Picture for Yuval Elovici

Yuval Elovici

When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders

Add code
Oct 19, 2020
Figure 1 for When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders
Figure 2 for When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders
Figure 3 for When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders
Figure 4 for When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders
Viaarxiv icon

Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples

Add code
Oct 07, 2020
Figure 1 for Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Figure 2 for Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Figure 3 for Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Figure 4 for Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Viaarxiv icon

Fairness Matters -- A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems

Add code
Sep 16, 2020
Figure 1 for Fairness Matters -- A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems
Figure 2 for Fairness Matters -- A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems
Figure 3 for Fairness Matters -- A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems
Figure 4 for Fairness Matters -- A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems
Viaarxiv icon

GLOD: Gaussian Likelihood Out of Distribution Detector

Add code
Aug 21, 2020
Figure 1 for GLOD: Gaussian Likelihood Out of Distribution Detector
Figure 2 for GLOD: Gaussian Likelihood Out of Distribution Detector
Figure 3 for GLOD: Gaussian Likelihood Out of Distribution Detector
Viaarxiv icon

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Add code
Aug 10, 2020
Figure 1 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Figure 2 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Figure 3 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Figure 4 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Viaarxiv icon

Adversarial Learning in the Cyber Security Domain

Add code
Jul 05, 2020
Figure 1 for Adversarial Learning in the Cyber Security Domain
Figure 2 for Adversarial Learning in the Cyber Security Domain
Figure 3 for Adversarial Learning in the Cyber Security Domain
Figure 4 for Adversarial Learning in the Cyber Security Domain
Viaarxiv icon

Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities

Add code
Jun 30, 2020
Figure 1 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 2 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 3 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 4 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Viaarxiv icon

Lightweight Collaborative Anomaly Detection for the IoT using Blockchain

Add code
Jun 18, 2020
Figure 1 for Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Figure 2 for Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Figure 3 for Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Figure 4 for Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Viaarxiv icon

DANTE: A framework for mining and monitoring darknet traffic

Add code
Mar 05, 2020
Figure 1 for DANTE: A framework for mining and monitoring darknet traffic
Figure 2 for DANTE: A framework for mining and monitoring darknet traffic
Figure 3 for DANTE: A framework for mining and monitoring darknet traffic
Figure 4 for DANTE: A framework for mining and monitoring darknet traffic
Viaarxiv icon

IoT Device Identification Using Deep Learning

Add code
Feb 25, 2020
Figure 1 for IoT Device Identification Using Deep Learning
Figure 2 for IoT Device Identification Using Deep Learning
Figure 3 for IoT Device Identification Using Deep Learning
Figure 4 for IoT Device Identification Using Deep Learning
Viaarxiv icon