Picture for Asaf Shabtai

Asaf Shabtai

Adversarial Machine Learning Threat Analysis in Open Radio Access Networks

Add code
Jan 16, 2022
Viaarxiv icon

Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models

Add code
Nov 21, 2021
Figure 1 for Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models
Figure 2 for Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models
Figure 3 for Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models
Figure 4 for Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models
Viaarxiv icon

Dodging Attack Using Carefully Crafted Natural Makeup

Add code
Sep 14, 2021
Figure 1 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 2 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 3 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 4 for Dodging Attack Using Carefully Crafted Natural Makeup
Viaarxiv icon

A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

Add code
Jul 05, 2021
Figure 1 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 2 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 3 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 4 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Viaarxiv icon

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals

Add code
Jun 15, 2021
Figure 1 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 2 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 3 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 4 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Viaarxiv icon

RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks

Add code
Jun 13, 2021
Figure 1 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 2 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 3 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 4 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Viaarxiv icon

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack

Add code
Mar 10, 2021
Figure 1 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 2 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 3 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 4 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Viaarxiv icon

Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems

Add code
Dec 23, 2020
Figure 1 for Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems
Figure 2 for Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems
Figure 3 for Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems
Figure 4 for Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems
Viaarxiv icon

BENN: Bias Estimation Using Deep Neural Network

Add code
Dec 23, 2020
Figure 1 for BENN: Bias Estimation Using Deep Neural Network
Figure 2 for BENN: Bias Estimation Using Deep Neural Network
Figure 3 for BENN: Bias Estimation Using Deep Neural Network
Figure 4 for BENN: Bias Estimation Using Deep Neural Network
Viaarxiv icon

The Translucent Patch: A Physical and Universal Attack on Object Detectors

Add code
Dec 23, 2020
Figure 1 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Figure 2 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Figure 3 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Figure 4 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Viaarxiv icon