Skip to main content

Showing 1–8 of 8 results for author: Dunkelman, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2108.13068  [pdf

    cs.CY

    COVID-19 Datathon Based on Deidentified Governmental Data as an Approach for Solving Policy Challenges, Increasing Trust, and Building a Community: Case Study

    Authors: Mor Peleg, Amnon Reichman, Sivan Shachar, Tamir Gadot, Meytal Avgil Tsadok, Maya Azaria, Orr Dunkelman, Shiri Hassid, Daniella Partem, Maya Shmailov, Elad Yom-Tov, Roy Cohen

    Abstract: Triggered by the COVID-19 crisis, Israel's Ministry of Health (MoH) held a virtual Datathon based on deidentified governmental data. Organized by a multidisciplinary committee, Israel's research community was invited to offer insights to COVID-19 policy challenges. The Datathon was designed to (1) develop operationalizable data-driven models to address COVID-19 health-policy challenges and (2) bui… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

  2. arXiv:2012.13293  [pdf, other

    cs.CR cs.AI

    Fuzzy Commitments Offer Insufficient Protection to Biometric Templates Produced by Deep Learning

    Authors: Danny Keller, Margarita Osadchy, Orr Dunkelman

    Abstract: In this work, we study the protection that fuzzy commitments offer when they are applied to facial images, processed by the state of the art deep learning facial recognition systems. We show that while these systems are capable of producing great accuracy, they produce templates of too little entropy. As a result, we present a reconstruction attack that takes a protected template, and reconstructs… ▽ More

    Submitted 24 December, 2020; originally announced December 2020.

  3. arXiv:2008.03675  [pdf, other

    cs.CG

    Consistent High Dimensional Rounding with Side Information

    Authors: Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler

    Abstract: In standard rounding, we want to map each value $X$ in a large continuous space (e.g., $R$) to a nearby point $P$ from a discrete subset (e.g., $Z$). This process seems to be inherently discontinuous in the sense that two consecutive noisy measurements $X_1$ and $X_2$ of the same value may be extremely close to each other and yet they can be rounded to different points $P_1\ne P_2$, which is undes… ▽ More

    Submitted 9 August, 2020; originally announced August 2020.

  4. arXiv:1904.01240  [pdf, other

    cs.CR

    DNS-Morph: UDP-Based Bootstrapping Protocol For Tor

    Authors: Rami Ailabouni, Orr Dunkelman, Sara Bitan

    Abstract: Tor is one of the most popular systems for anonymous communication and censorship circumvention on the web, currently used by millions of users every day. This puts Tor as a target for attacks by organizations and governmental bodies whose goal is to hinder users' ability to connect to it. These attacks include deep packet inspection (DPI) to classify Tor traffic as well as legitimate Tor client i… ▽ More

    Submitted 2 April, 2019; originally announced April 2019.

  5. arXiv:1901.10861  [pdf, other

    cs.LG cs.CR stat.ML

    A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance

    Authors: Adi Shamir, Itay Safran, Eyal Ronen, Orr Dunkelman

    Abstract: The existence of adversarial examples in which an imperceptible change in the input can fool well trained neural networks was experimentally discovered by Szegedy et al in 2013, who called them "Intriguing properties of neural networks". Since then, this topic had become one of the hottest research areas within machine learning, but the ease with which we can switch between any two decisions in ta… ▽ More

    Submitted 30 January, 2019; originally announced January 2019.

  6. arXiv:1704.02659  [pdf, other

    cs.CR

    Tight Bounds on Online Checkpointing Algorithms

    Authors: Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir

    Abstract: The problem of online checkpointing is a classical problem with numerous applications which had been studied in various forms for almost 50 years. In the simplest version of this problem, a user has to maintain $k$ memorized checkpoints during a long computation, where the only allowed operation is to move one of the checkpoints from its old time to the current time, and his goal is to keep the ch… ▽ More

    Submitted 19 June, 2019; v1 submitted 9 April, 2017; originally announced April 2017.

    Comments: Appeared at ICALP 2018

  7. arXiv:1611.03811  [pdf, other

    cs.CR cs.CV

    HoneyFaces: Increasing the Security and Privacy of Authentication Using Synthetic Facial Images

    Authors: Mor Ohana, Orr Dunkelman, Stuart Gibson, Margarita Osadchy

    Abstract: One of the main challenges faced by Biometric-based authentication systems is the need to offer secure authentication while maintaining the privacy of the biometric data. Previous solutions, such as Secure Sketch and Fuzzy Extractors, rely on assumptions that cannot be guaranteed in practice, and often affect the authentication accuracy. In this paper, we introduce HoneyFaces: the concept of add… ▽ More

    Submitted 11 November, 2016; originally announced November 2016.

  8. arXiv:1608.08020  [pdf, other

    cs.CR

    Breaching the Privacy of Israel's Paper Ballot Voting System

    Authors: Tomer Ashur, Orr Dunkelman, Nimrod Talmon

    Abstract: An election is a process through which citizens in liberal democracies select their governing bodies, usually through voting. For elections to be truly honest, people must be able to vote freely without being subject to coercion; that is why voting is usually done in a private manner. In this paper we analyze the security offered by a paper-ballot voting system that is used in Israel, as well as i… ▽ More

    Submitted 29 August, 2016; originally announced August 2016.

    Comments: 17 pages

    MSC Class: 94A60