
Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems
Recently, neural network (NN)based methods, including autoencoders, hav...
read it

PoPS: Policy Pruning and Shrinking for Deep Reinforcement Learning
The recent success of deep neural networks (DNNs) for function approxima...
read it

IPatch: A Remote Adversarial Patch
Applications such as autonomous vehicles and medical screening use deep ...
read it

Verifying Robustness of Gradient Boosted Models
Gradient boosted models are a fundamental machine learning technique. Ro...
read it

MultiAgent Pathfinding: Definitions, Variants, and Benchmarks
The MAPF problem is the fundamental problem of planning paths for multip...
read it

MultiAgent Path Finding with Deadlines
We formalize MultiAgent Path Finding with Deadlines (MAPFDL). The obje...
read it

Generic BlackBox EndtoEnd Attack Against State of the Art API Call Based Malware Classifiers
In this paper, we present a blackbox attack against API call based mach...
read it

Contextual Object Detection with a Few Relevant Neighbors
A natural way to improve the detection of objects is to consider the con...
read it

On the Utility of Context (or the Lack Thereof) for Object Detection
The recurring context in which objects appear holds valuable information...
read it

Curve Reconstruction via the Global Statistics of Natural Curves
Reconstructing the missing parts of a curve has been the subject of much...
read it

A Planning Approach to Monitoring Behavior of Computer Programs
We describe a novel approach to monitoring high level behaviors using co...
read it

Modifying Optimal SATbased Approach to Multiagent Pathfinding Problem to Suboptimal Variants
In multiagent path finding (MAPF) the task is to find nonconflicting p...
read it

Specifying NonMarkovian Rewards in MDPs Using LDL on Finite Traces (Preliminary Version)
In Markov Decision Processes (MDPs), the reward obtained in a state depe...
read it

Gradual Learning of Deep Recurrent Neural Networks
Deep Recurrent Neural Networks (RNNs) achieve stateoftheart results i...
read it

Mixing time estimation in reversible Markov chains from a single sample path
The spectral gap γ of a finite, ergodic, and reversible Markov chain is ...
read it

Detection of Unauthorized IoT Devices Using Machine Learning Techniques
Security experts have demonstrated numerous risks imposed by Internet of...
read it

Solving DCOPs with Distributed Large Neighborhood Search
The field of Distributed Constraint Optimization has gained momentum in ...
read it

Lifted Message Passing for the Generalized Belief Propagation
We introduce the lifted Generalized Belief Propagation (GBP) message pas...
read it

Estimating the Probability of Meeting a Deadline in Hierarchical Plans
Given a hierarchical plan (or schedule) with uncertain task times, we pr...
read it

Handwritten Signature Verification Using HandWorn Devices
Online signature verification technologies, such as those available in b...
read it

Rational Deployment of Multiple Heuristics in IDA*
Recent advances in metareasoning for search has shown its usefulness in ...
read it

Towards Rational Deployment of Multiple Heuristics in A*
The obvious way to use several admissible heuristics in A* is to take th...
read it

Deep Learning for Saliency Prediction in Natural Video
The purpose of this paper is the detection of salient areas in natural v...
read it

Active Regression by Stratification
We propose a new active learning algorithm for parametric linear regress...
read it

VOIaware MCTS
UCT, a stateofthe art algorithm for Monte Carlo tree search (MCTS) in ...
read it

MCTS Based on Simple Regret
UCT, a stateofthe art algorithm for Monte Carlo tree search (MCTS) in ...
read it

A Bayes consistent 1NN classifier
We show that a simple modification of the 1nearest neighbor classifier ...
read it

A General Theory of Additive State Space Abstractions
Informally, a set of abstractions of a state space S is additive if the ...
read it

Predictive PAC Learning and Process Decompositions
We informally call a stochastic process learnable if it admits a general...
read it

Rational Deployment of CSP Heuristics
Heuristics are crucial tools in decreasing search effort in varied field...
read it

Efficient Classification for Metric Data
Recent advances in largemargin classification of data residing in gener...
read it

Adaptive Metric Dimensionality Reduction
We study adaptive datadependent dimensionality reduction in the context...
read it

A Syntactic Approach to DomainSpecific Automatic Question Generation
Factoid questions are questions that require short factbased answers. A...
read it

Language Models with PreTrained (GloVe) Word Embeddings
In this work we implement a training of a Language Model (LM), using Rec...
read it

Incorporating Reality into Social Choice
When voting on a proposal one in fact chooses between two alternatives: ...
read it

A multigrid solver to the Helmholtz equation with a point source based on travel time and amplitude
The Helmholtz equation arises when modeling wave propagation in the freq...
read it

Data Aggregation Over Multiple Access Wireless Sensors Network
Data collection in Wireless Sensor Networks (WSN) draws significant atte...
read it

Feedback Capacity and Coding for the (0,k)RLL InputConstrained BEC
The inputconstrained binary erasure channel (BEC) with strictly causal ...
read it

The Parameterized Complexity of Centrality Improvement in Networks
The centrality of a vertex v in a network intuitively captures how impor...
read it

A Parameterized View on MultiLayer Cluster Editing
In classical Cluster Editing we seek to transform a given graph into a d...
read it

Network Optimization on Partitioned Pairs of Points
Given n pairs of points, S = {{p_1, q_1}, {p_2, q_2}, ..., {p_n, q_n}}, ...
read it

What Can Spatiotemporal Characteristics of Movements in RAMIS Tell Us?
Quantitative characterization of surgical movements can improve the qual...
read it

A CondorcetConsistent Participatory Budgeting Algorithm
The budget is the key means for effecting policy in democracies, yet its...
read it

New Algorithms for Minimizing the Weighted Number of Tardy Jobs On a Single Machine
In this paper we study the classical single machine scheduling problem w...
read it

A Survey on Geographically Distributed BigData Processing using MapReduce
Hadoop and Spark are widely used distributed processing frameworks for l...
read it

Wiretap and GelfandPinsker Channels Analogy and its Applications
A framework of analogy between wiretap channels (WTCs) and statedepende...
read it

Seasonal Goods and Spoiled Milk: Pricing for a Limited ShelfLife
We examine the case of items with a limited shelflife where storing an ...
read it

Game of Drones  Detecting Streamed POI from Encrypted FPV Channel
Drones have created a new threat to people's privacy. We are now in an e...
read it

Asymptotically Optimal Scheduling Algorithm for ComputeandForward
Consider a Compute and Forward (CF) relay network with L users and a sin...
read it

Asymptotically Optimal Scheduling for ComputeandForward
Consider a Compute and Forward (CF) relay network with L users and a sin...
read it
BenGurion University of the Negev
Ben Gurion University of the Negev offers degrees in both undergraduate and graduate level curriculum. The University offers courses in health sciences, social sciences, humanities, natural sciences, engineering, and management and business.