Get our free extension to see links to code for papers anywhere online!

Chrome logo  Add to Chrome

Firefox logo Add to Firefox

EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome



Efrat Levy , Ben Nassi , Raz Swissa , Yuval Elovici


   Access Paper or Ask Questions

The Security of Deep Learning Defences for Medical Imaging



Moshe Levy , Guy Amit , Yuval Elovici , Yisroel Mirsky


   Access Paper or Ask Questions

Adversarial Machine Learning Threat Analysis in Open Radio Access Networks



Ron Bitton , Dan Avraham , Eitan Klevansky , Dudu Mimran , Oleg Brodt , Heiko Lehmann , Yuval Elovici , Asaf Shabtai


   Access Paper or Ask Questions

Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models



Alon Zolfi , Shai Avidan , Yuval Elovici , Asaf Shabtai


   Access Paper or Ask Questions

Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples



Yi Xiang Marcus Tan , Penny Chong , Jiamei Sun , Ngai-man Cheung , Yuval Elovici , Alexander Binder

* arXiv admin note: text overlap with arXiv:2012.06330 

   Access Paper or Ask Questions

Dodging Attack Using Carefully Crafted Natural Makeup



Nitzan Guetta , Asaf Shabtai , Inderjeet Singh , Satoru Momiyama , Yuval Elovici


   Access Paper or Ask Questions

A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems



Ron Bitton , Nadav Maman , Inderjeet Singh , Satoru Momiyama , Yuval Elovici , Asaf Shabtai


   Access Paper or Ask Questions

The Threat of Offensive AI to Organizations



Yisroel Mirsky , Ambra Demontis , Jaidip Kotak , Ram Shankar , Deng Gelei , Liu Yang , Xiangyu Zhang , Wenke Lee , Yuval Elovici , Battista Biggio


   Access Paper or Ask Questions

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals



Efrat Levy , Asaf Shabtai , Bogdan Groza , Pal-Stefan Murvay , Yuval Elovici


   Access Paper or Ask Questions

RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks



Shai Cohen , Efrat Levy , Avi Shaked , Tair Cohen , Yuval Elovici , Asaf Shabtai


   Access Paper or Ask Questions

1
2
3
4
5
6
>>