default search action
Ran Dubin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Ofek Bader, Adi Lichy, Amit Dvir, Ran Dubin, Chen Hajaj:
OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification. Comput. Commun. 213: 271-284 (2024) - [j14]Ran Dubin:
Content Disarm and Reconstruction of Microsoft Office OLE files. Comput. Secur. 137: 103647 (2024) - [j13]Or Haim Anidjar, Revital Marbel, Ran Dubin, Amit Dvir, Chen Hajaj:
Extending limited datasets with GAN-like self-supervision for SMS spam detection. Comput. Secur. 145: 103998 (2024) - [j12]Chen Hajaj, Porat Aharon, Ran Dubin, Amit Dvir:
The art of time-bending: Data augmentation and early prediction for efficient traffic classification. Expert Syst. Appl. 252: 124166 (2024) - [j11]Daniel Gilkarov, Ran Dubin:
Steganalysis of AI Models LSB Attacks. IEEE Trans. Inf. Forensics Secur. 19: 4767-4779 (2024) - [c11]Nathan Dillbary, Roi Yozevitch, Amit Dvir, Ran Dubin, Chen Hajaj:
Hidden in Time, Revealed in Frequency: Spectral Features and Multiresolution Analysis for Encrypted Internet Traffic Classification. CCNC 2024: 266-271 - [i15]Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj:
CBR - Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution. CoRR abs/2403.11206 (2024) - [i14]Udi Aharon, Ran Dubin, Amit Dvir, Chen Hajaj:
Few-Shot API Attack Anomaly Detection in a Classification-by-Retrieval Framework. CoRR abs/2405.11247 (2024) - [i13]Udi Aharon, Revital Marbel, Ran Dubin, Amit Dvir, Chen Hajaj:
Few-Shot API Attack Detection: Overcoming Data Scarcity with GAN-Inspired Learning. CoRR abs/2405.11258 (2024) - [i12]Yehonatan Zion, Porat Aharon, Ran Dubin, Amit Dvir, Chen Hajaj:
Enhancing Encrypted Internet Traffic Classification Through Advanced Data Augmentation Techniques. CoRR abs/2407.16539 (2024) - [i11]Revital Marbel, Yanir Cohen, Ran Dubin, Amit Dvir, Chen Hajaj:
Cloudy with a Chance of Anomalies: Dynamic Graph Neural Network for Early Detection of Cloud Services' User Anomalies. CoRR abs/2409.12726 (2024) - [i10]Daniel Gilkarov, Ran Dubin:
Model X-Ray: Detection of Hidden Malware in AI Model Weights using Few Shot Learning. CoRR abs/2409.19310 (2024) - 2023
- [j10]Ran Dubin:
Content Disarm and Reconstruction of PDF Files. IEEE Access 11: 38399-38416 (2023) - [j9]Ran Dubin:
Disarming Attacks Inside Neural Network Models. IEEE Access 11: 124295-124303 (2023) - [j8]Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj:
When a RF beats a CNN and GRU, together - A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification. Comput. Secur. 124: 103000 (2023) - [j7]Ran Dubin:
Content Disarm and Reconstruction of RTF Files a Zero File Trust Methodology. IEEE Trans. Inf. Forensics Secur. 18: 1461-1472 (2023) - [i9]Eli Belkind, Ran Dubin, Amit Dvir:
Open Image Content Disarm And Reconstruction. CoRR abs/2307.14057 (2023) - [i8]Ran Dubin:
Disarming Steganography Attacks Inside Neural Network Models. CoRR abs/2309.03071 (2023) - [i7]Daniel Gilkarov, Ran Dubin:
Steganalysis of AI Models LSB Attacks. CoRR abs/2310.01969 (2023) - 2022
- [c10]Ofek Bader, Adi Lichy, Chen Hajaj, Ran Dubin, Amit Dvir:
MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification. CCNC 2022: 527-533 - [d1]Amit Dvir, Yehonatan Zion, Jonathan Muehlstein, Ofir Pele, Ran Dubin:
Robust Machine Learning for Encrypted Traffic Classification. IEEE DataPort, 2022 - [i6]Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj:
When a RF Beats a CNN and GRU, Together - A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification. CoRR abs/2206.08004 (2022) - [i5]Ofek Bader, Adi Lichy, Amit Dvir, Ran Dubin, Chen Hajaj:
Open-Source Framework for Encrypted Internet and Malicious Traffic Classification. CoRR abs/2206.10144 (2022) - 2020
- [j6]Amit Dvir, Angelos K. Marnerides, Ran Dubin, Nehor Golan, Chen Hajaj:
Encrypted video traffic clustering demystified. Comput. Secur. 96: 101917 (2020)
2010 – 2019
- 2019
- [j5]Ran Dubin, Raffael Shalala, Amit Dvir, Ofir Pele, Ofer Hadar:
A fair server adaptation algorithm for HTTP adaptive streaming using video complexity. Multim. Tools Appl. 78(9): 11203-11222 (2019) - [j4]Amit Dvir, Nissim Harel, Ran Dubin, Refael Barkan, Raffael Shalala, Ofer Hadar:
MiSAL - A minimal quality representation switch logic for adaptive streaming. Multim. Tools Appl. 78(18): 26483-26508 (2019) - [c9]Amit Dvir, Angelos K. Marnerides, Ran Dubin, Nehor Golan:
Clustering the Unknown - The Youtube Case. ICNC 2019: 402-407 - 2018
- [j3]Ran Dubin, Ofer Hadar, Amit Dvir, Ofir Pele:
Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming. KSII Trans. Internet Inf. Syst. 12(8): 3804-3819 (2018) - [j2]Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar, Itay Katz, Ori Mashiach:
Adaptation logic for HTTP dynamic adaptive streaming using geo-predictive crowdsourcing for mobile users. Multim. Syst. 24(1): 19-31 (2018) - [c8]Raffael Shalala, Ran Dubin, Ofer Hadar, Amit Dvir:
Video QoE Prediction Based on User Profile. ICNC 2018: 588-592 - 2017
- [j1]Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar:
I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification. IEEE Trans. Inf. Forensics Secur. 12(12): 3039-3049 (2017) - [c7]Jonathan Muehlstein, Yehonatan Zion, Maor Bahumi, Itay Kirshenboim, Ran Dubin, Amit Dvir, Ofir Pele:
Analyzing HTTPS encrypted traffic to identify user's operating system, browser and application. CCNC 2017: 1-6 - 2016
- [c6]Ran Dubin, Ofer Hadar, Itay Richman, Ofir Trabelsi, Amit Dvir, Ofir Pele:
Video quality representation classification of Safari encrypted DASH streams. DMIAF 2016: 213-216 - [i4]Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar, Itay Richman, Ofir Trabelsi:
Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari. CoRR abs/1602.00489 (2016) - [i3]Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar:
I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification. CoRR abs/1602.00490 (2016) - [i2]Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar, Itay Katz, Ori Mashiach:
Adaptation Logic for HTTP Dynamic Adaptive Streaming using Geo-Predictive Crowdsourcing. CoRR abs/1602.02030 (2016) - [i1]Jonathan Muehlstein, Yehonatan Zion, Maor Bahumi, Itay Kirshenboim, Ran Dubin, Amit Dvir, Ofir Pele:
Analyzing HTTPS Encrypted Traffic to Identify User Operating System, Browser and Application. CoRR abs/1603.04865 (2016) - 2015
- [c5]Ran Dubin, Ofer Hadar, Yariv Freifeld, Aviv Ruham, Amit Dvir, Nissim Harel, Refael Barkan:
Hybrid Clustered Peer-Assisted DASH-SVC System. CIT/IUCC/DASC/PICom 2015: 1651-1656 - [c4]Ran Dubin, Amit Dvir, Ofer Hadar, Tomer Frid, Alex Vesker:
Novel ad insertion technique for MPEG-DASH. CCNC 2015: 582-587 - [c3]Ran Dubin, Amit Dvir, Ofer Hadar, Raffael Shalala, Ofir Ahark:
Video complexity hybrid traffic shaping for HTTP Adaptive Streaming. CCNC 2015: 683-688 - [c2]Ran Dubin, Amit Dvir, Ofer Hadar, Nissim Harel, Refael Barkan:
Multicast adaptive logic for Dynamic Adaptive Streaming over HTTP network. INFOCOM Workshops 2015: 269-274 - 2013
- [c1]Ran Dubin, Ofer Hadar, Amit Dvir:
The effect of client buffer and MBR consideration on DASH Adaptation Logic. WCNC 2013: 2178-2183
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint