default search action
Emily Wenger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j1]Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov:
Data Isotopes for Data Provenance in DNNs. Proc. Priv. Enhancing Technol. 2024(1): 413-429 (2024) - [c13]Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The Cool and the Cruel: Separating Hard Parts of LWE Secrets. AFRICACRYPT 2024: 428-453 - [i22]Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin E. Lauter:
Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors. CoRR abs/2402.01082 (2024) - [i21]Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The cool and the cruel: separating hard parts of LWE secrets. CoRR abs/2403.10328 (2024) - [i20]Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin E. Lauter:
Benchmarking Attacks on Learning with Errors. CoRR abs/2408.00882 (2024) - [i19]Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin E. Lauter:
SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors. IACR Cryptol. ePrint Arch. 2024: 150 (2024) - [i18]Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The cool and the cruel: separating hard parts of LWE secrets. IACR Cryptol. ePrint Arch. 2024: 443 (2024) - [i17]Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin E. Lauter:
Benchmarking Attacks on Learning with Errors. IACR Cryptol. ePrint Arch. 2024: 1229 (2024) - 2023
- [c12]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter:
SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets. CCS 2023: 2606-2620 - [c11]Cathy Yuanchen Li, Emily Wenger, Zeyuan Allen-Zhu, François Charton, Kristin E. Lauter:
SALSA VERDE: a machine learning attack on LWE with sparse small secrets. NeurIPS 2023 - [c10]Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
SoK: Anti-Facial Recognition Technology. SP 2023: 864-881 - [c9]Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao:
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models. USENIX Security Symposium 2023: 2187-2204 - [i16]Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao:
GLAZE: Protecting Artists from Style Mimicry by Text-to-Image Models. CoRR abs/2302.04222 (2023) - [i15]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter:
SALSA PICANTE: a machine learning attack on LWE with binary secrets. CoRR abs/2303.04178 (2023) - [i14]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Zeyuan Allen-Zhu, François Charton, Kristin E. Lauter:
SALSA VERDE: a machine learning attack on Learning With Errors with sparse small secrets. CoRR abs/2306.11641 (2023) - [i13]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter:
SALSA PICANTE: a machine learning attack on LWE with binary secrets. IACR Cryptol. ePrint Arch. 2023: 340 (2023) - [i12]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Zeyuan Allen-Zhu, François Charton, Kristin E. Lauter:
SALSA VERDE: a machine learning attack on Learning with Errors with sparse small secrets. IACR Cryptol. ePrint Arch. 2023: 968 (2023) - 2022
- [c8]Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao:
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. CCS 2022: 2611-2625 - [c7]Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Heather Zheng, Ben Y. Zhao:
Finding Naturally Occurring Physical Backdoors in Image Datasets. NeurIPS 2022 - [c6]Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. NeurIPS 2022 - [c5]Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao:
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks. USENIX Security Symposium 2022: 2117-2134 - [i11]Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao:
Assessing Privacy Risks from Feature Vector Reconstruction Attacks. CoRR abs/2202.05760 (2022) - [i10]Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao:
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. CoRR abs/2205.10686 (2022) - [i9]Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao:
Natural Backdoor Datasets. CoRR abs/2206.10673 (2022) - [i8]Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. CoRR abs/2207.04785 (2022) - [i7]Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov:
Data Isotopes for Data Provenance in DNNs. CoRR abs/2208.13893 (2022) - [i6]Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. IACR Cryptol. ePrint Arch. 2022: 935 (2022) - 2021
- [c4]Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao:
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World. CCS 2021: 235-251 - [c3]Emily Wenger, Josephine Passananti, Arjun Nitin Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao:
Backdoor Attacks Against Deep Learning Systems in the Physical World. CVPR 2021: 6206-6215 - [i5]Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao:
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World. CoRR abs/2109.09598 (2021) - [i4]Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
SoK: Anti-Facial Recognition Technology. CoRR abs/2112.04558 (2021) - 2020
- [c2]Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao:
Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks. CCS 2020: 67-83 - [c1]Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. USENIX Security Symposium 2020: 1589-1604 - [i3]Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models. CoRR abs/2002.08327 (2020) - [i2]Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao:
Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks. CoRR abs/2006.14042 (2020) - [i1]Emily Wenger, Josephine Passananti, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao:
Backdoor Attacks on Facial Recognition in the Physical World. CoRR abs/2006.14580 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-11 00:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint