Volgen
Ishai Rosenberg
Ishai Rosenberg
Geverifieerd e-mailadres voor post.bgu.ac.il
Titel
Geciteerd door
Geciteerd door
Jaar
Generic black-box end-to-end attack against state of the art API call based malware classifiers
I Rosenberg, A Shabtai, L Rokach, Y Elovici
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
2022018
Adversarial machine learning attacks and defense methods in the cyber security domain
I Rosenberg, A Shabtai, Y Elovici, L Rokach
ACM Computing Surveys (CSUR) 54 (5), 1-36, 2021
1422021
Defense methods against adversarial examples for recurrent neural networks
I Rosenberg, A Shabtai, Y Elovici, L Rokach
arXiv preprint arXiv:1901.09963, 2019
552019
Generic black-box end-to-end attack against rnns and other api calls based malware classifiers
I Rosenberg, A Shabtai, L Rokach, Y Elovici
arXiv preprint arXiv:1707.05970 282, 2017
472017
Query-efficient black-box attack against sequence-based malware classifiers
I Rosenberg, A Shabtai, Y Elovici, L Rokach
Annual Computer Security Applications Conference, 611-626, 2020
462020
DeepAPT: nation-state APT attribution using end-to-end deep neural networks
I Rosenberg, G Sicard, E David
Artificial Neural Networks and Machine Learning–ICANN 2017: 26th …, 2017
342017
Generating end-to-end adversarial examples for malware classifiers using explainability
I Rosenberg, S Meir, J Berrebi, I Gordon, G Sicard, EO David
2020 international joint conference on neural networks (IJCNN), 1-10, 2020
282020
End-to-end deep neural networks and transfer learning for automatic analysis of nation-state malware
I Rosenberg, G Sicard, E David
Entropy 20 (5), 390, 2018
232018
Methods and systems for data traffic analysis
G Caspi, D Cohen, E David, N Maman, Y Neeman, I Rosenberg
US Patent 10,552,727, 2020
202020
DeepOrigin: End-to-end deep learning for detection of new malware families
I Cordonsky, I Rosenberg, G Sicard, EO David
2018 International Joint Conference on Neural Networks (IJCNN), 1-7, 2018
182018
Bypassing system calls–based intrusion detection systems
I Rosenberg, E Gudes
Concurrency and Computation: Practice and Experience 29 (16), e4023, 2017
182017
Methods and systems for malware detection
G Caspi, Y Neeman, D Cohen, N Maman, E David, I Rosenberg
US Patent 10,193,902, 2019
162019
Query-efficient gan based black-box attack against sequence based machine and deep learning classifiers
I Rosenberg, A Shabtai, Y Elovici, L Rokach
arXiv preprint arXiv:1804.08778, 2018
102018
Leucadendron'Safari Sunset': Postharvest treatments to improve quality of cut foliage during prolonged sea shipment
S Philosoph-Hadas, Y Perzelan, I Rosenberg, S Droby, S Meir
Acta horticulturae 869, 207-218, 2010
102010
Low resource black-box end-to-end attack against state of the art API call based malware classifiers
I Rosenberg, A Shabtai, Y Elovici, L Rokach
arXiv preprint arXiv:1804.08778, 2018
92018
Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants
I Rosenberg, A Shabtai, Y Elovici, L Rokach
2021 International Joint Conference on Neural Networks (IJCNN), 1-10, 2021
72021
Food: Fast out-of-distribution detector
G Amit, M Levy, I Rosenberg, A Shabtai, Y Elovici
2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021
72021
Evading system-calls based intrusion detection systems
I Rosenberg, E Gudes
Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016
62016
Improvement of postharvest Keeping quality and color development of bell peper by packaging with polyethylene bags at a reduced temperature
S Meier, I Rosenberg, E FALLIK
Postharvest Biology and Technology, Amsterdan 5, 303-309, 1995
61995
Adversarial vulnerability of deep learning models in analyzing next generation sequencing data
A Meiseles, I Rosenberg, Y Motro, L Rokach, J Moran-Gilad
2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2020
52020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20