Fawkes: Protecting privacy against unauthorized deep learning models S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao 29th USENIX security symposium (USENIX Security 20), 1589-1604, 2020 | 290 | 2020 |
Backdoor attacks against deep learning systems in the physical world E Wenger, J Passananti, AN Bhagoji, Y Yao, H Zheng, BY Zhao Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021 | 200* | 2021 |
Glaze: Protecting artists from style mimicry by {Text-to-Image} models S Shan, J Cryan, E Wenger, H Zheng, R Hanocka, BY Zhao 32nd USENIX Security Symposium (USENIX Security 23), 2187-2204, 2023 | 126 | 2023 |
Gotta catch'em all: Using honeypots to catch adversarial attacks on neural networks S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 101* | 2020 |
Blacklight: Defending black-box adversarial attacks on deep neural networks H Li, S Shan, E Wenger, J Zhang, H Zheng, BY Zhao arXiv preprint arXiv:2006.14042 3, 2020 | 88* | 2020 |
Piracy resistant watermarks for deep neural networks H Li, E Wenger, S Shan, BY Zhao, H Zheng arXiv preprint arXiv:1910.01226, 2019 | 71* | 2019 |
“Hello, It’s Me”: Deep Learning-based Speech Synthesis Attacks in the Real World E Wenger, M Bronckers, C Cianfarani, J Cryan, A Sha, H Zheng, BY Zhao | 42 | 2021 |
Salsa: Attacking lattice cryptography with transformers E Wenger, M Chen, F Charton, KE Lauter Advances in Neural Information Processing Systems 35, 34981-34994, 2022 | 26 | 2022 |
Finding Naturally Occurring Physical Backdoors in Image Datasets E Wenger, R Bhattacharjee, AN Bhagoji, J Passananti, E Andere, ... Thirty-sixth Conference on Neural Information Processing Systems Datasets …, 2022 | 19* | 2022 |
Sok: Anti-facial recognition technology E Wenger, S Shan, H Zheng, BY Zhao 2023 IEEE Symposium on Security and Privacy (SP), 864-881, 2023 | 13 | 2023 |
Post-breach recovery: Protection against white-box adversarial examples for leaked dnn models S Shan, W Ding, E Wenger, H Zheng, BY Zhao Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 10 | 2022 |
SalsaPicante: A machine learning attack on LWE with binary secrets CY Li, J Sotáková, E Wenger, M Malhou, E Garcelon, F Charton, K Lauter Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 7 | 2023 |
SALSA VERDE: a machine learning attack on LWE with sparse small secrets C Li, E Wenger, Z Allen-Zhu, F Charton, KE Lauter Advances in Neural Information Processing Systems 36, 53343-53361, 2023 | 6 | 2023 |
Data isotopes for data provenance in dnns E Wenger, X Li, BY Zhao, V Shmatikov arXiv preprint arXiv:2208.13893, 2022 | 5 | 2022 |
Assessing privacy risks from feature vector reconstruction attacks E Wenger, F Falzon, J Passananti, H Zheng, BY Zhao arXiv preprint arXiv:2202.05760, 2022 | 2 | 2022 |
The cool and the cruel: separating hard parts of LWE secrets N Nolte, M Malhou, E Wenger, S Stevens, C Li, F Charton, K Lauter International Conference on Cryptology in Africa, 428-453, 2024 | 1 | 2024 |
Salsa fresca: Angular embeddings and pre-training for ml attacks on learning with errors S Stevens, E Wenger, C Li, N Nolte, E Saxena, F Charton, K Lauter arXiv preprint arXiv:2402.01082, 2024 | 1 | 2024 |
Private Movie Recommendations for Children A Pham, M Samragh, S Wagh, E Wenger Protecting Privacy through Homomorphic Encryption, 163-167, 2021 | 1 | 2021 |
Reclaiming Data Agency in the Age of Ubiquitous Machine Learning EJ Wenger The University of Chicago, 2023 | | 2023 |
THE ALIGNMENT PROBLEM: Machine Learning and Human Values. E Wenger Perspectives on Science and Christian Faith 73 (4), 245-248, 2021 | | 2021 |