Chen Hajaj
Cited by
Cited by
Improving robustness of ML classifiers against realizable evasion attacks using conserved features
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
28th USENIX Security Symposium (USENIX Security 19), 285-302, 2019
Strategy-Proof and Efficient Kidney Exchange Using a Credit Mechanism
C Hajaj, JP Dickerson, A Hassidim, T Sandholm, D Sarne
In proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
Using CSF biomarkers to replicate genetic associations in Alzheimer's disease
JM Schott, ADNI Investigators
Neurobiology of Aging 33 (7), 1486. e9-1486. e15, 2012
A crowdsourcing framework for medical data sets
C Ye, J Coco, A Epishova, C Hajaj, H Bogardus, L Novak, J Denny, ...
AMIA Summits on Translational Science Proceedings 2018, 273, 2018
Search More, Disclose Less.
C Hajaj, N Hazon, D Sarne, A Elmalech
In proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013
Improving comparison shopping agents’ competence through selective price disclosure
C Hajaj, N Hazon, D Sarne
Electronic Commerce Research and Applications 14 (6), 563–581, 2015
MalDIST: From encrypted traffic classification to malware traffic detection and classification
O Bader, A Lichy, C Hajaj, R Dubin, A Dvir
2022 IEEE 19th annual consumer communications & networking conference (CCNC …, 2022
Enhancing comparison shopping agents through ordering and gradual information disclosure
C Hajaj, N Hazon, D Sarne
Autonomous Agents and Multi-Agent Systems 31 (3), 696–714, 2017
Less is more: Robust and novel features for malicious domain detection
C Hajaj, N Hason, A Dvir
Electronics 11 (6), 969, 2022
Strategic information platforms: selective disclosure and the price of free
C Hajaj, D Sarne
Proceedings of the Fifteenth ACM conference on Economics and Computation …, 2014
Ordering Effects and Belief Adjustment in the Use of Comparison Shopping Agents
C Hajaj, N Hazon, D Sarne
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence …, 2014
When a RF beats a CNN and GRU, together—A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification
A Lichy, O Bader, R Dubin, A Dvir, C Hajaj
Computers & Security 124, 103000, 2023
Encrypted video traffic clustering demystified
A Dvir, AK Marnerides, R Dubin, N Golan, C Hajaj
Computers & Security 96, 101917, 2020
Evasion is not enough: A case study of android malware
H Berger, C Hajaj, A Dvir
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
Extending workers' attention span through dummy events
A Elmalech, D Sarne, E David, C Hajaj
Proceedings of the AAAI Conference on Human Computation and Crowdsourcing 4 …, 2016
Hybrid Speech and Text Analysis Methods for Speaker Change Detection
OH Anidjar, I Lapidot, C Hajaj, A Dvir, I Gilad
IEEE/ACM Transactions on Audio, Speech, and Language Processing 29, 2324-2338, 2021
The hidden conversion funnel of mobile vs. desktop consumers
A Goldstein, C Hajaj
Electronic Commerce Research and Applications 53, 101135, 2022
Robust malicious domain detection
N Hason, A Dvir, C Hajaj
Cyber Security Cryptography and Machine Learning: Fourth International …, 2020
Simcse for encrypted traffic detection and zero-day attack detection
R Bar, C Hajaj
IEEE Access 10, 56952-56960, 2022
Prediction model for the spread of the COVID-19 outbreak in the global environment
RS Hirschprung, C Hajaj
Heliyon 7 (7), 2021
The system can't perform the operation now. Try again later.
Articles 1–20