Personal profile
Research interests
AI Safety, AI Security, Offensive AI, Adversarial Machine Learning, Cyber Security
- Offensive AI Research Lab: https://offensive-ai-lab.github.io/
- Personal Site: https://ymirsky.github.io/
Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
The Security of Deep Learning Defenses in Medical Imaging
Levy, M., Amit, G. & Mirsky, Y., 1 Jan 2026, Cybersecurity in Healthcare - First Annual HealthSec 2024, Proceedings. Yurcik, W. (ed.). Springer Science and Business Media Deutschland GmbH, p. 86-110 25 p. (Communications in Computer and Information Science; vol. 2716 CCIS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Back-in-Time Diffusion: Unsupervised Detection of Medical Deepfakes
Grabovski, F. M., Yasur, L., Amit, G. & Mirsky, Y., 17 Oct 2025, In: ACM Transactions on Intelligent Systems and Technology. 16, 6, 123.Research output: Contribution to journal › Article › peer-review
1 Scopus citations -
Cloak, Honey, Trap: Proactive Defenses Against LLM Agents
Ayzenshteyn, D., Weiss, R. & Mirsky, Y., 1 Jan 2025, Proceedings of the 34th USENIX Security Symposium. USENIX Association, p. 8095-8114 20 p. (Proceedings of the 34th USENIX Security Symposium).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
1 Scopus citations -
Counter-Samples: A Stateless Strategy to Neutralize Black-Box Adversarial Attacks
Bokobza, R. & Mirsky, Y., 18 Aug 2025, In: ACM Transactions on Intelligent Systems and Technology. 16, 4, 94.Research output: Contribution to journal › Article › peer-review
-
PEAS: A Strategy for Crafting Transferable Adversarial Examples
Avraham, B. & Mirsky, Y., 17 Oct 2025, In: ACM Transactions on Intelligent Systems and Technology. 16, 6, 130.Research output: Contribution to journal › Article › peer-review
Open Access -
ProxyPrints: From Database Breach to Spoof, A Plug-and-Play Defense for Biometric Systems
Hacmon, Y., Gorelik, K., Gressel, G. & Mirsky, Y., 1 Jan 2025, Proceedings - 2025 Annual Computer Security Applications Conference, ACSAC 2025. Association for Computing Machinery, p. 322-336 15 p. (Proceedings - Annual Computer Security Applications Conference, ACSAC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
The Threat of Deepfake Fingerprints
Hacmon, Y., Gorelik, K. & Mirsky, Y., 25 Aug 2025, ACM WDC 2025 - Proceedings of the 4th Workshop on the security implications of Deepfakes and Cheapfakes. Association for Computing Machinery, Inc, p. 1-8 8 p. (ACM WDC 2025 - Proceedings of the 4th Workshop on the security implications of Deepfakes and Cheapfakes).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Toward Robust Clinical AI in Clinical Imaging
Del Corso, G., Colantonio, S., Mirsky, Y., Fotopoulos, D. & Papanikolaou, N., 1 Jan 2025, Trustworthy AI in Cancer Imaging Research. Springer Science+Business Media, p. 195-217 23 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › peer-review
-
Discussion Paper: Exploiting LLMs for Scam Automation: A Looming Threat
Gressel, G., Pankajakshan, R. & Mirsky, Y., 1 Jul 2024, ACM WDC 2024 - Proceedings of the 3rd ACM Workshop on Security Implications of Deepfakes and Cheapfakes. Association for Computing Machinery, Inc, p. 20-24 5 p. (ACM WDC 2024 - Proceedings of the 3rd ACM Workshop on Security Implications of Deepfakes and Cheapfakes).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access17 Scopus citations -
Efficient Model Extraction via Boundary Sampling
Biton Dor, M. & Mirsky, Y., 22 Nov 2024, AISec 2024 - Proceedings of the 2024 Workshop on Artificial Intelligence and Security, Co-Located with: CCS 2024. Association for Computing Machinery, Inc, p. 1-11 11 p. (AISec 2024 - Proceedings of the 2024 Workshop on Artificial Intelligence and Security, Co-Located with: CCS 2024).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access1 Scopus citations
Thesis
-
Online Anomaly Detection Algorithms for Securing the Internet of Things
Mirsky, Y. (Author), Elovici, Y. (Supervisor) & Shapira, B. (Supervisor), 2018Student thesis: Doctoral Thesis