Chen Hajaj

Orcid: 0000-0001-9940-5654

According to our database1, Chen Hajaj authored at least 51 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Measuring flight-destination similarity: A multidimensional approach.
Expert Syst. Appl., March, 2024

OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification.
Comput. Commun., January, 2024

The art of time-bending: Data augmentation and early prediction for efficient traffic classification.
Expert Syst. Appl., 2024

Cloudy with a Chance of Anomalies: Dynamic Graph Neural Network for Early Detection of Cloud Services' User Anomalies.
CoRR, 2024

Enhancing Encrypted Internet Traffic Classification Through Advanced Data Augmentation Techniques.
CoRR, 2024

Few-Shot API Attack Detection: Overcoming Data Scarcity with GAN-Inspired Learning.
CoRR, 2024

Few-Shot API Attack Anomaly Detection in a Classification-by-Retrieval Framework.
CoRR, 2024

CBR - Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution.
CoRR, 2024

Extending limited datasets with GAN-like self-supervision for SMS spam detection.
Comput. Secur., 2024

Warm Recommendation: Enhancing Cold Start Recommendations Using Multimodal Product Representations.
Proceedings of the 45th International Conference on Information Systems, 2024

Hidden in Time, Revealed in Frequency: Spectral Features and Multiresolution Analysis for Encrypted Internet Traffic Classification.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Breaking the structure of MaMaDroid.
Expert Syst. Appl., October, 2023

Speech and multilingual natural language framework for speaker change detection and diarization.
Expert Syst. Appl., 2023

When a RF beats a CNN and GRU, together - A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification.
Comput. Secur., 2023

2022
The hidden conversion funnel of mobile vs. desktop consumers.
Electron. Commer. Res. Appl., 2022

Open-Source Framework for Encrypted Internet and Malicious Traffic Classification.
CoRR, 2022

Problem-Space Evasion Attacks in the Android OS: a Survey.
CoRR, 2022

Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks.
CoRR, 2022

A Rotating Proposer Mechanism for Team Formation.
CoRR, 2022

MaMaDroid2.0 - The Holes of Control Flow Graphs.
CoRR, 2022

Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier.
IEEE Access, 2022

SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection.
IEEE Access, 2022

MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Hybrid Speech and Text Analysis Methods for Speaker Change Detection.
IEEE ACM Trans. Audio Speech Lang. Process., 2021

Robust coordination in adversarial social networks: From human behavior to agent-based modeling.
Netw. Sci., 2021

A Thousand Words are Worth More Than One Recording: <i>Word-Embedding</i> Based Speaker Change Detection.
Proceedings of the 22nd Annual Conference of the International Speech Communication Association, Interspeech 2021, Brno, Czechia, August 30, 2021

PCL: Packet Classification with Limited Knowledge.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
Less is More: Robust and Novel Features for Malicious Domain Detection.
CoRR, 2020

A Thousand Words are Worth More Than One Recording: NLP Based Speaker Change Point Detection.
CoRR, 2020

When the Guard failed the Droid: A case study of Android malware.
CoRR, 2020

Encrypted video traffic clustering demystified.
Comput. Secur., 2020

Robust Malicious Domain Detection.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

Evasion Is Not Enough: A Case Study of Android Malware.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

2019
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.
Proceedings of the 28th USENIX Security Symposium, 2019

Adversarial Coordination on Social Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Adversarial Coordination on Social Networks.
CoRR, 2018

Adversarial Task Assignment.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Crowdsourcing Clinical Chart Reviews.
Proceedings of the AMIA 2018, 2018

2017
Adversarial Task Allocation.
CoRR, 2017

Feature Conservation in Adversarial Classifier Evasion: A Case Study.
CoRR, 2017

Selective opportunity disclosure at the service of strategic information platforms.
Auton. Agents Multi Agent Syst., 2017

Enhancing comparison shopping agents through ordering and gradual information disclosure.
Auton. Agents Multi Agent Syst., 2017

Enhancing Crowdworkers' Vigilance.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

2016
Extending Workers' Attention Span Through Dummy Events.
Proceedings of the Fourth AAAI Conference on Human Computation and Crowdsourcing, 2016

2015
Improving comparison shopping agents' competence through selective price disclosure.
Electron. Commer. Res. Appl., 2015

Automatic anatomical shape correspondence and alignment using mesh features.
Proceedings of the 12th IEEE International Symposium on Biomedical Imaging, 2015

Strategy-Proof and Efficient Kidney Exchange Using a Credit Mechanism.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Strategic information platforms: selective disclosure and the price of "free".
Proceedings of the ACM Conference on Economics and Computation, 2014

Advanced service schemes for a self-interested information platform.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Ordering Effects and Belief Adjustment in the Use of Comparison Shopping Agents.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Search More, Disclose Less.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013


  Loading...