Yael Mathov
YOU?
Author Swipe
Enhancing Real-World Adversarial Patches with 3D Modeling Techniques. Open
Although many studies have examined adversarial examples in the real world, most of them relied on 2D photos of the attack scene; thus, the attacks proposed cannot address realistic environments with 3D objects or varied conditions. Studie…
Enhancing Real-World Adversarial Patches through 3D Modeling of Complex Target Scenes Open
Adversarial examples have proven to be a concerning threat to deep learning models, particularly in the image domain. However, while many studies have examined adversarial examples in the real world, most of them relied on 2D photos of the…
Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations Open
Mass surveillance systems for voice over IP (VoIP) conversations pose a great risk to privacy. These automated systems use learning models to analyze conversations, and calls that involve specific topics are routed to a human agent for fur…
Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders Open
In recent years, machine learning has become prevalent in numerous tasks, including algorithmic trading. Stock market traders utilize machine learning models to predict the market's behavior and execute an investment strategy accordingly. …
When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders. Open
In recent years, machine learning has become prevalent in numerous tasks, including algorithmic trading. Stock market traders utilize learning models to predict the market's behavior and execute an investment strategy accordingly. However,…
Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples Open
Recent work on adversarial learning has focused mainly on neural networks and domains where those networks excel, such as computer vision, or audio processing. The data in these domains is typically homogeneous, whereas heterogeneous tabul…
Challenges for Security Assessment of Enterprises in the IoT Era Open
For years, attack graphs have been an important tool for security assessment of enterprise networks, but IoT devices, a new player in the IT world, might threat the reliability of this tool. In this paper, we review the challenges that mus…
Security Testbed for Internet-of-Things Devices Open
The Internet of Things (IoT) is a global ecosystem of information and communication technologies aimed at connecting any type of object (thing), at any time, and in any place, to each other and to the Internet. One of the major problems as…