Seguir
Chen Hajaj
Título
Citado por
Citado por
Año
Improving robustness of ML classifiers against realizable evasion attacks using conserved features
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
28th USENIX Security Symposium (USENIX Security 19), 285-302, 2019
112*2019
Strategy-Proof and Efficient Kidney Exchange Using a Credit Mechanism
C Hajaj, JP Dickerson, A Hassidim, T Sandholm, D Sarne
In proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
602015
Using CSF biomarkers to replicate genetic associations in Alzheimer's disease
JM Schott, ADNI Investigators
Neurobiology of Aging 33 (7), 1486. e9-1486. e15, 2012
322012
A crowdsourcing framework for medical data sets
C Ye, J Coco, A Epishova, C Hajaj, H Bogardus, L Novak, J Denny, ...
AMIA Summits on Translational Science Proceedings 2018, 273, 2018
282018
Search More, Disclose Less.
C Hajaj, N Hazon, D Sarne, A Elmalech
In proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013
252013
Improving comparison shopping agents’ competence through selective price disclosure
C Hajaj, N Hazon, D Sarne
Electronic Commerce Research and Applications 14 (6), 563–581, 2015
232015
Enhancing comparison shopping agents through ordering and gradual information disclosure
C Hajaj, N Hazon, D Sarne
Autonomous Agents and Multi-Agent Systems 31 (3), 696–714, 2017
202017
MalDIST: From encrypted traffic classification to malware traffic detection and classification
O Bader, A Lichy, C Hajaj, R Dubin, A Dvir
2022 IEEE 19th annual consumer communications & networking conference (CCNC …, 2022
192022
Less is more: Robust and novel features for malicious domain detection
C Hajaj, N Hason, A Dvir
Electronics 11 (6), 969, 2022
172022
Strategic information platforms: selective disclosure and the price of free
C Hajaj, D Sarne
Proceedings of the Fifteenth ACM conference on Economics and Computation …, 2014
172014
Ordering Effects and Belief Adjustment in the Use of Comparison Shopping Agents
C Hajaj, N Hazon, D Sarne
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence …, 2014
172014
When a RF beats a CNN and GRU, together—A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification
A Lichy, O Bader, R Dubin, A Dvir, C Hajaj
Computers & Security 124, 103000, 2023
142023
Evasion is not enough: A case study of android malware
H Berger, C Hajaj, A Dvir
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
142020
Extending workers' attention span through dummy events
A Elmalech, D Sarne, E David, C Hajaj
Proceedings of the AAAI Conference on Human Computation and Crowdsourcing 4 …, 2016
142016
Hybrid Speech and Text Analysis Methods for Speaker Change Detection
OH Anidjar, I Lapidot, C Hajaj, A Dvir, I Gilad
IEEE/ACM Transactions on Audio, Speech, and Language Processing 29, 2324-2338, 2021
132021
Encrypted video traffic clustering demystified
A Dvir, AK Marnerides, R Dubin, N Golan, C Hajaj
Computers & Security 96, 101917, 2020
132020
Robust malicious domain detection
N Hason, A Dvir, C Hajaj
Cyber Security Cryptography and Machine Learning: Fourth International …, 2020
102020
The hidden conversion funnel of mobile vs. desktop consumers
A Goldstein, C Hajaj
Electronic Commerce Research and Applications 53, 101135, 2022
92022
Prediction model for the spread of the COVID-19 outbreak in the global environment
RS Hirschprung, C Hajaj
Heliyon 7 (7), 2021
82021
Adversarial coordination on social networks
C Hajaj, S Yu, Z Joveski, Y Vorobeychik
Proceedings of the 18th International Conference on Autonomous Agents and …, 2019
82019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20