Transformer feed-forward layers are key-value memories M Geva, R Schuster, J Berant, O Levy Proceedings of the 2021 Conference on Empirical Methods in Natural Language …, 2021 | 416 | 2021 |
Beauty and the burst: Remote identification of encrypted video streams R Schuster, V Shmatikov, E Tromer 26th USENIX Security Symposium (USENIX Security 17), 1357-1374, 2017 | 213 | 2017 |
The limitations of stylometry for detecting machine-generated fake news T Schuster, R Schuster, DJ Shah, R Barzilay Computational Linguistics 46 (2), 499-510, 2020 | 145* | 2020 |
You autocomplete me: Poisoning vulnerabilities in neural code completion R Schuster, C Song, E Tromer, V Shmatikov 30th USENIX Security Symposium (USENIX Security 21), 1559-1575, 2021 | 137 | 2021 |
Situational access control in the internet of things R Schuster, V Shmatikov, E Tromer Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 104 | 2018 |
When the curious abandon honesty: Federated learning is not private F Boenisch, A Dziedzic, R Schuster, AS Shamsabadi, I Shumailov, ... 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 175-199, 2023 | 97 | 2023 |
Synesthesia: Detecting screen content via remote acoustic side channels D Genkin, M Pattani, R Schuster, E Tromer 2019 IEEE Symposium on Security and Privacy (SP), 853-869, 2019 | 80 | 2019 |
Humpty dumpty: Controlling word meanings via corpus poisoning R Schuster, T Schuster, Y Meri, V Shmatikov 2020 IEEE symposium on security and privacy (SP), 1295-1313, 2020 | 41 | 2020 |
Droiddisintegrator: Intra-application information flow control in android apps E Tromer, R Schuster Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 25 | 2016 |
Understanding transformer memorization recall through idioms A Haviv, I Cohen, J Gidron, R Schuster, Y Goldberg, M Geva arXiv preprint arXiv:2210.03588, 2022 | 24 | 2022 |
Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning J Prokos, N Fendley, M Green, R Schuster, E Tromer, TM Jois, Y Cao USENIX Security '23, 2023 | 16* | 2023 |
Is Federated Learning a Practical PET Yet? F Boenisch, A Dziedzic, R Schuster, AS Shamsabadi, I Shumailov, ... CISPA, 2023 | 10* | 2023 |
Lend Me Your Ear: Passive Remote Physical Side Channels on {PCs} D Genkin, N Nissan, R Schuster, E Tromer 31st USENIX Security Symposium (USENIX Security 22), 4437-4454, 2022 | 10 | 2022 |
In Differential Privacy, There is Truth: on Vote-Histogram Leakage in Ensemble Private Learning J Wang, R Schuster, I Shumailov, D Lie, N Papernot Advances in Neural Information Processing Systems, 2022 | 5 | 2022 |
De-anonymizing text by fingerprinting language generation Z Sun, R Schuster, V Shmatikov Advances in Neural Information Processing Systems 33 (NeurIPS 2020), 2020 | 5 | 2020 |
Learned systems security R Schuster, JP Zhou, T Eisenhofer, P Grubbs, N Papernot arXiv preprint arXiv:2212.10318, 2022 | 3 | 2022 |
Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help T Mendel, R Schuster, E Tromer, E Toch Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022 | 3 | 2022 |
Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents A Shafran, R Schuster, V Shmatikov arXiv preprint arXiv:2406.05870, 2024 | 1 | 2024 |
The Adversarial Implications of Variable-Time Inference D Biton, A Misra, E Levy, J Kotak, R Bitton, R Schuster, N Papernot, ... Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security …, 2023 | | 2023 |