Data exfiltration over the DNS protocol and its detection have been
rese...
Object detection models, which are widely used in various domains (such ...
Watermarking is one of the most important copyright protection tools for...
IoT devices are known to be vulnerable to various cyber-attacks, such as...
Although home IoT (Internet of Things) devices are typically plain and t...
Out-of-distribution (OOD) detection has attracted a large amount of atte...
Model agnostic feature attribution algorithms (such as SHAP and LIME) ar...
In recent years, various watermarking methods were suggested to detect
c...
Adversarial attacks against deep learning-based object detectors (ODs) h...
State-of-the-art deep neural networks (DNNs) are highly effective at tac...
Many challenging real-world problems require the deployment of ensembles...
The sophistication and complexity of cyber attacks and the variety of
ta...
Organizations employ various adversary models in order to assess the ris...
Adversarial attacks against deep learning-based object detectors have be...
MIL-STD-1553, a standard that defines a communication bus for interconne...
The Open Radio Access Network (O-RAN) is a new, open, adaptive, and
inte...
The Open Radio Access Network (O-RAN) is a promising RAN architecture, a...
Deep learning-based facial recognition (FR) models have demonstrated
sta...
Anti-malware agents typically communicate with their remote services to ...
Deep learning face recognition models are used by state-of-the-art
surve...
Although cyberattacks on machine learning (ML) production systems can be...
The Controller Area Network (CAN) is used for communication between
in-v...
Radar systems are mainly used for tracking aircraft, missiles, satellite...
Cyber attacks are becoming more frequent and sophisticated, introducing
...
Recently, neural network (NN)-based methods, including autoencoders, hav...
The need to detect bias in machine learning (ML) models has led to the
d...
Physical adversarial attacks against object detectors have seen increasi...
The performance of a machine learning-based malware classifier depends o...
Despite continuous investments in data technologies, the latency of quer...
Recent research shows that neural networks models used for computer visi...
Mass surveillance systems for voice over IP (VoIP) conversations pose a ...
In recent years, machine learning has become prevalent in numerous tasks...
Recent work on adversarial learning has focused mainly on neural network...
Recent works have shown that the input domain of any machine learning
cl...
Facial recognition technologies are widely used in governmental and
indu...
Discriminative deep neural networks (DNNs) do well at classifying input
...
Attack graphs are one of the main techniques used to automate the risk
a...
In this paper, we present MORTON, a system that identifies compromised
e...
Multi-objective task scheduling (MOTS) is the task scheduling while
opti...
In recent years, machine learning algorithms, and more specially, deep
l...
The existence of a security vulnerability in a system does not necessari...
Trillions of network packets are sent over the Internet to destinations ...
In recent years, a variety of effective neural network-based methods for...
In many cases, neural network classifiers are likely to be exposed to in...
IP-based Surveillance systems protect industrial facilities, railways, g...
State-of-the-art deep neural networks (DNNs) are highly effective in sol...
Additive manufacturing (AM), or 3D printing, is an emerging manufacturin...
Industrial control systems (ICSs) are widely used and vital to industry ...
Selecting the optimal set of countermeasures is a challenging task that
...
For years, attack graphs have been an important tool for security assess...