ติดตาม
Lea Schönherr
Lea Schönherr
CISPA Helmholtz Center for Information Security
ยืนยันอีเมลแล้วที่ cispa.de - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Leveraging Frequency Analysis for Deep Fake Image Recognition
J Frank, T Eisenhofer, L Schönherr, A Fischer, D Kolossa, T Holz
International Conference on Machine Learning (ICML), 2020
6382020
Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding
L Schönherr, K Kohls, S Zeiler, T Holz, D Kolossa
Network and Distributed System Security Symposium (NDSS), 2019
3732019
WaveFake: a data set to facilitate audio deepfake detection
J Frank, L Schönherr
NeurIPS Dataset and Benchmark Track, 2021
1462021
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems
L Schönherr, T Eisenhofer, S Zeiler, T Holz, D Kolossa
Annual Computer Security Applications Conference (ACSAC), 2020
87*2020
Exploring accidental triggers of smart speakers
L Schönherr, M Golla, T Eisenhofer, J Wiele, D Kolossa, T Holz
Computer Speech & Language 73, 2022
76*2022
Cooperation, Competition, and Maliciousness: LLM-Stakeholders Interactive Negotiation
S Abdelnabi, A Gomaa, S Sivaprasad, L Schönherr, M Fritz
NeurIPS Dataset and Benchmark Track, 2024
68*2024
CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models
H Hajipour, K Hassler, T Holz, L Schönherr, M Fritz
Secure and Trustworthy Machine Learning (SatML), 2024
49*2024
Drone Security and the Mysterious Case of DJI's DroneID.
N Schiller, M Chlosta, M Schloegel, N Bars, T Eisenhofer, T Scharnowski, ...
Network and Distributed System Security Symposium (NDSS), 2023
402023
VENOMAVE: Clean-label poisoning against speech recognition
H Aghakhani, T Eisenhofer, L Schönherr, D Kolossa, T Holz, C Kruegel, ...
Secure and Trustworthy Machine Learning (SatML), 2023
40*2023
Dompteur: Taming Audio Adversarial Examples
T Eisenhofer, L Schönherr, J Frank, L Speckemeier, D Kolossa, T Holz
USENIX Security Symposium, 2021
392021
Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification
S Däubener, L Schönherr, A Fischer, D Kolossa
INTERSPEECH, 2020
222020
Whispers in the Machine: Confidentiality in LLM-integrated Systems
J Evertz, M Chlosta, L Schönherr, T Eisenhofer
arXiv preprint arXiv:2402.06922, 2024
172024
Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition
E Debenedetti, J Rando, D Paleka, SF Florin, D Albastroiu, N Cohen, ...
NeurIPS Dataset and Benchmark Track, 2024
122024
A Representative Study on Human Detection of Artificially Generated Media Across Countries
J Frank, F Herbert, J Ricker, L Schönherr, T Eisenhofer, A Fischer, ...
IEEE Security & Privacy (S&P), 2024
122024
Environmentally robust audio-visual speaker identification
L Schönherr, D Orth, M Heckmann, D Kolossa
IEEE Spoken Language Technology Workshop (SLT), 2016
122016
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams
B Acharya, M Saad, AE Cinà, L Schönherr, HD Nguyen, A Oest, ...
IEEE Security & Privacy (S&P), 2024
112024
Privacy-Preserving Feature Extraction for Cloud-Based Wake Word Verification
AN Timm Koppelmann, L Schönherr, D Kolossa, R Martin
INTERSPEECH, 2021
92021
Rag and roll: An end-to-end evaluation of indirect prompt manipulations in llm-based application frameworks
G De Stefano, L Schönherr, G Pellegrino
arXiv preprint arXiv:2408.05025, 2024
72024
Clustering-based Wake Word Detection in Privacy-aware Acoustic Sensor Networks
T Koppelmann, L Becker, A Nelus, R Glitza, L Schönherr, R Martin
Proc. Interspeech 2022, 719-723, 2022
62022
Prompt obfuscation for large language models
D Pape, S Mavali, T Eisenhofer, L Schönherr
arXiv preprint arXiv:2409.11026, 2024
42024
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20