Skip to main content

Showing 1–8 of 8 results for author: Solewicz, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.11238  [pdf, ps, other

    cs.LG cs.AI eess.SP

    uPVC-Net: A Universal Premature Ventricular Contraction Detection Deep Learning Algorithm

    Authors: Hagai Hamami, Yosef Solewicz, Daniel Zur, Yonatan Kleerekoper, Joachim A. Behar

    Abstract: Introduction: Premature Ventricular Contractions (PVCs) are common cardiac arrhythmias originating from the ventricles. Accurate detection remains challenging due to variability in electrocardiogram (ECG) waveforms caused by differences in lead placement, recording conditions, and population demographics. Methods: We developed uPVC-Net, a universal deep learning model to detect PVCs from any singl… ▽ More

    Submitted 12 June, 2025; originally announced June 2025.

    Comments: 8 pages

    MSC Class: 92C55; 92B20 ACM Class: I.2.6; J.3

  2. arXiv:2503.13486  [pdf, other

    eess.SP cs.LG

    Machine learning for triage of strokes with large vessel occlusion using photoplethysmography biomarkers

    Authors: Márton Á. Goda, Helen Badge, Jasmeen Khan, Yosef Solewicz, Moran Davoodi, Rumbidzai Teramayi, Dennis Cordato, Longting Lin, Lauren Christie, Christopher Blair, Gagan Sharma, Mark Parsons, Joachim A. Behar

    Abstract: Objective. Large vessel occlusion (LVO) stroke presents a major challenge in clinical practice due to the potential for poor outcomes with delayed treatment. Treatment for LVO involves highly specialized care, in particular endovascular thrombectomy, and is available only at certain hospitals. Therefore, prehospital identification of LVO by emergency ambulance services, can be critical for triagin… ▽ More

    Submitted 9 March, 2025; originally announced March 2025.

  3. arXiv:1803.03422  [pdf, other

    cs.CR

    MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication

    Authors: Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici

    Abstract: In this paper we show how two (or more) airgapped computers in the same room, equipped with passive speakers, headphones, or earphones can covertly exchange data via ultrasonic waves. Microphones are not required. Our method is based on the capability of a malware to exploit a specific audio chip feature in order to reverse the connected speakers from output devices into input devices - unobtrusiv… ▽ More

    Submitted 16 March, 2018; v1 submitted 9 March, 2018; originally announced March 2018.

  4. arXiv:1709.08344  [pdf

    cs.SD eess.AS

    Predicting interviewee attitude and body language from speech descriptors

    Authors: Yosef Solewicz, Chagay Orenshtein, Avital Friedland

    Abstract: This present research investigated the relationship between personal impressions and the acoustic nonverbal communication conveyed by employees being interviewed. First, we investigated the extent to which different conversation topics addressed during the interview induced changes in the interviewees' acoustic parameters. Next, we attempted to predict the observed and self-assessed attitudes and… ▽ More

    Submitted 25 September, 2017; originally announced September 2017.

  5. arXiv:1705.06454  [pdf, other

    cs.CR

    Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing

    Authors: Sofia Belikovetsky, Yosef Solewicz, Mark Yampolskiy, Jinghui Toh, Yuval Elovici

    Abstract: Additive Manufacturing (AM, or 3D printing) is a novel manufacturing technology that is being adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper we address sabotage via tampering with the 3D printing process. We present an object verification system using side-channel emanations: sound generat… ▽ More

    Submitted 18 May, 2017; originally announced May 2017.

  6. arXiv:1611.07350  [pdf

    cs.CR

    SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit

    Authors: Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici

    Abstract: It is possible to manipulate the headphones (or earphones) connected to a computer, silently turning them into a pair of eavesdropping microphones - with software alone. The same is also true for some types of loudspeakers. This paper focuses on this threat in a cyber-security context. We present SPEAKE(a)R, a software that can covertly turn the headphones connected to a PC into a microphone. We p… ▽ More

    Submitted 22 November, 2016; originally announced November 2016.

  7. arXiv:1608.03431  [pdf

    cs.CR

    DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise

    Authors: Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici

    Abstract: Air-gapped computers are disconnected from the Internet physically and logically. This measure is taken in order to prevent the leakage of sensitive data from secured networks. In the past, it has been shown that malware can exfiltrate data from air-gapped computers by transmitting ultrasonic signals via the computer's speakers. However, such acoustic communication relies on the availability of sp… ▽ More

    Submitted 11 August, 2016; originally announced August 2016.

  8. arXiv:1606.05915  [pdf

    cs.CR

    Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers

    Authors: Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici

    Abstract: Because computers may contain or interact with sensitive information, they are often air-gapped and in this way kept isolated and disconnected from the Internet. In recent years the ability of malware to communicate over an air-gap by transmitting sonic and ultrasonic signals from a computer speaker to a nearby receiver has been shown. In order to eliminate such acoustic channels, current best pra… ▽ More

    Submitted 19 June, 2016; originally announced June 2016.