Ishai Rosenberg
Orcid: 0000-0003-3509-4329
According to our database1,
Ishai Rosenberg
authored at least 20 papers
between 2016 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain.
ACM Comput. Surv., 2022
2021
Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
2020
CoRR, 2020
Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization.
CoRR, 2020
Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Adversarial Vulnerability of Deep Learning Models in Analyzing Next Generation Sequencing Data.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
CoRR, 2019
2018
End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware.
Entropy, 2018
Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
CoRR, 2018
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
2017
Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017
2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016