关注
Emily Wenger
Emily Wenger
在 duke.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Fawkes: Protecting privacy against unauthorized deep learning models
S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao
29th USENIX security symposium (USENIX Security 20), 1589-1604, 2020
2902020
Backdoor attacks against deep learning systems in the physical world
E Wenger, J Passananti, AN Bhagoji, Y Yao, H Zheng, BY Zhao
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
200*2021
Glaze: Protecting artists from style mimicry by {Text-to-Image} models
S Shan, J Cryan, E Wenger, H Zheng, R Hanocka, BY Zhao
32nd USENIX Security Symposium (USENIX Security 23), 2187-2204, 2023
1262023
Gotta catch'em all: Using honeypots to catch adversarial attacks on neural networks
S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
101*2020
Blacklight: Defending black-box adversarial attacks on deep neural networks
H Li, S Shan, E Wenger, J Zhang, H Zheng, BY Zhao
arXiv preprint arXiv:2006.14042 3, 2020
88*2020
Piracy resistant watermarks for deep neural networks
H Li, E Wenger, S Shan, BY Zhao, H Zheng
arXiv preprint arXiv:1910.01226, 2019
71*2019
“Hello, It’s Me”: Deep Learning-based Speech Synthesis Attacks in the Real World
E Wenger, M Bronckers, C Cianfarani, J Cryan, A Sha, H Zheng, BY Zhao
422021
Salsa: Attacking lattice cryptography with transformers
E Wenger, M Chen, F Charton, KE Lauter
Advances in Neural Information Processing Systems 35, 34981-34994, 2022
262022
Finding Naturally Occurring Physical Backdoors in Image Datasets
E Wenger, R Bhattacharjee, AN Bhagoji, J Passananti, E Andere, ...
Thirty-sixth Conference on Neural Information Processing Systems Datasets …, 2022
19*2022
Sok: Anti-facial recognition technology
E Wenger, S Shan, H Zheng, BY Zhao
2023 IEEE Symposium on Security and Privacy (SP), 864-881, 2023
132023
Post-breach recovery: Protection against white-box adversarial examples for leaked dnn models
S Shan, W Ding, E Wenger, H Zheng, BY Zhao
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
102022
SalsaPicante: A machine learning attack on LWE with binary secrets
CY Li, J Sotáková, E Wenger, M Malhou, E Garcelon, F Charton, K Lauter
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
72023
SALSA VERDE: a machine learning attack on LWE with sparse small secrets
C Li, E Wenger, Z Allen-Zhu, F Charton, KE Lauter
Advances in Neural Information Processing Systems 36, 53343-53361, 2023
62023
Data isotopes for data provenance in dnns
E Wenger, X Li, BY Zhao, V Shmatikov
arXiv preprint arXiv:2208.13893, 2022
52022
Assessing privacy risks from feature vector reconstruction attacks
E Wenger, F Falzon, J Passananti, H Zheng, BY Zhao
arXiv preprint arXiv:2202.05760, 2022
22022
The cool and the cruel: separating hard parts of LWE secrets
N Nolte, M Malhou, E Wenger, S Stevens, C Li, F Charton, K Lauter
International Conference on Cryptology in Africa, 428-453, 2024
12024
Salsa fresca: Angular embeddings and pre-training for ml attacks on learning with errors
S Stevens, E Wenger, C Li, N Nolte, E Saxena, F Charton, K Lauter
arXiv preprint arXiv:2402.01082, 2024
12024
Private Movie Recommendations for Children
A Pham, M Samragh, S Wagh, E Wenger
Protecting Privacy through Homomorphic Encryption, 163-167, 2021
12021
Reclaiming Data Agency in the Age of Ubiquitous Machine Learning
EJ Wenger
The University of Chicago, 2023
2023
THE ALIGNMENT PROBLEM: Machine Learning and Human Values.
E Wenger
Perspectives on Science and Christian Faith 73 (4), 245-248, 2021
2021
系统目前无法执行此操作,请稍后再试。
文章 1–20