Picture for Yuval Elovici

Yuval Elovici

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals

Add code
Jun 15, 2021
Figure 1 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 2 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 3 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Figure 4 for CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals
Viaarxiv icon

RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks

Add code
Jun 13, 2021
Figure 1 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 2 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 3 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Figure 4 for RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
Viaarxiv icon

Who's Afraid of Adversarial Transferability?

Add code
May 05, 2021
Figure 1 for Who's Afraid of Adversarial Transferability?
Figure 2 for Who's Afraid of Adversarial Transferability?
Figure 3 for Who's Afraid of Adversarial Transferability?
Figure 4 for Who's Afraid of Adversarial Transferability?
Viaarxiv icon

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack

Add code
Mar 10, 2021
Figure 1 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 2 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 3 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Figure 4 for TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
Viaarxiv icon

Enhancing Real-World Adversarial Patches with 3D Modeling Techniques

Add code
Feb 10, 2021
Figure 1 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Figure 2 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Figure 3 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Figure 4 for Enhancing Real-World Adversarial Patches with 3D Modeling Techniques
Viaarxiv icon

BENN: Bias Estimation Using Deep Neural Network

Add code
Dec 23, 2020
Figure 1 for BENN: Bias Estimation Using Deep Neural Network
Figure 2 for BENN: Bias Estimation Using Deep Neural Network
Figure 3 for BENN: Bias Estimation Using Deep Neural Network
Figure 4 for BENN: Bias Estimation Using Deep Neural Network
Viaarxiv icon

The Translucent Patch: A Physical and Universal Attack on Object Detectors

Add code
Dec 23, 2020
Figure 1 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Figure 2 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Figure 3 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Figure 4 for The Translucent Patch: A Physical and Universal Attack on Object Detectors
Viaarxiv icon

Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity

Add code
Dec 09, 2020
Figure 1 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Figure 2 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Figure 3 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Figure 4 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Viaarxiv icon

Deja vu from the SVM Era: Example-based Explanations with Outlier Detection

Add code
Nov 11, 2020
Figure 1 for Deja vu from the SVM Era: Example-based Explanations with Outlier Detection
Figure 2 for Deja vu from the SVM Era: Example-based Explanations with Outlier Detection
Figure 3 for Deja vu from the SVM Era: Example-based Explanations with Outlier Detection
Figure 4 for Deja vu from the SVM Era: Example-based Explanations with Outlier Detection
Viaarxiv icon

Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers

Add code
Oct 30, 2020
Figure 1 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Figure 2 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Figure 3 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Figure 4 for Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Viaarxiv icon