Alert button
Picture for Vahid Behzadan

Vahid Behzadan

Alert button

Sandwich attack: Multi-language Mixture Adaptive Attack on LLMs

Add code
Bookmark button
Alert button
Apr 09, 2024
Bibek Upadhayay, Vahid Behzadan

Viaarxiv icon

TaCo: Enhancing Cross-Lingual Transfer for Low-Resource Languages in LLMs through Translation-Assisted Chain-of-Thought Processes

Add code
Bookmark button
Alert button
Nov 17, 2023
Bibek Upadhayay, Vahid Behzadan

Viaarxiv icon

Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events

Add code
Bookmark button
Alert button
Nov 18, 2022
Bibek Upadhayay, Vahid Behzadan

Figure 1 for Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events
Figure 2 for Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events
Figure 3 for Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events
Figure 4 for Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events
Viaarxiv icon

Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP)

Add code
Bookmark button
Alert button
Sep 29, 2021
Nancirose Piazza, Vahid Behzadan

Figure 1 for Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP)
Figure 2 for Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP)
Figure 3 for Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP)
Figure 4 for Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP)
Viaarxiv icon

Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors

Add code
Bookmark button
Alert button
Feb 11, 2021
Pooya Tavallali, Vahid Behzadan, Peyman Tavallali, Mukesh Singhal

Figure 1 for Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors
Figure 2 for Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors
Figure 3 for Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors
Figure 4 for Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors
Viaarxiv icon

Adversarial Attacks on Deep Algorithmic Trading Policies

Add code
Bookmark button
Alert button
Oct 22, 2020
Yaser Faghan, Nancirose Piazza, Vahid Behzadan, Ali Fathi

Figure 1 for Adversarial Attacks on Deep Algorithmic Trading Policies
Figure 2 for Adversarial Attacks on Deep Algorithmic Trading Policies
Figure 3 for Adversarial Attacks on Deep Algorithmic Trading Policies
Figure 4 for Adversarial Attacks on Deep Algorithmic Trading Policies
Viaarxiv icon

Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification

Add code
Bookmark button
Alert button
Sep 01, 2020
Bibek Upadhayay, Vahid Behzadan

Figure 1 for Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification
Figure 2 for Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification
Figure 3 for Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification
Figure 4 for Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification
Viaarxiv icon

Founding The Domain of AI Forensics

Add code
Bookmark button
Alert button
Dec 11, 2019
Ibrahim Baggili, Vahid Behzadan

Figure 1 for Founding The Domain of AI Forensics
Viaarxiv icon

A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams

Add code
Bookmark button
Alert button
Jul 12, 2019
Avishek Bose, Vahid Behzadan, Carlos Aguirre, William H. Hsu

Figure 1 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Figure 2 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Figure 3 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Figure 4 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Viaarxiv icon

Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies

Add code
Bookmark button
Alert button
Jun 03, 2019
Vahid Behzadan, William Hsu

Figure 1 for Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies
Figure 2 for Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies
Figure 3 for Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies
Figure 4 for Sequential Triggers for Watermarking of Deep Reinforcement Learning Policies
Viaarxiv icon