Alert button
Picture for Efrat Levy

Efrat Levy

Alert button

The Adversarial Implications of Variable-Time Inference

Add code
Bookmark button
Alert button
Sep 05, 2023
Dudi Biton, Aditi Misra, Efrat Levy, Jaidip Kotak, Ron Bitton, Roei Schuster, Nicolas Papernot, Yuval Elovici, Ben Nassi

Figure 1 for The Adversarial Implications of Variable-Time Inference
Figure 2 for The Adversarial Implications of Variable-Time Inference
Figure 3 for The Adversarial Implications of Variable-Time Inference
Figure 4 for The Adversarial Implications of Variable-Time Inference
Viaarxiv icon

EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome

Add code
Bookmark button
Alert button
May 13, 2022
Efrat Levy, Ben Nassi, Raz Swissa, Yuval Elovici

Figure 1 for EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Figure 2 for EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Figure 3 for EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Figure 4 for EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Viaarxiv icon

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals

Add code
Bookmark button
Alert button
Jun 15, 2021
Efrat Levy, Asaf Shabtai, Bogdan Groza, Pal-Stefan Murvay, Yuval Elovici

Figure 1 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 2 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 3 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 4 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Viaarxiv icon

RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks

Add code
Bookmark button
Alert button
Jun 13, 2021
Shai Cohen, Efrat Levy, Avi Shaked, Tair Cohen, Yuval Elovici, Asaf Shabtai

Figure 1 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 2 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 3 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 4 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Viaarxiv icon