Yisroel Mirsky

Orcid: 0000-0001-6367-2734

According to our database1, Yisroel Mirsky authored at least 57 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PEAS: A Strategy for Crafting Transferable Adversarial Examples.
CoRR, 2024

The Best Defense is a Good Offense: Countering LLM-Powered Cyberattacks.
CoRR, 2024

Are You Human? An Adversarial Benchmark to Expose LLMs.
CoRR, 2024

Back-in-Time Diffusion: Unsupervised Detection of Medical Deepfakes.
CoRR, 2024

Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks.
CoRR, 2024

Discussion Paper: Exploiting LLMs for Scam Automation: A Looming Threat.
Proceedings of the 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes, 2024

What Was Your Prompt? A Remote Keylogging Attack on AI Assistants.
Proceedings of the 33rd USENIX Security Symposium, 2024

Transpose Attack: Stealing Datasets with Bidirectional Training.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

The Security of Deep Learning Defenses in Medical Imaging.
Proceedings of the 2024 Workshop on Cybersecurity in Healthcare, 2024

Efficient Model Extraction via Boundary Sampling.
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024

TTTS: Tree Test Time Simulation for Enhancing Decision Tree Robustness against Adversarial Examples.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
IPatch: a remote adversarial patch.
Cybersecur., December, 2023

The Threat of Offensive AI to Organizations.
Comput. Secur., 2023

Protecting Autonomous Cars from Phantom Attacks.
Commun. ACM, 2023

Discussion Paper: The Threat of Real Time Deepfakes.
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023

VulChecker: Graph-based Vulnerability Localization in Source Code.
Proceedings of the 32nd USENIX Security Symposium, 2023

Deepfake CAPTCHA: A Method for Preventing Fake Calls.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
The Creation and Detection of Deepfakes: A Survey.
ACM Comput. Surv., 2022

Transferability Ranking of Adversarial Examples.
CoRR, 2022

DF-Captcha: A Deepfake Captcha for Preventing Fake Calls.
CoRR, 2022

The Security of Deep Learning Defences for Medical Imaging.
CoRR, 2022

Discussion Paper: The Integrity of Medical AI.
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022

2021
DDoS Attacks on 9-1-1 Emergency Services.
IEEE Trans. Dependable Secur. Comput., 2021

The Threat of Offensive AI to Organizations.
CoRR, 2021

DeepReflect: Discovering Malicious Functionality through Binary Reconstruction.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
The Security of IP-Based Video Surveillance Systems.
Sensors, 2020

Lightweight collaborative anomaly detection for the IoT using blockchain.
J. Parallel Distributed Comput., 2020

Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems.
IACR Cryptol. ePrint Arch., 2020

An Encryption System for Securing Physical Signals.
Proceedings of the Security and Privacy in Communication Networks, 2020

DANTE: A Framework for Mining and Monitoring Darknet Traffic.
Proceedings of the Computer Security - ESORICS 2020, 2020

Helix: DGA Domain Embeddings for Tracking and Exploring Botnets.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs.
IEEE Trans. Inf. Forensics Secur., 2019

Physical Layer Encryption using a Vernam Cipher.
CoRR, 2019

Online Budgeted Learning for Classifier Induction.
CoRR, 2019

CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
detection_of_IoT_botnet_attacks_N_BaIoT.
Dataset, March, 2018

Machine learning methods for SIR prediction in cellular networks.
Phys. Commun., 2018

N-BaIoT - Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders.
IEEE Pervasive Comput., 2018

CIoTA: Collaborative IoT Anomaly Detection via Blockchain.
CoRR, 2018

Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Predicting wireless coverage maps using radial basis networks.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Anomaly detection for smartphone data streams.
Pervasive Mob. Comput., 2017

HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System.
CoRR, 2017

User Verification on Mobile Devices Using Sequences of Touch Gestures.
Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 2017

Enhanced situation space mining for data streams.
Proceedings of the Symposium on Applied Computing, 2017

9-1-1 DDoS: Attacks, Analysis and Mitigation.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
9-1-1 DDoS: Threat, Analysis and Mitigation.
CoRR, 2016

SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

2015
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies.
Proceedings of the 24th USENIX Security Symposium, 2015

Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015

Up-High to Down-Low: Applying Machine Learning to an Exploit Database.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2013
A linear downlink power control algorithm for wireless networks.
Proceedings of the 2013 Wireless Telecommunications Symposium, 2013

2011
Power efficient femtocell distribution strategies.
Proceedings of the 19th International Conference on Software, 2011


  Loading...