The Curse of Recursion: Training on Generated Data Makes Models Forget I Shumailov, Z Shumaylov, Y Zhao, Y Gal, N Papernot, R Anderson https://arxiv.org/abs/2305.17493, 2023 | 214* | 2023 |
Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context M Reid, N Savinov, D Teplyashin, D Lepikhin, T Lillicrap, J Alayrac, ... arXiv preprint arXiv:2403.05530, 2024 | 188 | 2024 |
When the curious abandon honesty: Federated learning is not private F Boenisch, A Dziedzic, R Schuster, AS Shamsabadi, I Shumailov, ... 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 175-199, 2023 | 160* | 2023 |
Bad characters: Imperceptible NLP attacks N Boucher, I Shumailov, R Anderson, N Papernot 2022 IEEE Symposium on Security and Privacy (SP), 1987-2004, 2022 | 119 | 2022 |
Sponge Examples: Energy-Latency Attacks on Neural Networks I Shumailov, Y Zhao, D Bates, N Papernot, R Mullins, R Anderson 6th IEEE European Symposium on Security and Privacy (EuroS&P 2021), 2020 | 113 | 2020 |
On the necessity of auditable algorithmic definitions for machine unlearning A Thudi, H Jia, I Shumailov, N Papernot 31st USENIX Security Symposium (USENIX Security 22), 4007-4022, 2022 | 103 | 2022 |
Manipulating SGD with data ordering attacks I Shumailov, Z Shumaylov, D Kazhdan, Y Zhao, N Papernot, MA Erdogdu, ... 35th Conference on Neural Information Processing Systems (NeurIPS), 2021 | 75 | 2021 |
Hearing your touch: A new acoustic side channel on smartphones I Shumailov, L Simon, J Yan, R Anderson arXiv preprint arXiv:1903.11137, 2019 | 61 | 2019 |
Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras AV Vu, J Hughes, I Pete, B Collier, YT Chua, I Shumailov, A Hutchings ACM Internet Measurement Conference (IMC 2020), 551-566, 2020 | 57 | 2020 |
To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression Y Zhao, I Shumailov, R Mullins, R Anderson Conference on Machine Learning and Systems (SysML 2018), 2018 | 49 | 2018 |
Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains R Bhalerao, M Aliapoulios, I Shumailov, S Afroz, D McCoy Symposium on Electronic Crime Research (eCrime 2019), 2019 | 47* | 2019 |
Making bitcoin legal R Anderson, I Shumailov, M Ahmed Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March …, 2018 | 43* | 2018 |
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information Y Zhao, I Shumailov, H Cui, X Gao, R Mullins, R Anderson Dependable and Secure Machine Learning (DSML 2020), 2019 | 37 | 2019 |
LLM Censorship: The Problem and its Limitations D Glukhov, I Shumailov, Y Gal, N Papernot, V Papyan | 32* | |
Bitcoin Redux R Anderson, I Shumailov, M Ahmed, A Rietmann Workshop on the Economics of Information Security (WEIS 2018), 2018 | 30 | 2018 |
Tendrils of crime: Visualizing the diffusion of stolen bitcoins M Ahmed, I Shumailov, R Anderson Graphical Models for Security: 5th International Workshop, GraMSec 2018 …, 2019 | 29 | 2019 |
Not my deepfake: Towards plausible deniability for machine-generated media B Zhang, JP Zhou, I Shumailov, N Papernot arXiv preprint arXiv:2008.09194, 2020 | 24* | 2020 |
On the Limitations of Stochastic Pre-processing Defenses Y Gao, I Shumailov, K Fawaz, N Papernot 36th Conference on Neural Information Processing Systems (NeurIPS), 2022 | 23 | 2022 |
Towards More Robust Keyword Spotting for Voice Assistants S Ahmed, I Shumailov, N Papernot, K Fawaz 31st USENIX Security Symposium (USENIX Security 22), 2022 | 22 | 2022 |
Computational analysis of valence and arousal in virtual reality gaming using lower arm electromyograms I Shumailov, H Gunes 2017 Seventh International Conference on Affective Computing and Intelligent …, 2017 | 21 | 2017 |