Alert button
Picture for Ishai Rosenberg

Ishai Rosenberg

Alert button

Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers

Add code
Bookmark button
Alert button
Oct 30, 2020
Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici

Figure 1 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Figure 2 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Figure 3 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Figure 4 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Viaarxiv icon

GLOD: Gaussian Likelihood Out of Distribution Detector

Add code
Bookmark button
Alert button
Aug 21, 2020
Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici

Figure 1 for GLOD: Gaussian Likelihood Out of Distribution Detector
Figure 2 for GLOD: Gaussian Likelihood Out of Distribution Detector
Figure 3 for GLOD: Gaussian Likelihood Out of Distribution Detector
Viaarxiv icon

Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization

Add code
Bookmark button
Alert button
Feb 06, 2020
Guy Amit, Ishai Rosenberg, Moshe Levy, Ron Bitton, Asaf Shabtai, Yuval Elovici

Figure 1 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 2 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 3 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 4 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Viaarxiv icon

End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware

Add code
Bookmark button
Alert button
Nov 30, 2019
Ishai Rosenberg, Guillaume Sicard, Eli David

Figure 1 for End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware
Figure 2 for End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware
Viaarxiv icon

Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers

Add code
Bookmark button
Alert button
Sep 22, 2018
Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach

Figure 1 for Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers
Figure 2 for Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers
Figure 3 for Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers
Figure 4 for Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers
Viaarxiv icon

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

Add code
Bookmark button
Alert button
Jun 24, 2018
Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici

Figure 1 for Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
Figure 2 for Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
Figure 3 for Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
Figure 4 for Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
Viaarxiv icon

DeepAPT: Nation-State APT Attribution Using End-to-End Deep Neural Networks

Add code
Bookmark button
Alert button
Nov 27, 2017
Ishai Rosenberg, Guillaume Sicard, Eli David

Viaarxiv icon