Follow
Lea Schönherr
Lea Schönherr
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
Leveraging Frequency Analysis for Deep Fake Image Recognition
J Frank, T Eisenhofer, L Schönherr, A Fischer, D Kolossa, T Holz
International Conference on Machine Learning (ICML), 2020
5272020
Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding
L Schönherr, K Kohls, S Zeiler, T Holz, D Kolossa
Network and Distributed System Security Symposium (NDSS), 2019
3562019
WaveFake: a data set to facilitate audio deepfake detection
J Frank, L Schönherr
NeurIPS Dataset and Benchmark Track, 2021
1002021
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems
L Schönherr, T Eisenhofer, S Zeiler, T Holz, D Kolossa
Annual Computer Security Applications Conference (ACSAC), 2020
742020
Exploring accidental triggers of smart speakers
L Schönherr, M Golla, T Eisenhofer, J Wiele, D Kolossa, T Holz
Computer Speech & Language 73, 2022
70*2022
Dompteur: Taming Audio Adversarial Examples
T Eisenhofer, L Schönherr, J Frank, L Speckemeier, D Kolossa, T Holz
USENIX Security Symposium, 2021
362021
VENOMAVE: Clean-label poisoning against speech recognition
H Aghakhani, T Eisenhofer, L Schönherr, D Kolossa, T Holz, C Kruegel, ...
Secure and Trustworthy Machine Learning (SatML), 2023
35*2023
CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models
H Hajipour, K Hassler, T Holz, L Schönherr, M Fritz
Secure and Trustworthy Machine Learning (SatML), 2024
33*2024
Drone Security and the Mysterious Case of DJI's DroneID.
N Schiller, M Chlosta, M Schloegel, N Bars, T Eisenhofer, T Scharnowski, ...
Network and Distributed System Security Symposium (NDSS), 2023
282023
Llm-deliberation: Evaluating llms with interactive multi-agent negotiation games
S Abdelnabi, A Gomaa, S Sivaprasad, L Schönherr, M Fritz
NeurIPS Dataset and Benchmark Track, 2024
262024
Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification
S Däubener, L Schönherr, A Fischer, D Kolossa
INTERSPEECH, 2020
222020
Whispers in the Machine: Confidentiality in LLM-integrated Systems
J Evertz, M Chlosta, L Schönherr, T Eisenhofer
arXiv preprint arXiv:2402.06922, 2024
112024
Environmentally robust audio-visual speaker identification
L Schönherr, D Orth, M Heckmann, D Kolossa
IEEE Spoken Language Technology Workshop (SLT), 2016
112016
Privacy-Preserving Feature Extraction for Cloud-Based Wake Word Verification
AN Timm Koppelmann, L Schönherr, D Kolossa, R Martin
INTERSPEECH, 2021
72021
Clustering-based Wake Word Detection in Privacy-aware Acoustic Sensor Networks
T Koppelmann, L Becker, A Nelus, R Glitza, L Schönherr, R Martin
Proc. Interspeech 2022, 719-723, 2022
52022
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams
B Acharya, M Saad, AE Cinà, L Schönherr, HD Nguyen, A Oest, ...
IEEE Security & Privacy (S&P), 2024
42024
A Representative Study on Human Detection of Artificially Generated Media Across Countries
J Frank, F Herbert, J Ricker, L Schönherr, T Eisenhofer, A Fischer, ...
IEEE Security & Privacy (S&P), 2024
32024
On the Limitations of Model Stealing with Uncertainty Quantification Models
D Pape, S Däubener, T Eisenhofer, AE Cinà, L Schönherr
European Symposium on Artificial Neural Networks, Computational Intelligence …, 2023
22023
Spoofing detection via simultaneous verification of audio-visual synchronicity and transcription
L Schönherr, S Zeiler, D Kolossa
IEEE Automatic Speech Recognition and Understanding Workshop (ASRU), 2017
12017
Fake It Until You Break It: On the Adversarial Robustness of AI-generated Image Detectors
S Mavali, J Ricker, D Pape, Y Sharma, A Fischer, L Schoenherr
arXiv preprint arXiv:2410.01574, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20