pith. machine review for the scientific record. sign in

Radha Poovendran

Identifiers

  • name variant Radha Poovendran 0.60 · backfill

Papers (45)

  1. Polyhedral Instability Governs Regret in Online Learning cs.LG · 2026 · author #9
  2. The WidthWall: A Strict Expressivity Hierarchy for Hypergraph Neural Networks cs.LG · 2026 · author #9
  3. Visual Aesthetic Benchmark: Can Frontier Models Judge Beauty? cs.CV · 2026 · author #16
  4. Distributed Safety-Critical Control of Multi-Agent Systems with Time-Varying Communication Topologies eess.SY · 2026 · author #5
  5. SoSBench: Benchmarking Safety Alignment on Six Scientific Domains cs.LG · 2025 · author #11
  6. Magpie: Alignment Data Synthesis from Scratch by Prompting Aligned LLMs with Nothing cs.CL · 2024 · author #5
  7. Mitigating Vulnerabilities of Voltage-based Intrusion Detection Systems in Controller Area Networks cs.CR · 2019 · author #2
  8. Potential-Based Advice for Stochastic Policy Learning cs.LG · 2019 · author #6
  9. Dropping Pixels for Adversarial Robustness cs.LG · 2019 · author #3
  10. Detecting ADS-B Spoofing Attacks using Deep Neural Networks cs.CR · 2019 · author #6
  11. Secure Control under Partial Observability with Temporal Logic Constraints cs.SY · 2019 · author #4
  12. TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks cs.CR · 2019 · author #4
  13. A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats cs.GT · 2018 · author #7
  14. Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks cs.CR · 2018 · author #5
  15. Assessing Shape Bias Property of Convolutional Neural Networks cs.CV · 2018 · author #4
  16. Semantic Adversarial Examples cs.CV · 2018 · author #2
  17. Controlled Islanding via Weak Submodularity math.OC · 2018 · author #5
  18. Minimal Input Selection for Robust Control math.OC · 2017 · author #7
  19. Cloaking the Clock: Emulating Clock Skew in Controller Area Networks cs.CR · 2017 · author #5
  20. Detecting LTE-U Duty Cycling Misbehavior for Fair Sharing with Wi-Fi in Shared Bands cs.NI · 2017 · author #2
  21. Maximizing the Smallest Eigenvalue of a Symmetric Matrix: A Submodular Optimization Approach cs.SY · 2017 · author #4
  22. On the Structure and Computation of Random Walk Times in Finite Graphs cs.SY · 2017 · author #4
  23. Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API cs.MM · 2017 · author #4
  24. Safety and Security for Intelligent Infrastructure cs.CY · 2017 · author #6
  25. Google's Cloud Vision API Is Not Robust To Noise cs.CV · 2017 · author #3
  26. Deceiving Google's Cloud Video Intelligence API Built for Summarizing Videos cs.CV · 2017 · author #3
  27. On the Limitation of Convolutional Neural Networks in Recognizing Negative Images cs.CV · 2017 · author #4
  28. Blocking Transferability of Adversarial Examples in Black-Box Learning Systems cs.LG · 2017 · author #5
  29. Deceiving Google's Perspective API Built for Detecting Toxic Comments cs.LG · 2017 · author #4
  30. Combinatorial Algorithms for Control of Biological Regulatory Networks cs.SY · 2017 · author #5
  31. Pricing Mechanisms for Crowd-Sensed Spatial-Statistics-Based Radio Mapping cs.NI · 2016 · author #3
  32. No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices cs.CR · 2016 · author #5
  33. Learning Temporal Dependence from Time-Series Data with Latent Variables cs.LG · 2016 · author #4
  34. Submodularity in Input Node Selection for Networked Systems cs.SY · 2016 · author #4
  35. Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach cs.SY · 2016 · author #5
  36. Group Event Detection with a Varying Number of Group Members for Video Surveillance cs.CV · 2015 · author #3
  37. Activity Recognition Using A Combination of Category Components And Local Models for Video Surveillance cs.CV · 2015 · author #3
  38. LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks cs.NI · 2015 · author #4
  39. Input Selection for Performance and Controllability of Structured Linear Descriptor Systems math.OC · 2014 · author #4
  40. Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework cs.SY · 2014 · author #4
  41. A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems cs.SY · 2013 · author #4
  42. Using Social Information for Flow Allocation in MANETs cs.NI · 2013 · author #4
  43. Minimizing Convergence Error in Multi-Agent Systems via Leader Selection: A Supermodular Optimization Approach cs.SY · 2013 · author #4
  44. A Supermodular Optimization Framework for Leader Selection under Link Noise in Linear Multi-Agent Systems cs.SY · 2012 · author #3
  45. SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks cs.SI · 2012 · author #3

Mentions

  • 2406.08464 #5 · arxiv_oai · confidence 0.70 Radha Poovendran

Frequent Coauthors