Roei Schuster

Orcid: 0000-0003-1669-6367

According to our database1, Roei Schuster authored at least 23 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Is Federated Learning a Practical PET Yet?
CoRR, 2023

Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

When the Curious Abandon Honesty: Federated Learning Is Not Private.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Understanding Transformer Memorization Recall Through Idioms.
Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, 2023

The Adversarial Implications of Variable-Time Inference.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Learned Systems Security.
CoRR, 2022

In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning.
CoRR, 2022

Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.
Proceedings of the 31st USENIX Security Symposium, 2022

In Differential Privacy, There is Truth: on Vote-Histogram Leakage in Ensemble Private Learning.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

2021
Data-Oriented Systems Security
PhD thesis, 2021

Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning.
IACR Cryptol. ePrint Arch., 2021

You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion.
Proceedings of the 30th USENIX Security Symposium, 2021

Transformer Feed-Forward Layers Are Key-Value Memories.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

2020
The Limitations of Stylometry for Detecting Machine-Generated Fake News.
Comput. Linguistics, 2020

Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

De-Anonymizing Text by Fingerprinting Language Generation.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

2019
Are We Safe Yet? The Limitations of Distributional Features for Fake News Detection.
CoRR, 2019

Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Situational Access Control in the Internet of Things.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Beauty and the Burst: Remote Identification of Encrypted Video Streams.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
DroidDisintegrator: Intra-Application Information Flow Control in Android Apps.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016


  Loading...