N-baiot—network-based detection of iot botnet attacks using deep autoencoders Y Meidan, M Bohadana, Y Mathov, Y Mirsky, A Shabtai, D Breitenbacher, ... IEEE Pervasive Computing 17 (3), 12-22, 2018 | 1532 | 2018 |
Security testbed for Internet-of-Things devices S Siboni, V Sachidananda, Y Meidan, M Bohadana, Y Mathov, S Bhairav, ... IEEE transactions on reliability 68 (1), 23-44, 2018 | 227 | 2018 |
Reverse engineering IoT devices: Effective techniques and methods O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren IEEE Internet of Things Journal 5 (6), 4965-4976, 2018 | 56 | 2018 |
Not all datasets are born equal: On heterogeneous tabular data and adversarial examples Y Mathov, E Levy, Z Katzir, A Shabtai, Y Elovici Knowledge-Based Systems 242, 108377, 2022 | 53* | 2022 |
Opening Pandora’s box: effective techniques for reverse engineering IoT devices O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren Smart Card Research and Advanced Applications: 16th International Conference …, 2018 | 42 | 2018 |
Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders' Y Meidan, M Bohadana, Y Mathov, Y Mirsky, D Breitenbacher, A Shabtai, ... IEEE Pervasive Computing, Special Issue-Securing the IoT (July/Sep 2018), 2022 | 9 | 2022 |
Enhancing real-world adversarial patches through 3D modeling of complex target scenes Y Mathov, L Rokach, Y Elovici Neurocomputing 499, 11-22, 2022 | 8 | 2022 |
Stop bugging me! evading modern-day wiretapping using adversarial perturbations Y Mathov, TB Senior, A Shabtai, Y Elovici Computers & Security 121, 102841, 2022 | 7 | 2022 |
Challenges for security assessment of enterprises in the IoT era Y Mathov, N Agmon, A Shabtai, R Puzis, NO Tippenhauer, Y Elovici arXiv preprint arXiv:1906.10922, 2019 | 6 | 2019 |
Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders E Nehemya, Y Mathov, A Shabtai, Y Elovici Joint European Conference on Machine Learning and Knowledge Discovery in …, 2021 | 5* | 2021 |