Follow
Thorsten Eisenhofer
Title
Cited by
Cited by
Year
Leveraging Frequency Analysis for Deep Fake Image Recognition
J Frank, T Eisenhofer, L Schönherr, A Fischer, D Kolossa, T Holz
International Conference on Machine Learning (ICML), 2020
5362020
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems
L Schönherr, T Eisenhofer, S Zeiler, T Holz, D Kolossa
Annual Computer Security Applications Conference (ACSAC), 2020
742020
Exploring Accidental Triggers of Smart Speakers
L Schönherr, M Golla, T Eisenhofer, J Wiele, D Kolossa, T Holz
Computer Speech & Language (CSL), 2022
70*2022
VENOMAVE: Targeted Poisoning Against Speech Recognition
H Aghakhani, L Schönherr, T Eisenhofer, D Kolossa, T Holz, C Kruegel, ...
Conference on Secure and Trustworthy Machine Learning (SaTML), 2023
36*2023
Dompteur: Taming Audio Adversarial Examples
T Eisenhofer, L Schönherr, J Frank, L Speckemeier, D Kolossa, T Holz
USENIX Security Symposium, 2021
362021
Password-Authenticated Key Exchange from Group Actions
M Abdalla, T Eisenhofer, E Kiltz, S Kunzweiler, D Riepel
Annual International Cryptology Conference (CRYPTO), 2022
302022
Drone Security and the Mysterious Case of DJI's DroneID.
N Schiller, M Chlosta, M Schloegel, N Bars, T Eisenhofer, T Scharnowski, ...
Network and Distributed System Security Symposium (NDSS), 2023
282023
Verifiable and Provably Secure Machine Unlearning
T Eisenhofer, D Riepel, V Chandrasekaran, E Ghosh, O Ohrimenko, ...
Computing Research Repository (CoRR), 2022
192022
Whispers in the Machine: Confidentiality in LLM-integrated Systems
J Evertz, M Chlosta, L Schönherr, T Eisenhofer
Computing Research Repository (CoRR), 2024
122024
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
T Eisenhofer, E Quiring, J Möller, D Riepel, T Holz, K Rieck
USENIX Security Symposium, 2023
52023
A Representative Study on Human Detection of Artificially Generated Media Across Countries
J Frank, F Herbert, J Ricker, L Schönherr, T Eisenhofer, A Fischer, ...
Symposium on Security and Privacy (SP), 2024
42024
Learned Systems Security
R Schuster, JP Zhou, T Eisenhofer, P Grubbs, N Papernot
Computing Research Repository (CoRR), 2022
32022
On the Limitations of Model Stealing with Uncertainty Quantification Models
D Pape, S Däubener, T Eisenhofer, AE Cinà, L Schönherr
European Symposium on Artificial Neural Networks, Computational Intelligence …, 2023
22023
Prompt Obfuscation for Large Language Models
D Pape, T Eisenhofer, L Schönherr
Computing Research Repository (CoRR), 2024
2024
SoK: Where to Fuzz? Assessing Target Selection Methods in Directed Fuzzing
F Weissberg, J Möller, T Ganz, E Imgrund, L Pirch, L Seidel, M Schloegel, ...
Asia Conference on Computer and Communications Security (ASIACCS), 2024
2024
Cross-Language Differential Testing of JSON Parsers
J Möller, F Weißberg, L Pirch, T Eisenhofer, K Rieck
Asia Conference on Computer and Communications Security (ASIACCS), 2024
2024
Security of Machine Learning Systems
T Eisenhofer
Dissertation, 2023
2023
Non-forgetting Classifiers
L Schönherr, T Eisenhofer, M Pintor, B Biggio
Security of Machine Learning (Dagstuhl Seminar 22281), 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–18