


default search action
Vahid Behzadan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j3]Dalton A. Hahn, Arslan Munir
, Vahid Behzadan:
Security and Privacy Issues in Intelligent Transportation Systems: Classification and Challenges. IEEE Intell. Transp. Syst. Mag. 13(1): 181-196 (2021) - [j2]Vahid Behzadan, Arslan Munir
:
Adversarial Reinforcement Learning Framework for Benchmarking Collision Avoidance Mechanisms in Autonomous Vehicles. IEEE Intell. Transp. Syst. Mag. 13(2): 236-241 (2021) - 2016
- [j1]Suman Bhunia
, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta:
Adaptive beam nulling in multihop ad hoc networks against a jammer in motion. Comput. Networks 109: 50-66 (2016)
Conference and Workshop Papers
- 2024
- [c27]Nancirose Piazza, Bibek Upadhayay, Ronald Scarpa, Vahid Behzadan:
Large Language Models for Automatic Standardization of Cyber Deception Plans based on the Adversary Engagement Ontology. MILCOM 2024: 1-5 - 2023
- [c26]Nancirose Piazza, Vahid Behzadan:
A Theory of Mind Approach as Test-Time Mitigation Against Emergent Adversarial Communication. AAMAS 2023: 2842-2844 - [c25]Bibek Upadhayay, Vahid Behzadan:
Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events. SMC 2023: 3061-3066 - 2022
- [c24]Bibek Upadhayay, Vahid Behzadan:
Hybrid Deep Learning Model for Fake News Detection in Social Networks (Student Abstract). AAAI 2022: 13067-13068 - [c23]Pooya Tavallali, Vahid Behzadan, Azar Alizadeh, Aditya Ranganath, Mukesh Singhal:
Adversarial Label-Poisoning Attacks and Defense for General Multi-Class Models Based on Synthetic Reduced Nearest Neighbor. ICIP 2022: 3717-3722 - [c22]Azar Alizadeh, Mukesh Singhal, Vahid Behzadan, Pooya Tavallali, Aditya Ranganath:
Stochastic Induction of Decision Trees with Application to Learning Haar Trees. ICMLA 2022: 825-830 - [c21]Azar Alizadeh, Pooya Tavallali, Vahid Behzadan, Aditya Ranganath, Mukesh Singhal:
A Novel Approach for Synthetic Reduced Nearest-Neighbor Leveraging Neural Networks. ICMLA 2022: 831-836 - 2021
- [c20]Milan Zinzuvadiya, Vahid Behzadan:
State-Wise Adaptive Discounting from Experience (SADE): A Novel Discounting Scheme for Reinforcement Learning (Student Abstract). AAAI 2021: 15953-15954 - [c19]Bibek Upadhayay, Zeeshan Ahmed M. Lodhia, Vahid Behzadan:
Combating Human Trafficking via Automatic OSINT Collection, Validation and Fusion. ICWSM Workshops 2021 - [c18]Avishek Bose, Shreya Gopal Sundari, Vahid Behzadan, William H. Hsu:
Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter Network. ISI 2021: 1-6 - 2020
- [c17]Vahid Behzadan, Ibrahim M. Baggili:
Founding The Domain of AI Forensics. SafeAI@AAAI 2020: 31-35 - [c16]Bibek Upadhayay, Vahid Behzadan:
Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification. ISI 2020: 1-6 - 2019
- [c15]Vahid Behzadan, Roman V. Yampolskiy, Arslan Munir:
Emergence of Addictive Behaviors in Reinforcement Learning Agents. SafeAI@AAAI 2019 - [c14]Vahid Behzadan, James Minton, Arslan Munir
:
TrolleyMod v1.0: An Open-Source Simulation and Data-Collection Platform for Ethical Decision Making in Autonomous Vehicles. AIES 2019: 391-395 - [c13]Avishek Bose, Vahid Behzadan, Carlos A. Aguirre, William H. Hsu:
A novel approach for detection and ranking of trendy and emerging cyber threat events in Twitter streams. ASONAM 2019: 871-878 - [c12]Vahid Behzadan, William H. Hsu:
Adversarial Exploitation of Policy Imitation. AISafety@IJCAI 2019 - [c11]Vahid Behzadan, William H. Hsu:
Watermarking of DRL Policies with Sequential Triggers. AISafety@IJCAI 2019 - [c10]Vahid Behzadan, William H. Hsu:
RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies. SAFECOMP Workshops 2019: 314-325 - 2018
- [c9]Vahid Behzadan, Carlos A. Aguirre, Avishek Bose, William H. Hsu:
Corpus and Deep Learning Classifier for Collection of Cyber Threat Indicators in Twitter Stream. IEEE BigData 2018: 5002-5007 - [c8]Vahid Behzadan, Arslan Munir
:
Adversarial Exploitation of Emergent Dynamics in Smart Cities. ISC2 2018: 1-8 - [c7]Vahid Behzadan, Arslan Munir
:
Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space Noise. SAFECOMP Workshops 2018: 406-417 - [c6]Vahid Behzadan, Arslan Munir
, Roman V. Yampolskiy:
A Psychopathological Approach to Safety Engineering in AI and AGI. SAFECOMP Workshops 2018: 513-520 - 2017
- [c5]Vahid Behzadan, Amin Nourmohammadi, Mehmet Hadi Gunes, Murat Yuksel:
On Fighting Fire with Fire: Strategic Destabilization of Terrorist Networks. ASONAM 2017: 1120-1127 - [c4]Vahid Behzadan, Banafsheh Rekabdar:
A Game-Theoretic Model for Analysis and Design of Self-organization Mechanisms in IoT. GAMENETS 2017: 74-85 - [c3]Vahid Behzadan, Arslan Munir
:
Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks. MLDM 2017: 262-275 - 2015
- [c2]Suman Bhunia
, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta:
Performance of Adaptive Beam Nulling in Multihop Ad-Hoc Networks under Jamming. HPCC/CSS/ICESS 2015: 1236-1241 - [c1]Suman Bhunia
, Vahid Behzadan, Shamik Sengupta:
Enhancement of spectrum utilization in non-contiguous DSA with online defragmentation. MILCOM 2015: 432-437
Informal and Other Publications
- 2024
- [i27]Nancirose Piazza, Vahid Behzadan, Stefan Sarkadi:
The Power in Communication: Power Regularization of Communication for Autonomy in Cooperative Multi-Agent Reinforcement Learning. CoRR abs/2404.06387 (2024) - [i26]Bibek Upadhayay, Vahid Behzadan:
Sandwich attack: Multi-language Mixture Adaptive Attack on LLMs. CoRR abs/2404.07242 (2024) - [i25]Bibek Upadhayay, Vahid Behzadan, Amin Karbasi:
Cognitive Overload Attack:Prompt Injection for Long Context. CoRR abs/2410.11272 (2024) - 2023
- [i24]Nancirose Piazza, Vahid Behzadan:
A Theory of Mind Approach as Test-Time Mitigation Against Emergent Adversarial Communication. CoRR abs/2302.07176 (2023) - [i23]Bibek Upadhayay, Vahid Behzadan:
TaCo: Enhancing Cross-Lingual Transfer for Low-Resource Languages in LLMs through Translation-Assisted Chain-of-Thought Processes. CoRR abs/2311.10797 (2023) - 2022
- [i22]Bibek Upadhayay, Vahid Behzadan:
Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events. CoRR abs/2211.10033 (2022) - 2021
- [i21]Pooya Tavallali, Vahid Behzadan, Peyman Tavallali, Mukesh Singhal:
Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors. CoRR abs/2102.05867 (2021) - [i20]Nancirose Piazza, Vahid Behzadan:
Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP). CoRR abs/2109.14678 (2021) - 2020
- [i19]Bibek Upadhayay, Vahid Behzadan:
Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification. CoRR abs/2009.01047 (2020) - [i18]Yaser Faghan, Nancirose Piazza, Vahid Behzadan, Ali Fathi:
Adversarial Attacks on Deep Algorithmic Trading Policies. CoRR abs/2010.11388 (2020) - 2019
- [i17]Vahid Behzadan, William H. Hsu:
RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies. CoRR abs/1906.01110 (2019) - [i16]Vahid Behzadan, William H. Hsu:
Analysis and Improvement of Adversarial Training in DQN Agents With Adversarially-Guided Exploration (AGE). CoRR abs/1906.01119 (2019) - [i15]Vahid Behzadan, William H. Hsu:
Adversarial Exploitation of Policy Imitation. CoRR abs/1906.01121 (2019) - [i14]Vahid Behzadan, William H. Hsu:
Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies. CoRR abs/1906.01126 (2019) - [i13]Avishek Bose, Vahid Behzadan, Carlos A. Aguirre, William H. Hsu:
A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams. CoRR abs/1907.07768 (2019) - [i12]Ibrahim M. Baggili, Vahid Behzadan:
Founding The Domain of AI Forensics. CoRR abs/1912.06497 (2019) - 2018
- [i11]Vahid Behzadan, Arslan Munir, Roman V. Yampolskiy:
A Psychopathological Approach to Safety Engineering in AI and AGI. CoRR abs/1805.08915 (2018) - [i10]Vahid Behzadan, Arslan Munir:
Adversarial Reinforcement Learning Framework for Benchmarking Collision Avoidance Mechanisms in Autonomous Vehicles. CoRR abs/1806.01368 (2018) - [i9]Vahid Behzadan, Arslan Munir:
Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space Noise. CoRR abs/1806.02190 (2018) - [i8]Vahid Behzadan, Arslan Munir:
The Faults in Our Pi Stars: Security Issues and Open Challenges in Deep Reinforcement Learning. CoRR abs/1810.10369 (2018) - [i7]Vahid Behzadan, Roman V. Yampolskiy, Arslan Munir:
Emergence of Addictive Behaviors in Reinforcement Learning Agents. CoRR abs/1811.05590 (2018) - [i6]Vahid Behzadan, James Minton, Arslan Munir:
TrolleyMod v1.0: An Open-Source Simulation and Data-Collection Platform for Ethical Decision Making in Autonomous Vehicles. CoRR abs/1811.05594 (2018) - 2017
- [i5]Vahid Behzadan, Arslan Munir:
Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks. CoRR abs/1701.04143 (2017) - [i4]Vahid Behzadan, Banafsheh Rekabdar:
A Game-Theoretic Model for Analysis and Design of Self-Organization Mechanisms in IoT. CoRR abs/1701.04562 (2017) - [i3]Vahid Behzadan:
Cyber-Physical Attacks on UAS Networks- Challenges and Open Research Problems. CoRR abs/1702.01251 (2017) - [i2]Vahid Behzadan, Arslan Munir:
Models and Framework for Adversarial Attacks on Complex Adaptive Systems. CoRR abs/1709.04137 (2017) - [i1]Vahid Behzadan, Arslan Munir:
Whatever Does Not Kill Deep Reinforcement Learning, Makes It Stronger. CoRR abs/1712.09344 (2017)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint