default search action
Yisroel Mirsky
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c28]Seffi Cohen, Ofir Arbili, Yisroel Mirsky, Lior Rokach:
TTTS: Tree Test Time Simulation for Enhancing Decision Tree Robustness against Adversarial Examples. AAAI 2024: 20993-21000 - [c27]Guy Amit, Moshe Levy, Yisroel Mirsky:
Transpose Attack: Stealing Datasets with Bidirectional Training. NDSS 2024 - [c26]Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky:
What Was Your Prompt? A Remote Keylogging Attack on AI Assistants. USENIX Security Symposium 2024 - [c25]Gilad Gressel, Rahul Pankajakshan, Yisroel Mirsky:
Discussion Paper: Exploiting LLMs for Scam Automation: A Looming Threat. WDC@AsiaCCS 2024 - [i26]Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky:
What Was Your Prompt? A Remote Keylogging Attack on AI Assistants. CoRR abs/2403.09751 (2024) - [i25]Roey Bokobza, Yisroel Mirsky:
Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks. CoRR abs/2403.10562 (2024) - [i24]Fred Matanel Grabovski, Lior Yasur, Guy Amit, Yuval Elovici, Yisroel Mirsky:
Back-in-Time Diffusion: Unsupervised Detection of Medical Deepfakes. CoRR abs/2407.15169 (2024) - 2023
- [j11]Ben Nassi, Yisroel Mirsky, Jacob Shams, Raz Ben-Netanel, Dudi Nassi, Yuval Elovici:
Protecting Autonomous Cars from Phantom Attacks. Commun. ACM 66(4): 56-69 (2023) - [j10]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Maura Pintor, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. Comput. Secur. 124: 103006 (2023) - [j9]Yisroel Mirsky:
IPatch: a remote adversarial patch. Cybersecur. 6(1): 18 (2023) - [c24]Lior Yasur, Guy Frankovits, Fred Matanel Grabovski, Yisroel Mirsky:
Deepfake CAPTCHA: A Method for Preventing Fake Calls. AsiaCCS 2023: 608-622 - [c23]Yisroel Mirsky, George Macon, Michael D. Brown, Carter Yagemann, Matthew Pruett, Evan Downing, J. Sukarno Mertoguno, Wenke Lee:
VulChecker: Graph-based Vulnerability Localization in Source Code. USENIX Security Symposium 2023: 6557-6574 - [c22]Guy Frankovits, Yisroel Mirsky:
Discussion Paper: The Threat of Real Time Deepfakes. WDC@AsiaCCS 2023: 20-23 - [i23]Lior Yasur, Guy Frankovits, Fred Matanel Grabovski, Yisroel Mirsky:
Deepfake CAPTCHA: A Method for Preventing Fake Calls. CoRR abs/2301.03064 (2023) - [i22]Guy Frankovits, Yisroel Mirsky:
Discussion Paper: The Threat of Real Time Deepfakes. CoRR abs/2306.02487 (2023) - [i21]Guy Amit, Moshe Levy, Yisroel Mirsky:
Transpose Attack: Stealing Datasets with Bidirectional Training. CoRR abs/2311.07389 (2023) - 2022
- [j8]Yisroel Mirsky, Wenke Lee:
The Creation and Detection of Deepfakes: A Survey. ACM Comput. Surv. 54(1): 7:1-7:41 (2022) - [c21]Yisroel Mirsky:
Discussion Paper: The Integrity of Medical AI. WDC@AsiaCCS 2022: 31-33 - [i20]Moshe Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky:
The Security of Deep Learning Defences for Medical Imaging. CoRR abs/2201.08661 (2022) - [i19]Yisroel Mirsky:
DF-Captcha: A Deepfake Captcha for Preventing Fake Calls. CoRR abs/2208.08524 (2022) - [i18]Moshe Levy, Yuval Elovici, Yisroel Mirsky:
Transferability Ranking of Adversarial Examples. CoRR abs/2208.10878 (2022) - 2021
- [j7]Yisroel Mirsky, Mordechai Guri:
DDoS Attacks on 9-1-1 Emergency Services. IEEE Trans. Dependable Secur. Comput. 18(6): 2767-2786 (2021) - [c20]Evan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee:
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction. USENIX Security Symposium 2021: 3469-3486 - [i17]Yisroel Mirsky:
IPatch: A Remote Adversarial Patch. CoRR abs/2105.00113 (2021) - [i16]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. CoRR abs/2106.15764 (2021) - 2020
- [j6]Yisroel Mirsky, Tomer Golomb, Yuval Elovici:
Lightweight collaborative anomaly detection for the IoT using blockchain. J. Parallel Distributed Comput. 145: 75-97 (2020) - [j5]Naor Kalbo, Yisroel Mirsky, Asaf Shabtai, Yuval Elovici:
The Security of IP-Based Video Surveillance Systems. Sensors 20(17): 4806 (2020) - [c19]Ben Nassi, Yisroel Mirsky, Dudi Nassi, Raz Ben-Netanel, Oleg Drokin, Yuval Elovici:
Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks. CCS 2020: 293-308 - [c18]Lior Sidi, Yisroel Mirsky, Asaf Nadler, Yuval Elovici, Asaf Shabtai:
Helix: DGA Domain Embeddings for Tracking and Exploring Botnets. CIKM 2020: 2741-2748 - [c17]Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis, Asaf Shabtai:
DANTE: A Framework for Mining and Monitoring Darknet Traffic. ESORICS (1) 2020: 88-109 - [c16]Yisroel Mirsky, Benjamin Fedidat, Yoram Haddad:
An Encryption System for Securing Physical Signals. SecureComm (1) 2020: 211-232 - [i15]Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai:
DANTE: A framework for mining and monitoring darknet traffic. CoRR abs/2003.02575 (2020) - [i14]Yisroel Mirsky, Wenke Lee:
The Creation and Detection of Deepfakes: A Survey. CoRR abs/2004.11138 (2020) - [i13]Yisroel Mirsky, Tomer Golomb, Yuval Elovici:
Lightweight Collaborative Anomaly Detection for the IoT using Blockchain. CoRR abs/2006.10587 (2020) - [i12]Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici:
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems. IACR Cryptol. ePrint Arch. 2020: 85 (2020)
2010 – 2019
- 2019
- [j4]Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai:
Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs. IEEE Trans. Inf. Forensics Secur. 14(6): 1638-1653 (2019) - [c15]Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici:
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. USENIX Security Symposium 2019: 461-478 - [i11]Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici:
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. CoRR abs/1901.03597 (2019) - [i10]Eran Fainman, Bracha Shapira, Lior Rokach, Yisroel Mirsky:
Online Budgeted Learning for Classifier Induction. CoRR abs/1903.05382 (2019) - [i9]Yisroel Mirsky, Benjamin Fedidat, Yoram Haddad:
Physical Layer Encryption using a Vernam Cipher. CoRR abs/1910.08262 (2019) - [i8]Naor Kalbo, Yisroel Mirsky, Asaf Shabtai, Yuval Elovici:
The Security of IP-based Video Surveillance Systems. CoRR abs/1910.10749 (2019) - 2018
- [j3]Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Asaf Shabtai, Dominik Breitenbacher, Yuval Elovici:
N-BaIoT - Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Comput. 17(3): 12-22 (2018) - [j2]Orit Rozenblit, Yoram Haddad, Yisroel Mirsky, Rina Azoulay:
Machine learning methods for SIR prediction in cellular networks. Phys. Commun. 31: 239-253 (2018) - [c14]Yisroel Mirsky, Yoram Haddad, Orit Rozenblit, Rina Azoulay:
Predicting wireless coverage maps using radial basis networks. CCNC 2018: 1-4 - [c13]Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai:
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. NDSS 2018 - [c12]Liron Ben Kimon, Yisroel Mirsky, Lior Rokach, Bracha Shapira:
Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices. PAKDD (3) 2018: 816-828 - [d1]Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Dominik Breitenbacher, Asaf, Asaf Shabtai:
detection_of_IoT_botnet_attacks_N_BaIoT. UCI Machine Learning Repository, 2018 - [i7]Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai:
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. CoRR abs/1802.09089 (2018) - [i6]Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai:
Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs. CoRR abs/1803.02560 (2018) - [i5]Tomer Golomb, Yisroel Mirsky, Yuval Elovici:
CIoTA: Collaborative IoT Anomaly Detection via Blockchain. CoRR abs/1803.03807 (2018) - [i4]Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Dominik Breitenbacher, Asaf Shabtai, Yuval Elovici:
N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders. CoRR abs/1805.03409 (2018) - 2017
- [j1]Yisroel Mirsky, Asaf Shabtai, Bracha Shapira, Yuval Elovici, Lior Rokach:
Anomaly detection for smartphone data streams. Pervasive Mob. Comput. 35: 83-107 (2017) - [c11]Mordechai Guri, Yisroel Mirsky, Yuval Elovici:
9-1-1 DDoS: Attacks, Analysis and Mitigation. EuroS&P 2017: 218-232 - [c10]Yisroel Mirsky, Tal Halpern, Rishabh Upadhyay, Sivan Toledo, Yuval Elovici:
Enhanced situation space mining for data streams. SAC 2017: 842-849 - [c9]Liron Ben Kimon, Yisroel Mirsky, Lior Rokach, Bracha Shapira:
User Verification on Mobile Devices Using Sequences of Touch Gestures. UMAP 2017: 365-366 - [i3]Yisroel Mirsky, Mordechai Guri, Yuval Elovici:
HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System. CoRR abs/1703.10454 (2017) - 2016
- [c8]Yisroel Mirsky, Asaf Shabtai, Lior Rokach, Bracha Shapira, Yuval Elovici:
SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research. AISec@CCS 2016: 1-12 - [i2]Mordechai Guri, Yisroel Mirsky, Yuval Elovici:
9-1-1 DDoS: Threat, Analysis and Mitigation. CoRR abs/1609.02353 (2016) - 2015
- [c7]Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici:
BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. CSF 2015: 276-289 - [c6]Yisroel Mirsky, Bracha Shapira, Lior Rokach, Yuval Elovici:
pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts. PAKDD (2) 2015: 119-133 - [c5]Yisroel Mirsky, Noam Cohen, Asaf Shabtai:
Up-High to Down-Low: Applying Machine Learning to an Exploit Database. SECITC 2015: 184-200 - [c4]Yisroel Mirsky, Aviad Cohen, Roni Stern, Ariel Felner, Lior Rokach, Yuval Elovici, Bracha Shapira:
Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains. SOCS 2015: 70-77 - [c3]Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, Yuval Elovici:
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. USENIX Security Symposium 2015: 849-864 - [i1]Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici:
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations. CoRR abs/1503.07919 (2015) - 2013
- [c2]Yisroel Mirsky, Yoram Haddad:
A linear downlink power control algorithm for wireless networks. WTS 2013: 1-7 - 2011
- [c1]Yoram Haddad, Yisroel Mirsky:
Power efficient femtocell distribution strategies. SoftCOM 2011: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint