Seguir
Roei Schuster
Roei Schuster
Wild Moose
Dirección de correo verificada de wildmoose.ai - Página principal
Título
Citado por
Citado por
Año
Transformer feed-forward layers are key-value memories
M Geva, R Schuster, J Berant, O Levy
Proceedings of the 2021 Conference on Empirical Methods in Natural Language …, 2021
3422021
Beauty and the burst: Remote identification of encrypted video streams
R Schuster, V Shmatikov, E Tromer
26th USENIX Security Symposium (USENIX Security 17), 1357-1374, 2017
2062017
The limitations of stylometry for detecting machine-generated fake news
T Schuster, R Schuster, DJ Shah, R Barzilay
Computational Linguistics 46 (2), 499-510, 2020
132*2020
You autocomplete me: Poisoning vulnerabilities in neural code completion
R Schuster, C Song, E Tromer, V Shmatikov
30th USENIX Security Symposium (USENIX Security 21), 1559-1575, 2021
1172021
Situational access control in the internet of things
R Schuster, V Shmatikov, E Tromer
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1002018
Synesthesia: Detecting screen content via remote acoustic side channels
D Genkin, M Pattani, R Schuster, E Tromer
2019 IEEE Symposium on Security and Privacy (SP), 853-869, 2019
792019
When the curious abandon honesty: Federated learning is not private
F Boenisch, A Dziedzic, R Schuster, AS Shamsabadi, I Shumailov, ...
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 175-199, 2023
752023
Humpty dumpty: Controlling word meanings via corpus poisoning
R Schuster, T Schuster, Y Meri, V Shmatikov
2020 IEEE symposium on security and privacy (SP), 1295-1313, 2020
392020
Droiddisintegrator: Intra-application information flow control in android apps
E Tromer, R Schuster
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
232016
Understanding transformer memorization recall through idioms
A Haviv, I Cohen, J Gidron, R Schuster, Y Goldberg, M Geva
arXiv preprint arXiv:2210.03588, 2022
192022
Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning
J Prokos, N Fendley, M Green, R Schuster, E Tromer, TM Jois, Y Cao
USENIX Security '23, 2023
15*2023
Is Federated Learning a Practical PET Yet?”
F Boenisch, A Dziedzic, R Schuster, AS Shamsabadi, I Shumailov, ...
CoRR, 2023
8*2023
Lend Me Your Ear: Passive Remote Physical Side Channels on {PCs}
D Genkin, N Nissan, R Schuster, E Tromer
31st USENIX Security Symposium (USENIX Security 22), 4437-4454, 2022
82022
In Differential Privacy, There is Truth: on Vote-Histogram Leakage in Ensemble Private Learning
J Wang, R Schuster, I Shumailov, D Lie, N Papernot
Advances in Neural Information Processing Systems, 2022
5*2022
De-anonymizing text by fingerprinting language generation
Z Sun, R Schuster, V Shmatikov
Advances in Neural Information Processing Systems 33 (NeurIPS 2020), 2020
52020
Learned Systems Security
R Schuster, JP Zhou, T Eisenhofer, P Grubbs, N Papernot
arXiv preprint arXiv:2212.10318, 2022
32022
Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help
T Mendel, R Schuster, E Tromer, E Toch
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022
22022
The Adversarial Implications of Variable-Time Inference
D Biton, A Misra, E Levy, J Kotak, R Bitton, R Schuster, N Papernot, ...
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security …, 2023
2023
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–18