Spremljaj
Roei Schuster
Roei Schuster
Wild Moose
Preverjeni e-poštni naslov na wildmoose.ai - Domača stran
Naslov
Navedeno
Navedeno
Leto
Transformer feed-forward layers are key-value memories
M Geva, R Schuster, J Berant, O Levy
Proceedings of the 2021 Conference on Empirical Methods in Natural Language …, 2021
7352021
Beauty and the burst: Remote identification of encrypted video streams
R Schuster, V Shmatikov, E Tromer
26th USENIX Security Symposium (USENIX Security 17), 1357-1374, 2017
2372017
When the curious abandon honesty: Federated learning is not private
F Boenisch, A Dziedzic, R Schuster, AS Shamsabadi, I Shumailov, ...
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 175-199, 2023
2232023
You autocomplete me: Poisoning vulnerabilities in neural code completion
R Schuster, C Song, E Tromer, V Shmatikov
30th USENIX Security Symposium (USENIX Security 21), 1559-1575, 2021
1902021
The limitations of stylometry for detecting machine-generated fake news
T Schuster, R Schuster, DJ Shah, R Barzilay
Computational Linguistics 46 (2), 499-510, 2020
177*2020
Situational access control in the internet of things
R Schuster, V Shmatikov, E Tromer
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1152018
Synesthesia: Detecting screen content via remote acoustic side channels
D Genkin, M Pattani, R Schuster, E Tromer
2019 IEEE Symposium on Security and Privacy (SP), 853-869, 2019
822019
Humpty dumpty: Controlling word meanings via corpus poisoning
R Schuster, T Schuster, Y Meri, V Shmatikov
2020 IEEE symposium on security and privacy (SP), 1295-1313, 2020
472020
Understanding transformer memorization recall through idioms
A Haviv, I Cohen, J Gidron, R Schuster, Y Goldberg, M Geva
arXiv preprint arXiv:2210.03588, 2022
372022
Is federated learning a practical pet yet?
F Boenisch, A Dziedzic, R Schuster, AS Shamsabadi, I Shumailov, ...
CISPA, 2023
27*2023
Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning
J Prokos, N Fendley, M Green, R Schuster, E Tromer, TM Jois, Y Cao
USENIX Security '23, 2023
26*2023
Droiddisintegrator: Intra-application information flow control in android apps
E Tromer, R Schuster
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
262016
Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents
A Shafran, R Schuster, V Shmatikov
arXiv preprint arXiv:2406.05870, 2024
172024
Lend me your ear: Passive remote physical side channels on {PCs}
D Genkin, N Nissan, R Schuster, E Tromer
31st USENIX Security Symposium (USENIX Security 22), 4437-4454, 2022
15*2022
Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help
T Mendel, R Schuster, E Tromer, E Toch
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022
7*2022
De-anonymizing text by fingerprinting language generation
Z Sun, R Schuster, V Shmatikov
Advances in Neural Information Processing Systems 33 (NeurIPS 2020), 2020
72020
In Differential Privacy, There is Truth: on Vote-Histogram Leakage in Ensemble Private Learning
J Wang, R Schuster, I Shumailov, D Lie, N Papernot
Advances in Neural Information Processing Systems, 2022
62022
Learned systems security
R Schuster, JP Zhou, T Eisenhofer, P Grubbs, N Papernot
arXiv preprint arXiv:2212.10318, 2022
32022
The adversarial implications of variable-time inference
D Biton, A Misra, E Levy, J Kotak, R Bitton, R Schuster, N Papernot, ...
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security …, 2023
12023
Rerouting LLM Routers
A Shafran, R Schuster, T Ristenpart, V Shmatikov
arXiv preprint arXiv:2501.01818, 2025
2025
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20