Подписаться
Emily Wenger
Emily Wenger
Подтвержден адрес электронной почты в домене uchicago.edu - Главная страница
Название
Процитировано
Процитировано
Год
Fawkes: Protecting privacy against unauthorized deep learning models
S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao
29th USENIX security symposium (USENIX Security 20), 1589-1604, 2020
2672020
Backdoor attacks against deep learning systems in the physical world
E Wenger, J Passananti, AN Bhagoji, Y Yao, H Zheng, BY Zhao
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
177*2021
Gotta catch'em all: Using honeypots to catch adversarial attacks on neural networks
S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
902020
Glaze: Protecting Artists from Style Mimicry by {Text-to-Image} Models
S Shan, J Cryan, E Wenger, H Zheng, R Hanocka, BY Zhao
32nd USENIX Security Symposium (USENIX Security 23), 2187-2204, 2023
812023
Blacklight: Defending black-box adversarial attacks on deep neural networks
H Li, S Shan, E Wenger, J Zhang, H Zheng, BY Zhao
arXiv preprint arXiv:2006.14042 3, 2020
81*2020
Piracy resistant watermarks for deep neural networks
H Li, E Wenger, S Shan, BY Zhao, H Zheng
arXiv preprint arXiv:1910.01226, 2019
69*2019
“Hello, It’s Me”: Deep Learning-based Speech Synthesis Attacks in the Real World
E Wenger, M Bronckers, C Cianfarani, J Cryan, A Sha, H Zheng, BY Zhao
362021
Salsa: Attacking lattice cryptography with transformers
E Wenger, M Chen, F Charton, KE Lauter
Advances in Neural Information Processing Systems 35, 34981-34994, 2022
252022
Finding Naturally Occurring Physical Backdoors in Image Datasets
E Wenger, R Bhattacharjee, AN Bhagoji, J Passananti, E Andere, ...
Thirty-sixth Conference on Neural Information Processing Systems Datasets …, 2022
15*2022
Sok: Anti-facial recognition technology
E Wenger, S Shan, H Zheng, BY Zhao
2023 IEEE Symposium on Security and Privacy (SP), 864-881, 2023
122023
Post-breach recovery: Protection against white-box adversarial examples for leaked dnn models
S Shan, W Ding, E Wenger, H Zheng, BY Zhao
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
92022
SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets
CY Li, J Sotáková, E Wenger, M Malhou, E Garcelon, F Charton, K Lauter
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
52023
Data isotopes for data provenance in dnns
E Wenger, X Li, BY Zhao, V Shmatikov
arXiv preprint arXiv:2208.13893, 2022
52022
SALSA VERDE: a machine learning attack on LWE with sparse small secrets
C Li, E Wenger, Z Allen-Zhu, F Charton, KE Lauter
Advances in Neural Information Processing Systems 36, 53343-53361, 2023
4*2023
Assessing privacy risks from feature vector reconstruction attacks
E Wenger, F Falzon, J Passananti, H Zheng, BY Zhao
arXiv preprint arXiv:2202.05760, 2022
22022
The cool and the cruel: separating hard parts of LWE secrets
N Nolte, M Malhou, E Wenger, S Stevens, C Li, F Charton, K Lauter
arXiv preprint arXiv:2403.10328, 2024
12024
Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors
S Stevens, E Wenger, C Li, N Nolte, E Saxena, F Charton, K Lauter
arXiv preprint arXiv:2402.01082, 2024
12024
Private Movie Recommendations for Children
A Pham, M Samragh, S Wagh, E Wenger
Protecting Privacy through Homomorphic Encryption, 163-167, 2021
12021
Reclaiming Data Agency in the Age of Ubiquitous Machine Learning
EJ Wenger
The University of Chicago, 2023
2023
THE ALIGNMENT PROBLEM: Machine Learning and Human Values.
E Wenger
Perspectives on Science and Christian Faith 73 (4), 245-248, 2021
2021
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20