Follow
Yisroel Mirsky
Title
Cited by
Year
TTTS: Tree Test Time Simulation for Enhancing Decision Tree Robustness against Adversarial Examples
S Cohen, O Arbili, Y Mirsky, L Rokach
Proceedings of the AAAI Conference on Artificial Intelligence 38 (19), 20993 …, 2024
2024
What Was Your Prompt? A Remote Keylogging Attack on AI Assistants
R Weiss, D Ayzenshteyn, G Amit, Y Mirsky
arXiv preprint arXiv:2403.09751, 2024
2024
Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks
R Bokobza, Y Mirsky
arXiv preprint arXiv:2403.10562, 2024
2024
Transpose Attack: Stealing Datasets with Bidirectional Training
G Amit, M Levy, Y Mirsky
arXiv preprint arXiv:2311.07389, 2023
2023
Discussion Paper: The Threat of Real Time Deepfakes
G Frankovits, Y Mirsky
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and …, 2023
12023
Deepfake captcha: A method for preventing fake calls
L Yasur, G Frankovits, FM Grabovski, Y Mirsky
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
52023
Method and system for clustering darknet traffic streams with word embeddings
D Cohen, A Shabtai, Y Elovici, YA Mirsky, R Puzis, T Martin, K Manuel
US Patent 11,695,794, 2023
2023
IPatch: a remote adversarial patch
Y Mirsky
Cybersecurity 6 (1), 18, 2023
92023
Enabling object detectors to better distinguish between real and fake objects in semi-autonomous and fully autonomous vehicles. Protecting Autonomous Cars from Phantom Attacks
B Nassi, Y Mirsky, J Shams, R Ben-Netanel, D Nassi, Y Elovici
COMMUNICATIONS OF THE ACM 66 (4), 56-67, 2023
2023
Protecting Autonomous Cars from Phantom Attacks
B Nassi, Y Mirsky, J Shams, R Ben-Netanel, D Nassi, Y Elovici
Communications of the ACM 66 (4), 56-69, 2023
2023
Methods for detecting phantom projection attacks against computer vision algorithms
B Nassi, Y Elovici, YA Mirsky, D Nassi, RBEN NETHANEL
US Patent App. 17/779,774, 2023
22023
VulChecker: Graph-based Vulnerability Localization in Source Code
Y Mirsky, G Macon, M Brown, C Yagemann, M Pruett, E Downing, ...
USENIX Security '23, 2023
92023
The threat of offensive ai to organizations
Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei, L Yang, X Zhang, ...
Computers & Security 124, 103006, 2023
652023
Echo detection of Man-in-the-Middle LAN attacks
A Shabtai, YA Mirsky, N Kalbo, Y Elovici
US Patent 11,539,743, 2022
2022
Transferability Ranking of Adversarial Examples
M Levy, Y Elovici, Y Mirsky
arXiv preprint arXiv:2208.10878, 2022
2022
DF-Captcha: A Deepfake Captcha for Preventing Fake Calls
Y Mirsky
arXiv preprint arXiv:2208.08524, 2022
12022
Discussion Paper: The Integrity of Medical AI
Y Mirsky
Proceedings of the 1st Workshop on Security Implications of Deepfakes and …, 2022
12022
CHAIMELEON project: creation of a pan-European repository of health imaging data for the development of AI-powered cancer management tools
L Martí Bonmatí, A Miguel, A Suárez, M Aznar, JP Beregi, L Fournier, ...
Frontiers in oncology 12, 1-11, 2022
22022
CHAIMELEON project: creation of a pan-European Repository of health imaging data for the development of AI-powered cancer management tools
LM Bonmatí, A Miguel, A Suárez, M Aznar, JP Beregi, L Fournier, E Neri, ...
Frontiers in oncology 12, 742701, 2022
142022
The security of deep learning defences for medical imaging
M Levy, G Amit, Y Elovici, Y Mirsky
arXiv preprint arXiv:2201.08661, 2022
82022
The system can't perform the operation now. Try again later.
Articles 1–20