Vahid Behzadan

Profile Picture of Vahid Behzadan
Title
Assistant Professor
Department
Electrical and Computer Engineering and Computer Science
Institution
University of New Haven

Education

  • Ph.D. Computer Science

Research Interests

Adversarial Machine Learning   Deep Reinforcement Learning   Artificial Intelligence  

  View all research interests

Biography

Not mentioned yet

Homepages

Contact Information

Not mentioned yet.
Research
Not mentioned yet. (?)
List of Publications (55)
In 2024
55

Sandwich attack: Multi-language Mixture Adaptive Attack on LLMs. B Upadhayay, V Behzadan arXiv preprint arXiv:2404.07242, 2024.

Found on Publication Page
54

The Power in Communication: Power Regularization of Communication for Autonomy in Cooperative Multi-Agent Reinforcement Learning. N Piazza, V Behzadan, S Sarkadi arXiv preprint arXiv:2404.06387, 2024.

Found on Publication Page
In 2023
53

Short Review on Supervised Learning Under Adversarial Label Poisoning and Clean-Label Data Poisoning. P Tavllali, V Behzadan 2023 Congress in Computer Science, Computer Engineering, & Applied Computing ..., 2023.

Found on Publication Page
52

A theory of mind approach as test-time mitigation against emergent adversarial communication. N Piazza, V Behzadan arXiv preprint arXiv:2302.07176, 2023.

Found on Publication Page
51

TaCo: Enhancing Cross-Lingual Transfer for Low-Resource Languages in LLMs through Translation-Assisted Chain-of-Thought Processes. B Upadhayay, V Behzadan arXiv preprint arXiv:2311.10797, 2023.

Found on Publication Page
50

Limitations of Theory of Mind Defenses against Deception in Multi-Agent Systems. N Piazza, V Behzadan, S Sarkadi .

Found on Publication Page
49

Reinforcement Learning Approach to Evaluation and Decision-Support of Lockdown Policies for Epidemic Outbreaks. MS Suwal, M Soltanolkottabi, V Behzadan IIE Annual Conference. Proceedings, 1-6, 2023.

Found on Publication Page
48

Adversarial stimuli: Attacking brain-computer interfaces via perturbed sensory events. B Upadhayay, V Behzadan 2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC ..., 2023.

Found on Publication Page
In 2022
47

Hybrid deep learning model for fake news detection in social networks (student abstract). B Upadhayay, V Behzadan Proceedings of the AAAI Conference on Artificial Intelligence 36 (11), 13067 ..., 2022.

Found on Publication Page
46

Effects of maternal nutrient restriction and melatonin supplementation on cardiomyocyte cell development parameters using machine learning techniques. M Mazinani, ZE Contreras-Correa, V Behzadan, S Gopal, CO Lemley Animals 12 (14), 1818, 2022.

Found on Publication Page
45

A Novel Approach for Synthetic Reduced Nearest-Neighbor Leveraging Neural Networks. A Alizadeh, P Tavallali, V Behzadan, A Ranganath, M Singhal 2022 21st IEEE International Conference on Machine Learning and Applications ..., 2022.

Found on Publication Page
44

Stochastic Induction of Decision Trees with Application to Learning Haar Trees. A Alizadeh, M Singhal, V Behzadan, P Tavallali, A Ranganath 2022 21st IEEE International Conference on Machine Learning and Applications ..., 2022.

Found on Publication Page
43

Adversarial label-poisoning attacks and defense for general multi-class models based on synthetic reduced nearest neighbor. P Tavallali, V Behzadan, A Alizadeh, A Ranganath, M Singhal 2022 IEEE International Conference on Image Processing (ICIP), 3717-3722, 2022.

Found on Publication Page
In 2021
42

Tracing relevant twitter accounts active in cyber threat intelligence domain by exploiting content and structure of twitter network. A Bose, SG Sundari, V Behzadan, WH Hsu 2021 IEEE International Conference on Intelligence and Security Informatics ..., 2021.

Found on Publication Page
41

Combating Human Trafficking via Automatic OSINT Collection, Validation and Fusion. B Upadhayay, ZAM Lodhia, V Behzadan ICWSM Workshops, 2021.

Found on Publication Page
40

State-wise adaptive discounting from experience (sade): A novel discounting scheme for reinforcement learning (student abstract). M Zinzuvadiya, V Behzadan Proceedings of the AAAI Conference on Artificial Intelligence 35 (18), 15953 ..., 2021.

Found on Publication Page
39

Synthetic Reduced Nearest Neighbor Model for Regression. P Tavallali, V Behzadan, M Singhal .

Found on Publication Page
38

Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP). N Piazza, V Behzadan arXiv preprint arXiv:2109.14678, 2021.

Found on Publication Page
37

Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors. P Tavallali, V Behzadan, P Tavallali, M Singhal arXiv preprint arXiv:2102.05867, 2021.

Found on Publication Page
36

Adversarial Attacks on Deep Algorithmic Trading Policies. N Piazza, Y Faghan, V Behzadan, A Fathi .

Found on Publication Page
In 2020
35

Sentimental liar: Extended corpus and deep learning models for fake claim classification. B Upadhayay, V Behzadan 2020 IEEE International Conference on Intelligence and Security Informatics ..., 2020.

Found on Publication Page
34

Founding The Domain of AI Forensics. V Behzadan, IM Baggili SafeAI@ AAAI, 31-35, 2020.

Found on Publication Page
33

Adversarial attacks on deep algorithmic trading policies. Y Faghan, N Piazza, V Behzadan, A Fathi arXiv preprint arXiv:2010.11388, 2020.

Found on Publication Page
In 2019
32

Security and privacy issues in intelligent transportation systems: Classification and challenges. D Hahn, A Munir, V Behzadan IEEE Intelligent Transportation Systems Magazine 13 (1), 181-196, 2019.

Found on Publication Page
31

Adversarial reinforcement learning framework for benchmarking collision avoidance mechanisms in autonomous vehicles. V Behzadan, A Munir IEEE Intelligent Transportation Systems Magazine 13 (2), 236-241, 2019.

Found on Publication Page
30

Sequential triggers for watermarking of deep reinforcement learning policies. V Behzadan, W Hsu arXiv preprint arXiv:1906.01126, 2019.

Found on Publication Page
29

A novel approach for detection and ranking of trendy and emerging cyber threat events in twitter streams. A Bose, V Behzadan, C Aguirre, WH Hsu Proceedings of the 2019 IEEE/ACM International Conference on Advances in ..., 2019.

Found on Publication Page
28

Adversarial exploitation of policy imitation. V Behzadan, W Hsu arXiv preprint arXiv:1906.01121, 2019.

Found on Publication Page
27

Analysis and improvement of adversarial training in dqn agents with adversarially-guided exploration (age). V Behzadan, W Hsu arXiv preprint arXiv:1906.01119, 2019.

Found on Publication Page
26

Founding the domain of AI forensics. I Baggili, V Behzadan arXiv preprint arXiv:1912.06497, 2019.

Found on Publication Page
25

Rl-based method for benchmarking the adversarial resilience and robustness of deep reinforcement learning policies. V Behzadan, W Hsu Computer Safety, Reliability, and Security: SAFECOMP 2019 Workshops, ASSURE ..., 2019.

Found on Publication Page
24

Trolleymod v1. 0: An open-source simulation and data-collection platform for ethical decision making in autonomous vehicles. V Behzadan, J Minton, A Munir Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 391-395, 2019.

Found on Publication Page
23

Security of deep reinforcement learning. V Behzadan Kansas State University, 2019.

Found on Publication Page
In 2018
22

Technical Report on the CleverHans v2.1.0 Adversarial Examples Library. N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ... arXiv preprint arXiv:1610.00768v6 10, 2018.

Found on Publication Page
21

Corpus and deep learning classifier for collection of cyber threat indicators in twitter stream. V Behzadan, C Aguirre, A Bose, W Hsu 2018 IEEE International Conference on Big Data (Big Data), 5002-5007, 2018.

Found on Publication Page
20

The faults in our pi stars: Security issues and open challenges in deep reinforcement learning. V Behzadan, A Munir arXiv preprint arXiv:1810.10369, 2018.

Found on Publication Page
19

Mitigation of policy manipulation attacks on deep q-networks with parameter-space noise. V Behzadan, A Munir Computer Safety, Reliability, and Security: SAFECOMP 2018 Workshops, ASSURE ..., 2018.

Found on Publication Page
18

Emergence of addictive behaviors in reinforcement learning agents. V Behzadan, RV Yampolskiy, A Munir arXiv preprint arXiv:1811.05590, 2018.

Found on Publication Page
17

A psychopathological approach to safety engineering in ai and agi. V Behzadan, A Munir, RV Yampolskiy Computer Safety, Reliability, and Security: SAFECOMP 2018 Workshops, ASSURE ..., 2018.

Found on Publication Page
16

Technical report on the cleverhans v2. 1.0 adversarial examples library. arXiv. N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ... arXiv preprint arXiv:1610.00768, 2018.

Found on Publication Page
15

Adversarial exploitation of emergent dynamics in smart cities. V Behzadan, A Munir 2018 IEEE International Smart Cities Conference (ISC2), 1-8, 2018.

Found on Publication Page
In 2017
14

Whatever does not kill deep reinforcement learning, makes it stronger. V Behzadan, A Munir arXiv preprint arXiv:1712.09344, 2017.

Found on Publication Page
13

Vulnerability of deep reinforcement learning to policy induction attacks. V Behzadan, A Munir Machine Learning and Data Mining in Pattern Recognition: 13th International ..., 2017.

Found on Publication Page
12

Cyber-physical attacks on uas networks-challenges and open research problems. V Behzadan arXiv preprint arXiv:1702.01251, 2017.

Found on Publication Page
11

A game-theoretic model for analysis and design of self-organization mechanisms in iot. V Behzadan, B Rekabdar Game Theory for Networks: 7th International EAI Conference, GameNets 2017 ..., 2017.

Found on Publication Page
10

Models and framework for adversarial attacks on complex adaptive systems. V Behzadan, A Munir arXiv preprint arXiv:1709.04137, 2017.

Found on Publication Page
9

On Fighting Fire with Fire: Strategic Destabilization of Terrorist Networks. V Behzadan, A Nourmohammadi, M Gunes, M Yuksel Proceedings of the 2017 {IEEE/ACM} International Conference on Advances in ..., 2017.

Found on Publication Page
In 2016
8

Adaptive beam nulling in multihop ad hoc networks against a jammer in motion. S Bhunia, V Behzadan, PA Regis, S Sengupta Computer Networks 109, 50-66, 2016.

Found on Publication Page
7

Real-time inference of topological sStructure and vulnerabilities for adaptive jamming against covert ad hoc networks. V Behzadan University of Nevada, Reno, 2016.

Found on Publication Page
In 2015
6

Performance of adaptive beam nulling in multihop ad-hoc networks under jamming. S Bhunia, V Behzadan, PA Regis, S Sengupta 2015 IEEE 17th International Conference on High Performance Computing and ..., 2015.

Found on Publication Page
5

Enhancement of spectrum utilization in non-contiguous dsa with online defragmentation. S Bhunia, V Behzadan, S Sengupta MILCOM 2015-2015 IEEE Military Communications Conference, 432-437, 2015.

Found on Publication Page
In 2011
4

A novel utilization of cluster-tree wireless sensor networks for situation awareness in smart grids. MS Ebrahimi, MH Daraei, V Behzadan, A Khajooeizadeh, SA Behrostaghi, ... 2011 IEEE PES Innovative Smart Grid Technologies, 1-5, 2011.

Found on Publication Page
Unspecified
3

Technical report on the cleverhans v2. 1.0 adversarial examples library (2018). N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ... arXiv preprint arXiv:1610.00768, 0.

Found on Publication Page
2

Ebrahimi, Mohammadreza 169, 181 Eren, Maksim 53 Esaki, Hiroshi 80 Evans, Samuel 271. A Abbasi, SMA Abbasi, M Abdelsalam, YS Abdulsalam, J Abreu, ... .

Found on Publication Page
1

International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2020) FOSINT-SI 2020 Symposium Organizing Committee. R Alhajj, P Shakarian, U Gla sser, F Spezzano, M Tayebi, D Caragea, ... .

Found on Publication Page
Search Profiles
Colleagues
Profile Picture of Nina Barretts
University of New Haven
Profile Picture of Amanda R. Bozack
University of New Haven
Profile Picture of Amy Carlile
University of New Haven
People Also Viewed
Profile Picture of Kevin Chang
University of Illinois Urbana-Champaign
Profile Picture of Marinilka Kimbro
Seattle University
Profile Picture of Eric Fruits
Portland State University
Recommended Grants