Picture for Ran Dubin

Ran Dubin

Model X-Ray: Detection of Hidden Malware in AI Model Weights using Few Shot Learning

Add code
Sep 28, 2024
Viaarxiv icon

Enhancing Encrypted Internet Traffic Classification Through Advanced Data Augmentation Techniques

Add code
Jul 23, 2024
Viaarxiv icon

CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution

Add code
Mar 17, 2024
Figure 1 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Figure 2 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Figure 3 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Figure 4 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Viaarxiv icon

Open Image Content Disarm And Reconstruction

Add code
Jul 26, 2023
Viaarxiv icon

Open-Source Framework for Encrypted Internet and Malicious Traffic Classification

Add code
Jun 21, 2022
Figure 1 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Figure 2 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Figure 3 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Figure 4 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Viaarxiv icon

When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification

Add code
Jun 16, 2022
Figure 1 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Figure 2 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Figure 3 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Figure 4 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Viaarxiv icon

I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification

Add code
Jul 21, 2016
Figure 1 for I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification
Figure 2 for I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification
Figure 3 for I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification
Figure 4 for I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification
Viaarxiv icon

Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari

Add code
Feb 19, 2016
Figure 1 for Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari
Figure 2 for Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari
Figure 3 for Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari
Figure 4 for Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari
Viaarxiv icon