Alert button
Picture for Yuval Elovici

Yuval Elovici

Alert button

Latent SHAP: Toward Practical Human-Interpretable Explanations

Add code
Bookmark button
Alert button
Nov 27, 2022
Ron Bitton, Alon Malach, Amiel Meiseles, Satoru Momiyama, Toshinori Araki, Jun Furukawa, Yuval Elovici, Asaf Shabtai

Figure 1 for Latent SHAP: Toward Practical Human-Interpretable Explanations
Figure 2 for Latent SHAP: Toward Practical Human-Interpretable Explanations
Figure 3 for Latent SHAP: Toward Practical Human-Interpretable Explanations
Figure 4 for Latent SHAP: Toward Practical Human-Interpretable Explanations
Viaarxiv icon

Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models

Add code
Bookmark button
Alert button
Nov 24, 2022
Jacob Shams, Ben Nassi, Ikuya Morikawa, Toshiya Shimizu, Asaf Shabtai, Yuval Elovici

Figure 1 for Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models
Figure 2 for Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models
Figure 3 for Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models
Figure 4 for Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models
Viaarxiv icon

Attacking Object Detector Using A Universal Targeted Label-Switch Patch

Add code
Bookmark button
Alert button
Nov 16, 2022
Avishag Shapira, Ron Bitton, Dan Avraham, Alon Zolfi, Yuval Elovici, Asaf Shabtai

Figure 1 for Attacking Object Detector Using A Universal Targeted Label-Switch Patch
Figure 2 for Attacking Object Detector Using A Universal Targeted Label-Switch Patch
Figure 3 for Attacking Object Detector Using A Universal Targeted Label-Switch Patch
Figure 4 for Attacking Object Detector Using A Universal Targeted Label-Switch Patch
Viaarxiv icon

Transferability Ranking of Adversarial Examples

Add code
Bookmark button
Alert button
Aug 23, 2022
Mosh Levy, Yuval Elovici, Yisroel Mirsky

Figure 1 for Transferability Ranking of Adversarial Examples
Figure 2 for Transferability Ranking of Adversarial Examples
Figure 3 for Transferability Ranking of Adversarial Examples
Figure 4 for Transferability Ranking of Adversarial Examples
Viaarxiv icon

WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models

Add code
Bookmark button
Alert button
Jul 25, 2022
Yonatan Bitton, Nitzan Bitton Guetta, Ron Yosef, Yuval Elovici, Mohit Bansal, Gabriel Stanovsky, Roy Schwartz

Figure 1 for WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models
Figure 2 for WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models
Figure 3 for WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models
Figure 4 for WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models
Viaarxiv icon

EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome

Add code
Bookmark button
Alert button
May 13, 2022
Efrat Levy, Ben Nassi, Raz Swissa, Yuval Elovici

Figure 1 for EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Figure 2 for EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Figure 3 for EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Figure 4 for EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Viaarxiv icon

The Security of Deep Learning Defences for Medical Imaging

Add code
Bookmark button
Alert button
Jan 21, 2022
Moshe Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky

Figure 1 for The Security of Deep Learning Defences for Medical Imaging
Figure 2 for The Security of Deep Learning Defences for Medical Imaging
Figure 3 for The Security of Deep Learning Defences for Medical Imaging
Figure 4 for The Security of Deep Learning Defences for Medical Imaging
Viaarxiv icon

Adversarial Machine Learning Threat Analysis in Open Radio Access Networks

Add code
Bookmark button
Alert button
Jan 16, 2022
Ron Bitton, Dan Avraham, Eitan Klevansky, Dudu Mimran, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai

Figure 1 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Figure 2 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Figure 3 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Figure 4 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Viaarxiv icon

Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models

Add code
Bookmark button
Alert button
Nov 21, 2021
Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai

Figure 1 for Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models
Figure 2 for Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models
Figure 3 for Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models
Figure 4 for Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models
Viaarxiv icon

Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples

Add code
Bookmark button
Alert button
Oct 24, 2021
Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-man Cheung, Yuval Elovici, Alexander Binder

Figure 1 for Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples
Figure 2 for Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples
Figure 3 for Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples
Figure 4 for Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples
Viaarxiv icon