Vahid Behzadan
TitleCited byYear
Technical Report on the CleverHans v2.1.0 Adversarial Examples Library
N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ...
arXiv preprint arXiv:1610.00768v6 10, 2018
Vulnerability of deep reinforcement learning to policy induction attacks
V Behzadan, A Munir
International Conference on Machine Learning and Data Mining in Pattern …, 2017
Performance of adaptive beam nulling in multihop ad-hoc networks under jamming
S Bhunia, V Behzadan, PA Regis, S Sengupta
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
Whatever does not kill deep reinforcement learning, makes it stronger
V Behzadan, A Munir
arXiv preprint arXiv:1712.09344, 2017
Adaptive beam nulling in multihop ad hoc networks against a jammer in motion
S Bhunia, V Behzadan, PA Regis, S Sengupta
Computer Networks 109, 50-66, 2016
The faults in our pi stars: Security issues and open challenges in deep reinforcement learning
V Behzadan, A Munir
arXiv preprint arXiv:1810.10369, 2018
A psychopathological approach to safety engineering in ai and agi
V Behzadan, A Munir, RV Yampolskiy
International Conference on Computer Safety, Reliability, and Security, 513-520, 2018
Cyber-physical attacks on uas networks-challenges and open research problems
V Behzadan
arXiv preprint arXiv:1702.01251, 2017
A novel utilization of cluster-tree wireless sensor networks for situation awareness in smart grids
MS Ebrahimi, MH Daraei, V Behzadan, A Khajooeizadeh, SA Behrostaghi, ...
2011 IEEE PES Innovative Smart Grid Technologies, 1-5, 2011
Adversarial reinforcement learning framework for benchmarking collision avoidance mechanisms in autonomous vehicles
V Behzadan, A Munir
arXiv preprint arXiv:1806.01368, 2018
Emergence of Addictive Behaviors in Reinforcement Learning Agents
V Behzadan, RV Yampolskiy, A Munir
arXiv preprint arXiv:1811.05590, 2018
Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space Noise
V Behzadan, A Munir
International Conference on Computer Safety, Reliability, and Security, 406-417, 2018
A game-theoretic model for analysis and design of self-organization mechanisms in IoT
V Behzadan, B Rekabdar
International Conference on Game Theory for Networks, 74-85, 2017
Adversarial Exploitation of Emergent Dynamics in Smart Cities
V Behzadan, A Munir
2018 IEEE International Smart Cities Conference (ISC2), 1-8, 2018
Models and Framework for Adversarial Attacks on Complex Adaptive Systems
V Behzadan, A Munir
arXiv preprint arXiv:1709.04137, 2017
Evaluation of Uncertainty for Soil Water Characteristic Curve Measurements and the Implications for Predicting the Hydro-Mechanical Behavior of Unsaturated Soils
L Fissel, RJ Breitmeyer
Geotechnical Frontiers 2017, 579-588, 2016
Real-time inference of topological structure and vulnerabilities for adaptive jamming against covert ad hoc networks
V Behzadan
Enhancement of spectrum utilization in non-contiguous dsa with online defragmentation
S Bhunia, V Behzadan, S Sengupta
MILCOM 2015-2015 IEEE Military Communications Conference, 432-437, 2015
Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies
V Behzadan, W Hsu
arXiv preprint arXiv:1906.01126, 2019
Security and Privacy Issues in Intelligent Transportation Systems: Classification and Challenges
DA Hahn, A Munir, V Behzadan
IEEE Intell. Transp. Syst, 2019
The system can't perform the operation now. Try again later.
Articles 1–20