Skip to main content

Showing 1–13 of 13 results for author: Lapid, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.04858  [pdf, ps, other

    cs.AI cs.LG

    Don't Lag, RAG: Training-Free Adversarial Detection Using RAG

    Authors: Roie Kazoom, Raz Lapid, Moshe Sipper, Ofer Hadar

    Abstract: Adversarial patch attacks pose a major threat to vision systems by embedding localized perturbations that mislead deep models. Traditional defense methods often require retraining or fine-tuning, making them impractical for real-world deployment. We propose a training-free Visual Retrieval-Augmented Generation (VRAG) framework that integrates Vision-Language Models (VLMs) for adversarial patch det… ▽ More

    Submitted 12 June, 2025; v1 submitted 7 April, 2025; originally announced April 2025.

    Comments: Accepted at VecDB @ ICML 2025

  2. arXiv:2502.09110  [pdf, other

    cs.CV

    Pulling Back the Curtain: Unsupervised Adversarial Detection via Contrastive Auxiliary Networks

    Authors: Eylon Mizrahi, Raz Lapid, Moshe Sipper

    Abstract: Deep learning models are widely employed in safety-critical applications yet remain susceptible to adversarial attacks -- imperceptible perturbations that can significantly degrade model performance. Conventional defense mechanisms predominantly focus on either enhancing model robustness or detecting adversarial inputs independently. In this work, we propose an Unsupervised adversarial detection v… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

  3. arXiv:2501.15425  [pdf, other

    cs.IR physics.soc-ph

    An Empirically-parametrized Spatio-Temporal Extended-SIR Model for Combined Dilution and Vaccination Mitigation for Rabies Outbreaks in Wild Jackals

    Authors: Teddy Lazebnik, Yehuda Samuel, Jonathan Tichon, Roi Lapid, Roni King, Tomer Nissimian, Orr Spiegel

    Abstract: The transmission of zoonotic diseases between animals and humans poses an increasing threat. Rabies is a prominent example with various instances globally, facilitated by a surplus of meso-predators (commonly, facultative synanthropic species e.g., golden jackals [Canis aureus, hereafter jackals]) thanks to the abundance of anthropogenic resources leading to dense populations close to human establ… ▽ More

    Submitted 26 January, 2025; originally announced January 2025.

  4. arXiv:2408.13809  [pdf, other

    cs.CV cs.CR

    On the Robustness of Kolmogorov-Arnold Networks: An Adversarial Perspective

    Authors: Tal Alter, Raz Lapid, Moshe Sipper

    Abstract: Kolmogorov-Arnold Networks (KANs) have recently emerged as a novel approach to function approximation, demonstrating remarkable potential in various domains. Despite their theoretical promise, the robustness of KANs under adversarial conditions has yet to be thoroughly examined. In this paper we explore the adversarial robustness of KANs, with a particular focus on image classification tasks. We a… ▽ More

    Submitted 12 March, 2025; v1 submitted 25 August, 2024; originally announced August 2024.

    Comments: Accepted at TMLR 2025

  5. arXiv:2404.12120  [pdf, other

    cs.CV cs.AI

    Fortify the Guardian, Not the Treasure: Resilient Adversarial Detectors

    Authors: Raz Lapid, Almog Dubin, Moshe Sipper

    Abstract: This paper presents RADAR-Robust Adversarial Detection via Adversarial Retraining-an approach designed to enhance the robustness of adversarial detectors against adaptive attacks, while maintaining classifier performance. An adaptive attack is one where the attacker is aware of the defenses and adapts their strategy accordingly. Our proposed method leverages adversarial training to reinforce the a… ▽ More

    Submitted 30 June, 2024; v1 submitted 18 April, 2024; originally announced April 2024.

  6. arXiv:2403.02955  [pdf, other

    cs.CR cs.CV

    XAI-Based Detection of Adversarial Attacks on Deepfake Detectors

    Authors: Ben Pinhasov, Raz Lapid, Rony Ohayon, Moshe Sipper, Yehudit Aperstein

    Abstract: We introduce a novel methodology for identifying adversarial attacks on deepfake detectors using eXplainable Artificial Intelligence (XAI). In an era characterized by digital advancement, deepfakes have emerged as a potent tool, creating a demand for efficient detection systems. However, these systems are frequently targeted by adversarial attacks that inhibit their performance. We address this ga… ▽ More

    Submitted 18 August, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: Accepted at TMLR 2024

    Journal ref: Transactions on Machine Learning Research, 2024

  7. arXiv:2309.01446  [pdf, other

    cs.CL cs.CV cs.NE

    Open Sesame! Universal Black Box Jailbreaking of Large Language Models

    Authors: Raz Lapid, Ron Langberg, Moshe Sipper

    Abstract: Large language models (LLMs), designed to provide helpful and safe responses, often rely on alignment techniques to align with user intent and social guidelines. Unfortunately, this alignment can be exploited by malicious actors seeking to manipulate an LLM's outputs for unintended purposes. In this paper we introduce a novel approach that employs a genetic algorithm (GA) to manipulate LLMs when m… ▽ More

    Submitted 5 August, 2024; v1 submitted 4 September, 2023; originally announced September 2023.

    Comments: Accepted at SeT-LLM @ ICLR 2024

    Journal ref: ICLR 2024 Workshop on Secure and Trustworthy Large Language Models

  8. arXiv:2306.07591  [pdf, other

    cs.CV cs.NE

    I See Dead People: Gray-Box Adversarial Attack on Image-To-Text Models

    Authors: Raz Lapid, Moshe Sipper

    Abstract: Modern image-to-text systems typically adopt the encoder-decoder framework, which comprises two main components: an image encoder, responsible for extracting image features, and a transformer-based decoder, used for generating captions. Taking inspiration from the analysis of neural networks' robustness against adversarial perturbations, we propose a novel gray-box algorithm for creating adversari… ▽ More

    Submitted 19 July, 2023; v1 submitted 13 June, 2023; originally announced June 2023.

    Journal ref: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2023)

  9. arXiv:2306.04971  [pdf, other

    cs.NE cs.LG

    A Melting Pot of Evolution and Learning

    Authors: Moshe Sipper, Achiya Elyasaf, Tomer Halperin, Zvika Haramaty, Raz Lapid, Eyal Segal, Itai Tzruia, Snir Vitrack Tamam

    Abstract: We survey eight recent works by our group, involving the successful blending of evolutionary algorithms with machine learning and deep learning: 1. Binary and Multinomial Classification through Evolutionary Symbolic Regression, 2. Classy Ensemble: A Novel Ensemble Algorithm for Classification, 3. EC-KitY: Evolutionary Computation Tool Kit in Python, 4. Evolution of Activation Functions for Deep Le… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

    Comments: To Appear in Proceedings of Genetic Programming Theory & Practice XX, 2023

  10. arXiv:2303.04238  [pdf, other

    cs.CV cs.AI cs.NE

    Patch of Invisibility: Naturalistic Physical Black-Box Adversarial Attacks on Object Detectors

    Authors: Raz Lapid, Eylon Mizrahi, Moshe Sipper

    Abstract: Adversarial attacks on deep-learning models have been receiving increased attention in recent years. Work in this area has mostly focused on gradient-based techniques, so-called "white-box" attacks, wherein the attacker has access to the targeted model's internal parameters; such an assumption is usually unrealistic in the real world. Some attacks additionally use the entire pixel space to fool a… ▽ More

    Submitted 19 August, 2024; v1 submitted 7 March, 2023; originally announced March 2023.

    Comments: Accepted at MLCS @ ECML-PKDD 2024

    Journal ref: ECML-PKDD 2024 Workshop on Machine Leraning For Cybersecurity

  11. arXiv:2211.14860  [pdf, other

    cs.CV cs.AI

    Foiling Explanations in Deep Neural Networks

    Authors: Snir Vitrack Tamam, Raz Lapid, Moshe Sipper

    Abstract: Deep neural networks (DNNs) have greatly impacted numerous fields over the past decade. Yet despite exhibiting superb performance over many problems, their black-box nature still poses a significant challenge with respect to explainability. Indeed, explainable artificial intelligence (XAI) is crucial in several fields, wherein the answer alone -- sans a reasoning of how said answer was derived --… ▽ More

    Submitted 13 August, 2023; v1 submitted 27 November, 2022; originally announced November 2022.

    Comments: Snir Vitrack Tamam and Raz Lapid contributed equally

    Journal ref: Transactions on Machine Learning Research, 08/2023

  12. An Evolutionary, Gradient-Free, Query-Efficient, Black-Box Algorithm for Generating Adversarial Instances in Deep Networks

    Authors: Raz Lapid, Zvika Haramaty, Moshe Sipper

    Abstract: Deep neural networks (DNNs) are sensitive to adversarial data in a variety of scenarios, including the black-box scenario, where the attacker is only allowed to query the trained model and receive an output. Existing black-box methods for creating adversarial instances are costly, often using gradient estimation or training a replacement network. This paper introduces \textbf{Qu}ery-Efficient \tex… ▽ More

    Submitted 13 September, 2022; v1 submitted 17 August, 2022; originally announced August 2022.

    Journal ref: Algorithms 2022, 15(11), 407

  13. Evolution of Activation Functions for Deep Learning-Based Image Classification

    Authors: Raz Lapid, Moshe Sipper

    Abstract: Activation functions (AFs) play a pivotal role in the performance of neural networks. The Rectified Linear Unit (ReLU) is currently the most commonly used AF. Several replacements to ReLU have been suggested but improvements have proven inconsistent. Some AFs exhibit better performance for specific tasks, but it is hard to know a priori how to select the appropriate one(s). Studying both standard… ▽ More

    Submitted 24 June, 2022; originally announced June 2022.

    Journal ref: Proceedings of 2022 Genetic and Evolutionary Computation Conference