Alert button
Picture for Asaf Shabtai

Asaf Shabtai

Alert button

A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

Add code
Bookmark button
Alert button
Jul 05, 2021
Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai

Figure 1 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 2 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 3 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 4 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Viaarxiv icon

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals

Add code
Bookmark button
Alert button
Jun 15, 2021
Efrat Levy, Asaf Shabtai, Bogdan Groza, Pal-Stefan Murvay, Yuval Elovici

Figure 1 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 2 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 3 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 4 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Viaarxiv icon

RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks

Add code
Bookmark button
Alert button
Jun 13, 2021
Shai Cohen, Efrat Levy, Avi Shaked, Tair Cohen, Yuval Elovici, Asaf Shabtai

Figure 1 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 2 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 3 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 4 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Viaarxiv icon

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack

Add code
Bookmark button
Alert button
Mar 10, 2021
Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici

Figure 1 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 2 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 3 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 4 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Viaarxiv icon

Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems

Add code
Bookmark button
Alert button
Dec 23, 2020
Moshe Kravchik, Battista Biggio, Asaf Shabtai

Figure 1 for Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems
Figure 2 for Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems
Figure 3 for Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems
Figure 4 for Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems
Viaarxiv icon

BENN: Bias Estimation Using Deep Neural Network

Add code
Bookmark button
Alert button
Dec 23, 2020
Amit Giloni, Edita Grolman, Tanja Hagemann, Ronald Fromm, Sebastian Fischer, Yuval Elovici, Asaf Shabtai

Figure 1 for BENN: Bias Estimation Using Deep Neural Network
Figure 2 for BENN: Bias Estimation Using Deep Neural Network
Figure 3 for BENN: Bias Estimation Using Deep Neural Network
Figure 4 for BENN: Bias Estimation Using Deep Neural Network
Viaarxiv icon

The Translucent Patch: A Physical and Universal Attack on Object Detectors

Add code
Bookmark button
Alert button
Dec 23, 2020
Alon Zolfi, Moshe Kravchik, Yuval Elovici, Asaf Shabtai

Figure 1 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Figure 2 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Figure 3 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Figure 4 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Viaarxiv icon

Approximating Aggregated SQL Queries With LSTM Networks

Add code
Bookmark button
Alert button
Nov 02, 2020
Nir Regev, Lior Rokach, Asaf Shabtai

Figure 1 for Approximating Aggregated SQL Queries With LSTM Networks
Figure 2 for Approximating Aggregated SQL Queries With LSTM Networks
Figure 3 for Approximating Aggregated SQL Queries With LSTM Networks
Figure 4 for Approximating Aggregated SQL Queries With LSTM Networks
Viaarxiv icon

Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers

Add code
Bookmark button
Alert button
Oct 30, 2020
Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici

Figure 1 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Figure 2 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Figure 3 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Figure 4 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Viaarxiv icon