Skip to main content

Showing 1–12 of 12 results for author: Hadar, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.14720  [pdf, other

    cs.NI cs.LG cs.MM

    Video QoE Metrics from Encrypted Traffic: Application-agnostic Methodology

    Authors: Tamir Berger, Jonathan Sterenson, Raz Birman, Ofer Hadar

    Abstract: Instant Messaging-Based Video Call Applications (IMVCAs) and Video Conferencing Applications (VCAs) have become integral to modern communication. Ensuring a high Quality of Experience (QoE) for users in this context is critical for network operators, as network conditions significantly impact user QoE. However, network operators lack access to end-device QoE metrics due to encrypted traffic. Exist… ▽ More

    Submitted 20 April, 2025; originally announced April 2025.

    Comments: 8 pages, 7 figures

    ACM Class: C.2.1; C.2.3; I.2.6

  2. arXiv:2504.04858  [pdf, ps, other

    cs.AI cs.LG

    Don't Lag, RAG: Training-Free Adversarial Detection Using RAG

    Authors: Roie Kazoom, Raz Lapid, Moshe Sipper, Ofer Hadar

    Abstract: Adversarial patch attacks pose a major threat to vision systems by embedding localized perturbations that mislead deep models. Traditional defense methods often require retraining or fine-tuning, making them impractical for real-world deployment. We propose a training-free Visual Retrieval-Augmented Generation (VRAG) framework that integrates Vision-Language Models (VLMs) for adversarial patch det… ▽ More

    Submitted 12 June, 2025; v1 submitted 7 April, 2025; originally announced April 2025.

    Comments: Accepted at VecDB @ ICML 2025

  3. arXiv:2411.14095  [pdf, other

    cs.CV

    WARLearn: Weather-Adaptive Representation Learning

    Authors: Shubham Agarwal, Raz Birman, Ofer Hadar

    Abstract: This paper introduces WARLearn, a novel framework designed for adaptive representation learning in challenging and adversarial weather conditions. Leveraging the in-variance principal used in Barlow Twins, we demonstrate the capability to port the existing models initially trained on clear weather data to effectively handle adverse weather conditions. With minimal additional training, our method e… ▽ More

    Submitted 21 November, 2024; originally announced November 2024.

    Comments: Accepted for publication in IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2025

  4. arXiv:2409.05697  [pdf, other

    cs.CV cs.LG

    Segmentation by Factorization: Unsupervised Semantic Segmentation for Pathology by Factorizing Foundation Model Features

    Authors: Jacob Gildenblat, Ofir Hadar

    Abstract: We introduce Segmentation by Factorization (F-SEG), an unsupervised segmentation method for pathology that generates segmentation masks from pre-trained deep learning models. F-SEG allows the use of pre-trained deep neural networks, including recently developed pathology foundation models, for semantic segmentation. It achieves this without requiring additional training or finetuning, by factorizi… ▽ More

    Submitted 9 September, 2024; originally announced September 2024.

  5. arXiv:2409.00821  [pdf, other

    cs.CV cs.LG

    Real-Time Weather Image Classification with SVM

    Authors: Eden Ship, Eitan Spivak, Shubham Agarwal, Raz Birman, Ofer Hadar

    Abstract: Accurate classification of weather conditions in images is essential for enhancing the performance of object detection and classification models under varying weather conditions. This paper presents a comprehensive study on classifying weather conditions in images into four categories: rainy, low light, haze, and clear. The motivation for this work stems from the need to improve the reliability an… ▽ More

    Submitted 1 September, 2024; originally announced September 2024.

  6. arXiv:2403.12988  [pdf

    cs.CV cs.AI

    Improving the Robustness of Object Detection and Classification AI models against Adversarial Patch Attacks

    Authors: Roie Kazoom, Raz Birman, Ofer Hadar

    Abstract: Adversarial patch attacks, crafted to compromise the integrity of Deep Neural Networks (DNNs), significantly impact Artificial Intelligence (AI) systems designed for object detection and classification tasks. The primary purpose of this work is to defend models against real-world physical attacks that target object detection and classification. We analyze attack techniques and propose a robust def… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  7. arXiv:2012.04585  [pdf, other

    cs.CL cs.SI

    Discourse Parsing of Contentious, Non-Convergent Online Discussions

    Authors: Stepan Zakharov, Omri Hadar, Tovit Hakak, Dina Grossman, Yifat Ben-David Kolikant, Oren Tsur

    Abstract: Online discourse is often perceived as polarized and unproductive. While some conversational discourse parsing frameworks are available, they do not naturally lend themselves to the analysis of contentious and polarizing discussions. Inspired by the Bakhtinian theory of Dialogism, we propose a novel theoretical and computational framework, better suited for non-convergent discussions. We redefine… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

  8. arXiv:1604.08010  [pdf, other

    cs.CV

    Deep Learning for Saliency Prediction in Natural Video

    Authors: Souad Chaabouni, Jenny Benois-Pineau, Ofer Hadar, Chokri Ben Amar

    Abstract: The purpose of this paper is the detection of salient areas in natural video by using the new deep learning techniques. Salient patches in video frames are predicted first. Then the predicted visual fixation maps are built upon them. We design the deep architecture on the basis of CaffeNet implemented with Caffe toolkit. We show that changing the way of data selection for optimisation of network p… ▽ More

    Submitted 27 April, 2016; originally announced April 2016.

  9. Adaptation Logic for HTTP Dynamic Adaptive Streaming using Geo-Predictive Crowdsourcing

    Authors: Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar, Itay Katz, Ori Mashiach

    Abstract: The increasing demand for video streaming services with high Quality of Experience (QoE) has prompted a lot of research on client-side adaptation logic approaches. However, most algorithms use the client's previous download experience and do not use a crowd knowledge database generated by users of a professional service. We propose a new crowd algorithm that maximizes the QoE. Additionally, we sho… ▽ More

    Submitted 5 February, 2016; originally announced February 2016.

    Comments: 10 pages

  10. I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification

    Authors: Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar

    Abstract: Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active and passive. In this paper, we consider the passive scenario where the adversary does not interact actively with the device, but he is able to eavesdrop on the network traffic of the device from the network side. Most of the Internet traffic is encrypted and thus passive attac… ▽ More

    Submitted 21 July, 2016; v1 submitted 1 February, 2016; originally announced February 2016.

    Comments: 9 pages. arXiv admin note: text overlap with arXiv:1602.00489

    Journal ref: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 12, NO. 12, DECEMBER 2017

  11. arXiv:1602.00489  [pdf, ps, other

    cs.MM cs.CR cs.LG cs.NI

    Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari

    Authors: Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar, Itay Richman, Ofir Trabelsi

    Abstract: The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet Inspection (DPI). However, Google and certain content providers have started to encrypt their video services. As a result, operators often encounter difficulties in shaping their encrypted video traffic… ▽ More

    Submitted 19 February, 2016; v1 submitted 1 February, 2016; originally announced February 2016.

    Comments: 9 pages

  12. arXiv:cs/0610082  [pdf, ps, other

    cs.IT

    Theoretical analysis of network cranback protocols performance

    Authors: Sander Stepanov, Ofer Hadar

    Abstract: Suggested the decision of the network cranback protocols performance analyzing problem from Eyal Felstine, Reuven Cohen and Ofer Hadar, " Crankback Prediction in Hierarchical ATM networks", Journal of Network and Systems Management, Vol. 10, No. 3, September 2002. It show that the false alarm probability and probability of successful way crossing can be calculated. The main optimization equation… ▽ More

    Submitted 13 October, 2006; originally announced October 2006.