Vahid Behzadan
Cited by
Cited by
Technical Report on the CleverHans v2.1.0 Adversarial Examples Library
N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ...
arXiv preprint arXiv:1610.00768v6 10, 2018
Vulnerability of deep reinforcement learning to policy induction attacks
V Behzadan, A Munir
International Conference on Machine Learning and Data Mining in Pattern …, 2017
Performance of adaptive beam nulling in multihop ad-hoc networks under jamming
S Bhunia, V Behzadan, PA Regis, S Sengupta
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
Whatever does not kill deep reinforcement learning, makes it stronger
V Behzadan, A Munir
arXiv preprint arXiv:1712.09344, 2017
Adaptive beam nulling in multihop ad hoc networks against a jammer in motion
S Bhunia, V Behzadan, PA Regis, S Sengupta
Computer Networks 109, 50-66, 2016
A psychopathological approach to safety engineering in ai and agi
V Behzadan, A Munir, RV Yampolskiy
International Conference on Computer Safety, Reliability, and Security, 513-520, 2018
Cyber-physical attacks on uas networks-challenges and open research problems
V Behzadan
arXiv preprint arXiv:1702.01251, 2017
Adversarial reinforcement learning framework for benchmarking collision avoidance mechanisms in autonomous vehicles
V Behzadan, A Munir
IEEE Intelligent Transportation Systems Magazine, 2019
The faults in our pi stars: Security issues and open challenges in deep reinforcement learning
V Behzadan, A Munir
arXiv preprint arXiv:1810.10369, 2018
A novel utilization of cluster-tree wireless sensor networks for situation awareness in smart grids
MS Ebrahimi, MH Daraei, V Behzadan, A Khajooeizadeh, SA Behrostaghi, ...
2011 IEEE PES Innovative Smart Grid Technologies, 1-5, 2011
Emergence of addictive behaviors in reinforcement learning agents
V Behzadan, RV Yampolskiy, A Munir
arXiv preprint arXiv:1811.05590, 2018
Mitigation of policy manipulation attacks on deep q-networks with parameter-space noise
V Behzadan, A Munir
International Conference on Computer Safety, Reliability, and Security, 406-417, 2018
Rl-based method for benchmarking the adversarial resilience and robustness of deep reinforcement learning policies
V Behzadan, W Hsu
International Conference on Computer Safety, Reliability, and Security, 314-325, 2019
A game-theoretic model for analysis and design of self-organization mechanisms in IoT
V Behzadan, B Rekabdar
International Conference on Game Theory for Networks, 74-85, 2017
Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies
V Behzadan, W Hsu
arXiv preprint arXiv:1906.01126, 2019
Corpus and Deep Learning Classifier for Collection of Cyber Threat Indicators in Twitter Stream
V Behzadan, C Aguirre, A Bose, W Hsu
2018 IEEE International Conference on Big Data (Big Data), 5002-5007, 2018
Adversarial exploitation of emergent dynamics in smart cities
V Behzadan, A Munir
2018 IEEE International Smart Cities Conference (ISC2), 1-8, 2018
Models and Framework for Adversarial Attacks on Complex Adaptive Systems
V Behzadan, A Munir
arXiv preprint arXiv:1709.04137, 2017
On Fighting Fire with Fire: Strategic Destabilization of Terrorist Networks
V Behzadan, A Nourmohammadi, M Gunes, M Yuksel
Proceedings of the 2017 {IEEE/ACM} International Conference on Advances in …, 2017
Evaluation of Uncertainty for Soil Water Characteristic Curve Measurements and the Implications for Predicting the Hydro-Mechanical Behavior of Unsaturated Soils
L Fissel, RJ Breitmeyer
Geotechnical Frontiers 2017, 579-588, 2016
The system can't perform the operation now. Try again later.
Articles 1–20