Roei Schuster
Roei Schuster
Vector Institute
Verified email at - Homepage
Cited by
Cited by
Beauty and the Burst: Remote Identification of Encrypted Video Streams.
R Schuster, V Shmatikov, E Tromer
USENIX Security Symposium, 1357-1374, 2017
The limitations of stylometry for detecting machine-generated fake news
T Schuster, R Schuster, DJ Shah, R Barzilay
Computational Linguistics 46 (2), 499-510, 2020
Situational access control in the internet of things
R Schuster, V Shmatikov, E Tromer
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Transformer feed-forward layers are key-value memories
M Geva, R Schuster, J Berant, O Levy
Proceedings of the 2021 Conference on Empirical Methods in Natural Language …, 2021
Synesthesia: Detecting screen content via remote acoustic side channels
D Genkin, M Pattani, R Schuster, E Tromer
2019 IEEE Symposium on Security and Privacy (SP), 853-869, 2019
You autocomplete me: Poisoning vulnerabilities in neural code completion
R Schuster, C Song
USENIX Security, 2021
Humpty dumpty: Controlling word meanings via corpus poisoning
R Schuster, T Schuster, Y Meri, V Shmatikov
2020 IEEE symposium on security and privacy (SP), 1295-1313, 2020
Droiddisintegrator: Intra-application information flow control in android apps
E Tromer, R Schuster
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
When the curious abandon honesty: Federated learning is not private
F Boenisch, A Dziedzic, R Schuster, AS Shamsabadi, I Shumailov, ...
arXiv preprint arXiv:2112.02918, 2021
Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning
J Prokos, N Fendley, M Green, R Schuster, E Tromer, TM Jois, Y Cao
USENIX Security '23, 2023
De-anonymizing text by fingerprinting language generation
Z Sun, R Schuster, V Shmatikov
Advances in Neural Information Processing Systems 33 (NeurIPS 2020), 2020
Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help
T Mendel, R Schuster, E Tromer, E Toch
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022
In Differential Privacy, There is Truth: on Vote-Histogram Leakage in Ensemble Private Learning
J Wang, R Schuster, I Shumailov, D Lie, N Papernot
Advances in Neural Information Processing Systems, 2022
Is Federated Learning a Practical PET Yet?
F Boenisch, A Dziedzic, R Schuster, AS Shamsabadi, I Shumailov, ...
arXiv preprint arXiv:2301.04017, 2023
Learned Systems Security
R Schuster, JP Zhou, P Grubbs, T Eisenhofer, N Papernot
arXiv preprint arXiv:2212.10318, 2022
Understanding Transformer Memorization Recall Through Idioms
A Haviv, I Cohen, J Gidron, R Schuster, Y Goldberg, M Geva
arXiv preprint arXiv:2210.03588, 2022
Lend Me Your Ear: Passive Remote Physical Side Channels on {PCs}
D Genkin, N Nissan, R Schuster, E Tromer
31st USENIX Security Symposium (USENIX Security 22), 4437-4454, 2022
The system can't perform the operation now. Try again later.
Articles 1–17