


default search action
Asaf Shabtai
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j88]Lavi Ben-Shimol, Danielle Lavi, Eitan Klevansky, Oleg Brodt, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
Detection of compromised functions in a serverless cloud environment. Comput. Secur. 150: 104261 (2025) - [j87]David Tayouri, Omri Sgan Cohen, Inbar Maimon, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
CORAL: Container Online Risk Assessment with Logical attack graphs. Comput. Secur. 150: 104296 (2025) - [j86]Edan Habler, Ron Bitton, Dan Avraham, Eitan Klevansky, Dudu Mimran, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Adversarial machine learning threat analysis and remediation in Open Radio Access Network (O-RAN). J. Netw. Comput. Appl. 236: 104090 (2025) - 2024
- [j85]Mor Nahum, Edita Grolman, Inbar Maimon, Dudu Mimran
, Oleg Brodt
, Aviad Elyashar, Yuval Elovici, Asaf Shabtai
:
OSSIntegrity: Collaborative open-source code integrity verification. Comput. Secur. 144: 103977 (2024) - [j84]Edan Habler
, Ron Bitton
, Asaf Shabtai
:
Assessing Aircraft Security: A Comprehensive Survey and Methodology for Evaluation. ACM Comput. Surv. 56(4): 96:1-96:40 (2024) - [j83]Orel Lavie
, Asaf Shabtai, Gilad Katz
:
Cost effective transfer of reinforcement learning policies. Expert Syst. Appl. 237(Part A): 121380 (2024) - [j82]Ofir Moshe, Gil Fidel, Ron Bitton, Asaf Shabtai:
Improving interpretability via regularization of neural activation sensitivity. Mach. Learn. 113(9): 6165-6196 (2024) - [j81]Omer Hofman, Amit Giloni, Yarin Hayun, Ikuya Morikawa, Toshiya Shimizu, Yuval Elovici, Asaf Shabtai:
X-Detect: explainable adversarial patch detection for object detectors in retail. Mach. Learn. 113(9): 6273-6292 (2024) - [j80]Efrat Levy
, Nadav Maman, Asaf Shabtai
, Yuval Elovici
:
AnoMili: Spoofing Hardening and Explainable Anomaly Detection for the 1553 Military Avionic Bus. IEEE Trans. Aerosp. Electron. Syst. 60(6): 7738-7753 (2024) - [j79]Amit Giloni
, Edita Grolman
, Tanja Hagemann, Ronald Fromm, Sebastian Fischer, Yuval Elovici
, Asaf Shabtai
:
BENN: Bias Estimation Using a Deep Neural Network. IEEE Trans. Neural Networks Learn. Syst. 35(1): 117-131 (2024) - [c103]Adi Ashkenazi, Edita Grolman, Aviad Elyashar, Dudu Mimran, Oleg Brodt, Yuval Elovici, Asaf Shabtai:
SMART: Serverless Module Analysis and Recognition Technique for Managed Applications. CCGrid 2024: 442-452 - [c102]Alon Zolfi, Guy Amit, Amit Baras, Satoru Koda, Ikuya Morikawa, Yuval Elovici, Asaf Shabtai:
YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection. CVPR 2024: 5788-5797 - [c101]Noa Wegerhoff, Avishag Shapira, Yuval Elovici, Asaf Shabtai:
DataDetective: Dataset Watermarking for Leaker Identification in ML Training. ECAI 2024: 2442-2451 - [c100]Jonathan Brokman
, Omer Hofman, Roman Vainshtein, Amit Giloni
, Toshiya Shimizu, Inderjeet Singh
, Oren Rachmil, Alon Zolfi
, Asaf Shabtai
, Yuki Unno, Hisashi Kojima
:
MONTRAGE: Monitoring Training for Attribution of Generative Diffusion Models. ECCV (75) 2024: 1-17 - [c99]Roye Katzav, Amit Giloni
, Edita Grolman
, Hiroo Saito, Tomoyuki Shibata, Tsukasa Omino, Misaki Komatsu, Yoshikazu Hanatani, Yuval Elovici
, Asaf Shabtai
:
AdversariaLeak: External Information Leakage Attack Using Adversarial Samples on Face Recognition Systems. ECCV (75) 2024: 288-303 - [c98]Sagi Brudni, Sapir Anidgar, Oleg Brodt, Dudu Mimran, Asaf Shabtai, Yuval Elovici:
Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions. EuroS&P 2024: 676-696 - [c97]Shoham Hanina, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
Universal Adversarial Attack Against Speaker Recognition Models. ICASSP 2024: 4860-4864 - [c96]Edita Grolman, Amit Giloni, Ryuta Kremer, Hiroo Saito, Tomoyuki Shibata, Tsukasa Omino, Misaki Komatsu, Yoshikazu Hanatani, Asaf Shabtai, Yuval Elovici:
Query-Based External Information Leakage Attacks on Face Recognition Models. IJCNN 2024: 1-10 - [c95]Ido Sakazi, Edita Grolman, Yuval Elovici, Asaf Shabtai:
STFL: Utilizing a Semi-Supervised, Transfer-Learning, Federated-Learning Approach to Detect Phishing URL Attacks. IJCNN 2024: 1-10 - [c94]Shuki Zanyovka, Asaf Shabtai:
Simultaneous Transmission and Null Space Tracking Using Interference Feedback for Spatial Division Multiple Access. IWCMC 2024: 811-817 - [c93]Yarin Ozery, Asaf Nadler, Asaf Shabtai:
Information Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection. NDSS 2024 - [c92]Mor Nahum
, Edita Grolman
, Inbar Maimon
, Dudu Mimran
, Oleg Brodt
, Aviad Elyashar
, Yuval Elovici
, Asaf Shabtai
:
Secure Crowdsource-Based Open-Source Code Verification (SC)^2V. SAC 2024: 1536-1538 - [i106]Sagiv Antebi, Noam Azulay, Edan Habler, Ben Ganon, Asaf Shabtai, Yuval Elovici:
GPT in Sheep's Clothing: The Risk of Customized GPTs. CoRR abs/2401.09075 (2024) - [i105]Oryan Yehezkel, Alon Zolfi, Amit Baras, Yuval Elovici, Asaf Shabtai:
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers. CoRR abs/2402.02554 (2024) - [i104]Daniel Nahmias, Gal Engelberg, Dan Klein, Asaf Shabtai:
Prompted Contextual Vectors for Spear-Phishing Detection. CoRR abs/2402.08309 (2024) - [i103]Amit Finkman, Eden Bar-Kochva, Avishag Shapira, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants. CoRR abs/2404.09066 (2024) - [i102]Lavi Ben-Shimol, Edita Grolman, Aviad Elyashar, Inbar Maimon, Dudu Mimran, Oleg Brodt, Martin Strassmann, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring. CoRR abs/2405.07172 (2024) - [i101]Ehud Malul, Yair Meidan, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation. CoRR abs/2405.19954 (2024) - [i100]Yonatan Amaru, Prasanna N. Wudali, Yuval Elovici, Asaf Shabtai:
RAPID: Robust APT Detection and Investigation Using Context-Aware Deep Learning. CoRR abs/2406.05362 (2024) - [i99]Yuval Schwartz, Lavi Ben-Shimol, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI. CoRR abs/2407.05194 (2024) - [i98]Beni Ifland, Elad Duani, Rubin Krief, Miro Ohana, Aviram Zilberman, Andres Murillo, Ofir Manor, Ortal Lavi, Hikichi Kenji, Asaf Shabtai, Yuval Elovici, Rami Puzis:
GeNet: A Multimodal LLM-Based Co-Pilot for Network Topology and Configuration. CoRR abs/2407.08249 (2024) - [i97]Danielle Lavi, Oleg Brodt, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
Detection of Compromised Functions in a Serverless Cloud Environment. CoRR abs/2408.02641 (2024) - [i96]Tom Segal
, Asaf Shabtai, Yuval Elovici:
DOMBA: Double Model Balancing for Access-Controlled Language Models via Minimum-Bounded Aggregation. CoRR abs/2408.11121 (2024) - [i95]Ofir Cohen, Gil Ari Agmon, Asaf Shabtai, Rami Puzis:
The Information Security Awareness of Large Language Models. CoRR abs/2411.13207 (2024) - [i94]Ben Ganon, Alon Zolfi, Omer Hofman, Inderjeet Singh, Hisashi Kojima, Yuval Elovici, Asaf Shabtai:
DIESEL - Dynamic Inference-Guidance via Evasion of Semantic Embeddings in LLMs. CoRR abs/2411.19038 (2024) - [i93]Yael Itzhakev, Amit Giloni, Yuval Elovici, Asaf Shabtai:
Addressing Key Challenges of Adversarial Attacks and Defenses in the Tabular Domain: A Methodological Framework for Coherence and Consistency. CoRR abs/2412.07326 (2024) - 2023
- [j78]David Tayouri
, Nick Baum, Asaf Shabtai
, Rami Puzis
:
A Survey of MulVAL Extensions and Their Attack Scenarios Coverage. IEEE Access 11: 27974-27991 (2023) - [j77]Yair Meidan
, Daniel Benatar, Ron Bitton, Dan Avraham, Asaf Shabtai:
D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks. Comput. Secur. 126: 103073 (2023) - [j76]Ron Bitton
, Nadav Maman
, Inderjeet Singh
, Satoru Momiyama
, Yuval Elovici
, Asaf Shabtai
:
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems. ACM Comput. Surv. 55(9): 183:1-183:36 (2023) - [j75]Yair Meidan
, Dan Avraham, Hanan Libhaber, Asaf Shabtai
:
CADeSH: Collaborative Anomaly Detection for Smart Homes. IEEE Internet Things J. 10(10): 8514-8532 (2023) - [j74]Jaidip Kotak
, Edan Habler
, Oleg Brodt, Asaf Shabtai
, Yuval Elovici
:
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions. Sensors 23(8): 4018 (2023) - [j73]Efrat Levy
, Asaf Shabtai
, Bogdan Groza
, Pal-Stefan Murvay, Yuval Elovici
:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. IEEE Trans. Inf. Forensics Secur. 18: 4800-4814 (2023) - [j72]Adriana Berdich
, Bogdan Groza
, René Mayrhofer
, Efrat Levy
, Asaf Shabtai
, Yuval Elovici
:
Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics. IEEE Trans. Mob. Comput. 22(4): 2417-2434 (2023) - [c91]Adi Offer
, Aviram Zilberman
, Asaf Shabtai
, Yuval Elovici
, Rami Puzis
:
CDGeB: Cloud Data Geolocation Benchmark. CCSW@CCS 2023: 69-74 - [c90]Ofir Cohen
, Ron Bitton
, Asaf Shabtai
, Rami Puzis
:
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment. ESORICS (3) 2023: 431-451 - [c89]Satoru Koda, Alon Zolfi, Edita Grolman, Asaf Shabtai, Ikuya Morikawa, Yuval Elovici:
Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey. IJCNN 2023: 1-10 - [c88]Yakov Mallah, Yuval Elovici, Asaf Shabtai:
Risk Oriented Resource Allocation in Robotic Swarm. PST 2023: 1-7 - [c87]Avishag Shapira, Alon Zolfi, Luca Demetrio
, Battista Biggio, Asaf Shabtai:
Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors. WACV 2023: 4560-4569 - [i92]Yair Meidan, Dan Avraham, Hanan Libhaber, Asaf Shabtai:
CADeSH: Collaborative Anomaly Detection for Smart Homes. CoRR abs/2303.01021 (2023) - [i91]Yair Meidan, Daniel Benatar, Ron Bitton, Dan Avraham, Asaf Shabtai:
D-Score: An Expert-Based Method for Assessing the Detectability of IoT-Related Cyber-Attacks. CoRR abs/2303.01041 (2023) - [i90]Natan Semyonov, Rami Puzis, Asaf Shabtai, Gilad Katz:
ReMark: Receptive Field based Spatial WaterMark Embedding Optimization using Deep Network. CoRR abs/2305.06786 (2023) - [i89]Omer Hofman, Amit Giloni, Yarin Hayun, Ikuya Morikawa, Toshiya Shimizu, Yuval Elovici, Asaf Shabtai:
X-Detect: Explainable Adversarial Patch Detection for Object Detectors in Retail. CoRR abs/2306.08422 (2023) - [i88]Yarin Ozery, Asaf Nadler, Asaf Shabtai:
Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and Prevention. CoRR abs/2307.02614 (2023) - [i87]David Tayouri, Telem Nachum, Asaf Shabtai:
MIRAGE: Multi-Binary Image Risk Assessment with Attack Graph Employment. CoRR abs/2311.03565 (2023) - [i86]Priyanka Prakash Surve, Oleg Brodt, Mark Yampolskiy, Yuval Elovici, Asaf Shabtai:
SoK: Security Below the OS - A Security Analysis of UEFI. CoRR abs/2311.03809 (2023) - [i85]Ryuta Kremer, Prasanna N. Wudali, Satoru Momiyama, Toshinori Araki, Jun Furukawa
, Yuval Elovici, Asaf Shabtai:
IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response. CoRR abs/2311.03825 (2023) - [i84]Yizhak Vaisman, Gilad Katz, Yuval Elovici, Asaf Shabtai:
Detecting Anomalous Network Communication Patterns Using Graph Convolutional Networks. CoRR abs/2311.18525 (2023) - [i83]Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai:
FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning. CoRR abs/2312.01200 (2023) - [i82]Roy Peled, Eran Aizikovich, Edan Habler, Yuval Elovici, Asaf Shabtai:
Evaluating the Security of Satellite Systems. CoRR abs/2312.01330 (2023) - [i81]Amit Baras, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
QuantAttack: Exploiting Dynamic Quantization to Attack Vision Transformers. CoRR abs/2312.02220 (2023) - 2022
- [j71]Adriana Berdich
, Bogdan Groza
, Efrat Levy
, Asaf Shabtai
, Yuval Elovici
, René Mayrhofer
:
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings. IEEE Access 10: 122399-122413 (2022) - [j70]Asaf Nadler
, Ron Bitton, Oleg Brodt, Asaf Shabtai:
On the vulnerability of anti-malware solutions to DNS attacks. Comput. Secur. 116: 102687 (2022) - [j69]Yael Mathov
, Tal Ben Senior, Asaf Shabtai, Yuval Elovici:
Stop bugging me! Evading modern-day wiretapping using adversarial perturbations. Comput. Secur. 121: 102841 (2022) - [j68]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Security of Open Radio Access Networks. Comput. Secur. 122: 102890 (2022) - [j67]Moshe Kravchik, Luca Demetrio
, Battista Biggio, Asaf Shabtai:
Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems. Comput. Secur. 122: 102901 (2022) - [j66]Ishai Rosenberg
, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. ACM Comput. Surv. 54(5): 108:1-108:36 (2022) - [j65]Edita Grolman, Dvir Cohen, Tatiana Frenklach, Asaf Shabtai, Rami Puzis:
How and when to stop the co-training process. Expert Syst. Appl. 187: 115841 (2022) - [j64]Yoni Birman
, Shaked Hindi
, Gilad Katz, Asaf Shabtai:
Cost-effective ensemble models selection using deep reinforcement learning. Inf. Fusion 77: 133-148 (2022) - [j63]Yael Mathov
, Eden Levy, Ziv Katzir
, Asaf Shabtai, Yuval Elovici
:
Not all datasets are born equal: On heterogeneous tabular data and adversarial examples. Knowl. Based Syst. 242: 108377 (2022) - [j62]Adir Solomon
, Michael Michaelshvili, Ron Bitton, Bracha Shapira
, Lior Rokach, Rami Puzis
, Asaf Shabtai:
Contextual security awareness: A context-based approach for assessing the security awareness of users. Knowl. Based Syst. 246: 108709 (2022) - [j61]Shai Cohen
, Efrat Levy
, Avi Shaked
, Tair Cohen, Yuval Elovici
, Asaf Shabtai
:
RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks. Sensors 22(11): 4259 (2022) - [j60]Edan Habler
, Asaf Shabtai
:
Analyzing Sequences of Airspace States to Detect Anomalous Traffic Conditions. IEEE Trans. Aerosp. Electron. Syst. 58(3): 1843-1857 (2022) - [j59]Orly Stan
, Ron Bitton
, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici
, Asaf Shabtai
:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1936-1954 (2022) - [j58]Moshe Kravchik
, Asaf Shabtai
:
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA. IEEE Trans. Dependable Secur. Comput. 19(4): 2179-2197 (2022) - [j57]Yam Sharon, David Berend
, Yang Liu
, Asaf Shabtai
, Yuval Elovici
:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. IEEE Trans. Inf. Forensics Secur. 17: 3225-3237 (2022) - [c86]Shay Sakazi, Yuval Elovici, Asaf Shabtai:
Prioritizing Antivirus Alerts on Internal Enterprise Machines. DIMVA 2022: 75-95 - [c85]Bogdan Groza
, Lucian Popa, Tudor Andreica, Pal-Stefan Murvay, Asaf Shabtai, Yuval Elovici:
PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks. ESORICS (3) 2022: 658-679 - [c84]Amit Giloni, Edita Grolman, Yuval Elovici, Asaf Shabtai:
FEPC: Fairness Estimation Using Prototypes and Critics for Tabular Data. ICPR 2022: 4877-4884 - [c83]Alon Zolfi
, Shai Avidan, Yuval Elovici
, Asaf Shabtai
:
Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models. ECML/PKDD (3) 2022: 304-320 - [c82]Nachiket Tapas, Sofia Belikovetsky, Francesco Longo, Antonio Puliafito, Asaf Shabtai, Yuval Elovici:
3D Marketplace: Distributed Attestation of 3D Designs on Blockchain. SMARTCOMP 2022: 311-316 - [c81]Edita Grolman, Hodaya Binyamini, Asaf Shabtai, Yuval Elovici, Ikuya Morikawa, Toshiya Shimizu:
HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter. UMAP 2022: 143-152 - [c80]Yushi Cao, David Berend, Palina Tolmach, Guy Amit, Moshe Levy, Yang Liu
, Asaf Shabtai, Yuval Elovici:
Fair and accurate age prediction using distribution aware data curation and augmentation. WACV 2022: 2867-2877 - [d2]David Tayouri, Nick Baum, Asaf Shabtai, Rami Puzis:
MulVAL Interaction Rules Mapped to MITRE ATT&CK. IEEE DataPort, 2022 - [i80]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Evaluating the Security of Open Radio Access Networks. CoRR abs/2201.06080 (2022) - [i79]Ron Bitton, Dan Avraham, Eitan Klevansky, Dudu Mimran, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Adversarial Machine Learning Threat Analysis in Open Radio Access Networks. CoRR abs/2201.06093 (2022) - [i78]Efrat Levy, Nadav Maman, Asaf Shabtai, Yuval Elovici:
AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus. CoRR abs/2202.06870 (2022) - [i77]Avishag Shapira, Alon Zolfi, Luca Demetrio, Battista Biggio, Asaf Shabtai:
Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation. CoRR abs/2205.13618 (2022) - [i76]David Tayouri, Nick Baum, Asaf Shabtai, Rami Puzis:
A Survey of MulVAL Extensions and Their Attack Scenarios Coverage. CoRR abs/2208.05750 (2022) - [i75]Edan Habler, Ron Bitton, Asaf Shabtai:
Evaluating the Security of Aircraft Systems. CoRR abs/2209.04028 (2022) - [i74]Orel Lavie, Asaf Shabtai, Gilad Katz:
A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection. CoRR abs/2209.09033 (2022) - [i73]Ofir Moshe, Gil Fidel, Ron Bitton, Asaf Shabtai:
Improving Interpretability via Regularization of Neural Activation Sensitivity. CoRR abs/2211.08686 (2022) - [i72]Avishag Shapira, Ron Bitton, Dan Avraham, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
Attacking Object Detector Using A Universal Targeted Label-Switch Patch. CoRR abs/2211.08859 (2022) - [i71]Jacob Shams, Ben Nassi, Ikuya Morikawa, Toshiya Shimizu, Asaf Shabtai, Yuval Elovici:
Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models. CoRR abs/2211.13644 (2022) - [i70]Ron Bitton, Alon Malach, Amiel Meiseles, Satoru Momiyama, Toshinori Araki, Jun Furukawa
, Yuval Elovici, Asaf Shabtai:
Latent SHAP: Toward Practical Human-Interpretable Explanations. CoRR abs/2211.14797 (2022) - [i69]Alon Zolfi, Guy Amit, Amit Baras, Satoru Koda, Ikuya Morikawa, Yuval Elovici, Asaf Shabtai:
YolOOD: Utilizing Object Detection Concepts for Out-of-Distribution Detection. CoRR abs/2212.02081 (2022) - 2021
- [j56]Shimon Harush, Yair Meidan, Asaf Shabtai
:
DeepStream: Autoencoder-based stream temporal clustering and anomaly detection. Comput. Secur. 106: 102276 (2021) - [j55]Tatiana Frenklach
, Dvir Cohen
, Asaf Shabtai, Rami Puzis
:
Android malware detection via an app similarity graph. Comput. Secur. 109: 102386 (2021) - [j54]Guy Amit
, Asaf Shabtai
, Yuval Elovici
:
A Self-Healing Mechanism for Internet of Things Devices. IEEE Secur. Priv. 19(1): 44-53 (2021) - [j53]Ron Bitton
, Asaf Shabtai
:
A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers. IEEE Trans. Dependable Secur. Comput. 18(3): 1164-1181 (2021) - [c79]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach for Countermeasure Selection Using Attack Graphs. CSF 2021: 1-16 - [c78]Alon Zolfi, Moshe Kravchik, Yuval Elovici, Asaf Shabtai:
The Translucent Patch: A Physical and Universal Attack on Object Detectors. CVPR 2021: 15232-15241 - [c77]Yael Daihes, Hen Tzaban, Asaf Nadler, Asaf Shabtai:
MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic. ESORICS (1) 2021: 736-756 - [c76]Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici:
FOOD: Fast Out-Of-Distribution Detector. IJCNN 2021: 1-8 - [c75]Yoni Birman, Ziv Ido, Gilad Katz, Asaf Shabtai:
Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes. IJCNN 2021: 1-10 - [c74]Nir Regev, Lior Rokach, Asaf Shabtai:
Approximating Aggregated SQL Queries with LSTM Networks. IJCNN 2021: 1-8 - [c73]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants. IJCNN 2021: 1-10 - [c72]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions. KDD 2021: 2574-2583 - [c71]Elior Nehemya
, Yael Mathov
, Asaf Shabtai
, Yuval Elovici
:
Taking over the Stock Market: Adversarial Perturbations Against Algorithmic Traders. ECML/PKDD (4) 2021: 221-236 - [c70]Moshe Kravchik, Battista Biggio, Asaf Shabtai:
Poisoning attacks on cyber attack detectors for industrial control systems. SAC 2021: 116-125 - [c69]