Alert button
Picture for Yisroel Mirsky

Yisroel Mirsky

Alert button

Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks

Add code
Bookmark button
Alert button
Mar 14, 2024
Roey Bokobza, Yisroel Mirsky

Figure 1 for Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks
Figure 2 for Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks
Figure 3 for Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks
Figure 4 for Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks
Viaarxiv icon

What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

Add code
Bookmark button
Alert button
Mar 14, 2024
Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky

Figure 1 for What Was Your Prompt? A Remote Keylogging Attack on AI Assistants
Figure 2 for What Was Your Prompt? A Remote Keylogging Attack on AI Assistants
Figure 3 for What Was Your Prompt? A Remote Keylogging Attack on AI Assistants
Figure 4 for What Was Your Prompt? A Remote Keylogging Attack on AI Assistants
Viaarxiv icon

Transpose Attack: Stealing Datasets with Bidirectional Training

Add code
Bookmark button
Alert button
Nov 13, 2023
Guy Amit, Mosh Levy, Yisroel Mirsky

Viaarxiv icon

Discussion Paper: The Threat of Real Time Deepfakes

Add code
Bookmark button
Alert button
Jun 04, 2023
Guy Frankovits, Yisroel Mirsky

Figure 1 for Discussion Paper: The Threat of Real Time Deepfakes
Viaarxiv icon

Deepfake CAPTCHA: A Method for Preventing Fake Calls

Add code
Bookmark button
Alert button
Jan 08, 2023
Lior Yasur, Guy Frankovits, Fred M. Grabovski, Yisroel Mirsky

Figure 1 for Deepfake CAPTCHA: A Method for Preventing Fake Calls
Figure 2 for Deepfake CAPTCHA: A Method for Preventing Fake Calls
Figure 3 for Deepfake CAPTCHA: A Method for Preventing Fake Calls
Figure 4 for Deepfake CAPTCHA: A Method for Preventing Fake Calls
Viaarxiv icon

Transferability Ranking of Adversarial Examples

Add code
Bookmark button
Alert button
Aug 23, 2022
Mosh Levy, Yuval Elovici, Yisroel Mirsky

Figure 1 for Transferability Ranking of Adversarial Examples
Figure 2 for Transferability Ranking of Adversarial Examples
Figure 3 for Transferability Ranking of Adversarial Examples
Figure 4 for Transferability Ranking of Adversarial Examples
Viaarxiv icon

DF-Captcha: A Deepfake Captcha for Preventing Fake Calls

Add code
Bookmark button
Alert button
Aug 17, 2022
Yisroel Mirsky

Figure 1 for DF-Captcha: A Deepfake Captcha for Preventing Fake Calls
Figure 2 for DF-Captcha: A Deepfake Captcha for Preventing Fake Calls
Figure 3 for DF-Captcha: A Deepfake Captcha for Preventing Fake Calls
Figure 4 for DF-Captcha: A Deepfake Captcha for Preventing Fake Calls
Viaarxiv icon

The Security of Deep Learning Defences for Medical Imaging

Add code
Bookmark button
Alert button
Jan 21, 2022
Moshe Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky

Figure 1 for The Security of Deep Learning Defences for Medical Imaging
Figure 2 for The Security of Deep Learning Defences for Medical Imaging
Figure 3 for The Security of Deep Learning Defences for Medical Imaging
Figure 4 for The Security of Deep Learning Defences for Medical Imaging
Viaarxiv icon

The Threat of Offensive AI to Organizations

Add code
Bookmark button
Alert button
Jun 30, 2021
Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio

Figure 1 for The Threat of Offensive AI to Organizations
Figure 2 for The Threat of Offensive AI to Organizations
Figure 3 for The Threat of Offensive AI to Organizations
Figure 4 for The Threat of Offensive AI to Organizations
Viaarxiv icon

IPatch: A Remote Adversarial Patch

Add code
Bookmark button
Alert button
Apr 30, 2021
Yisroel Mirsky

Figure 1 for IPatch: A Remote Adversarial Patch
Figure 2 for IPatch: A Remote Adversarial Patch
Figure 3 for IPatch: A Remote Adversarial Patch
Figure 4 for IPatch: A Remote Adversarial Patch
Viaarxiv icon