Ofir Pele

ORCID: 0000-0003-2353-3785
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Advanced Image and Video Retrieval Techniques
  • Image Retrieval and Classification Techniques
  • Advanced Steganography and Watermarking Techniques
  • Image and Video Quality Assessment
  • Advanced Malware Detection Techniques
  • Machine Learning and Algorithms
  • Machine Learning and Data Classification
  • Domain Adaptation and Few-Shot Learning
  • Robotics and Sensor-Based Localization
  • Advanced Vision and Imaging
  • Face and Expression Recognition
  • Remote-Sensing Image Classification
  • Video Analysis and Summarization
  • Diabetes Management and Research
  • Advanced Data Compression Techniques
  • Gene expression and cancer classification
  • Video Surveillance and Tracking Methods
  • Computability, Logic, AI Algorithms
  • Video Coding and Compression Technologies
  • Color perception and design
  • Hate Speech and Cyberbullying Detection
  • Graph Theory and Algorithms
  • Image Processing Techniques and Applications

Ariel University
2016-2021

University of Pennsylvania
2013

Hebrew University of Jerusalem
2007-2011

We present a new algorithm for robust family of Earth Mover's Distances - EMDs with thresholded ground distances. The transforms the flow-network EMD so that number edges is reduced by an order magnitude. As result, we compute magnitude faster than original algorithm, which makes it possible to on large histograms and databases. In addition, show distances have many desirable properties. First, they correspond way humans perceive Second, are outlier noise quantization effects. Third,...

10.1109/iccv.2009.5459199 article EN 2009-09-01

Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active passive. In this paper, we consider the passive scenario where adversary does not interact actively with device, but he is able eavesdrop on network traffic device from side. Most Internet encrypted thus attacks challenging. Previous research has shown that information extracted multimedia streams. This includes video title classification non HTTP adaptive streams...

10.1109/tifs.2017.2730819 article EN IEEE Transactions on Information Forensics and Security 2017-07-21

This paper describes a method for robust real time pattern matching. We first introduce family of image distance measures, the "Image Hamming Distance Family". Members this are to occlusion, small geometrical transforms, light changes and non-rigid deformations. then present novel Bayesian framework sequential hypothesis testing on finite populations. Based framework, we design an optimal rejection/acceptance sampling algorithm. algorithm quickly determines whether two images similar with...

10.1109/tpami.2007.70794 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2008-06-20

Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active passive. In this paper, we consider the passive scenario where adversary does not interact actively with device, but he is able eavesdrop on network traffic device from side. Most internet encrypted thus attacks challenging. show that an external attacker identify operating system, browser application HTTP (HTTPS). To best our knowledge, first work shows this. We provide...

10.1109/ccnc.2017.8013420 article EN 2017-01-01

Abstract This study was designed to improve blood glucose level predictability and future hypoglycemic hyperglycemic event alerts through a novel patient‐specific supervised‐machine‐learning (SML) analysis of based on continuous‐glucose‐monitoring system (CGM) that needs no human intervention, minimises false‐positive alerts. The CGM data over 7 50 non‐consecutive days from 11 type‐1 diabetic patients aged 18 39 with mean HbA1C 7.5% ± 1.2% were analysed using four SML models. algorithm...

10.1002/dmrr.3348 article EN Diabetes/Metabolism Research and Reviews 2020-05-23

The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet Inspection (DPI). However, Google and certain content providers have started encrypt services. As a result, operators often encounter difficulties in shaping encrypted via DPI. This highlights the need for new classification methods enable smart shaping. These will effectively estimate quality...

10.48550/arxiv.1602.00489 preprint EN other-oa arXiv (Cornell University) 2016-01-01

The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet Inspection (DPI). However, Google and certain content providers have started encrypt services. As a result, operators often encounter difficulties in shaping encrypted via DPI. This highlights the need for new classification methods enable smart shaping. These will effectively estimate quality...

10.1109/dmiaf.2016.7574935 article EN 2016-07-01

We suggest a new color distance based on two observations. First, perceptual differences were designed to be used compare very similar colors. They do not capture human perception for medium and large well. Thresholding was proposed solve the problem differences, i.e. totally different colors are always same apart. show that thresholding alone cannot improve differences. alleviate this using basic terms. Second, when is edge detection, many small distances around just noticeable difference...

10.48550/arxiv.1211.5556 preprint EN other-oa arXiv (Cornell University) 2012-01-01

This study explored the relevancy of internet discourse among football fans and real-life stadium violence. Our hypothesis implies that there are positive correlations between violent utterances in fans’ social networks prior to games The sample included 6 clubs who participated Israeli Premier League 2015–2016 season. traffic was automatically collected into MySQL database. content includes various forms discursive interactions within susceptible predicting, provoking or expressing tension,...

10.1177/1012690217715298 article EN International Review for the Sociology of Sport 2017-06-22

The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet inspection (DPI).However, Google and certain content providers have started encrypt services.As a result, operators often encounter difficulties in shaping encrypted via DPI.This highlights the need for new classification methods enable smart shaping.These will effectively estimate quality...

10.3837/tiis.2018.08.014 article EN KSII Transactions on Internet and Information Systems 2018-08-31

Desktops and laptops can be maliciously exploited to violate privacy. In this paper, we consider the daily battle between passive attacker who is targeting a specific user against that may adversarial opponent. scenario, while tries choose best vector attack by surreptitiously monitoring victims encrypted network traffic in order identify users parameters such as Operating System (OS), browser apps. The use tools Virtual Private Network (VPN) or even change protocols protect his/her We...

10.48550/arxiv.1603.04865 preprint EN other-oa arXiv (Cornell University) 2016-01-01

We present a spectral-based method for the 2D/3D rigid registration of X-ray images to CT scan. The uses Fourier-based representation decompose six transformation parameters problem into twoparameter out-of-plane rotation and four-parameter in-plane problems. Preoperatively, set Digitally Reconstructed Radiographs (DRRs) are generated offline from in expected location ranges fluoroscopic imaging devices. Each DRR is transformed device invariant features space. Intraoperatively, few 2D...

10.1117/12.876365 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2011-02-11

We propose a new embedding method for single vector and pair of vectors. This enables: a) efficient classification regression functions vectors; b) approximation distance functions; c) non-Euclidean, semimetric learning. To the best our knowledge, this is first work that enables learning any general, semimetrics. That is, universal can approximate function with as high accuracy needed or without constraints. The project homepage including code at: http://www.ariel.ac.il/sites/ofirpele/ID

10.48550/arxiv.1608.02484 preprint EN other-oa arXiv (Cornell University) 2016-01-01

We propose a new embedding method which is particularly well-suited for settings where the sample size greatly exceeds ambient dimension. Our technique consists of partitioning space into simplices and then data points features corresponding to simplices' barycentric coordinates. train linear classifier in rich feature obtained from simplices. The decision boundary may be highly non-linear, though it within each simplex (and hence piecewise-linear overall). Further, our can approximate any...

10.48550/arxiv.2002.01999 preprint EN cc-by arXiv (Cornell University) 2020-01-01
Coming Soon ...