no code implementations • 27 Nov 2022 • Ron Bitton, Alon Malach, Amiel Meiseles, Satoru Momiyama, Toshinori Araki, Jun Furukawa, Yuval Elovici, Asaf Shabtai
Model agnostic feature attribution algorithms (such as SHAP and LIME) are ubiquitous techniques for explaining the decisions of complex classification models, such as deep neural networks.
no code implementations • 29 Sep 2021 • Inderjeet Singh, Satoru Momiyama, Kazuya Kakizaki, Toshinori Araki
This paper introduces a novel adversarial example generation method against face recognition systems (FRSs).
no code implementations • 14 Sep 2021 • Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici
Deep learning face recognition models are used by state-of-the-art surveillance systems to identify individuals passing through public areas (e. g., airports).
no code implementations • 5 Jul 2021 • Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai
Using the extension, security practitioners can apply attack graph analysis methods in environments that include ML components; thus, providing security practitioners with a methodological and practical tool for evaluating the impact and quantifying the risk of a cyberattack targeting an ML production system.