Yael Mathov
Yael Mathov
Ph.D. Student, Ben Gurion University
Verified email at
Cited by
Cited by
N-baiot—network-based detection of iot botnet attacks using deep autoencoders
Y Meidan, M Bohadana, Y Mathov, Y Mirsky, A Shabtai, D Breitenbacher, ...
IEEE Pervasive Computing 17 (3), 12-22, 2018
Security testbed for Internet-of-Things devices
S Siboni, V Sachidananda, Y Meidan, M Bohadana, Y Mathov, S Bhairav, ...
IEEE transactions on reliability 68 (1), 23-44, 2018
Reverse engineering IoT devices: Effective techniques and methods
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
IEEE Internet of Things Journal 5 (6), 4965-4976, 2018
Not all datasets are born equal: On heterogeneous tabular data and adversarial examples
Y Mathov, E Levy, Z Katzir, A Shabtai, Y Elovici
Knowledge-Based Systems 242, 108377, 2022
Opening Pandora’s box: effective techniques for reverse engineering IoT devices
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
Smart Card Research and Advanced Applications: 16th International Conference …, 2018
Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders'
Y Meidan, M Bohadana, Y Mathov, Y Mirsky, D Breitenbacher, A Shabtai, ...
IEEE Pervasive Computing, Special Issue-Securing the IoT (July/Sep 2018), 2022
Challenges for security assessment of enterprises in the IoT era
Y Mathov, N Agmon, A Shabtai, R Puzis, NO Tippenhauer, Y Elovici
arXiv preprint arXiv:1906.10922, 2019
Enhancing real-world adversarial patches through 3D modeling of complex target scenes
Y Mathov, L Rokach, Y Elovici
Neurocomputing 499, 11-22, 2022
Stop bugging me! evading modern-day wiretapping using adversarial perturbations
TB Senior, Y Mathov, A Shabtai, Y Elovici
arXiv preprint arXiv:2010.12809, 2020
Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders
E Nehemya, Y Mathov, A Shabtai, Y Elovici
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2021
The system can't perform the operation now. Try again later.
Articles 1–10