Follow
Roei Schuster
Roei Schuster
Wild Moose
Verified email at wildmoose.ai - Homepage
Title
Cited by
Cited by
Year
Transformer feed-forward layers are key-value memories
M Geva, R Schuster, J Berant, O Levy
Proceedings of the 2021 Conference on Empirical Methods in Natural Language …, 2021
2772021
Beauty and the burst: Remote identification of encrypted video streams
R Schuster, V Shmatikov, E Tromer
26th USENIX Security Symposium (USENIX Security 17), 1357-1374, 2017
2032017
The limitations of stylometry for detecting machine-generated fake news
T Schuster, R Schuster, DJ Shah, R Barzilay
Computational Linguistics 46 (2), 499-510, 2020
128*2020
You autocomplete me: Poisoning vulnerabilities in neural code completion
R Schuster, C Song, E Tromer, V Shmatikov
30th USENIX Security Symposium (USENIX Security 21), 1559-1575, 2021
1142021
When the curious abandon honesty: Federated learning is not private
F Boenisch, A Dziedzic, R Schuster, AS Shamsabadi, I Shumailov, ...
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 175-199, 2023
1092023
Situational access control in the internet of things
R Schuster, V Shmatikov, E Tromer
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
942018
Synesthesia: Detecting screen content via remote acoustic side channels
D Genkin, M Pattani, R Schuster, E Tromer
2019 IEEE Symposium on Security and Privacy (SP), 853-869, 2019
742019
Humpty dumpty: Controlling word meanings via corpus poisoning
R Schuster, T Schuster, Y Meri, V Shmatikov
2020 IEEE symposium on security and privacy (SP), 1295-1313, 2020
392020
Droiddisintegrator: Intra-application information flow control in android apps
E Tromer, R Schuster
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
232016
Understanding transformer memorization recall through idioms
A Haviv, I Cohen, J Gidron, R Schuster, Y Goldberg, M Geva
arXiv preprint arXiv:2210.03588, 2022
162022
Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning
J Prokos, N Fendley, M Green, R Schuster, E Tromer, TM Jois, Y Cao
USENIX Security '23, 2023
9*2023
Lend Me Your Ear: Passive Remote Physical Side Channels on {PCs}
D Genkin, N Nissan, R Schuster, E Tromer
31st USENIX Security Symposium (USENIX Security 22), 4437-4454, 2022
62022
Is Federated Learning a Practical PET Yet?
F Boenisch, A Dziedzic, R Schuster, AS Shamsabadi, I Shumailov, ...
arXiv preprint arXiv:2301.04017, 2023
5*2023
In Differential Privacy, There is Truth: on Vote-Histogram Leakage in Ensemble Private Learning
J Wang, R Schuster, I Shumailov, D Lie, N Papernot
Advances in Neural Information Processing Systems, 2022
5*2022
De-anonymizing text by fingerprinting language generation
Z Sun, R Schuster, V Shmatikov
Advances in Neural Information Processing Systems 33 (NeurIPS 2020), 2020
52020
Learned Systems Security
R Schuster, JP Zhou, T Eisenhofer, P Grubbs, N Papernot
arXiv preprint arXiv:2212.10318, 2022
22022
Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help
T Mendel, R Schuster, E Tromer, E Toch
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022
22022
The Adversarial Implications of Variable-Time Inference
D Biton, A Misra, E Levy, J Kotak, R Bitton, R Schuster, N Papernot, ...
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–18