Alert button
Picture for Ron Bitton

Ron Bitton

Alert button

The Adversarial Implications of Variable-Time Inference

Add code
Bookmark button
Alert button
Sep 05, 2023
Dudi Biton, Aditi Misra, Efrat Levy, Jaidip Kotak, Ron Bitton, Roei Schuster, Nicolas Papernot, Yuval Elovici, Ben Nassi

Figure 1 for The Adversarial Implications of Variable-Time Inference
Figure 2 for The Adversarial Implications of Variable-Time Inference
Figure 3 for The Adversarial Implications of Variable-Time Inference
Figure 4 for The Adversarial Implications of Variable-Time Inference
Viaarxiv icon

Latent SHAP: Toward Practical Human-Interpretable Explanations

Add code
Bookmark button
Alert button
Nov 27, 2022
Ron Bitton, Alon Malach, Amiel Meiseles, Satoru Momiyama, Toshinori Araki, Jun Furukawa, Yuval Elovici, Asaf Shabtai

Figure 1 for Latent SHAP: Toward Practical Human-Interpretable Explanations
Figure 2 for Latent SHAP: Toward Practical Human-Interpretable Explanations
Figure 3 for Latent SHAP: Toward Practical Human-Interpretable Explanations
Figure 4 for Latent SHAP: Toward Practical Human-Interpretable Explanations
Viaarxiv icon

Attacking Object Detector Using A Universal Targeted Label-Switch Patch

Add code
Bookmark button
Alert button
Nov 16, 2022
Avishag Shapira, Ron Bitton, Dan Avraham, Alon Zolfi, Yuval Elovici, Asaf Shabtai

Figure 1 for Attacking Object Detector Using A Universal Targeted Label-Switch Patch
Figure 2 for Attacking Object Detector Using A Universal Targeted Label-Switch Patch
Figure 3 for Attacking Object Detector Using A Universal Targeted Label-Switch Patch
Figure 4 for Attacking Object Detector Using A Universal Targeted Label-Switch Patch
Viaarxiv icon

Improving Interpretability via Regularization of Neural Activation Sensitivity

Add code
Bookmark button
Alert button
Nov 16, 2022
Ofir Moshe, Gil Fidel, Ron Bitton, Asaf Shabtai

Figure 1 for Improving Interpretability via Regularization of Neural Activation Sensitivity
Figure 2 for Improving Interpretability via Regularization of Neural Activation Sensitivity
Figure 3 for Improving Interpretability via Regularization of Neural Activation Sensitivity
Figure 4 for Improving Interpretability via Regularization of Neural Activation Sensitivity
Viaarxiv icon

Adversarial Machine Learning Threat Analysis in Open Radio Access Networks

Add code
Bookmark button
Alert button
Jan 16, 2022
Ron Bitton, Dan Avraham, Eitan Klevansky, Dudu Mimran, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai

Figure 1 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Figure 2 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Figure 3 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Figure 4 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Viaarxiv icon

A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

Add code
Bookmark button
Alert button
Jul 05, 2021
Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai

Figure 1 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 2 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 3 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 4 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Viaarxiv icon

Adversarial robustness via stochastic regularization of neural activation sensitivity

Add code
Bookmark button
Alert button
Sep 23, 2020
Gil Fidel, Ron Bitton, Ziv Katzir, Asaf Shabtai

Figure 1 for Adversarial robustness via stochastic regularization of neural activation sensitivity
Figure 2 for Adversarial robustness via stochastic regularization of neural activation sensitivity
Figure 3 for Adversarial robustness via stochastic regularization of neural activation sensitivity
Figure 4 for Adversarial robustness via stochastic regularization of neural activation sensitivity
Viaarxiv icon

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Add code
Bookmark button
Alert button
Aug 10, 2020
Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

Figure 1 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Figure 2 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Figure 3 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Figure 4 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Viaarxiv icon

Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities

Add code
Bookmark button
Alert button
Jun 30, 2020
Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai

Figure 1 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 2 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 3 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 4 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Viaarxiv icon

Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization

Add code
Bookmark button
Alert button
Feb 06, 2020
Guy Amit, Ishai Rosenberg, Moshe Levy, Ron Bitton, Asaf Shabtai, Yuval Elovici

Figure 1 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 2 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 3 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 4 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Viaarxiv icon