Picture for Roei Schuster

Roei Schuster

Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents

Add code
Jun 09, 2024
Viaarxiv icon

The Adversarial Implications of Variable-Time Inference

Add code
Sep 05, 2023
Figure 1 for The Adversarial Implications of Variable-Time Inference
Figure 2 for The Adversarial Implications of Variable-Time Inference
Figure 3 for The Adversarial Implications of Variable-Time Inference
Figure 4 for The Adversarial Implications of Variable-Time Inference
Viaarxiv icon

Learned Systems Security

Add code
Jan 10, 2023
Figure 1 for Learned Systems Security
Figure 2 for Learned Systems Security
Figure 3 for Learned Systems Security
Figure 4 for Learned Systems Security
Viaarxiv icon

Is Federated Learning a Practical PET Yet?

Add code
Jan 09, 2023
Figure 1 for Is Federated Learning a Practical PET Yet?
Figure 2 for Is Federated Learning a Practical PET Yet?
Figure 3 for Is Federated Learning a Practical PET Yet?
Figure 4 for Is Federated Learning a Practical PET Yet?
Viaarxiv icon

Understanding Transformer Memorization Recall Through Idioms

Add code
Oct 11, 2022
Figure 1 for Understanding Transformer Memorization Recall Through Idioms
Figure 2 for Understanding Transformer Memorization Recall Through Idioms
Figure 3 for Understanding Transformer Memorization Recall Through Idioms
Figure 4 for Understanding Transformer Memorization Recall Through Idioms
Viaarxiv icon

In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning

Add code
Sep 22, 2022
Figure 1 for In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning
Figure 2 for In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning
Figure 3 for In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning
Figure 4 for In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning
Viaarxiv icon

When the Curious Abandon Honesty: Federated Learning Is Not Private

Add code
Dec 06, 2021
Figure 1 for When the Curious Abandon Honesty: Federated Learning Is Not Private
Figure 2 for When the Curious Abandon Honesty: Federated Learning Is Not Private
Figure 3 for When the Curious Abandon Honesty: Federated Learning Is Not Private
Figure 4 for When the Curious Abandon Honesty: Federated Learning Is Not Private
Viaarxiv icon

Transformer Feed-Forward Layers Are Key-Value Memories

Add code
Dec 29, 2020
Figure 1 for Transformer Feed-Forward Layers Are Key-Value Memories
Figure 2 for Transformer Feed-Forward Layers Are Key-Value Memories
Figure 3 for Transformer Feed-Forward Layers Are Key-Value Memories
Figure 4 for Transformer Feed-Forward Layers Are Key-Value Memories
Viaarxiv icon

You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion

Add code
Jul 07, 2020
Figure 1 for You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
Figure 2 for You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
Figure 3 for You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
Figure 4 for You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
Viaarxiv icon

De-Anonymizing Text by Fingerprinting Language Generation

Add code
Jun 17, 2020
Figure 1 for De-Anonymizing Text by Fingerprinting Language Generation
Figure 2 for De-Anonymizing Text by Fingerprinting Language Generation
Figure 3 for De-Anonymizing Text by Fingerprinting Language Generation
Figure 4 for De-Anonymizing Text by Fingerprinting Language Generation
Viaarxiv icon