Search

Your search keyword '"Elovici, Yuval"' showing total 1,170 results

Search Constraints

Start Over You searched for: Author "Elovici, Yuval" Remove constraint Author: "Elovici, Yuval"
1,170 results on '"Elovici, Yuval"'

Search Results

1. DOMBA: Double Model Balancing for Access-Controlled Language Models via Minimum-Bounded Aggregation

2. Detection of Compromised Functions in a Serverless Cloud Environment

3. Visual Riddles: a Commonsense and World Knowledge Challenge for Large Vision and Language Models

4. GeNet: A Multimodal LLM-Based Co-Pilot for Network Topology and Configuration

5. LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI

6. RAPID: Robust APT Detection and Investigation Using Context-Aware Deep Learning

7. GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation

8. Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring

9. CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants

11. Enhancing Energy Sector Resilience: Integrating Security by Design Principles

12. DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers

13. QuantAttack: Exploiting Dynamic Quantization to Attack Vision Transformers

14. Evaluating the Security of Satellite Systems

15. FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning

16. IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response

17. SoK: Security Below the OS -- A Security Analysis of UEFI

18. The Adversarial Implications of Variable-Time Inference

19. X-Detect: Explainable Adversarial Patch Detection for Object Detectors in Retail

20. Breaking Common Sense: WHOOPS! A Vision-and-Language Benchmark of Synthetic and Compositional Images

21. IoT Device Identification Based on Network Communication Analysis Using Deep Learning

22. YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection

23. Latent SHAP: Toward Practical Human-Interpretable Explanations

24. Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models

25. Attacking Object Detector Using A Universal Targeted Label-Switch Patch

26. Transferability Ranking of Adversarial Examples

27. WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models

28. EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome

29. Large-Scale Shill Bidder Detection in E-commerce

31. bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements

32. AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus

33. The Security of Deep Learning Defences for Medical Imaging

34. Adversarial Machine Learning Threat Analysis and Remediation in Open Radio Access Network (O-RAN)

35. Evaluating the Security of Open Radio Access Networks

36. VISAS -- Detecting GPS spoofing attacks against drones by analyzing camera's video stream

37. Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Model

38. Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples

39. Dodging Attack Using Carefully Crafted Natural Makeup

40. Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

41. The Threat of Offensive AI to Organizations

42. CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals

43. RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks

44. Who's Afraid of Adversarial Transferability?

45. TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack

46. Enhancing Real-World Adversarial Patches through 3D Modeling of Complex Target Scenes

47. BENN: Bias Estimation Using Deep Neural Network

48. The Translucent Patch: A Physical and Universal Attack on Object Detectors

49. Detection of Adversarial Supports in Few-shot Classifiers Using Self-Similarity and Filtering

Catalog

Books, media, physical & digital resources