Search Results for author: Yisroel Mirsky

Found 19 papers, 7 papers with code

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection

3 code implementations25 Feb 2018 Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai

In this paper, we present Kitsune: a plug and play NIDS which can learn to detect attacks on the local network, without supervision, and in an efficient online manner.

Network Intrusion Detection

CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning

1 code implementation11 Jan 2019 Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici

In this paper, we show how an attacker can use deep-learning to add or remove evidence of medical conditions from volumetric (3D) medical scans.

N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders

2 code implementations9 May 2018 Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Dominik Breitenbacher, Asaf Shabtai, Yuval Elovici

The proliferation of IoT devices which can be more easily compromised than desktop computers has led to an increase in the occurrence of IoT based botnet attacks.

Anomaly Detection

Lightweight Collaborative Anomaly Detection for the IoT using Blockchain

1 code implementation18 Jun 2020 Yisroel Mirsky, Tomer Golomb, Yuval Elovici

Due to their rapid growth and deployment, the Internet of things (IoT) have become a central aspect of our daily lives.

Anomaly Detection

Physical Layer Encryption using a Vernam Cipher

1 code implementation18 Oct 2019 Yisroel Mirsky, Benjamin Fedidat, Yoram Haddad

In this paper, we present the Vernam Physical Signal Cipher (VPSC): a novel cipher which can encrypt the harmonic composition of any analog waveform.

Cryptography and Security

Transpose Attack: Stealing Datasets with Bidirectional Training

1 code implementation13 Nov 2023 Guy Amit, Mosh Levy, Yisroel Mirsky

In addition, in this work we show that neural networks can be taught to systematically memorize and retrieve specific samples from datasets.

CIoTA: Collaborative IoT Anomaly Detection via Blockchain

no code implementations10 Mar 2018 Tomer Golomb, Yisroel Mirsky, Yuval Elovici

However, an anomaly detection model must be trained for a long time in order to capture all benign behaviors.

Anomaly Detection

Online Budgeted Learning for Classifier Induction

no code implementations13 Mar 2019 Eran Fainman, Bracha Shapira, Lior Rokach, Yisroel Mirsky

In online learning, the challenge is to find the optimum set of features to be acquired from each instance upon arrival from a data stream.

The Creation and Detection of Deepfakes: A Survey

no code implementations23 Apr 2020 Yisroel Mirsky, Wenke Lee

Generative deep learning algorithms have progressed to a point where it is difficult to tell the difference between what is real and what is fake.

Misinformation

IPatch: A Remote Adversarial Patch

no code implementations30 Apr 2021 Yisroel Mirsky

In this paper, we introduce a new type of adversarial patch which alters a model's perception of an image's semantics.

Autonomous Vehicles Image Segmentation +2

The Threat of Offensive AI to Organizations

no code implementations30 Jun 2021 Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio

Although offensive AI has been discussed in the past, there is a need to analyze and understand the threat in the context of organizations.

The Security of Deep Learning Defences for Medical Imaging

no code implementations21 Jan 2022 Moshe Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky

Deep learning has shown great promise in the domain of medical image analysis.

DF-Captcha: A Deepfake Captcha for Preventing Fake Calls

no code implementations17 Aug 2022 Yisroel Mirsky

In this paper, we propose a lightweight application which can protect organizations and individuals from deepfake SE attacks.

Face Swapping

Transferability Ranking of Adversarial Examples

1 code implementation23 Aug 2022 Mosh Levy, Yuval Elovici, Yisroel Mirsky

However, to the best of our knowledge, there are no works which propose a means for ranking the transferability of an adversarial example in the perspective of a blackbox attacker.

Deepfake CAPTCHA: A Method for Preventing Fake Calls

no code implementations8 Jan 2023 Lior Yasur, Guy Frankovits, Fred M. Grabovski, Yisroel Mirsky

In this work we focus on real-time audio deepfakes and present preliminary results on video.

Face Swapping

Discussion Paper: The Threat of Real Time Deepfakes

no code implementations4 Jun 2023 Guy Frankovits, Yisroel Mirsky

Generative deep learning models are able to create realistic audio and video.

Misinformation

What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

no code implementations14 Mar 2024 Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky

In this paper, we unveil a novel side-channel that can be used to read encrypted responses from AI Assistants over the web: the token-length side-channel.

Language Modelling Large Language Model +1

Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks

no code implementations14 Mar 2024 Roey Bokobza, Yisroel Mirsky

Our paper presents a novel defence against black box attacks, where attackers use the victim model as an oracle to craft their adversarial examples.

Cannot find the paper you are looking for? You can Submit a new open access paper.