default search action
Chen Hajaj
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Ofek Bader, Adi Lichy, Amit Dvir, Ran Dubin, Chen Hajaj:
OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification. Comput. Commun. 213: 271-284 (2024) - [j15]Or Haim Anidjar, Revital Marbel, Ran Dubin, Amit Dvir, Chen Hajaj:
Extending limited datasets with GAN-like self-supervision for SMS spam detection. Comput. Secur. 145: 103998 (2024) - [j14]Anat Goldstein, Chen Hajaj:
Measuring flight-destination similarity: A multidimensional approach. Expert Syst. Appl. 238(Part A): 121802 (2024) - [j13]Chen Hajaj, Porat Aharon, Ran Dubin, Amit Dvir:
The art of time-bending: Data augmentation and early prediction for efficient traffic classification. Expert Syst. Appl. 252: 124166 (2024) - [c18]Nathan Dillbary, Roi Yozevitch, Amit Dvir, Ran Dubin, Chen Hajaj:
Hidden in Time, Revealed in Frequency: Spectral Features and Multiresolution Analysis for Encrypted Internet Traffic Classification. CCNC 2024: 266-271 - [i19]Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj:
CBR - Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution. CoRR abs/2403.11206 (2024) - [i18]Udi Aharon, Ran Dubin, Amit Dvir, Chen Hajaj:
Few-Shot API Attack Anomaly Detection in a Classification-by-Retrieval Framework. CoRR abs/2405.11247 (2024) - [i17]Udi Aharon, Revital Marbel, Ran Dubin, Amit Dvir, Chen Hajaj:
Few-Shot API Attack Detection: Overcoming Data Scarcity with GAN-Inspired Learning. CoRR abs/2405.11258 (2024) - [i16]Yehonatan Zion, Porat Aharon, Ran Dubin, Amit Dvir, Chen Hajaj:
Enhancing Encrypted Internet Traffic Classification Through Advanced Data Augmentation Techniques. CoRR abs/2407.16539 (2024) - [i15]Revital Marbel, Yanir Cohen, Ran Dubin, Amit Dvir, Chen Hajaj:
Cloudy with a Chance of Anomalies: Dynamic Graph Neural Network for Early Detection of Cloud Services' User Anomalies. CoRR abs/2409.12726 (2024) - 2023
- [j12]Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj:
When a RF beats a CNN and GRU, together - A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification. Comput. Secur. 124: 103000 (2023) - [j11]Or Haim Anidjar, Yannick Estève, Chen Hajaj, Amit Dvir, Itshak Lapidot:
Speech and multilingual natural language framework for speaker change detection and diarization. Expert Syst. Appl. 213(Part): 119238 (2023) - [j10]Harel Berger, Amit Dvir, Enrico Mariconti, Chen Hajaj:
Breaking the structure of MaMaDroid. Expert Syst. Appl. 228: 120429 (2023) - 2022
- [j9]Harel Berger, Chen Hajaj, Enrico Mariconti, Amit Dvir:
Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier. IEEE Access 10: 1317-1333 (2022) - [j8]Rotem Bar, Chen Hajaj:
SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection. IEEE Access 10: 56952-56960 (2022) - [j7]Anat Goldstein, Chen Hajaj:
The hidden conversion funnel of mobile vs. desktop consumers. Electron. Commer. Res. Appl. 53: 101135 (2022) - [c17]Ofek Bader, Adi Lichy, Chen Hajaj, Ran Dubin, Amit Dvir:
MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification. CCNC 2022: 527-533 - [i14]Harel Berger, Chen Hajaj, Enrico Mariconti, Amit Dvir:
MaMaDroid2.0 - The Holes of Control Flow Graphs. CoRR abs/2202.13922 (2022) - [i13]Jian Low, Chen Hajaj, Yevgeniy Vorobeychik:
A Rotating Proposer Mechanism for Team Formation. CoRR abs/2204.04251 (2022) - [i12]Harel Berger, Amit Dvir, Chen Hajaj, Rony Ronen:
Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks. CoRR abs/2205.04293 (2022) - [i11]Harel Berger, Chen Hajaj, Amit Dvir:
Problem-Space Evasion Attacks in the Android OS: a Survey. CoRR abs/2205.14576 (2022) - [i10]Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj:
When a RF Beats a CNN and GRU, Together - A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification. CoRR abs/2206.08004 (2022) - [i9]Ofek Bader, Adi Lichy, Amit Dvir, Ran Dubin, Chen Hajaj:
Open-Source Framework for Encrypted Internet and Malicious Traffic Classification. CoRR abs/2206.10144 (2022) - 2021
- [j6]Chen Hajaj, Zlatko Joveski, Sixie Yu, Yevgeniy Vorobeychik:
Robust coordination in adversarial social networks: From human behavior to agent-based modeling. Netw. Sci. 9(3): 255-290 (2021) - [j5]Or Haim Anidjar, Itshak Lapidot, Chen Hajaj, Amit Dvir, Issachar Gilad:
Hybrid Speech and Text Analysis Methods for Speaker Change Detection. IEEE ACM Trans. Audio Speech Lang. Process. 29: 2324-2338 (2021) - [c16]Vitalii Demianiuk, Chen Hajaj, Kirill Kogan:
PCL: Packet Classification with Limited Knowledge. INFOCOM 2021: 1-10 - [c15]Or Haim Anidjar, Itshak Lapidot, Chen Hajaj, Amit Dvir:
A Thousand Words are Worth More Than One Recording: Word-Embedding Based Speaker Change Detection. Interspeech 2021: 3121-3125 - 2020
- [j4]Amit Dvir, Angelos K. Marnerides, Ran Dubin, Nehor Golan, Chen Hajaj:
Encrypted video traffic clustering demystified. Comput. Secur. 96: 101917 (2020) - [c14]Nitay Hason, Amit Dvir, Chen Hajaj:
Robust Malicious Domain Detection. CSCML 2020: 45-61 - [c13]Harel Berger, Chen Hajaj, Amit Dvir:
Evasion Is Not Enough: A Case Study of Android Malware. CSCML 2020: 167-174 - [i8]Harel Berger, Chen Hajaj, Amit Dvir:
When the Guard failed the Droid: A case study of Android malware. CoRR abs/2003.14123 (2020) - [i7]Or Haim Anidjar, Chen Hajaj, Amit Dvir, I. Gilad:
A Thousand Words are Worth More Than One Recording: NLP Based Speaker Change Point Detection. CoRR abs/2006.01206 (2020) - [i6]Chen Hajaj, Nitay Hason, Nissim Harel, Amit Dvir:
Less is More: Robust and Novel Features for Malicious Domain Detection. CoRR abs/2006.01449 (2020)
2010 – 2019
- 2019
- [c12]Chen Hajaj, Sixie Yu, Zlatko Joveski, Yifan Guo, Yevgeniy Vorobeychik:
Adversarial Coordination on Social Networks. AAMAS 2019: 1515-1523 - [c11]Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik:
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features. USENIX Security Symposium 2019: 285-302 - 2018
- [c10]Joseph R. Coco, Cheng Ye, Chen Hajaj, Yevgeniy Vorobeychik, Joshua C. Denny, Laurie L. Novak, Bradley A. Malin, Thomas A. Lasko, Daniel Fabbri:
Crowdsourcing Clinical Chart Reviews. AMIA 2018 - [c9]Chen Hajaj, Yevgeniy Vorobeychik:
Adversarial Task Assignment. IJCAI 2018: 3783-3789 - [i5]Chen Hajaj, Yevgeniy Vorobeychik:
Adversarial Task Assignment. CoRR abs/1804.11221 (2018) - [i4]Chen Hajaj, Sixie Yu, Zlatko Joveski, Yevgeniy Vorobeychik:
Adversarial Coordination on Social Networks. CoRR abs/1808.01173 (2018) - 2017
- [j3]Chen Hajaj, Noam Hazon, David Sarne:
Enhancing comparison shopping agents through ordering and gradual information disclosure. Auton. Agents Multi Agent Syst. 31(3): 696-714 (2017) - [j2]Chen Hajaj, David Sarne:
Selective opportunity disclosure at the service of strategic information platforms. Auton. Agents Multi Agent Syst. 31(5): 1133-1164 (2017) - [c8]Avshalom Elmalech, David Sarne, Esther David, Chen Hajaj:
Enhancing Crowdworkers' Vigilance. IJCAI 2017: 4826-4830 - [e1]Sofia Ceppi, Esther David, Chen Hajaj, Valentin Robu, Ioannis A. Vetsikas:
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets - AMEC/TADA 2015, Istanbul, Turkey, May 4, 2015, and AMEC/TADA 2016, New York, NY, USA, July 10, 2016, Revised Selected Papers. Lecture Notes in Business Information Processing 271, Springer 2017, ISBN 978-3-319-54228-7 [contents] - [i3]Liang Tong, Bo Li, Chen Hajaj, Yevgeniy Vorobeychik:
Feature Conservation in Adversarial Classifier Evasion: A Case Study. CoRR abs/1708.08327 (2017) - [i2]Chen Hajaj, Yevgeniy Vorobeychik:
Adversarial Task Allocation. CoRR abs/1709.00358 (2017) - 2016
- [c7]Avshalom Elmalech, David Sarne, Esther David, Chen Hajaj:
Extending Workers' Attention Span Through Dummy Events. HCOMP 2016: 42-51 - [i1]Chen Hajaj, Noam Hazon, David Sarne:
Improving Comparison Shopping Agents' Competence through Selective Price Disclosure. CoRR abs/1610.00327 (2016) - 2015
- [j1]Chen Hajaj, Noam Hazon, David Sarne:
Improving comparison shopping agents' competence through selective price disclosure. Electron. Commer. Res. Appl. 14(6): 563-581 (2015) - [c6]Chen Hajaj, John P. Dickerson, Avinatan Hassidim, Tuomas Sandholm, David Sarne:
Strategy-Proof and Efficient Kidney Exchange Using a Credit Mechanism. AAAI 2015: 921-928 - [c5]Tal Darom, Yaniv Gur, Chen Hajaj, Yosi Keller:
Automatic anatomical shape correspondence and alignment using mesh features. ISBI 2015: 1530-1534 - 2014
- [c4]Chen Hajaj, Noam Hazon, David Sarne:
Ordering Effects and Belief Adjustment in the Use of Comparison Shopping Agents. AAAI 2014: 930-936 - [c3]Chen Hajaj, David Sarne, Lea Perets:
Advanced service schemes for a self-interested information platform. AAMAS 2014: 1413-1414 - [c2]Chen Hajaj, David Sarne:
Strategic information platforms: selective disclosure and the price of "free". EC 2014: 839-856 - 2013
- [c1]Chen Hajaj, Noam Hazon, David Sarne, Avshalom Elmalech:
Search More, Disclose Less. AAAI 2013: 401-408
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint