Alert button
Picture for Yael Mathov

Yael Mathov

Alert button

Enhancing Real-World Adversarial Patches with 3D Modeling Techniques

Add code
Bookmark button
Alert button
Feb 10, 2021
Yael Mathov, Lior Rokach, Yuval Elovici

Figure 1 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Figure 2 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Figure 3 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Figure 4 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Viaarxiv icon

Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations

Add code
Bookmark button
Alert button
Oct 24, 2020
Tal Ben Senior, Yael Mathov, Asaf Shabtai, Yuval Elovici

Figure 1 for Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Figure 2 for Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Figure 3 for Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Figure 4 for Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Viaarxiv icon

When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders

Add code
Bookmark button
Alert button
Oct 19, 2020
Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici

Figure 1 for When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders
Figure 2 for When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders
Figure 3 for When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders
Figure 4 for When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders
Viaarxiv icon

Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples

Add code
Bookmark button
Alert button
Oct 07, 2020
Eden Levy, Yael Mathov, Ziv Katzir, Asaf Shabtai, Yuval Elovici

Figure 1 for Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Figure 2 for Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Figure 3 for Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Figure 4 for Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Viaarxiv icon

N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders

Add code
Bookmark button
Alert button
May 09, 2018
Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Dominik Breitenbacher, Asaf Shabtai, Yuval Elovici

Figure 1 for N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders
Figure 2 for N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders
Figure 3 for N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders
Figure 4 for N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders
Viaarxiv icon