Picture for Vahid Behzadan

Vahid Behzadan

Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors

Add code
Feb 11, 2021
Figure 1 for Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors
Figure 2 for Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors
Figure 3 for Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors
Figure 4 for Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors
Viaarxiv icon

Adversarial Attacks on Deep Algorithmic Trading Policies

Add code
Oct 22, 2020
Figure 1 for Adversarial Attacks on Deep Algorithmic Trading Policies
Figure 2 for Adversarial Attacks on Deep Algorithmic Trading Policies
Figure 3 for Adversarial Attacks on Deep Algorithmic Trading Policies
Figure 4 for Adversarial Attacks on Deep Algorithmic Trading Policies
Viaarxiv icon

Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification

Add code
Sep 01, 2020
Figure 1 for Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification
Figure 2 for Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification
Figure 3 for Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification
Figure 4 for Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification
Viaarxiv icon

Founding The Domain of AI Forensics

Add code
Dec 11, 2019
Figure 1 for Founding The Domain of AI Forensics
Viaarxiv icon

A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams

Add code
Jul 12, 2019
Figure 1 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Figure 2 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Figure 3 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Figure 4 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Viaarxiv icon

Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies

Add code
Jun 03, 2019
Figure 1 for Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies
Figure 2 for Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies
Figure 3 for Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies
Figure 4 for Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies
Viaarxiv icon

Adversarial Exploitation of Policy Imitation

Add code
Jun 03, 2019
Figure 1 for Adversarial Exploitation of Policy Imitation
Figure 2 for Adversarial Exploitation of Policy Imitation
Figure 3 for Adversarial Exploitation of Policy Imitation
Figure 4 for Adversarial Exploitation of Policy Imitation
Viaarxiv icon

Analysis and Improvement of Adversarial Training in DQN Agents With Adversarially-Guided Exploration (AGE)

Add code
Jun 03, 2019
Figure 1 for Analysis and Improvement of Adversarial Training in DQN Agents With Adversarially-Guided Exploration (AGE)
Figure 2 for Analysis and Improvement of Adversarial Training in DQN Agents With Adversarially-Guided Exploration (AGE)
Figure 3 for Analysis and Improvement of Adversarial Training in DQN Agents With Adversarially-Guided Exploration (AGE)
Figure 4 for Analysis and Improvement of Adversarial Training in DQN Agents With Adversarially-Guided Exploration (AGE)
Viaarxiv icon

RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies

Add code
Jun 03, 2019
Figure 1 for RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies
Figure 2 for RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies
Figure 3 for RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies
Figure 4 for RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies
Viaarxiv icon

TrolleyMod v1.0: An Open-Source Simulation and Data-Collection Platform for Ethical Decision Making in Autonomous Vehicles

Add code
Nov 14, 2018
Figure 1 for TrolleyMod v1.0: An Open-Source Simulation and Data-Collection Platform for Ethical Decision Making in Autonomous Vehicles
Figure 2 for TrolleyMod v1.0: An Open-Source Simulation and Data-Collection Platform for Ethical Decision Making in Autonomous Vehicles
Figure 3 for TrolleyMod v1.0: An Open-Source Simulation and Data-Collection Platform for Ethical Decision Making in Autonomous Vehicles
Viaarxiv icon