Search

Your search keyword '"Poovendran, Radha"' showing total 429 results

Search Constraints

Start Over You searched for: Author "Poovendran, Radha" Remove constraint Author: "Poovendran, Radha" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
429 results on '"Poovendran, Radha"'

Search Results

1. CleanGen: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models

2. ChatBug: A Common Vulnerability of Aligned LLMs Induced by Chat Templates

3. Magpie: Alignment Data Synthesis from Scratch by Prompting Aligned LLMs with Nothing

4. ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning

5. Fault Tolerant Neural Control Barrier Functions for Robotic Systems under Sensor Faults and Attacks

6. ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs

7. SafeDecoding: Defending against Jailbreak Attacks via Safety-Aware Decoding

8. Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors

9. Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization

10. BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models

11. Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning

12. MDTD: A Multi Domain Trojan Detector for Deep Neural Networks

13. A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems

14. Risk-Aware Distributed Multi-Agent Reinforcement Learning

15. A Hybrid Submodular Optimization Approach to Controlled Islanding with Post-Disturbance Stability Guarantees

16. Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs

17. LDL: A Defense for Label-Based Membership Inference Attacks

18. A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint

19. Identity-Based Authentication for On-Demand Charging of Electric Vehicles

20. Game of Trojans: A Submodular Byzantine Approach

21. QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer

22. A Natural Language Processing Approach for Instruction Set Architecture Identification

23. An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee

24. A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics

25. Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning

26. Privacy-Preserving Reinforcement Learning Beyond Expectation

27. EVExchange: A Relay Attack on Electric Vehicle Charging System

28. Shaping Advice in Deep Reinforcement Learning

29. Agent-Temporal Attention for Reward Redistribution in Episodic Multi-Agent Reinforcement Learning

30. A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries

31. Reinforcement Learning Beyond Expectation

32. Shaping Advice in Deep Multi-Agent Reinforcement Learning

33. Scalable Planning in Multi-Agent MDPs

35. Adaptive Learning in Two-Player Stackelberg Games with Application to Network Security

36. Safety-Critical Online Control with Adversarial Disturbances

37. Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries

38. Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats

39. Secure Control in Partially Observable Environments to Satisfy LTL Specifications

40. A Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Detecting Advanced Persistent Threats

41. Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach

42. Submodular Input Selection for Synchronization in Kuramoto Networks

43. Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks

44. FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback

45. Covert Channel-Based Transmitter Authentication in Controller Area Networks

46. Linear Temporal Logic Satisfaction in Adversarial Environments using Secure Control Barrier Certificates

47. Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples

48. Mitigating Vulnerabilities of Voltage-based Intrusion Detection Systems in Controller Area Networks

49. Potential-Based Advice for Stochastic Policy Learning

50. Dropping Pixels for Adversarial Robustness

Catalog

Books, media, physical & digital resources