Radha Poovendran
Identifiers
- name variant Radha Poovendran 0.60 · backfill
Papers (45)
- Polyhedral Instability Governs Regret in Online Learning cs.LG · 2026 · author #9
- The WidthWall: A Strict Expressivity Hierarchy for Hypergraph Neural Networks cs.LG · 2026 · author #9
- Visual Aesthetic Benchmark: Can Frontier Models Judge Beauty? cs.CV · 2026 · author #16
- Distributed Safety-Critical Control of Multi-Agent Systems with Time-Varying Communication Topologies eess.SY · 2026 · author #5
- SoSBench: Benchmarking Safety Alignment on Six Scientific Domains cs.LG · 2025 · author #11
- Magpie: Alignment Data Synthesis from Scratch by Prompting Aligned LLMs with Nothing cs.CL · 2024 · author #5
- Mitigating Vulnerabilities of Voltage-based Intrusion Detection Systems in Controller Area Networks cs.CR · 2019 · author #2
- Potential-Based Advice for Stochastic Policy Learning cs.LG · 2019 · author #6
- Dropping Pixels for Adversarial Robustness cs.LG · 2019 · author #3
- Detecting ADS-B Spoofing Attacks using Deep Neural Networks cs.CR · 2019 · author #6
- Secure Control under Partial Observability with Temporal Logic Constraints cs.SY · 2019 · author #4
- TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks cs.CR · 2019 · author #4
- A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats cs.GT · 2018 · author #7
- Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks cs.CR · 2018 · author #5
- Assessing Shape Bias Property of Convolutional Neural Networks cs.CV · 2018 · author #4
- Semantic Adversarial Examples cs.CV · 2018 · author #2
- Controlled Islanding via Weak Submodularity math.OC · 2018 · author #5
- Minimal Input Selection for Robust Control math.OC · 2017 · author #7
- Cloaking the Clock: Emulating Clock Skew in Controller Area Networks cs.CR · 2017 · author #5
- Detecting LTE-U Duty Cycling Misbehavior for Fair Sharing with Wi-Fi in Shared Bands cs.NI · 2017 · author #2
- Maximizing the Smallest Eigenvalue of a Symmetric Matrix: A Submodular Optimization Approach cs.SY · 2017 · author #4
- On the Structure and Computation of Random Walk Times in Finite Graphs cs.SY · 2017 · author #4
- Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API cs.MM · 2017 · author #4
- Safety and Security for Intelligent Infrastructure cs.CY · 2017 · author #6
- Google's Cloud Vision API Is Not Robust To Noise cs.CV · 2017 · author #3
- Deceiving Google's Cloud Video Intelligence API Built for Summarizing Videos cs.CV · 2017 · author #3
- On the Limitation of Convolutional Neural Networks in Recognizing Negative Images cs.CV · 2017 · author #4
- Blocking Transferability of Adversarial Examples in Black-Box Learning Systems cs.LG · 2017 · author #5
- Deceiving Google's Perspective API Built for Detecting Toxic Comments cs.LG · 2017 · author #4
- Combinatorial Algorithms for Control of Biological Regulatory Networks cs.SY · 2017 · author #5
- Pricing Mechanisms for Crowd-Sensed Spatial-Statistics-Based Radio Mapping cs.NI · 2016 · author #3
- No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices cs.CR · 2016 · author #5
- Learning Temporal Dependence from Time-Series Data with Latent Variables cs.LG · 2016 · author #4
- Submodularity in Input Node Selection for Networked Systems cs.SY · 2016 · author #4
- Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach cs.SY · 2016 · author #5
- Group Event Detection with a Varying Number of Group Members for Video Surveillance cs.CV · 2015 · author #3
- Activity Recognition Using A Combination of Category Components And Local Models for Video Surveillance cs.CV · 2015 · author #3
- LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks cs.NI · 2015 · author #4
- Input Selection for Performance and Controllability of Structured Linear Descriptor Systems math.OC · 2014 · author #4
- Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework cs.SY · 2014 · author #4
- A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems cs.SY · 2013 · author #4
- Using Social Information for Flow Allocation in MANETs cs.NI · 2013 · author #4
- Minimizing Convergence Error in Multi-Agent Systems via Leader Selection: A Supermodular Optimization Approach cs.SY · 2013 · author #4
- A Supermodular Optimization Framework for Leader Selection under Link Noise in Linear Multi-Agent Systems cs.SY · 2012 · author #3
- SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks cs.SI · 2012 · author #3
Mentions
- 2406.08464 #5 · arxiv_oai · confidence 0.70 Radha Poovendran
Frequent Coauthors
- Andrew Clark 21 shared papers
- Linda Bushnell 21 shared papers
- Basel Alomair 10 shared papers
- Hossein Hosseini 10 shared papers
- Bhaskar Ramasubramanian 7 shared papers
- Baicen Xiao 6 shared papers
- Luyao Niu 6 shared papers
- Xuhang Ying 6 shared papers
- Fengqing Jiang 5 shared papers
- Mauro Conti 4 shared papers
- Phillip Lee 4 shared papers
- Sreeram Kannan 4 shared papers
- Yuetai Li 4 shared papers
- Baosen Zhang 3 shared papers
- Kaiyuan Zheng 3 shared papers
- Sang Uk Sagong 3 shared papers
- Yichen Feng 3 shared papers
- Zhangchen Xu 3 shared papers
- Daniel Kirschen 2 shared papers
- Giuseppe Bernieri 2 shared papers