Ishai Rosenberg
Ishai Rosenberg
Verified email at post.bgu.ac.il
Title
Cited by
Cited by
Year
Generic black-box end-to-end attack against state of the art API call based malware classifiers
I Rosenberg, A Shabtai, L Rokach, Y Elovici
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
582018
Generic black-box end-to-end attack against rnns and other api calls based malware classifiers
I Rosenberg, A Shabtai, L Rokach, Y Elovici
arXiv preprint arXiv:1707.05970, 2017
382017
Bypassing system calls–based intrusion detection systems
I Rosenberg, E Gudes
Concurrency and Computation: Practice and Experience 29 (16), e4023, 2017
122017
End-to-end deep neural networks and transfer learning for automatic analysis of nation-state malware
I Rosenberg, G Sicard, EO David
Entropy 20 (5), 390, 2018
112018
DeepAPT: Nation-state APT attribution using end-to-end deep neural networks
I Rosenberg, G Sicard, EO David
International Conference on Artificial Neural Networks, 91-99, 2017
102017
Defense methods against adversarial examples for recurrent neural networks
I Rosenberg, A Shabtai, Y Elovici, L Rokach
arXiv preprint arXiv:1901.09963, 2019
92019
Leucadendron'Safari Sunset': Postharvest treatments to improve quality of cut foliage during prolonged sea shipment
S Philosoph-Hadas, Y Perzelan, I Rosenberg, S Droby, S Meir
Acta horticulturae 869, 207-218, 2010
82010
Methods and systems for data traffic analysis
G Caspi, D Cohen, E David, N Maman, Y Neeman, I Rosenberg
US Patent 10,552,727, 2020
52020
Query-efficient gan based black-box attack against sequence based machine and deep learning classifiers
I Rosenberg, A Shabtai, Y Elovici, L Rokach
arXiv preprint arXiv:1804.08778, 2018
52018
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers
I Rosenberg, A Shabtai, Y Elovici, L Rokach
arXiv preprint arXiv:1804.08778, 2018
42018
Low resource black-box end-to-end attack against state of the art API call based malware classifiers
I Rosenberg, A Shabtai, Y Elovici, L Rokach
arXiv preprint arXiv:1804.08778, 2018
42018
Evading system-calls based intrusion detection systems
I Rosenberg, E Gudes
International Conference on Network and System Security, 200-216, 2016
42016
Methods and systems for malware detection
G Caspi, Y Neeman, D Cohen, N Maman, E David, I Rosenberg
US Patent 10,193,902, 2019
32019
DeepOrigin: End-to-end deep learning for detection of new malware families
I Cordonsky, I Rosenberg, G Sicard, EO David
2018 International Joint Conference on Neural Networks (IJCNN), 1-7, 2018
32018
GLOD: Gaussian Likelihood Out of Distribution Detector
G Amit, M Levy, I Rosenberg, A Shabtai, Y Elovici
arXiv preprint arXiv:2008.06856, 2020
22020
Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability
I Rosenberg, S Meir, J Berrebi, I Gordon, G Sicard, EO David
2020 International Joint Conference on Neural Networks (IJCNN), 1-10, 2020
12020
Attacking and Defending Dynamic Analysis System-Calls Based IDS
I Rosenberg, E Gudes
IFIP International Conference on Information Security Theory and Practice …, 2016
12016
Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
T Shapira, D Berend, I Rosenberg, Y Liu, A Shabtai, Y Elovici
arXiv preprint arXiv:2010.16323, 2020
2020
Methods and systems for malware detection
G Caspi, Y Neeman, D Cohen, N Maman, E David, I Rosenberg
US Patent 10,609,050, 2020
2020
Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
G Amit, I Rosenberg, M Levy, R Bitton, A Shabtai, Y Elovici
arXiv preprint arXiv:2002.02176, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20