Ilia Shumailov
Orcid: 0000-0003-3100-0727
According to our database1,
Ilia Shumailov
authored at least 77 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Nat., October, 2024
Trans. Mach. Learn. Res., 2024
Machine Unlearning Doesn't Do What You Think: Lessons for Generative AI Policy, Research, and Practice.
CoRR, 2024
CoRR, 2024
UnUnlearning: Unlearning is not sufficient for content regulation in advanced generative AI.
CoRR, 2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks.
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency, 2024
2023
CoRR, 2023
CoRR, 2023
Machine Learning needs its own Randomness Standard: Randomised Smoothing and PRNG-based attacks.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2023
2022
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks.
CoRR, 2022
In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
In Differential Privacy, There is Truth: on Vote-Histogram Leakage in Ensemble Private Learning.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems.
Proceedings of the International Conference on Machine Learning, 2022
2021
ExtremeBB: Enabling Large-Scale Research into Extremism, the Manosphere and Their Correlation by Online Forum Data.
CoRR, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
CoRR, 2020
CoRR, 2020
Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020
2019
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
Audio CAPTCHA with a Few Cocktails: It's So Noisy I Can't Hear You (Transcript of Discussion).
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the Security Protocols XXVII, 2019
Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion).
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the Security Protocols XXVII, 2019
To Compress Or Not To Compress: Understanding The Interactions Between Adversarial Attacks And Neural Network Compression.
Proceedings of the Second Conference on Machine Learning and Systems, SysML 2019, 2019
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019
2018
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018
2017
Computational analysis of valence and arousal in virtual reality gaming using lower arm electromyograms.
Proceedings of the Seventh International Conference on Affective Computing and Intelligent Interaction, 2017