Stop the war!
Остановите войну!
for scientists:
default search action
Yuval Elovici
Person information
- affiliation: Telekom Innovation Laboratories at Ben-Gurion University of the Negev, Beer-Sheva, Israel
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j149]Mor Nahum, Edita Grolman, Inbar Maimon, Dudu Mimran, Oleg Brodt, Aviad Elyashar, Yuval Elovici, Asaf Shabtai:
OSSIntegrity: Collaborative open-source code integrity verification. Comput. Secur. 144: 103977 (2024) - [j148]Omer Hofman, Amit Giloni, Yarin Hayun, Ikuya Morikawa, Toshiya Shimizu, Yuval Elovici, Asaf Shabtai:
X-Detect: explainable adversarial patch detection for object detectors in retail. Mach. Learn. 113(9): 6273-6292 (2024) - [j147]Amit Giloni, Edita Grolman, Tanja Hagemann, Ronald Fromm, Sebastian Fischer, Yuval Elovici, Asaf Shabtai:
BENN: Bias Estimation Using a Deep Neural Network. IEEE Trans. Neural Networks Learn. Syst. 35(1): 117-131 (2024) - [c193]Sagi Brudni, Sapir Anidgar, Oleg Brodt, Dudu Mimran, Asaf Shabtai, Yuval Elovici:
Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions. EuroS&P 2024: 676-696 - [c192]Shoham Hanina, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
Universal Adversarial Attack Against Speaker Recognition Models. ICASSP 2024: 4860-4864 - [c191]Mor Nahum, Edita Grolman, Inbar Maimon, Dudu Mimran, Oleg Brodt, Aviad Elyashar, Yuval Elovici, Asaf Shabtai:
Secure Crowdsource-Based Open-Source Code Verification (SC)^2V. SAC 2024: 1536-1538 - [i155]Sagiv Antebi, Noam Azulay, Edan Habler, Ben Ganon, Asaf Shabtai, Yuval Elovici:
GPT in Sheep's Clothing: The Risk of Customized GPTs. CoRR abs/2401.09075 (2024) - [i154]Oryan Yehezkel, Alon Zolfi, Amit Baras, Yuval Elovici, Asaf Shabtai:
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers. CoRR abs/2402.02554 (2024) - [i153]Dov Shirtz, Inna Koberman, Aviad Elyashar, Rami Puzis, Yuval Elovici:
Enhancing Energy Sector Resilience: Integrating Security by Design Principles. CoRR abs/2402.11543 (2024) - [i152]Amit Finkman, Eden Bar-Kochva, Avishag Shapira, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants. CoRR abs/2404.09066 (2024) - [i151]Lavi Ben-Shimol, Edita Grolman, Aviad Elyashar, Inbar Maimon, Dudu Mimran, Oleg Brodt, Martin Strassmann, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring. CoRR abs/2405.07172 (2024) - [i150]Ehud Malul, Yair Meidan, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation. CoRR abs/2405.19954 (2024) - [i149]Yonatan Amaru, Prasanna N. Wudali, Yuval Elovici, Asaf Shabtai:
RAPID: Robust APT Detection and Investigation Using Context-Aware Deep Learning. CoRR abs/2406.05362 (2024) - [i148]Yuval Schwartz, Lavi Ben-Shimol, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI. CoRR abs/2407.05194 (2024) - [i147]Beni Ifland, Elad Duani, Rubin Krief, Miro Ohana, Aviram Zilberman, Andres Murillo, Ofir Manor, Ortal Lavi, Hikichi Kenji, Asaf Shabtai, Yuval Elovici, Rami Puzis:
GeNet: A Multimodal LLM-Based Co-Pilot for Network Topology and Configuration. CoRR abs/2407.08249 (2024) - [i146]Fred Matanel Grabovski, Lior Yasur, Guy Amit, Yuval Elovici, Yisroel Mirsky:
Back-in-Time Diffusion: Unsupervised Detection of Medical Deepfakes. CoRR abs/2407.15169 (2024) - [i145]Nitzan Bitton Guetta, Aviv Slobodkin, Aviya Maimon, Eliya Habba, Royi Rassin, Yonatan Bitton, Idan Szpektor, Amir Globerson, Yuval Elovici:
Visual Riddles: a Commonsense and World Knowledge Challenge for Large Vision and Language Models. CoRR abs/2407.19474 (2024) - 2023
- [j146]Ben Nassi, Yisroel Mirsky, Jacob Shams, Raz Ben-Netanel, Dudi Nassi, Yuval Elovici:
Protecting Autonomous Cars from Phantom Attacks. Commun. ACM 66(4): 56-69 (2023) - [j145]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Maura Pintor, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. Comput. Secur. 124: 103006 (2023) - [j144]Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai:
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems. ACM Comput. Surv. 55(9): 183:1-183:36 (2023) - [j143]Jaidip Kotak, Yuval Elovici:
Adversarial Attacks Against IoT Identification Systems. IEEE Internet Things J. 10(9, May 1): 7868-7883 (2023) - [j142]Jaidip Kotak, Yuval Elovici:
IoT device identification based on network communication analysis using deep learning. J. Ambient Intell. Humaniz. Comput. 14(7): 9113-9129 (2023) - [j141]Jaidip Kotak, Edan Habler, Oleg Brodt, Asaf Shabtai, Yuval Elovici:
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions. Sensors 23(8): 4018 (2023) - [j140]Florian Klaus Kaiser, Uriel Dardik, Aviad Elitzur, Polina Zilberman, Nir Daniel, Marcus Wiens, Frank Schultmann, Yuval Elovici, Rami Puzis:
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph. IEEE Trans. Dependable Secur. Comput. 20(6): 4793-4809 (2023) - [j139]Efrat Levy, Asaf Shabtai, Bogdan Groza, Pal-Stefan Murvay, Yuval Elovici:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. IEEE Trans. Inf. Forensics Secur. 18: 4800-4814 (2023) - [j138]Adriana Berdich, Bogdan Groza, René Mayrhofer, Efrat Levy, Asaf Shabtai, Yuval Elovici:
Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics. IEEE Trans. Mob. Comput. 22(4): 2417-2434 (2023) - [j137]Ari Adler, Lior Bass, Yuval Elovici, Rami Puzis:
How Polynomial Regression Improves DeNATing. IEEE Trans. Netw. Serv. Manag. 20(4): 5000-5011 (2023) - [c190]Dudi Biton, Aditi Misra, Efrat Levy, Jaidip Kotak, Ron Bitton, Roei Schuster, Nicolas Papernot, Yuval Elovici, Ben Nassi:
The Adversarial Implications of Variable-Time Inference. AISec@CCS 2023: 103-114 - [c189]Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. CCS 2023: 268-280 - [c188]Adi Offer, Aviram Zilberman, Asaf Shabtai, Yuval Elovici, Rami Puzis:
CDGeB: Cloud Data Geolocation Benchmark. CCSW@CCS 2023: 69-74 - [c187]Nitzan Bitton Guetta, Yonatan Bitton, Jack Hessel, Ludwig Schmidt, Yuval Elovici, Gabriel Stanovsky, Roy Schwartz:
Breaking Common Sense: WHOOPS! A Vision-and-Language Benchmark of Synthetic and Compositional Images. ICCV 2023: 2616-2627 - [c186]Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici:
Large-Scale Shill Bidder Detection in E-commerce. IDEAS 2023: 79-86 - [c185]Satoru Koda, Alon Zolfi, Edita Grolman, Asaf Shabtai, Ikuya Morikawa, Yuval Elovici:
Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey. IJCNN 2023: 1-10 - [c184]Yakov Mallah, Yuval Elovici, Asaf Shabtai:
Risk Oriented Resource Allocation in Robotic Swarm. PST 2023: 1-7 - [c183]Ben Nassi, Raz Swissa, Jacob Shams, Boris Zadov, Yuval Elovici:
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects. SP (Workshops) 2023: 298-310 - [i144]Nitzan Bitton Guetta, Yonatan Bitton, Jack Hessel, Ludwig Schmidt, Yuval Elovici, Gabriel Stanovsky, Roy Schwartz:
Breaking Common Sense: WHOOPS! A Vision-and-Language Benchmark of Synthetic and Compositional Images. CoRR abs/2303.07274 (2023) - [i143]Jaidip Kotak, Yuval Elovici:
IoT Device Identification Based on Network Communication Analysis Using Deep Learning. CoRR abs/2303.12800 (2023) - [i142]Omer Hofman, Amit Giloni, Yarin Hayun, Ikuya Morikawa, Toshiya Shimizu, Yuval Elovici, Asaf Shabtai:
X-Detect: Explainable Adversarial Patch Detection for Object Detectors in Retail. CoRR abs/2306.08422 (2023) - [i141]Dudi Biton, Aditi Misra, Efrat Levy, Jaidip Kotak, Ron Bitton, Roei Schuster, Nicolas Papernot, Yuval Elovici, Ben Nassi:
The Adversarial Implications of Variable-Time Inference. CoRR abs/2309.02159 (2023) - [i140]Priyanka Prakash Surve, Oleg Brodt, Mark Yampolskiy, Yuval Elovici, Asaf Shabtai:
SoK: Security Below the OS - A Security Analysis of UEFI. CoRR abs/2311.03809 (2023) - [i139]Ryuta Kremer, Prasanna N. Wudali, Satoru Momiyama, Toshinori Araki, Jun Furukawa, Yuval Elovici, Asaf Shabtai:
IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response. CoRR abs/2311.03825 (2023) - [i138]Yizhak Vaisman, Gilad Katz, Yuval Elovici, Asaf Shabtai:
Detecting Anomalous Network Communication Patterns Using Graph Convolutional Networks. CoRR abs/2311.18525 (2023) - [i137]Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai:
FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning. CoRR abs/2312.01200 (2023) - [i136]Roy Peled, Eran Aizikovich, Edan Habler, Yuval Elovici, Asaf Shabtai:
Evaluating the Security of Satellite Systems. CoRR abs/2312.01330 (2023) - [i135]Amit Baras, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
QuantAttack: Exploiting Dynamic Quantization to Attack Vision Transformers. CoRR abs/2312.02220 (2023) - [i134]Ben Nassi, Etay Iluz, Danny Cohen-Or, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici:
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED. IACR Cryptol. ePrint Arch. 2023: 923 (2023) - [i133]Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. IACR Cryptol. ePrint Arch. 2023: 1068 (2023) - 2022
- [j136]Adriana Berdich, Bogdan Groza, Efrat Levy, Asaf Shabtai, Yuval Elovici, René Mayrhofer:
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings. IEEE Access 10: 122399-122413 (2022) - [j135]Tom Mahler, Erez Shalom, Yuval Elovici, Yuval Shahar:
A dual-layer context-based architecture for the detection of anomalous instructions sent to medical devices. Artif. Intell. Medicine 123: 102229 (2022) - [j134]Yael Mathov, Tal Ben Senior, Asaf Shabtai, Yuval Elovici:
Stop bugging me! Evading modern-day wiretapping using adversarial perturbations. Comput. Secur. 121: 102841 (2022) - [j133]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Security of Open Radio Access Networks. Comput. Secur. 122: 102890 (2022) - [j132]Ben Nassi, Yaron Pirutin, Jacob Shams, Raz Swissa, Yuval Elovici, Boris Zadov:
Optical Speech Recovery From Desktop Speakers. Computer 55(11): 40-51 (2022) - [j131]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. ACM Comput. Surv. 54(5): 108:1-108:36 (2022) - [j130]Yael Mathov, Lior Rokach, Yuval Elovici:
Enhancing real-world adversarial patches through 3D modeling of complex target scenes. Neurocomputing 499: 11-22 (2022) - [j129]Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Yuval Elovici, Nils Ole Tippenhauer:
HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version). IEEE Internet Things J. 9(12): 9640-9658 (2022) - [j128]Tom Mahler, Erez Shalom, Arnon Makori, Yuval Elovici, Yuval Shahar:
A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists' Perspective. J. Digit. Imaging 35(3): 666-677 (2022) - [j127]Yael Mathov, Eden Levy, Ziv Katzir, Asaf Shabtai, Yuval Elovici:
Not all datasets are born equal: On heterogeneous tabular data and adversarial examples. Knowl. Based Syst. 242: 108377 (2022) - [j126]Barak Davidovich, Ben Nassi, Yuval Elovici:
Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera's Video Stream. Sensors 22(7): 2608 (2022) - [j125]Ben Nassi, Jacob Shams, Lior Rokach, Yuval Elovici:
Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices. Sensors 22(9): 3580 (2022) - [j124]Shai Cohen, Efrat Levy, Avi Shaked, Tair Cohen, Yuval Elovici, Asaf Shabtai:
RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks. Sensors 22(11): 4259 (2022) - [j123]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1936-1954 (2022) - [j122]Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. IEEE Trans. Inf. Forensics Secur. 17: 3225-3237 (2022) - [j121]Penny Chong, Ngai-Man Cheung, Yuval Elovici, Alexander Binder:
Toward Scalable and Unified Example-Based Explanation and Outlier Detection. IEEE Trans. Image Process. 31: 525-540 (2022) - [c182]Shay Sakazi, Yuval Elovici, Asaf Shabtai:
Prioritizing Antivirus Alerts on Internal Enterprise Machines. DIMVA 2022: 75-95 - [c181]Bogdan Groza, Lucian Popa, Tudor Andreica, Pal-Stefan Murvay, Asaf Shabtai, Yuval Elovici:
PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks. ESORICS (3) 2022: 658-679 - [c180]Ben Nassi, Jacob Shams, Raz Ben-Netanel, Yuval Elovici:
bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements. EuroS&P Workshops 2022: 376-383 - [c179]Amit Giloni, Edita Grolman, Yuval Elovici, Asaf Shabtai:
FEPC: Fairness Estimation Using Prototypes and Critics for Tabular Data. ICPR 2022: 4877-4884 - [c178]Yonatan Bitton, Nitzan Bitton Guetta, Ron Yosef, Yuval Elovici, Mohit Bansal, Gabriel Stanovsky, Roy Schwartz:
WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models. NeurIPS 2022 - [c177]Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai:
Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models. ECML/PKDD (3) 2022: 304-320 - [c176]Nachiket Tapas, Sofia Belikovetsky, Francesco Longo, Antonio Puliafito, Asaf Shabtai, Yuval Elovici:
3D Marketplace: Distributed Attestation of 3D Designs on Blockchain. SMARTCOMP 2022: 311-316 - [c175]Edita Grolman, Hodaya Binyamini, Asaf Shabtai, Yuval Elovici, Ikuya Morikawa, Toshiya Shimizu:
HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter. UMAP 2022: 143-152 - [c174]Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations. USENIX Security Symposium 2022: 4401-4417 - [c173]Yushi Cao, David Berend, Palina Tolmach, Guy Amit, Moshe Levy, Yang Liu, Asaf Shabtai, Yuval Elovici:
Fair and accurate age prediction using distribution aware data curation and augmentation. WACV 2022: 2867-2877 - [i132]Barak Davidovich, Ben Nassi, Yuval Elovici:
VISAS - Detecting GPS spoofing attacks against drones by analyzing camera's video stream. CoRR abs/2201.00419 (2022) - [i131]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Evaluating the Security of Open Radio Access Networks. CoRR abs/2201.06080 (2022) - [i130]Ron Bitton, Dan Avraham, Eitan Klevansky, Dudu Mimran, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Adversarial Machine Learning Threat Analysis in Open Radio Access Networks. CoRR abs/2201.06093 (2022) - [i129]Moshe Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky:
The Security of Deep Learning Defences for Medical Imaging. CoRR abs/2201.08661 (2022) - [i128]Efrat Levy, Nadav Maman, Asaf Shabtai, Yuval Elovici:
AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus. CoRR abs/2202.06870 (2022) - [i127]Ben Nassi, Jacob Shams, Raz Ben-Netanel, Yuval Elovici:
bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements. CoRR abs/2202.10080 (2022) - [i126]Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici:
Large-Scale Shill Bidder Detection in E-commerce. CoRR abs/2204.02057 (2022) - [i125]Efrat Levy, Ben Nassi, Raz Swissa, Yuval Elovici:
EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome. CoRR abs/2205.06765 (2022) - [i124]Yonatan Bitton, Nitzan Bitton Guetta, Ron Yosef, Yuval Elovici, Mohit Bansal, Gabriel Stanovsky, Roy Schwartz:
WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models. CoRR abs/2207.12576 (2022) - [i123]Moshe Levy, Yuval Elovici, Yisroel Mirsky:
Transferability Ranking of Adversarial Examples. CoRR abs/2208.10878 (2022) - [i122]Avishag Shapira, Ron Bitton, Dan Avraham, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
Attacking Object Detector Using A Universal Targeted Label-Switch Patch. CoRR abs/2211.08859 (2022) - [i121]Jacob Shams, Ben Nassi, Ikuya Morikawa, Toshiya Shimizu, Asaf Shabtai, Yuval Elovici:
Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models. CoRR abs/2211.13644 (2022) - [i120]Ron Bitton, Alon Malach, Amiel Meiseles, Satoru Momiyama, Toshinori Araki, Jun Furukawa, Yuval Elovici, Asaf Shabtai:
Latent SHAP: Toward Practical Human-Interpretable Explanations. CoRR abs/2211.14797 (2022) - [i119]Alon Zolfi, Guy Amit, Amit Baras, Satoru Koda, Ikuya Morikawa, Yuval Elovici, Asaf Shabtai:
YolOOD: Utilizing Object Detection Concepts for Out-of-Distribution Detection. CoRR abs/2212.02081 (2022) - [i118]Ben Nassi, Ras Swissa, Yuval Elovici, Boris Zadov:
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects. IACR Cryptol. ePrint Arch. 2022: 227 (2022) - 2021
- [j120]Guy Amit, Asaf Shabtai, Yuval Elovici:
A Self-Healing Mechanism for Internet of Things Devices. IEEE Secur. Priv. 19(1): 44-53 (2021) - [j119]Raz Ben-Netanel, Ben Nassi, Adi Shamir, Yuval Elovici:
Detecting Spying Drones. IEEE Secur. Priv. 19(1): 65-73 (2021) - [j118]Ziv Katzir, Yuval Elovici:
Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks. IEEE Trans. Neural Networks Learn. Syst. 32(1): 128-138 (2021) - [c172]Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov:
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED. CCS 2021: 1900-1914 - [c171]Ben Nassi, Yaron Pirutin, Raz Swissa, Adi Shamir, Yuval Elovici, Boris Zadov:
POSTER: Recovering Songs from a Hanging Light Bulb. CCS 2021: 2381-2383 - [c170]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Game of Drones - Detecting Spying Drones Using Time Domain Analysis. CSCML 2021: 128-144 - [c169]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach for Countermeasure Selection Using Attack Graphs. CSF 2021: 1-16 - [c168]Alon Zolfi, Moshe Kravchik, Yuval Elovici, Asaf Shabtai:
The Translucent Patch: A Physical and Universal Attack on Object Detectors. CVPR 2021: 15232-15241 - [c167]Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici:
FOOD: Fast Out-Of-Distribution Detector. IJCNN 2021: 1-8 - [c166]Ori Or-Meir, Aviad Cohen, Yuval Elovici, Lior Rokach, Nir Nissim:
Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis. IJCNN 2021: 1-8 - [c165]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants. IJCNN 2021: 1-10 - [c164]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions. KDD 2021: 2574-2583 - [c163]Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici:
Taking over the Stock Market: Adversarial Perturbations Against Algorithmic Traders. ECML/PKDD (4) 2021: 221-236 - [c162]Jacob Gatlin, Sofia Belikovetsky, Yuval Elovici, Anthony Skjellum, Joshua Lubell, Paul Witherell, Mark Yampolskiy:
Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel. RAID 2021: 135-147 - [c161]Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, Yuval Elovici:
SoK: Security and Privacy in the Age of Commercial Drones. SP 2021: 1434-1451 - [c160]Bogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, Asaf Shabtai:
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs. USENIX Security Symposium 2021: 4259-4276 - [e5]Mark Yampolskiy, Yuval Elovici, Moti Yung:
AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8480-3 [contents] - [i117]Yael Mathov, Lior Rokach, Yuval Elovici:
Enhancing Real-World Adversarial Patches with 3D Modeling Techniques. CoRR abs/2102.05334 (2021) - [i116]Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. CoRR abs/2103.06297 (2021) - [i115]Ziv Katzir, Yuval Elovici:
Who's Afraid of Adversarial Transferability? CoRR abs/2105.00433 (2021) - [i114]Shai Cohen, Efrat Levy, Avi Shaked, Tair Cohen, Yuval Elovici, Asaf Shabtai:
RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks. CoRR abs/2106.07074 (2021) - [i113]Efrat Levy, Asaf Shabtai, Bogdan Groza, Pal-Stefan Murvay, Yuval Elovici:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. CoRR abs/2106.07895 (2021) - [i112]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. CoRR abs/2106.15764 (2021) - [i111]Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai:
A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems. CoRR abs/2107.01806 (2021) - [i110]Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici:
Dodging Attack Using Carefully Crafted Natural Makeup. CoRR abs/2109.06467 (2021) - [i109]Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-Man Cheung, Yuval Elovici, Alexander Binder:
Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples. CoRR abs/2110.12357 (2021) - [i108]