Generic black-box end-to-end attack against state of the art API call based malware classifiers I Rosenberg, A Shabtai, L Rokach, Y Elovici Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 208 | 2018 |
Adversarial machine learning attacks and defense methods in the cyber security domain I Rosenberg, A Shabtai, Y Elovici, L Rokach ACM Computing Surveys (CSUR) 54 (5), 1-36, 2021 | 167 | 2021 |
Defense methods against adversarial examples for recurrent neural networks I Rosenberg, A Shabtai, Y Elovici, L Rokach arXiv preprint arXiv:1901.09963, 2019 | 54 | 2019 |
Query-efficient black-box attack against sequence-based malware classifiers I Rosenberg, A Shabtai, Y Elovici, L Rokach Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 47 | 2020 |
Generic black-box end-to-end attack against rnns and other api calls based malware classifiers I Rosenberg, A Shabtai, L Rokach, Y Elovici arXiv preprint arXiv:1707.05970 282, 2017 | 47 | 2017 |
DeepAPT: nation-state APT attribution using end-to-end deep neural networks I Rosenberg, G Sicard, E David Artificial Neural Networks and Machine Learning–ICANN 2017: 26th …, 2017 | 39 | 2017 |
Generating end-to-end adversarial examples for malware classifiers using explainability I Rosenberg, S Meir, J Berrebi, I Gordon, G Sicard, EO David 2020 international joint conference on neural networks (IJCNN), 1-10, 2020 | 31 | 2020 |
End-to-end deep neural networks and transfer learning for automatic analysis of nation-state malware I Rosenberg, G Sicard, E David Entropy 20 (5), 390, 2018 | 27 | 2018 |
Methods and systems for malware detection G Caspi, Y Neeman, D Cohen, N Maman, E David, I Rosenberg US Patent 10,193,902, 2019 | 23 | 2019 |
Methods and systems for data traffic analysis G Caspi, D Cohen, E David, N Maman, Y Neeman, I Rosenberg US Patent 10,552,727, 2020 | 22 | 2020 |
DeepOrigin: End-to-end deep learning for detection of new malware families I Cordonsky, I Rosenberg, G Sicard, EO David 2018 International Joint Conference on Neural Networks (IJCNN), 1-7, 2018 | 20 | 2018 |
Bypassing system calls–based intrusion detection systems I Rosenberg, E Gudes Concurrency and Computation: Practice and Experience 29 (16), e4023, 2017 | 19 | 2017 |
Query-efficient GAN based black-box attack against sequence based machine and deep learning classifiers I Rosenberg, A Shabtai, Y Elovici, L Rokach arXiv preprint arXiv:1804.08778, 2018 | 10 | 2018 |
Leucadendron'Safari Sunset': Postharvest treatments to improve quality of cut foliage during prolonged sea shipment S Philosoph-Hadas, Y Perzelan, I Rosenberg, S Droby, S Meir Acta horticulturae 869, 207-218, 2010 | 10 | 2010 |
Low resource black-box end-to-end attack against state of the art API call based malware classifiers I Rosenberg, A Shabtai, Y Elovici, L Rokach arXiv preprint arXiv:1804.08778, 2018 | 9 | 2018 |
Sequence squeezing: A defense method against adversarial examples for API call-based RNN variants I Rosenberg, A Shabtai, Y Elovici, L Rokach 2021 International Joint Conference on Neural Networks (IJCNN), 1-10, 2021 | 8 | 2021 |
Food: Fast out-of-distribution detector G Amit, M Levy, I Rosenberg, A Shabtai, Y Elovici 2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021 | 7 | 2021 |
Evading system-calls based intrusion detection systems I Rosenberg, E Gudes Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016 | 6 | 2016 |
Improvement of postharvest Keeping quality and color development of bell peper by packaging with polyethylene bags at a reduced temperature S Meier, I Rosenberg, E FALLIK Postharvest Biology and Technology, Amsterdan 5, 303-309, 1995 | 6 | 1995 |
Defense methods against adversarial examples for recurrent neural networks. arXiv 2019 I Rosenberg, A Shabtai, Y Elovici, L Rokach arXiv preprint arXiv:1901.09963, 0 | 5 | |