Follow
Emily Wenger
Emily Wenger
Verified email at duke.edu - Homepage
Title
Cited by
Cited by
Year
Fawkes: Protecting privacy against unauthorized deep learning models
S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao
29th USENIX security symposium (USENIX Security 20), 1589-1604, 2020
3112020
Backdoor attacks against deep learning systems in the physical world
E Wenger, J Passananti, AN Bhagoji, Y Yao, H Zheng, BY Zhao
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
221*2021
Glaze: Protecting artists from style mimicry by {Text-to-Image} models
S Shan, J Cryan, E Wenger, H Zheng, R Hanocka, BY Zhao
32nd USENIX Security Symposium (USENIX Security 23), 2187-2204, 2023
1562023
Gotta catch'em all: Using honeypots to catch adversarial attacks on neural networks
S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
103*2020
Blacklight: Defending black-box adversarial attacks on deep neural networks
H Li, S Shan, E Wenger, J Zhang, H Zheng, BY Zhao
arXiv preprint arXiv:2006.14042 3, 2020
93*2020
Piracy resistant watermarks for deep neural networks
H Li, E Wenger, S Shan, BY Zhao, H Zheng
arXiv preprint arXiv:1910.01226, 2019
74*2019
“Hello, It’s Me”: Deep Learning-based Speech Synthesis Attacks in the Real World
E Wenger, M Bronckers, C Cianfarani, J Cryan, A Sha, H Zheng, BY Zhao
482021
Salsa: Attacking lattice cryptography with transformers
E Wenger, M Chen, F Charton, KE Lauter
Advances in Neural Information Processing Systems 35, 34981-34994, 2022
312022
Finding Naturally Occurring Physical Backdoors in Image Datasets
E Wenger, R Bhattacharjee, AN Bhagoji, J Passananti, E Andere, ...
Thirty-sixth Conference on Neural Information Processing Systems Datasets …, 2022
21*2022
Sok: Anti-facial recognition technology
E Wenger, S Shan, H Zheng, BY Zhao
2023 IEEE Symposium on Security and Privacy (SP), 864-881, 2023
172023
Post-breach recovery: Protection against white-box adversarial examples for leaked dnn models
S Shan, W Ding, E Wenger, H Zheng, BY Zhao
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
112022
SALSA VERDE: a machine learning attack on LWE with sparse small secrets
C Li, E Wenger, Z Allen-Zhu, F Charton, KE Lauter
Advances in Neural Information Processing Systems 36, 53343-53361, 2023
92023
SalsaPicante: A machine learning attack on LWE with binary secrets
CY Li, J Sotáková, E Wenger, M Malhou, E Garcelon, F Charton, K Lauter
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
92023
Data isotopes for data provenance in dnns
E Wenger, X Li, BY Zhao, V Shmatikov
arXiv preprint arXiv:2208.13893, 2022
82022
Salsa fresca: Angular embeddings and pre-training for ml attacks on learning with errors
S Stevens, E Wenger, C Li, N Nolte, E Saxena, F Charton, K Lauter
arXiv preprint arXiv:2402.01082, 2024
42024
The cool and the cruel: separating hard parts of lwe secrets
N Nolte, M Malhou, E Wenger, S Stevens, C Li, F Charton, K Lauter
International Conference on Cryptology in Africa, 428-453, 2024
22024
Assessing privacy risks from feature vector reconstruction attacks
E Wenger, F Falzon, J Passananti, H Zheng, BY Zhao
arXiv preprint arXiv:2202.05760, 2022
22022
Private Movie Recommendations for Children
A Pham, M Samragh, S Wagh, E Wenger
Protecting Privacy through Homomorphic Encryption, 163-167, 2021
12021
Benchmarking Attacks on Learning with Errors
E Wenger, E Saxena, M Malhou, E Thieu, K Lauter
arXiv preprint arXiv:2408.00882, 2024
2024
Reclaiming Data Agency in the Age of Ubiquitous Machine Learning
EJ Wenger
The University of Chicago, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20