Follow
Roei Schuster
Roei Schuster
Vector Institute
Verified email at vectorinstitute.ai - Homepage
Title
Cited by
Cited by
Year
Beauty and the burst: Remote identification of encrypted video streams
R Schuster, V Shmatikov, E Tromer
26th USENIX Security Symposium (USENIX Security 17), 1357-1374, 2017
1332017
Situational access control in the internet of things
R Schuster, V Shmatikov, E Tromer
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
672018
The limitations of stylometry for detecting machine-generated fake news
T Schuster, R Schuster, DJ Shah, R Barzilay
Computational Linguistics 46 (2), 499-510, 2020
65*2020
Synesthesia: Detecting screen content via remote acoustic side channels
D Genkin, M Pattani, R Schuster, E Tromer
2019 IEEE Symposium on Security and Privacy (SP), 853-869, 2019
572019
You autocomplete me: Poisoning vulnerabilities in neural code completion
R Schuster, C Song, E Tromer, V Shmatikov
30th USENIX Security Symposium (USENIX Security 21), 1559-1575, 2021
332021
Transformer feed-forward layers are key-value memories
M Geva, R Schuster, J Berant, O Levy
Proceedings of the 2021 Conference on Empirical Methods in Natural Language …, 2021
292021
Humpty dumpty: Controlling word meanings via corpus poisoning
R Schuster, T Schuster, Y Meri, V Shmatikov
2020 IEEE symposium on security and privacy (SP), 1295-1313, 2020
232020
Droiddisintegrator: Intra-application information flow control in android apps
E Tromer, R Schuster
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
222016
When the curious abandon honesty: Federated learning is not private
F Boenisch, A Dziedzic, R Schuster, AS Shamsabadi, I Shumailov, ...
arXiv preprint arXiv:2112.02918, 2021
32021
De-anonymizing text by fingerprinting language generation
Z Sun, R Schuster, V Shmatikov
Advances in Neural Information Processing Systems 33 (NeurIPS 2020), 2020
32020
Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help
T Mendel, R Schuster, E Tromer, E Toch
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022
2022
Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning
J Prokos, TM Jois, N Fendley, R Schuster, M Green, E Tromer, Y Cao
Cryptology ePrint Archive, 2021
2021
Lend Me Your Ear: Passive Remote Physical Side Channels on PCs
D Genkin, N Nissan, R Schuster, E Tromer
31st USENIX Security Symposium (USENIX Security 22), 0
The system can't perform the operation now. Try again later.
Articles 1–13