Leveraging Frequency Analysis for Deep Fake Image Recognition J Frank, T Eisenhofer, L Schönherr, A Fischer, D Kolossa, T Holz International Conference on Machine Learning (ICML), 2020 | 469 | 2020 |
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems L Schönherr, T Eisenhofer, S Zeiler, T Holz, D Kolossa Annual Computer Security Applications Conference (ACSAC), 2020 | 72 | 2020 |
Exploring Accidental Triggers of Smart Speakers L Schönherr, M Golla, T Eisenhofer, J Wiele, D Kolossa, T Holz Computer Speech & Language (CSL), 2022 | 68* | 2022 |
Dompteur: Taming Audio Adversarial Examples T Eisenhofer, L Schönherr, J Frank, L Speckemeier, D Kolossa, T Holz USENIX Security Symposium, 2021 | 34 | 2021 |
VENOMAVE: Targeted Poisoning Against Speech Recognition H Aghakhani, L Schönherr, T Eisenhofer, D Kolossa, T Holz, C Kruegel, ... Conference on Secure and Trustworthy Machine Learning (SaTML), 2023 | 31* | 2023 |
Drone Security and the Mysterious Case of DJI's DroneID. N Schiller, M Chlosta, M Schloegel, N Bars, T Eisenhofer, T Scharnowski, ... Network and Distributed System Security Symposium (NDSS), 2023 | 23 | 2023 |
Password-Authenticated Key Exchange from Group Actions M Abdalla, T Eisenhofer, E Kiltz, S Kunzweiler, D Riepel Annual International Cryptology Conference (CRYPTO), 2022 | 23 | 2022 |
Verifiable and Provably Secure Machine Unlearning T Eisenhofer, D Riepel, V Chandrasekaran, E Ghosh, O Ohrimenko, ... Computing Research Repository (CoRR), 2022 | 18 | 2022 |
Whispers in the Machine: Confidentiality in LLM-integrated Systems J Evertz, M Chlosta, L Schönherr, T Eisenhofer Computing Research Repository (CoRR), 2024 | 5 | 2024 |
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning T Eisenhofer, E Quiring, J Möller, D Riepel, T Holz, K Rieck USENIX Security Symposium, 2023 | 5 | 2023 |
A Representative Study on Human Detection of Artificially Generated Media Across Countries J Frank, F Herbert, J Ricker, L Schönherr, T Eisenhofer, A Fischer, ... Symposium on Security and Privacy (SP), 2024 | 3 | 2024 |
Learned Systems Security R Schuster, JP Zhou, T Eisenhofer, P Grubbs, N Papernot Computing Research Repository (CoRR), 2022 | 3 | 2022 |
On the Limitations of Model Stealing with Uncertainty Quantification Models D Pape, S Däubener, T Eisenhofer, AE Cinà, L Schönherr European Symposium on Artificial Neural Networks, Computational Intelligence …, 2023 | 2 | 2023 |
SoK: Where to Fuzz? Assessing Target Selection Methods in Directed Fuzzing F Weissberg, J Möller, T Ganz, E Imgrund, L Pirch, L Seidel, M Schloegel, ... Asia Conference on Computer and Communications Security (ASIACCS), 2024 | | 2024 |
Cross-Language Differential Testing of JSON Parsers J Möller, F Weißberg, L Pirch, T Eisenhofer, K Rieck Asia Conference on Computer and Communications Security (ASIACCS), 2024 | | 2024 |
Security of Machine Learning Systems T Eisenhofer Dissertation, 2023 | | 2023 |
Non-forgetting Classifiers L Schönherr, T Eisenhofer, M Pintor, B Biggio Security of Machine Learning (Dagstuhl Seminar 22281), 2022 | | 2022 |