Lea Schönherr

Orcid: 0000-0003-3779-7781

According to our database1, Lea Schönherr authored at least 24 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Whispers in the Machine: Confidentiality in LLM-integrated Systems.
CoRR, 2024

σ-zero: Gradient-based Optimization of 𝓁<sub>0</sub>-norm Adversarial Examples.
CoRR, 2024

Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams.
CoRR, 2024

2023
A Representative Study on Human Detection of Artificially Generated Media Across Countries.
CoRR, 2023

LLM-Deliberation: Evaluating LLMs with Interactive Multi-Agent Negotiation Games.
CoRR, 2023

On the Limitations of Model Stealing with Uncertainty Quantification Models.
CoRR, 2023

Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models.
CoRR, 2023

Drone Security and the Mysterious Case of DJI's DroneID.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Exploring accidental triggers of smart speakers.
Comput. Speech Lang., 2022

Clustering-based Wake Word Detection in Privacy-aware Acoustic Sensor Networks.
Proceedings of the Interspeech 2022, 2022

2021
Adversarially robust speech and speaker recognition.
PhD thesis, 2021

Dompteur: Taming Audio Adversarial Examples.
Proceedings of the 30th USENIX Security Symposium, 2021

WaveFake: A Data Set to Facilitate Audio Deepfake Detection.
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021

Privacy-Preserving Feature Extraction for Cloud-Based Wake Word Verification.
Proceedings of the Interspeech 2021, 22nd Annual Conference of the International Speech Communication Association, Brno, Czechia, 30 August, 2021

2020
VENOMAVE: Clean-Label Poisoning Against Speech Recognition.
CoRR, 2020

Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers.
CoRR, 2020

Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification.
Proceedings of the Interspeech 2020, 2020

Loss Functions for Deep Monaural Speech Enhancement.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Leveraging Frequency Analysis for Deep Fake Image Recognition.
Proceedings of the 37th International Conference on Machine Learning, 2020

Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Robust Over-the-Air Adversarial Examples Against Automatic Speech Recognition Systems.
CoRR, 2019

Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2017
Spoofing detection via simultaneous verification of audio-visual synchronicity and transcription.
Proceedings of the 2017 IEEE Automatic Speech Recognition and Understanding Workshop, 2017

2016
Environmentally robust audio-visual speaker identification.
Proceedings of the 2016 IEEE Spoken Language Technology Workshop, 2016


  Loading...