Follow
Chen Hajaj
Title
Cited by
Cited by
Year
Improving robustness of ML classifiers against realizable evasion attacks using conserved features
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
28th USENIX Security Symposium (USENIX Security 19), 285-302, 2019
71*2019
Strategy-Proof and Efficient Kidney Exchange Using a Credit Mechanism
C Hajaj, JP Dickerson, A Hassidim, T Sandholm, D Sarne
In proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
562015
Using CSF biomarkers to replicate genetic associations in Alzheimer's disease
JM Schott, ADNI Investigators
Neurobiology of Aging 33 (7), 1486. e9-1486. e15, 2012
272012
Search More, Disclose Less.
C Hajaj, N Hazon, D Sarne, A Elmalech
In proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013
242013
A crowdsourcing framework for medical data sets
C Ye, J Coco, A Epishova, C Hajaj, H Bogardus, L Novak, J Denny, ...
AMIA Summits on Translational Science Proceedings 2018, 273, 2018
202018
Improving comparison shopping agents’ competence through selective price disclosure
C Hajaj, N Hazon, D Sarne
Electronic Commerce Research and Applications 14 (6), 563–581, 2015
192015
Enhancing comparison shopping agents through ordering and gradual information disclosure
C Hajaj, N Hazon, D Sarne
Autonomous Agents and Multi-Agent Systems 31 (3), 696–714, 2017
172017
Strategic information platforms: selective disclosure and the price of free
C Hajaj, D Sarne
Proceedings of the Fifteenth ACM conference on Economics and Computation …, 2014
162014
Ordering Effects and Belief Adjustment in the Use of Comparison Shopping Agents
C Hajaj, N Hazon, D Sarne
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence …, 2014
162014
Extending workers' attention span through dummy events
A Elmalech, D Sarne, E David, C Hajaj
Proceedings of the AAAI Conference on Human Computation and Crowdsourcing 4 …, 2016
132016
Evasion is not enough: A case study of android malware
H Berger, C Hajaj, A Dvir
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
92020
Less is more: Robust and novel features for malicious domain detection
C Hajaj, N Hason, A Dvir
Electronics 11 (6), 969, 2022
72022
Encrypted video traffic clustering demystified
A Dvir, AK Marnerides, R Dubin, N Golan, C Hajaj
Computers & Security 96, 101917, 2020
72020
Adversarial coordination on social networks
C Hajaj, S Yu, Z Joveski, Y Vorobeychik
Proceedings of the 18th International Conference on Autonomous Agents and …, 2019
62019
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets
S Ceppi, E David, C Hajaj, V Robu, IA Vetsikas
Springer, 2017
6*2017
Robust malicious domain detection
N Hason, A Dvir, C Hajaj
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
52020
Selective opportunity disclosure at the service of strategic information platforms
C Hajaj, D Sarne
Autonomous Agents and Multi-Agent Systems 31 (5), 1133-1164, 2017
52017
Crystal ball: From innovative attacks to attack effectiveness classifier
H Berger, C Hajaj, E Mariconti, A Dvir
IEEE Access 10, 1317-1333, 2021
42021
When the guard failed the droid: A case study of android malware
H Berger, C Hajaj, A Dvir
arXiv preprint arXiv:2003.14123, 2020
42020
MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification
O Bader, A Lichy, C Hajaj, R Dubin, A Dvir
2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC …, 2022
32022
The system can't perform the operation now. Try again later.
Articles 1–20