default search action
Lea Schönherr
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, Mario Fritz:
CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models. SaTML 2024: 684-709 - [c17]Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, Thorsten Holz:
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. SP 2024: 17-35 - [c16]Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz:
A Representative Study on Human Detection of Artificially Generated Media Across Countries. SP 2024: 55-73 - [c15]Bhupendra Acharya, Dario Lazzaro, Efrén López-Morales, Adam Oest, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Thorsten Holz:
The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms. USENIX Security Symposium 2024 - [i20]Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, Thorsten Holz:
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. CoRR abs/2401.09824 (2024) - [i19]Antonio Emanuele Cinà, Francesco Villani, Maura Pintor, Lea Schönherr, Battista Biggio, Marcello Pelillo:
σ-zero: Gradient-based Optimization of 𝓁0-norm Adversarial Examples. CoRR abs/2402.01879 (2024) - [i18]Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer:
Whispers in the Machine: Confidentiality in LLM-integrated Systems. CoRR abs/2402.06922 (2024) - [i17]Edoardo Debenedetti, Javier Rando, Daniel Paleka, Silaghi Fineas Florin, Dragos Albastroiu, Niv Cohen, Yuval Lemberg, Reshmi Ghosh, Rui Wen, Ahmed Salem, Giovanni Cherubin, Santiago Zanella Béguelin, Robin Schmid, Victor Klemm, Takahiro Miki, Chenhao Li, Stefan Kraft, Mario Fritz, Florian Tramèr, Sahar Abdelnabi, Lea Schönherr:
Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition. CoRR abs/2406.07954 (2024) - [i16]Gianluca De Stefano, Lea Schönherr, Giancarlo Pellegrino:
Rag and Roll: An End-to-End Evaluation of Indirect Prompt Manipulations in LLM-based Application Frameworks. CoRR abs/2408.05025 (2024) - [i15]Hossein Hajipour, Lea Schönherr, Thorsten Holz, Mario Fritz:
HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data. CoRR abs/2409.06446 (2024) - [i14]David Pape, Thorsten Eisenhofer, Lea Schönherr:
Prompt Obfuscation for Large Language Models. CoRR abs/2409.11026 (2024) - [i13]Sina Mavali, Jonas Ricker, David Pape, Yash Sharma, Asja Fischer, Lea Schönherr:
Fake It Until You Break It: On the Adversarial Robustness of AI-generated Image Detectors. CoRR abs/2410.01574 (2024) - 2023
- [c14]David Pape, Sina Däubener, Thorsten Eisenhofer, Antonio Emanuele Cinà, Lea Schönherr:
On the Limitations of Model Stealing with Uncertainty Quantification Models. ESANN 2023 - [c13]Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, Thorsten Holz:
Drone Security and the Mysterious Case of DJI's DroneID. NDSS 2023 - [c12]Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
Venomave: Targeted Poisoning Against Speech Recognition. SaTML 2023: 404-417 - [i12]Hossein Hajipour, Thorsten Holz, Lea Schönherr, Mario Fritz:
Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models. CoRR abs/2302.04012 (2023) - [i11]David Pape, Sina Däubener, Thorsten Eisenhofer, Antonio Emanuele Cinà, Lea Schönherr:
On the Limitations of Model Stealing with Uncertainty Quantification Models. CoRR abs/2305.05293 (2023) - [i10]Sahar Abdelnabi, Amr Gomaa, Sarath Sivaprasad, Lea Schönherr, Mario Fritz:
LLM-Deliberation: Evaluating LLMs with Interactive Multi-Agent Negotiation Games. CoRR abs/2309.17234 (2023) - [i9]Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz:
A Representative Study on Human Detection of Artificially Generated Media Across Countries. CoRR abs/2312.05976 (2023) - 2022
- [j1]Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz:
Exploring accidental triggers of smart speakers. Comput. Speech Lang. 73: 101328 (2022) - [c11]Timm Koppelmann, Luca Becker, Alexandru Nelus, Rene Glitza, Lea Schönherr, Rainer Martin:
Clustering-based Wake Word Detection in Privacy-aware Acoustic Sensor Networks. INTERSPEECH 2022: 719-723 - 2021
- [b1]Lea Schönherr:
Adversarially robust speech and speaker recognition. Ruhr University Bochum, Germany, 2021 - [c10]Timm Koppelmann, Alexandru Nelus, Lea Schönherr, Dorothea Kolossa, Rainer Martin:
Privacy-Preserving Feature Extraction for Cloud-Based Wake Word Verification. Interspeech 2021: 876-880 - [c9]Joel Frank, Lea Schönherr:
WaveFake: A Data Set to Facilitate Audio Deepfake Detection. NeurIPS Datasets and Benchmarks 2021 - [c8]Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz:
Dompteur: Taming Audio Adversarial Examples. USENIX Security Symposium 2021: 2309-2326 - [i8]Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz:
Dompteur: Taming Audio Adversarial Examples. CoRR abs/2102.05431 (2021) - [i7]Joel Frank, Lea Schönherr:
WaveFake: A Data Set to Facilitate Audio Deepfake Detection. CoRR abs/2111.02813 (2021) - 2020
- [c7]Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems. ACSAC 2020: 843-855 - [c6]Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz:
Leveraging Frequency Analysis for Deep Fake Image Recognition. ICML 2020: 3247-3258 - [c5]Jan Freiwald, Lea Schönherr, Christopher Schymura, Steffen Zeiler, Dorothea Kolossa:
Loss Functions for Deep Monaural Speech Enhancement. IJCNN 2020: 1-7 - [c4]Sina Däubener, Lea Schönherr, Asja Fischer, Dorothea Kolossa:
Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification. INTERSPEECH 2020: 4661-4665 - [i6]Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz:
Leveraging Frequency Analysis for Deep Fake Image Recognition. CoRR abs/2003.08685 (2020) - [i5]Sina Däubener, Lea Schönherr, Asja Fischer, Dorothea Kolossa:
Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification. CoRR abs/2005.14611 (2020) - [i4]Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz:
Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers. CoRR abs/2008.00508 (2020) - [i3]Hojjat Aghakhani, Thorsten Eisenhofer, Lea Schönherr, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
VENOMAVE: Clean-Label Poisoning Against Speech Recognition. CoRR abs/2010.10682 (2020)
2010 – 2019
- 2019
- [c3]Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. NDSS 2019 - [i2]Lea Schönherr, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Robust Over-the-Air Adversarial Examples Against Automatic Speech Recognition Systems. CoRR abs/1908.01551 (2019) - 2018
- [i1]Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. CoRR abs/1808.05665 (2018) - 2017
- [c2]Lea Schonherr, Steffen Zeiler, Dorothea Kolossa:
Spoofing detection via simultaneous verification of audio-visual synchronicity and transcription. ASRU 2017: 591-598 - 2016
- [c1]Lea Schonherr, Dennis Orth, Martin Heckmann, Dorothea Kolossa:
Environmentally robust audio-visual speaker identification. SLT 2016: 312-318
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint