Picture for Asaf Shabtai

Asaf Shabtai

Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models

Add code
Nov 24, 2022
Figure 1 for Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models
Figure 2 for Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models
Figure 3 for Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models
Figure 4 for Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models
Viaarxiv icon

Attacking Object Detector Using A Universal Targeted Label-Switch Patch

Add code
Nov 16, 2022
Viaarxiv icon

Improving Interpretability via Regularization of Neural Activation Sensitivity

Add code
Nov 16, 2022
Figure 1 for Improving Interpretability via Regularization of Neural Activation Sensitivity
Figure 2 for Improving Interpretability via Regularization of Neural Activation Sensitivity
Figure 3 for Improving Interpretability via Regularization of Neural Activation Sensitivity
Figure 4 for Improving Interpretability via Regularization of Neural Activation Sensitivity
Viaarxiv icon

A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection

Add code
Sep 19, 2022
Figure 1 for A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection
Figure 2 for A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection
Figure 3 for A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection
Figure 4 for A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection
Viaarxiv icon

Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation

Add code
May 26, 2022
Figure 1 for Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation
Figure 2 for Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation
Figure 3 for Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation
Figure 4 for Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation
Viaarxiv icon

Adversarial Machine Learning Threat Analysis in Open Radio Access Networks

Add code
Jan 16, 2022
Figure 1 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Figure 2 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Figure 3 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Figure 4 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Viaarxiv icon

Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models

Add code
Nov 21, 2021
Figure 1 for Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models
Figure 2 for Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models
Figure 3 for Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models
Figure 4 for Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models
Viaarxiv icon

Dodging Attack Using Carefully Crafted Natural Makeup

Add code
Sep 14, 2021
Figure 1 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 2 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 3 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 4 for Dodging Attack Using Carefully Crafted Natural Makeup
Viaarxiv icon

A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

Add code
Jul 05, 2021
Figure 1 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 2 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 3 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 4 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Viaarxiv icon

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals

Add code
Jun 15, 2021
Figure 1 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 2 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 3 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 4 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Viaarxiv icon