Picture for Yuval Elovici

Yuval Elovici

Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization

Add code
Feb 06, 2020
Figure 1 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 2 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 3 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 4 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Viaarxiv icon

Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks

Add code
Jan 07, 2020
Figure 1 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 2 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 3 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 4 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Viaarxiv icon

TEAGS: Time-aware Text Embedding Approach to Generate Subgraphs

Add code
Aug 21, 2019
Figure 1 for TEAGS: Time-aware Text Embedding Approach to Generate Subgraphs
Figure 2 for TEAGS: Time-aware Text Embedding Approach to Generate Subgraphs
Figure 3 for TEAGS: Time-aware Text Embedding Approach to Generate Subgraphs
Figure 4 for TEAGS: Time-aware Text Embedding Approach to Generate Subgraphs
Viaarxiv icon

Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn

Add code
Jul 11, 2019
Figure 1 for Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn
Figure 2 for Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn
Figure 3 for Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn
Figure 4 for Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn
Viaarxiv icon

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup

Add code
May 31, 2019
Figure 1 for Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup
Figure 2 for Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup
Figure 3 for Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup
Figure 4 for Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup
Viaarxiv icon

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

Add code
May 28, 2019
Figure 1 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Figure 2 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Figure 3 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Figure 4 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Viaarxiv icon

CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning

Add code
Jan 11, 2019
Figure 1 for CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Figure 2 for CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Figure 3 for CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Figure 4 for CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Viaarxiv icon

Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces

Add code
Dec 04, 2018
Figure 1 for Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces
Figure 2 for Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces
Figure 3 for Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces
Figure 4 for Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces
Viaarxiv icon

Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers

Add code
Sep 22, 2018
Figure 1 for Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers
Figure 2 for Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers
Figure 3 for Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers
Figure 4 for Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers
Viaarxiv icon

DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN

Add code
Aug 24, 2018
Figure 1 for DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN
Figure 2 for DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN
Figure 3 for DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN
Figure 4 for DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN
Viaarxiv icon