Alert button
Picture for Yuval Elovici

Yuval Elovici

Alert button

Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks

Add code
Bookmark button
Alert button
Dec 08, 2019
Yi Xiang Marcus Tan, Yuval Elovici, Alexander Binder

Figure 1 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 2 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 3 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 4 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Viaarxiv icon

TEAGS: Time-aware Text Embedding Approach to Generate Subgraphs

Add code
Bookmark button
Alert button
Aug 21, 2019
Saeid Hosseini, Saeed Najafipour, Ngai-Man Cheung, Mohammad Reza Kangavari, Xiaofang Zhou, Yuval Elovici

Figure 1 for TEAGS: Time-aware Text Embedding Approach to Generate Subgraphs
Figure 2 for TEAGS: Time-aware Text Embedding Approach to Generate Subgraphs
Figure 3 for TEAGS: Time-aware Text Embedding Approach to Generate Subgraphs
Figure 4 for TEAGS: Time-aware Text Embedding Approach to Generate Subgraphs
Viaarxiv icon

Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn

Add code
Bookmark button
Alert button
Jul 11, 2019
Ziv Katzir, Yuval Elovici

Figure 1 for Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn
Figure 2 for Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn
Figure 3 for Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn
Figure 4 for Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn
Viaarxiv icon

TEALS: Time-aware Text Embedding Approach to Leverage Subgraphs

Add code
Bookmark button
Alert button
Jul 06, 2019
Saeid Hosseini, Saeed Najafi Pour, Ngai-Man Cheung, Mohammad Reza Kangavari, Xiaofang Zhou, Yuval Elovici

Figure 1 for TEALS: Time-aware Text Embedding Approach to Leverage Subgraphs
Figure 2 for TEALS: Time-aware Text Embedding Approach to Leverage Subgraphs
Figure 3 for TEALS: Time-aware Text Embedding Approach to Leverage Subgraphs
Figure 4 for TEALS: Time-aware Text Embedding Approach to Leverage Subgraphs
Viaarxiv icon

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup

Add code
Bookmark button
Alert button
May 31, 2019
Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai

Figure 1 for Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup
Figure 2 for Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup
Figure 3 for Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup
Figure 4 for Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup
Viaarxiv icon

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

Add code
Bookmark button
Alert button
May 28, 2019
Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder

Figure 1 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Figure 2 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Figure 3 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Figure 4 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Viaarxiv icon

CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning

Add code
Bookmark button
Alert button
Jan 11, 2019
Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici

Figure 1 for CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Figure 2 for CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Figure 3 for CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Figure 4 for CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Viaarxiv icon

Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces

Add code
Bookmark button
Alert button
Dec 04, 2018
Ziv Katzir, Yuval Elovici

Figure 1 for Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces
Figure 2 for Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces
Figure 3 for Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces
Figure 4 for Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces
Viaarxiv icon

Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers

Add code
Bookmark button
Alert button
Sep 22, 2018
Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach

Figure 1 for Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers
Figure 2 for Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers
Figure 3 for Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers
Figure 4 for Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers
Viaarxiv icon

DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN

Add code
Bookmark button
Alert button
Aug 24, 2018
Swee Kiat Lim, Yi Loo, Ngoc-Trung Tran, Ngai-Man Cheung, Gemma Roig, Yuval Elovici

Figure 1 for DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN
Figure 2 for DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN
Figure 3 for DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN
Figure 4 for DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN
Viaarxiv icon