Alert button
Picture for Yuval Elovici

Yuval Elovici

Alert button

Dodging Attack Using Carefully Crafted Natural Makeup

Add code
Bookmark button
Alert button
Sep 14, 2021
Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici

Figure 1 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 2 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 3 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 4 for Dodging Attack Using Carefully Crafted Natural Makeup
Viaarxiv icon

A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

Add code
Bookmark button
Alert button
Jul 05, 2021
Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai

Figure 1 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 2 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 3 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 4 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Viaarxiv icon

The Threat of Offensive AI to Organizations

Add code
Bookmark button
Alert button
Jun 30, 2021
Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio

Figure 1 for The Threat of Offensive AI to Organizations
Figure 2 for The Threat of Offensive AI to Organizations
Figure 3 for The Threat of Offensive AI to Organizations
Figure 4 for The Threat of Offensive AI to Organizations
Viaarxiv icon

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals

Add code
Bookmark button
Alert button
Jun 15, 2021
Efrat Levy, Asaf Shabtai, Bogdan Groza, Pal-Stefan Murvay, Yuval Elovici

Figure 1 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 2 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 3 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 4 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Viaarxiv icon

RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks

Add code
Bookmark button
Alert button
Jun 13, 2021
Shai Cohen, Efrat Levy, Avi Shaked, Tair Cohen, Yuval Elovici, Asaf Shabtai

Figure 1 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 2 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 3 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 4 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Viaarxiv icon

Who's Afraid of Adversarial Transferability?

Add code
Bookmark button
Alert button
May 05, 2021
Ziv Katzir, Yuval Elovici

Figure 1 for Who's Afraid of Adversarial Transferability?
Figure 2 for Who's Afraid of Adversarial Transferability?
Figure 3 for Who's Afraid of Adversarial Transferability?
Figure 4 for Who's Afraid of Adversarial Transferability?
Viaarxiv icon

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack

Add code
Bookmark button
Alert button
Mar 10, 2021
Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici

Figure 1 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 2 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 3 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 4 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Viaarxiv icon

Enhancing Real-World Adversarial Patches with 3D Modeling Techniques

Add code
Bookmark button
Alert button
Feb 10, 2021
Yael Mathov, Lior Rokach, Yuval Elovici

Figure 1 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Figure 2 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Figure 3 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Figure 4 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Viaarxiv icon

BENN: Bias Estimation Using Deep Neural Network

Add code
Bookmark button
Alert button
Dec 23, 2020
Amit Giloni, Edita Grolman, Tanja Hagemann, Ronald Fromm, Sebastian Fischer, Yuval Elovici, Asaf Shabtai

Figure 1 for BENN: Bias Estimation Using Deep Neural Network
Figure 2 for BENN: Bias Estimation Using Deep Neural Network
Figure 3 for BENN: Bias Estimation Using Deep Neural Network
Figure 4 for BENN: Bias Estimation Using Deep Neural Network
Viaarxiv icon