Prati
Chen Hajaj
Naslov
Citirano
Citirano
Godina
Improving robustness of ML classifiers against realizable evasion attacks using conserved features
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
28th USENIX Security Symposium (USENIX Security 19), 285-302, 2019
74*2019
Strategy-Proof and Efficient Kidney Exchange Using a Credit Mechanism
C Hajaj, JP Dickerson, A Hassidim, T Sandholm, D Sarne
In proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
572015
Using CSF biomarkers to replicate genetic associations in Alzheimer's disease
JM Schott, ADNI Investigators
Neurobiology of Aging 33 (7), 1486. e9-1486. e15, 2012
272012
Search More, Disclose Less.
C Hajaj, N Hazon, D Sarne, A Elmalech
In proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013
242013
A crowdsourcing framework for medical data sets
C Ye, J Coco, A Epishova, C Hajaj, H Bogardus, L Novak, J Denny, ...
AMIA Summits on Translational Science Proceedings 2018, 273, 2018
202018
Improving comparison shopping agents’ competence through selective price disclosure
C Hajaj, N Hazon, D Sarne
Electronic Commerce Research and Applications 14 (6), 563–581, 2015
202015
Enhancing comparison shopping agents through ordering and gradual information disclosure
C Hajaj, N Hazon, D Sarne
Autonomous Agents and Multi-Agent Systems 31 (3), 696–714, 2017
182017
Strategic information platforms: selective disclosure and the price of free
C Hajaj, D Sarne
Proceedings of the Fifteenth ACM conference on Economics and Computation …, 2014
162014
Ordering Effects and Belief Adjustment in the Use of Comparison Shopping Agents
C Hajaj, N Hazon, D Sarne
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence …, 2014
162014
Extending workers' attention span through dummy events
A Elmalech, D Sarne, E David, C Hajaj
Proceedings of the AAAI Conference on Human Computation and Crowdsourcing 4 …, 2016
152016
Evasion is not enough: A case study of android malware
H Berger, C Hajaj, A Dvir
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
102020
Less is more: Robust and novel features for malicious domain detection
C Hajaj, N Hason, A Dvir
Electronics 11 (6), 969, 2022
72022
Encrypted video traffic clustering demystified
A Dvir, AK Marnerides, R Dubin, N Golan, C Hajaj
Computers & Security 96, 101917, 2020
72020
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets
S Ceppi, E David, C Hajaj, V Robu, IA Vetsikas
Springer, 2017
7*2017
Robust malicious domain detection
N Hason, A Dvir, C Hajaj
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
62020
Adversarial coordination on social networks
C Hajaj, S Yu, Z Joveski, Y Vorobeychik
Proceedings of the 18th International Conference on Autonomous Agents and …, 2019
62019
Selective opportunity disclosure at the service of strategic information platforms
C Hajaj, D Sarne
Autonomous Agents and Multi-Agent Systems 31 (5), 1133-1164, 2017
52017
Crystal ball: From innovative attacks to attack effectiveness classifier
H Berger, C Hajaj, E Mariconti, A Dvir
IEEE Access 10, 1317-1333, 2021
42021
Hybrid Speech and Text Analysis Methods for Speaker Change Detection
OH Anidjar, I Lapidot, C Hajaj, A Dvir, I Gilad
IEEE/ACM Transactions on Audio, Speech, and Language Processing 29, 2324-2338, 2021
42021
A Thousand Words are Worth More Than One Recording: Word-Embedding Based Speaker Change Detection
OH Anidjar, I Lapidot, C Hajaj, A Dvir
Interspeech, 3121-3125, 2021
4*2021
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20