Picture for Yuval Elovici

Yuval Elovici

LexiMark: Robust Watermarking via Lexical Substitutions to Enhance Membership Verification of an LLM's Textual Training Data

Add code
Jun 17, 2025
Viaarxiv icon

ImpReSS: Implicit Recommender System for Support Conversations

Add code
Jun 17, 2025
Viaarxiv icon

RuleGenie: SIEM Detection Rule Set Optimization

Add code
May 10, 2025
Viaarxiv icon

PaniCar: Securing the Perception of Advanced Driving Assistance Systems Against Emergency Vehicle Lighting

Add code
May 08, 2025
Viaarxiv icon

Rogue Cell: Adversarial Attack and Defense in Untrusted O-RAN Setup Exploiting the Traffic Steering xApp

Add code
May 03, 2025
Viaarxiv icon

A Comprehensive Survey in LLM(-Agent) Full Stack Safety: Data, Training and Deployment

Add code
Apr 22, 2025
Viaarxiv icon

A Privacy Enhancing Technique to Evade Detection by Street Video Cameras Without Using Adversarial Accessories

Add code
Jan 26, 2025
Figure 1 for A Privacy Enhancing Technique to Evade Detection by Street Video Cameras Without Using Adversarial Accessories
Figure 2 for A Privacy Enhancing Technique to Evade Detection by Street Video Cameras Without Using Adversarial Accessories
Figure 3 for A Privacy Enhancing Technique to Evade Detection by Street Video Cameras Without Using Adversarial Accessories
Figure 4 for A Privacy Enhancing Technique to Evade Detection by Street Video Cameras Without Using Adversarial Accessories
Viaarxiv icon

Towards an End-to-End (E2E) Adversarial Learning and Application in the Physical World

Add code
Jan 16, 2025
Viaarxiv icon

Tag&Tab: Pretraining Data Detection in Large Language Models Using Keyword-Based Membership Inference Attack

Add code
Jan 14, 2025
Viaarxiv icon

Addressing Key Challenges of Adversarial Attacks and Defenses in the Tabular Domain: A Methodological Framework for Coherence and Consistency

Add code
Dec 10, 2024
Figure 1 for Addressing Key Challenges of Adversarial Attacks and Defenses in the Tabular Domain: A Methodological Framework for Coherence and Consistency
Figure 2 for Addressing Key Challenges of Adversarial Attacks and Defenses in the Tabular Domain: A Methodological Framework for Coherence and Consistency
Figure 3 for Addressing Key Challenges of Adversarial Attacks and Defenses in the Tabular Domain: A Methodological Framework for Coherence and Consistency
Figure 4 for Addressing Key Challenges of Adversarial Attacks and Defenses in the Tabular Domain: A Methodological Framework for Coherence and Consistency
Viaarxiv icon