Ishai Rosenberg

Orcid: 0000-0003-3509-4329

According to our database1, Ishai Rosenberg authored at least 20 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain.
ACM Comput. Surv., 2022

2021
Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants.
Proceedings of the International Joint Conference on Neural Networks, 2021

FOOD: Fast Out-Of-Distribution Detector.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers.
CoRR, 2020

GLOD: Gaussian Likelihood Out of Distribution Detector.
CoRR, 2020

Adversarial Learning in the Cyber Security Domain.
CoRR, 2020

Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization.
CoRR, 2020

Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Adversarial Vulnerability of Deep Learning Models in Analyzing Next Generation Sequencing Data.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020

Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Defense Methods Against Adversarial Examples for Recurrent Neural Networks.
CoRR, 2019

2018
End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware.
Entropy, 2018

Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
CoRR, 2018

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

DeepOrigin: End-To-End Deep Learning For Detection Of New Malware Families.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

2017
Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017

Bypassing system calls-based intrusion detection systems.
Concurr. Comput. Pract. Exp., 2017

DeepAPT: Nation-State APT Attribution Using End-to-End Deep Neural Networks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017

2016
Attacking and Defending Dynamic Analysis System-Calls Based IDS.
Proceedings of the Information Security Theory and Practice, 2016

Evading System-Calls Based Intrusion Detection Systems.
Proceedings of the Network and System Security - 10th International Conference, 2016


  Loading...