Thorsten Eisenhofer

According to our database1, Thorsten Eisenhofer authored at least 15 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Whispers in the Machine: Confidentiality in LLM-integrated Systems.
CoRR, 2024

2023
Security of machine learning systems.
PhD thesis, 2023

A Representative Study on Human Detection of Artificially Generated Media Across Countries.
CoRR, 2023

On the Limitations of Model Stealing with Uncertainty Quantification Models.
CoRR, 2023

No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Drone Security and the Mysterious Case of DJI's DroneID.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Password-Authenticated Key Exchange from Group Actions.
IACR Cryptol. ePrint Arch., 2022

Exploring accidental triggers of smart speakers.
Comput. Speech Lang., 2022

Learned Systems Security.
CoRR, 2022

Verifiable and Provably Secure Machine Unlearning.
CoRR, 2022

2021
Dompteur: Taming Audio Adversarial Examples.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
VENOMAVE: Clean-Label Poisoning Against Speech Recognition.
CoRR, 2020

Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers.
CoRR, 2020

Leveraging Frequency Analysis for Deep Fake Image Recognition.
Proceedings of the 37th International Conference on Machine Learning, 2020

Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020


  Loading...