Picture for Vahid Behzadan

Vahid Behzadan

Cognitive Overload Attack:Prompt Injection for Long Context

Add code
Oct 15, 2024
Viaarxiv icon

Sandwich attack: Multi-language Mixture Adaptive Attack on LLMs

Add code
Apr 09, 2024
Viaarxiv icon

TaCo: Enhancing Cross-Lingual Transfer for Low-Resource Languages in LLMs through Translation-Assisted Chain-of-Thought Processes

Add code
Nov 17, 2023
Viaarxiv icon

Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events

Add code
Nov 18, 2022
Viaarxiv icon

Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP)

Add code
Sep 29, 2021
Figure 1 for Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP)
Figure 2 for Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP)
Figure 3 for Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP)
Figure 4 for Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP)
Viaarxiv icon

Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors

Add code
Feb 11, 2021
Figure 1 for Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors
Figure 2 for Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors
Figure 3 for Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors
Figure 4 for Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors
Viaarxiv icon

Adversarial Attacks on Deep Algorithmic Trading Policies

Add code
Oct 22, 2020
Figure 1 for Adversarial Attacks on Deep Algorithmic Trading Policies
Figure 2 for Adversarial Attacks on Deep Algorithmic Trading Policies
Figure 3 for Adversarial Attacks on Deep Algorithmic Trading Policies
Figure 4 for Adversarial Attacks on Deep Algorithmic Trading Policies
Viaarxiv icon

Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification

Add code
Sep 01, 2020
Figure 1 for Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification
Figure 2 for Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification
Figure 3 for Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification
Figure 4 for Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification
Viaarxiv icon

Founding The Domain of AI Forensics

Add code
Dec 11, 2019
Figure 1 for Founding The Domain of AI Forensics
Viaarxiv icon

A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams

Add code
Jul 12, 2019
Figure 1 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Figure 2 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Figure 3 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Figure 4 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Viaarxiv icon