Publications
Research Publications
2025
- Cloudy with a Chance of Anomalies: Dynamic Graph Neural Network for Early Detection of Cloud Services’ User Anomalies2025Proceedings of the 34th International Conference on Computer Communications and Networks
- Optimized File Type Detection and One-Shot Reclassification Model2025Proceedings of the IEEE International Conference on Communications
- A New D-MAGIC: Dynamic Model for Cybersecurity Attack Detection Using GNNs into Clustering2025Proceedings of the IEEE International Conference on Communications
- Enhancing Encrypted Internet Traffic Classification Through Advanced Data Augmentation Techniques2025Proceedings of the IEEE International Conference on Communications
- PQClass: Classification of Post-Quantum Encryption Applications in Internet Traffic2025Proceedings of the IEEE International Conference on Communications
- Sentiment Analysis of Student-Tutor Interactions in VR Design Crits2025The Association for Computer-Aided Architectural Design Research in Asia (CAADRIA)
- A Classification-by-Retrieval Framework for Few-Shot Anomaly Detection to Detect API Injection2025Computers & Security
- Predicting Onset and Progression of Neurodegenerative Diseases Using Blood Test Data and Machine Learning Models2025
2024
- Phenotypical Characteristics of Nontuberculous Mycobacterial Infection in Patients with Bronchiectasis2024Respiratory Research
- Warm Recommendation: Enhancing Cold Start Recommendations Using Multimodal Product Representations2024International Conference on Information Systems (ICIS)
- The Art of Time-Bending: Data Augmentation and Early Prediction for Efficient Traffic Classification2024Expert Systems with Applications
- CBR–Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-Distribution2024arXiv preprint arXiv:2403.11206
- Cloudy with a Chance of Anomalies: Dynamic Graph Neural Network for Early Detection of Cloud Services’ User Anomalies2024arXiv preprint arXiv:2409.12726
- Exploring the Role of Sentiment in Tutor-Student Interaction. The Case Study of CS and Architecture Formative Studio Critiques20242024 IEEE Frontiers in Education Conference (FIE)
- Enhancing Encrypted Internet Traffic Classification Through Advanced Data Augmentation Techniques2024arXiv preprint arXiv:2407.16539
- Few-Shot API Attack Detection: Overcoming Data Scarcity with GAN-Inspired Learning2024arXiv preprint arXiv:2405.11258
- Extending Limited Datasets with GAN-Like Self-Supervision for SMS Spam Detection2024Computers & Security
- OSF-EIMTC: An Open-Source Framework for Standardized Encrypted Internet Traffic Classification2024Computer Communications
- Hidden in Time, Revealed in Frequency: Spectral Features and Multiresolution Analysis for Encrypted Internet Traffic Classification20242024 IEEE 21st Consumer Communications & Networking Conference (CCNC)
- Measuring Flight-Destination Similarity: A Multidimensional Approach2024Expert Systems with Applications
- The Sound of Emotions: An Artificial Intelligence Approach to Predicting Emotions from Musical Selections2024Available at SSRN 4656595
- Revolutionizing Our Way to Better Classifiers: Leveraging Synthetic Data with Generative Models for Encrypted Network Traffic Classification2024Available at SSRN 4654236
2023
- Speech and Multilingual Natural Language Framework for Speaker Change Detection and Diarization2023Expert Systems with Applications
- Online Temporary Learning Groups in Higher Education–Interactions, Compensation, and Maximisation of Achievements in an Israeli Case Study2023Journal of Education Culture and Society
- Breaking the Structure of MaMaDroid2023Expert Systems with Applications
- Adversarial Examples for Captcha Generation Adversarial Machine Learning for Social Good2023Available at SSRN 4608639
- Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning2023Electronics
- When a RF Beats a CNN and GRU, Together—A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification2023Computers & Security
- Protein Intake and Clinical Outcomes of Enterally Fed Critically Ill Patients2023Clinical Nutrition ESPEN
- Using Machine-Learning to Assess the Prognostic Value of Early Enteral Feeding Intolerance in Critically Ill Patients: A Retrospective Study2023Nutrients
2022
- SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection2022IEEE Access
- MaMaDroid2.0–The Holes of Control Flow Graphs2022arXiv preprint arXiv:2202.13922
- Problem-Space Evasion Attacks in the Android OS: A Survey2022arXiv preprint arXiv:2205.14576
- Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks2022arXiv preprint arXiv:2205.04293
- The Hidden Conversion Funnel of Mobile vs. Desktop Consumers2022Electronic Commerce Research and Applications
- Less Is More: Robust and Novel Features for Malicious Domain Detection2022Electronics
- MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification20222022 IEEE 19th annual consumer communications & networking conference (CCNC)
- Using the Cardio-Vascular Index (CVRI) to Predict Mortality in Septic Shock2022ISICEM
2021
- Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier2021IEEE Access
- Robust Coordination in Adversarial Social Networks: From Human Behavior to Agent-Based Modeling2021Network Science
- Prediction Model for the Spread of the COVID-19 Outbreak in the Global Environment2021Heliyon
- A Thousand Words Are Worth More Than One Recording: Word-Embedding Based Speaker Change Detection2021Interspeech
- Hybrid Speech and Text Analysis Methods for Speaker Change Detection2021IEEE/ACM Transactions on Audio, Speech, and Language Processing
- PCL: Packet Classification with Limited Knowledge2021IEEE INFOCOM 2021-IEEE Conference on Computer Communications
- Feeding Intolerance as a Predictor of Clinical Outcomes in Critically Ill Patients: A Machine Learning Approach2021Clinical Nutrition ESPEN
- Using machine learning to support early prediction of feeding intolerance in critically ill patients2021ESICM LIVES
2020
- Evasion Is Not Enough: A Case Study of Android Malware2020arXiv preprint arXiv:2003.14123
- Encrypted Video Traffic Clustering Demystified2020Computers & Security
- Robust Machine Learning for Encrypted Traffic Classification2020CoRR
- Evasion Is Not Enough: A Case Study of Android Malware2020International symposium on cyber security cryptography and machine learning
- Robust Malicious Domain Detection2020Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, Be’er Sheva, Israel, July 2–3, 2020, Proceedings 4
2019
- Adversarial Coordination on Social Networks2019Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems
- Improving Robustness of ML Classifiers Against Realizable Evasion Attacks Using Conserved Features201928th USENIX Security Symposium (USENIX Security 19)
2018
- Adversarial task assignment2018International Joint Conference on Artificial Intelligence
- A crowdsourcing framework for medical data sets2018AMIA Summits on Translational Science Proceedings
2017
- Non-Cooperative Team Formation and a Team Formation Mechanism2017Available at SSRN 3054771
- Enhancing Comparison Shopping Agents Through Ordering and Gradual Information Disclosure2017Autonomous Agents and Multi-Agent Systems
- Selective Opportunity Disclosure at the Service of Strategic Information Platforms2017Autonomous Agents and Multi-Agent Systems
- Enhancing Crowdworkers’ Vigilance2017Twenty-Sixth International Joint Conference on Artificial Intelligence (IJCAI-17)
- Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets2017
2016
- Robust Machine Learning for Encrypted Traffic Classification2016arXiv preprint arXiv:1603.04865
- Extending Workers’ Attention Span Through Dummy Events2016Proceedings of the AAAI Conference on Human Computation and Crowdsourcing
- Intelligent Mechanisms for Platforms in Modern Markets2016
2015
- Improving Comparison Shopping Agents’ Competence Through Selective Price Disclosure2015Electronic Commerce Research and Applications
- Automatic Anatomical Shape Correspondence and Alignment Using Mesh Features2015Biomedical Imaging (ISBI), 2015
- Strategy-Proof and Efficient Kidney Exchange Using a Credit Mechanism2015In proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence
2014
- Advanced Service Schemes for a Self-Interested Information Platform2014Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems
- Ordering Effects and Belief Adjustment in the Use of Comparison Shopping Agents2014Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence (AAAI 2014)
- Strategic Information Platforms: Selective Disclosure and the Price of Free2014Proceedings of the Fifteenth ACM conference on Economics and Computation
2013
- Search More, Disclose Less2013In proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence
2012
- Three Dimensional Group Registration of Mesh Objects2012