关注
Emily Wenger
Emily Wenger
在 uchicago.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Fawkes: Protecting privacy against unauthorized deep learning models
S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao
29th USENIX security symposium (USENIX Security 20), 1589-1604, 2020
2552020
Backdoor attacks against deep learning systems in the physical world
E Wenger, J Passananti, AN Bhagoji, Y Yao, H Zheng, BY Zhao
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
168*2021
Gotta catch'em all: Using honeypots to catch adversarial attacks on neural networks
S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
90*2020
Blacklight: Defending black-box adversarial attacks on deep neural networks
H Li, S Shan, E Wenger, J Zhang, H Zheng, BY Zhao
arXiv preprint arXiv:2006.14042, 2020
76*2020
Glaze: Protecting artists from style mimicry by text-to-image models
S Shan, J Cryan, E Wenger, H Zheng, R Hanocka, BY Zhao
arXiv preprint arXiv:2302.04222, 2023
672023
Piracy resistant watermarks for deep neural networks
H Li, E Wenger, S Shan, BY Zhao, H Zheng
arXiv preprint arXiv:1910.01226, 2019
65*2019
“Hello, It’s Me”: Deep Learning-based Speech Synthesis Attacks in the Real World
E Wenger, M Bronckers, C Cianfarani, J Cryan, A Sha, H Zheng, BY Zhao
342021
Salsa: Attacking lattice cryptography with transformers
E Wenger, M Chen, F Charton, KE Lauter
Advances in Neural Information Processing Systems 35, 34981-34994, 2022
222022
Finding Naturally Occurring Physical Backdoors in Image Datasets
E Wenger, R Bhattacharjee, AN Bhagoji, J Passananti, E Andere, ...
Thirty-sixth Conference on Neural Information Processing Systems Datasets …, 2022
14*2022
Sok: Anti-facial recognition technology
E Wenger, S Shan, H Zheng, BY Zhao
2023 IEEE Symposium on Security and Privacy (SP), 864-881, 2023
122023
Post-breach recovery: Protection against white-box adversarial examples for leaked DNN models
S Shan, W Ding, E Wenger, H Zheng, BY Zhao
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
92022
Data Isotopes for Data Provenance in DNNs
E Wenger, X Li, BY Zhao, V Shmatikov
arXiv preprint arXiv:2208.13893, 2022
32022
SALSA VERDE: a machine learning attack on LWE with sparse small secrets
C Li, E Wenger, Z Allen-Zhu, F Charton, KE Lauter
Advances in Neural Information Processing Systems 36, 2024
2*2024
SALSA PICANTE: a machine learning attack on LWE with binary secrets
C Li, J Sotáková, E Wenger, M Malhou, E Garcelon, F Charton, K Lauter
arXiv preprint arXiv:2303.04178, 2023
22023
Assessing Privacy Risks from Feature Vector Reconstruction Attacks
E Wenger, F Falzon, J Passananti, H Zheng, BY Zhao
arXiv preprint arXiv:2202.05760, 2022
22022
Private Movie Recommendations for Children
A Pham, M Samragh, S Wagh, E Wenger
Protecting Privacy through Homomorphic Encryption, 163-167, 2021
12021
Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors
S Stevens, E Wenger, C Li, N Nolte, E Saxena, F Charton, K Lauter
arXiv preprint arXiv:2402.01082, 2024
2024
Reclaiming Data Agency in the Age of Ubiquitous Machine Learning
EJ Wenger
The University of Chicago, 2023
2023
THE ALIGNMENT PROBLEM: Machine Learning and Human Values.
E Wenger
Perspectives on Science and Christian Faith 73 (4), 245-248, 2021
2021
Initial Investigation into Effect of Radiation Damping on Magnetization Transfer Parameters Extracted From Inversion Recovery Experiments
E Willson, H Whitney
Proc. Intl. Soc. Mag. Reson. Med 23, 3361, 2015
2015
系统目前无法执行此操作,请稍后再试。
文章 1–20