
42
Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP). N Piazza, V Behzadan arXiv preprint arXiv:2109.14678, 2021.
Found on Publication Page
41
Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors. P Tavallali, V Behzadan, P Tavallali, M Singhal arXiv preprint arXiv:2102.05867, 2021.
Found on Publication Page
40
Adversarial Attacks on Deep Algorithmic Trading Policies. N Piazza, Y Faghan, V Behzadan, A Fathi .
Found on Publication Page
In 2020
39
Sentimental liar: Extended corpus and deep learning models for fake claim classification. B Upadhayay, V Behzadan 2020 IEEE International Conference on Intelligence and Security Informatics ..., 2020.
Found on Publication Page
37
Adversarial attacks on deep algorithmic trading policies. Y Faghan, N Piazza, V Behzadan, A Fathi arXiv preprint arXiv:2010.11388, 2020.
Found on Publication Page
In 2019
36
Security and privacy issues in intelligent transportation systems: Classification and challenges. D Hahn, A Munir, V Behzadan IEEE Intelligent Transportation Systems Magazine 13 (1), 181-196, 2019.
Found on Publication Page
35
Adversarial reinforcement learning framework for benchmarking collision avoidance mechanisms in autonomous vehicles. V Behzadan, A Munir IEEE Intelligent Transportation Systems Magazine 13 (2), 236-241, 2019.
Found on Publication Page
34
Sequential triggers for watermarking of deep reinforcement learning policies. V Behzadan, W Hsu arXiv preprint arXiv:1906.01126, 2019.
Found on Publication Page
33
A novel approach for detection and ranking of trendy and emerging cyber threat events in twitter streams. A Bose, V Behzadan, C Aguirre, WH Hsu Proceedings of the 2019 IEEE/ACM International Conference on Advances in ..., 2019.
Found on Publication Page
32
Adversarial exploitation of policy imitation. V Behzadan, W Hsu arXiv preprint arXiv:1906.01121, 2019.
Found on Publication Page
31
Analysis and improvement of adversarial training in dqn agents with adversarially-guided exploration (age). V Behzadan, W Hsu arXiv preprint arXiv:1906.01119, 2019.
Found on Publication Page
30
Founding the domain of AI forensics. I Baggili, V Behzadan arXiv preprint arXiv:1912.06497, 2019.
Found on Publication Page
29
Rl-based method for benchmarking the adversarial resilience and robustness of deep reinforcement learning policies. V Behzadan, W Hsu Computer Safety, Reliability, and Security: SAFECOMP 2019 Workshops, ASSURE ..., 2019.
Found on Publication Page
28
Trolleymod v1. 0: An open-source simulation and data-collection platform for ethical decision making in autonomous vehicles. V Behzadan, J Minton, A Munir Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 391-395, 2019.
Found on Publication Page
In 2018
26
Technical Report on the CleverHans v2.1.0 Adversarial Examples Library. N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ... arXiv preprint arXiv:1610.00768v6 10, 2018.
Found on Publication Page
25
Corpus and deep learning classifier for collection of cyber threat indicators in twitter stream. V Behzadan, C Aguirre, A Bose, W Hsu 2018 IEEE International Conference on Big Data (Big Data), 5002-5007, 2018.
Found on Publication Page
24
The faults in our pi stars: Security issues and open challenges in deep reinforcement learning. V Behzadan, A Munir arXiv preprint arXiv:1810.10369, 2018.
Found on Publication Page
23
Mitigation of policy manipulation attacks on deep q-networks with parameter-space noise. V Behzadan, A Munir Computer Safety, Reliability, and Security: SAFECOMP 2018 Workshops, ASSURE ..., 2018.
Found on Publication Page
22
Emergence of addictive behaviors in reinforcement learning agents. V Behzadan, RV Yampolskiy, A Munir arXiv preprint arXiv:1811.05590, 2018.
Found on Publication Page
21
A psychopathological approach to safety engineering in ai and agi. V Behzadan, A Munir, RV Yampolskiy Computer Safety, Reliability, and Security: SAFECOMP 2018 Workshops, ASSURE ..., 2018.
Found on Publication Page
20
Technical report on the cleverhans v2. 1.0 adversarial examples library. arXiv. N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ... arXiv preprint arXiv:1610.00768, 2018.
Found on Publication Page
19
Adversarial exploitation of emergent dynamics in smart cities. V Behzadan, A Munir 2018 IEEE International Smart Cities Conference (ISC2), 1-8, 2018.
Found on Publication Page
In 2017
18
Whatever does not kill deep reinforcement learning, makes it stronger. V Behzadan, A Munir arXiv preprint arXiv:1712.09344, 2017.
Found on Publication Page
17
Vulnerability of deep reinforcement learning to policy induction attacks. V Behzadan, A Munir Machine Learning and Data Mining in Pattern Recognition: 13th International ..., 2017.
Found on Publication Page
16
Cyber-physical attacks on uas networks-challenges and open research problems. V Behzadan arXiv preprint arXiv:1702.01251, 2017.
Found on Publication Page
15
A game-theoretic model for analysis and design of self-organization mechanisms in iot. V Behzadan, B Rekabdar Game Theory for Networks: 7th International EAI Conference, GameNets 2017 ..., 2017.
Found on Publication Page
14
Models and framework for adversarial attacks on complex adaptive systems. V Behzadan, A Munir arXiv preprint arXiv:1709.04137, 2017.
Found on Publication Page
13
On Fighting Fire with Fire: Strategic Destabilization of Terrorist Networks. V Behzadan, A Nourmohammadi, M Gunes, M Yuksel Proceedings of the 2017 {IEEE/ACM} International Conference on Advances in ..., 2017.
Found on Publication Page
In 2016
12
Adaptive beam nulling in multihop ad hoc networks against a jammer in motion. S Bhunia, V Behzadan, PA Regis, S Sengupta Computer Networks 109, 50-66, 2016.
Found on Publication Page
11
Real-time inference of topological sStructure and vulnerabilities for adaptive jamming against covert ad hoc networks. V Behzadan University of Nevada, Reno, 2016.
Found on Publication Page
In 2015
10
Performance of adaptive beam nulling in multihop ad-hoc networks under jamming. S Bhunia, V Behzadan, PA Regis, S Sengupta 2015 IEEE 17th International Conference on High Performance Computing and ..., 2015.
Found on Publication Page
9
Enhancement of spectrum utilization in non-contiguous dsa with online defragmentation. S Bhunia, V Behzadan, S Sengupta MILCOM 2015-2015 IEEE Military Communications Conference, 432-437, 2015.
Found on Publication Page
In 2011
8
A novel utilization of cluster-tree wireless sensor networks for situation awareness in smart grids. MS Ebrahimi, MH Daraei, V Behzadan, A Khajooeizadeh, SA Behrostaghi, ... 2011 IEEE PES Innovative Smart Grid Technologies, 1-5, 2011.
Found on Publication Page
Unspecified
6
Generalized Hyperbolic Discounting for Delay-Sensitive Reinforcement Learning. RF Ali, J Woods, RA Southern, T Smith, V Behzadan, W Hsu Finding the Frame: An RLC Workshop for Examining Conceptual Frameworks, 0.
Found on Publication Page
5
Hyperbolic Discounting in Multi-Agent Reinforcement Learning. RF Ali, J Woods, E Seraj, K Duong, V Behzadan, W Hsu Finding the Frame: An RLC Workshop for Examining Conceptual Frameworks, 0.
Found on Publication Page
4
Technical report on the cleverhans v2. 1.0 adversarial examples library (2018). N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ... arXiv preprint arXiv:1610.00768, 0.
Found on Publication Page
2
Ebrahimi, Mohammadreza 169, 181 Eren, Maksim 53 Esaki, Hiroshi 80 Evans, Samuel 271. A Abbasi, SMA Abbasi, M Abdelsalam, YS Abdulsalam, J Abreu, ... .
Found on Publication Page
1
International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2020) FOSINT-SI 2020 Symposium Organizing Committee. R Alhajj, P Shakarian, U Gla sser, F Spezzano, M Tayebi, D Caragea, ... .
Found on Publication Page