Picture for Yuval Elovici

Yuval Elovici

Dynamic Adversarial Patch for Evading Object Detection Models

Add code
Oct 25, 2020
Figure 1 for Dynamic Adversarial Patch for Evading Object Detection Models
Figure 2 for Dynamic Adversarial Patch for Evading Object Detection Models
Figure 3 for Dynamic Adversarial Patch for Evading Object Detection Models
Figure 4 for Dynamic Adversarial Patch for Evading Object Detection Models
Viaarxiv icon

Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations

Add code
Oct 24, 2020
Figure 1 for Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Figure 2 for Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Figure 3 for Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Figure 4 for Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Viaarxiv icon

When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders

Add code
Oct 19, 2020
Figure 1 for When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders
Figure 2 for When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders
Figure 3 for When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders
Figure 4 for When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders
Viaarxiv icon

Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples

Add code
Oct 07, 2020
Figure 1 for Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Figure 2 for Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Figure 3 for Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Figure 4 for Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Viaarxiv icon

Fairness Matters -- A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems

Add code
Sep 16, 2020
Figure 1 for Fairness Matters -- A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems
Figure 2 for Fairness Matters -- A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems
Figure 3 for Fairness Matters -- A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems
Figure 4 for Fairness Matters -- A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems
Viaarxiv icon

GLOD: Gaussian Likelihood Out of Distribution Detector

Add code
Aug 21, 2020
Figure 1 for GLOD: Gaussian Likelihood Out of Distribution Detector
Figure 2 for GLOD: Gaussian Likelihood Out of Distribution Detector
Figure 3 for GLOD: Gaussian Likelihood Out of Distribution Detector
Viaarxiv icon

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Add code
Aug 10, 2020
Figure 1 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Figure 2 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Figure 3 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Figure 4 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Viaarxiv icon

Adversarial Learning in the Cyber Security Domain

Add code
Jul 05, 2020
Figure 1 for Adversarial Learning in the Cyber Security Domain
Figure 2 for Adversarial Learning in the Cyber Security Domain
Figure 3 for Adversarial Learning in the Cyber Security Domain
Figure 4 for Adversarial Learning in the Cyber Security Domain
Viaarxiv icon

Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities

Add code
Jun 30, 2020
Figure 1 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 2 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 3 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 4 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Viaarxiv icon

Lightweight Collaborative Anomaly Detection for the IoT using Blockchain

Add code
Jun 18, 2020
Figure 1 for Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Figure 2 for Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Figure 3 for Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Figure 4 for Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Viaarxiv icon