OSSIntegrity: Collaborative open-source code integrity verification M Nahum, E Grolman, I Maimon, D Mimran, O Brodt, A Elyashar, Y Elovici, ... Computers & Security, 103977, 2024 | | 2024 |
LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI Y Schwartz, L Benshimol, D Mimran, Y Elovici, A Shabtai arXiv preprint arXiv:2407.05194, 2024 | | 2024 |
AnoMili: Spoofing Hardening and Explainable Anomaly Detection for the 1553 Military Avionic Bus E Levy, N Maman, A Shabtai, Y Elovici IEEE Transactions on Aerospace and Electronic Systems, 2024 | | 2024 |
X-detect: Explainable adversarial patch detection for object detectors in retail O Hofman, A Giloni, Y Hayun, I Morikawa, T Shimizu, Y Elovici, A Shabtai Machine Learning, 1-20, 2024 | 2 | 2024 |
RAPID: Robust APT Detection and Investigation Using Context-Aware Deep Learning Y Amaru, P Wudali, Y Elovici, A Shabtai arXiv preprint arXiv:2406.05362, 2024 | | 2024 |
GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation E Malul, Y Meidan, D Mimran, Y Elovici, A Shabtai arXiv preprint arXiv:2405.19954, 2024 | | 2024 |
Identification and prediction of metabolic pathways from correlation-based metabolite networks D Toubiana, R Puzis, Y Elovici US Patent 11,995,568, 2024 | 1 | 2024 |
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring L Ben-Shimol, E Grolman, A Elyashar, I Maimon, D Mimran, O Brodt, ... arXiv preprint arXiv:2405.07172, 2024 | | 2024 |
Method for Assessment of the Robustness and Resilience of Machine Learning Models to Model Extraction Attacks on AI-Based Systems Y Elovici, O Brodt, A Shabtai, E Grolman, D Mimran, M Khavkin US Patent App. 18/497,075, 2024 | | 2024 |
Universal Adversarial Attack Against Speaker Recognition Models S Hanina, A Zolfi, Y Elovici, A Shabtai ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and …, 2024 | | 2024 |
CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants A Finkman, E Bar-Kochva, A Shapira, D Mimran, Y Elovici, A Shabtai arXiv preprint arXiv:2404.09066, 2024 | | 2024 |
Secure Crowdsource-Based Open-Source Code Verification (SC)^ 2V M Nahum, E Grolman, I Maimon, D Mimran, O Brodt, A Elyashar, Y Elovici, ... Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 1536-1538, 2024 | | 2024 |
Cost‐sensitive machine learning to support startup investment decisions R Setty, Y Elovici, D Schwartz Intelligent Systems in Accounting, Finance and Management 31 (1), e1548, 2024 | | 2024 |
Security assessment system M Inokuchi, Y Ohta, R Bitton, S Orly, A Shabtai, Y Elovici US Patent 11,909,754, 2024 | | 2024 |
Enhancing Energy Sector Resilience: Integrating Security by Design Principles D Shirtz, I Koberman, A Elyashar, R Puzis, Y Elovici arXiv preprint arXiv:2402.11543, 2024 | | 2024 |
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers O Yehezkel, A Zolfi, A Baras, Y Elovici, A Shabtai arXiv preprint arXiv:2402.02554, 2024 | | 2024 |
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED Captured by Standard Video Cameras B Nassi, E Iluz, O Cohen, O Vayner, D Nassi, B Zadov, Y Elovici 2024 IEEE Symposium on Security and Privacy (SP), 163-163, 2024 | 2 | 2024 |
GPT in Sheep's Clothing: The Risk of Customized GPTs S Antebi, N Azulay, E Habler, B Ganon, A Shabtai, Y Elovici arXiv preprint arXiv:2401.09075, 2024 | | 2024 |
Ranking the Transferability of Adversarial Examples M Levy, G Amit, Y Elovici, Y Mirsky ACM Transactions on Intelligent Systems and Technology, 2024 | | 2024 |
YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection A Zolfi, G Amit, A Baras, S Koda, I Morikawa, Y Elovici, A Shabtai Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024 | | 2024 |