Fingerprint
Dive into the research topics where Yuval Elovici is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
-
AdversariaLeak: External Information Leakage Attack Using Adversarial Samples on Face Recognition Systems
Katzav, R., Giloni, A., Grolman, E., Saito, H., Shibata, T., Omino, T., Komatsu, M., Hanatani, Y., Elovici, Y. & Shabtai, A., 1 Jan 2025, Computer Vision – ECCV 2024 - 18th European Conference, Proceedings. Leonardis, A., Ricci, E., Roth, S., Russakovsky, O., Sattler, T. & Varol, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 288-303 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15133 LNCS).Ben-Gurion University of the Negev
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Adversarial machine learning threat analysis and remediation in Open Radio Access Network (O-RAN)
Habler, E., Bitton, R., Avraham, D., Klevansky, E., Mimran, D., Brodt, O., Lehmann, H., Elovici, Y. & Shabtai, A., 1 Apr 2025, In: Journal of Network and Computer Applications. 236, 104090.Ben-Gurion University of the Negev
Research output: Contribution to journal › Article › peer-review
-
Atag: AI-Agent Application Threat Assessment with Attack Graphs
Gandhi, P. A., Shukla, A., Tayouri, D., Ifland, B., Elovici, Y., Puzis, R. & Shabtai, A., 3 Jun 2025.Ben-Gurion University of the Negev
Research output: Working paper › Preprint
Open Access -
CORAL: Container Online Risk Assessment with Logical attack graphs
Tayouri, D., Sgan Cohen, O., Maimon, I., Mimran, D., Elovici, Y. & Shabtai, A., 1 Mar 2025, In: Computers and Security. 150, 104296.Ben-Gurion University of the Negev
Research output: Contribution to journal › Article › peer-review
-
CyberShapley: Explanation, prioritization, and triage of cybersecurity alerts using informative graph representation
Malach, A., Wudali, P. N., Momiyama, S., Furukawa, J., Araki, T., Elovici, Y. & Shabtai, A., 1 Mar 2025, In: Computers and Security. 150, 104270.Ben-Gurion University of the Negev
Research output: Contribution to journal › Article › peer-review