


Остановите войну!
for scientists:


default search action
Yisroel Mirsky
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Maura Pintor, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. Comput. Secur. 124: 103006 (2023) - [i21]Lior Yasur, Guy Frankovits, Fred M. Grabovski, Yisroel Mirsky:
Deepfake CAPTCHA: A Method for Preventing Fake Calls. CoRR abs/2301.03064 (2023) - 2022
- [j8]Yisroel Mirsky
, Wenke Lee:
The Creation and Detection of Deepfakes: A Survey. ACM Comput. Surv. 54(1): 7:1-7:41 (2022) - [c21]Yisroel Mirsky:
Discussion Paper: The Integrity of Medical AI. WDC@AsiaCCS 2022: 31-33 - [i20]Moshe Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky:
The Security of Deep Learning Defences for Medical Imaging. CoRR abs/2201.08661 (2022) - [i19]Yisroel Mirsky:
DF-Captcha: A Deepfake Captcha for Preventing Fake Calls. CoRR abs/2208.08524 (2022) - [i18]Moshe Levy, Yuval Elovici, Yisroel Mirsky:
Transferability Ranking of Adversarial Examples. CoRR abs/2208.10878 (2022) - 2021
- [j7]Yisroel Mirsky
, Mordechai Guri
:
DDoS Attacks on 9-1-1 Emergency Services. IEEE Trans. Dependable Secur. Comput. 18(6): 2767-2786 (2021) - [c20]Evan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee:
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction. USENIX Security Symposium 2021: 3469-3486 - [i17]Yisroel Mirsky:
IPatch: A Remote Adversarial Patch. CoRR abs/2105.00113 (2021) - [i16]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. CoRR abs/2106.15764 (2021) - 2020
- [j6]Yisroel Mirsky, Tomer Golomb, Yuval Elovici:
Lightweight collaborative anomaly detection for the IoT using blockchain. J. Parallel Distributed Comput. 145: 75-97 (2020) - [j5]Naor Kalbo, Yisroel Mirsky
, Asaf Shabtai, Yuval Elovici:
The Security of IP-Based Video Surveillance Systems. Sensors 20(17): 4806 (2020) - [c19]Ben Nassi, Yisroel Mirsky, Dudi Nassi, Raz Ben-Netanel, Oleg Drokin, Yuval Elovici:
Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks. CCS 2020: 293-308 - [c18]Lior Sidi, Yisroel Mirsky, Asaf Nadler, Yuval Elovici, Asaf Shabtai:
Helix: DGA Domain Embeddings for Tracking and Exploring Botnets. CIKM 2020: 2741-2748 - [c17]Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis, Asaf Shabtai:
DANTE: A Framework for Mining and Monitoring Darknet Traffic. ESORICS (1) 2020: 88-109 - [c16]Yisroel Mirsky, Benjamin Fedidat, Yoram Haddad:
An Encryption System for Securing Physical Signals. SecureComm (1) 2020: 211-232 - [i15]Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai:
DANTE: A framework for mining and monitoring darknet traffic. CoRR abs/2003.02575 (2020) - [i14]Yisroel Mirsky, Wenke Lee:
The Creation and Detection of Deepfakes: A Survey. CoRR abs/2004.11138 (2020) - [i13]Yisroel Mirsky, Tomer Golomb, Yuval Elovici:
Lightweight Collaborative Anomaly Detection for the IoT using Blockchain. CoRR abs/2006.10587 (2020) - [i12]Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici:
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems. IACR Cryptol. ePrint Arch. 2020: 85 (2020)
2010 – 2019
- 2019
- [j4]Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai:
Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs. IEEE Trans. Inf. Forensics Secur. 14(6): 1638-1653 (2019) - [c15]Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici:
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. USENIX Security Symposium 2019: 461-478 - [i11]Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici:
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. CoRR abs/1901.03597 (2019) - [i10]Eran Fainman, Bracha Shapira, Lior Rokach, Yisroel Mirsky:
Online Budgeted Learning for Classifier Induction. CoRR abs/1903.05382 (2019) - [i9]Yisroel Mirsky, Benjamin Fedidat, Yoram Haddad:
Physical Layer Encryption using a Vernam Cipher. CoRR abs/1910.08262 (2019) - [i8]Naor Kalbo, Yisroel Mirsky, Asaf Shabtai, Yuval Elovici:
The Security of IP-based Video Surveillance Systems. CoRR abs/1910.10749 (2019) - 2018
- [j3]Yair Meidan
, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Asaf Shabtai, Dominik Breitenbacher, Yuval Elovici:
N-BaIoT - Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Comput. 17(3): 12-22 (2018) - [j2]Orit Rozenblit, Yoram Haddad, Yisroel Mirsky, Rina Azoulay:
Machine learning methods for SIR prediction in cellular networks. Phys. Commun. 31: 239-253 (2018) - [c14]Yisroel Mirsky, Yoram Haddad, Orit Rozenblit, Rina Azoulay:
Predicting wireless coverage maps using radial basis networks. CCNC 2018: 1-4 - [c13]Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai:
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. NDSS 2018 - [c12]Liron Ben Kimon, Yisroel Mirsky, Lior Rokach, Bracha Shapira:
Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices. PAKDD (3) 2018: 816-828 - [i7]Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai:
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. CoRR abs/1802.09089 (2018) - [i6]Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai:
Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs. CoRR abs/1803.02560 (2018) - [i5]Tomer Golomb, Yisroel Mirsky, Yuval Elovici:
CIoTA: Collaborative IoT Anomaly Detection via Blockchain. CoRR abs/1803.03807 (2018) - [i4]Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Dominik Breitenbacher, Asaf Shabtai, Yuval Elovici:
N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders. CoRR abs/1805.03409 (2018) - 2017
- [j1]Yisroel Mirsky, Asaf Shabtai, Bracha Shapira, Yuval Elovici, Lior Rokach:
Anomaly detection for smartphone data streams. Pervasive Mob. Comput. 35: 83-107 (2017) - [c11]Mordechai Guri, Yisroel Mirsky, Yuval Elovici:
9-1-1 DDoS: Attacks, Analysis and Mitigation. EuroS&P 2017: 218-232 - [c10]Yisroel Mirsky, Tal Halpern, Rishabh Upadhyay, Sivan Toledo, Yuval Elovici:
Enhanced situation space mining for data streams. SAC 2017: 842-849 - [c9]Liron Ben Kimon, Yisroel Mirsky, Lior Rokach, Bracha Shapira:
User Verification on Mobile Devices Using Sequences of Touch Gestures. UMAP 2017: 365-366 - [i3]Yisroel Mirsky, Mordechai Guri, Yuval Elovici:
HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System. CoRR abs/1703.10454 (2017) - 2016
- [c8]Yisroel Mirsky, Asaf Shabtai, Lior Rokach, Bracha Shapira, Yuval Elovici:
SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research. AISec@CCS 2016: 1-12 - [i2]Mordechai Guri, Yisroel Mirsky, Yuval Elovici:
9-1-1 DDoS: Threat, Analysis and Mitigation. CoRR abs/1609.02353 (2016) - 2015
- [c7]Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici:
BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. CSF 2015: 276-289 - [c6]Yisroel Mirsky, Bracha Shapira, Lior Rokach, Yuval Elovici:
pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts. PAKDD (2) 2015: 119-133 - [c5]Yisroel Mirsky, Noam Cohen, Asaf Shabtai:
Up-High to Down-Low: Applying Machine Learning to an Exploit Database. SECITC 2015: 184-200 - [c4]Yisroel Mirsky, Aviad Cohen, Roni Stern, Ariel Felner, Lior Rokach, Yuval Elovici, Bracha Shapira:
Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains. SOCS 2015: 70-77 - [c3]Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, Yuval Elovici:
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. USENIX Security Symposium 2015: 849-864 - [i1]Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici:
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations. CoRR abs/1503.07919 (2015) - 2013
- [c2]Yisroel Mirsky, Yoram Haddad:
A linear downlink power control algorithm for wireless networks. WTS 2013: 1-7 - 2011
- [c1]Yoram Haddad, Yisroel Mirsky:
Power efficient femtocell distribution strategies. SoftCOM 2011: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-01-22 02:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint