关注
Yuval Elovici
Yuval Elovici
Head of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion University
在 bgu.ac.il 的电子邮件经过验证 - 首页
标题
引用次数
年份
OSSIntegrity: Collaborative open-source code integrity verification
M Nahum, E Grolman, I Maimon, D Mimran, O Brodt, A Elyashar, Y Elovici, ...
Computers & Security, 103977, 2024
2024
LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI
Y Schwartz, L Benshimol, D Mimran, Y Elovici, A Shabtai
arXiv preprint arXiv:2407.05194, 2024
2024
AnoMili: Spoofing Hardening and Explainable Anomaly Detection for the 1553 Military Avionic Bus
E Levy, N Maman, A Shabtai, Y Elovici
IEEE Transactions on Aerospace and Electronic Systems, 2024
2024
X-detect: Explainable adversarial patch detection for object detectors in retail
O Hofman, A Giloni, Y Hayun, I Morikawa, T Shimizu, Y Elovici, A Shabtai
Machine Learning, 1-20, 2024
22024
RAPID: Robust APT Detection and Investigation Using Context-Aware Deep Learning
Y Amaru, P Wudali, Y Elovici, A Shabtai
arXiv preprint arXiv:2406.05362, 2024
2024
GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation
E Malul, Y Meidan, D Mimran, Y Elovici, A Shabtai
arXiv preprint arXiv:2405.19954, 2024
2024
Identification and prediction of metabolic pathways from correlation-based metabolite networks
D Toubiana, R Puzis, Y Elovici
US Patent 11,995,568, 2024
12024
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring
L Ben-Shimol, E Grolman, A Elyashar, I Maimon, D Mimran, O Brodt, ...
arXiv preprint arXiv:2405.07172, 2024
2024
Method for Assessment of the Robustness and Resilience of Machine Learning Models to Model Extraction Attacks on AI-Based Systems
Y Elovici, O Brodt, A Shabtai, E Grolman, D Mimran, M Khavkin
US Patent App. 18/497,075, 2024
2024
Universal Adversarial Attack Against Speaker Recognition Models
S Hanina, A Zolfi, Y Elovici, A Shabtai
ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and …, 2024
2024
CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants
A Finkman, E Bar-Kochva, A Shapira, D Mimran, Y Elovici, A Shabtai
arXiv preprint arXiv:2404.09066, 2024
2024
Secure Crowdsource-Based Open-Source Code Verification (SC)^ 2V
M Nahum, E Grolman, I Maimon, D Mimran, O Brodt, A Elyashar, Y Elovici, ...
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 1536-1538, 2024
2024
Cost‐sensitive machine learning to support startup investment decisions
R Setty, Y Elovici, D Schwartz
Intelligent Systems in Accounting, Finance and Management 31 (1), e1548, 2024
2024
Security assessment system
M Inokuchi, Y Ohta, R Bitton, S Orly, A Shabtai, Y Elovici
US Patent 11,909,754, 2024
2024
Enhancing Energy Sector Resilience: Integrating Security by Design Principles
D Shirtz, I Koberman, A Elyashar, R Puzis, Y Elovici
arXiv preprint arXiv:2402.11543, 2024
2024
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers
O Yehezkel, A Zolfi, A Baras, Y Elovici, A Shabtai
arXiv preprint arXiv:2402.02554, 2024
2024
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED Captured by Standard Video Cameras
B Nassi, E Iluz, O Cohen, O Vayner, D Nassi, B Zadov, Y Elovici
2024 IEEE Symposium on Security and Privacy (SP), 163-163, 2024
22024
GPT in Sheep's Clothing: The Risk of Customized GPTs
S Antebi, N Azulay, E Habler, B Ganon, A Shabtai, Y Elovici
arXiv preprint arXiv:2401.09075, 2024
2024
Ranking the Transferability of Adversarial Examples
M Levy, G Amit, Y Elovici, Y Mirsky
ACM Transactions on Intelligent Systems and Technology, 2024
2024
YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection
A Zolfi, G Amit, A Baras, S Koda, I Morikawa, Y Elovici, A Shabtai
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20