Picture for Yuval Elovici

Yuval Elovici

Who's Afraid of Adversarial Transferability?

Add code
May 05, 2021
Figure 1 for Who's Afraid of Adversarial Transferability?
Figure 2 for Who's Afraid of Adversarial Transferability?
Figure 3 for Who's Afraid of Adversarial Transferability?
Figure 4 for Who's Afraid of Adversarial Transferability?
Viaarxiv icon

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack

Add code
Mar 10, 2021
Figure 1 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 2 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 3 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 4 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Viaarxiv icon

Enhancing Real-World Adversarial Patches with 3D Modeling Techniques

Add code
Feb 10, 2021
Figure 1 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Figure 2 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Figure 3 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Figure 4 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Viaarxiv icon

BENN: Bias Estimation Using Deep Neural Network

Add code
Dec 23, 2020
Figure 1 for BENN: Bias Estimation Using Deep Neural Network
Figure 2 for BENN: Bias Estimation Using Deep Neural Network
Figure 3 for BENN: Bias Estimation Using Deep Neural Network
Figure 4 for BENN: Bias Estimation Using Deep Neural Network
Viaarxiv icon

The Translucent Patch: A Physical and Universal Attack on Object Detectors

Add code
Dec 23, 2020
Figure 1 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Figure 2 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Figure 3 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Figure 4 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Viaarxiv icon

Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity

Add code
Dec 09, 2020
Figure 1 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Figure 2 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Figure 3 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Figure 4 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Viaarxiv icon

Deja vu from the SVM Era: Example-based Explanations with Outlier Detection

Add code
Nov 11, 2020
Figure 1 for Deja vu from the SVM Era: Example-based Explanations with Outlier Detection
Figure 2 for Deja vu from the SVM Era: Example-based Explanations with Outlier Detection
Figure 3 for Deja vu from the SVM Era: Example-based Explanations with Outlier Detection
Figure 4 for Deja vu from the SVM Era: Example-based Explanations with Outlier Detection
Viaarxiv icon

Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers

Add code
Oct 30, 2020
Figure 1 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Figure 2 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Figure 3 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Figure 4 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Viaarxiv icon

Dynamic Adversarial Patch for Evading Object Detection Models

Add code
Oct 25, 2020
Figure 1 for Dynamic Adversarial Patch for Evading Object Detection Models
Figure 2 for Dynamic Adversarial Patch for Evading Object Detection Models
Figure 3 for Dynamic Adversarial Patch for Evading Object Detection Models
Figure 4 for Dynamic Adversarial Patch for Evading Object Detection Models
Viaarxiv icon

Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations

Add code
Oct 24, 2020
Figure 1 for Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Figure 2 for Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Figure 3 for Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Figure 4 for Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Viaarxiv icon