Picture for Emily Wenger

Emily Wenger

Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors

Add code
Feb 02, 2024
Viaarxiv icon

SALSA PICANTE: a machine learning attack on LWE with binary secrets

Add code
Mar 07, 2023
Figure 1 for SALSA PICANTE: a machine learning attack on LWE with binary secrets
Figure 2 for SALSA PICANTE: a machine learning attack on LWE with binary secrets
Figure 3 for SALSA PICANTE: a machine learning attack on LWE with binary secrets
Figure 4 for SALSA PICANTE: a machine learning attack on LWE with binary secrets
Viaarxiv icon

Data Isotopes for Data Provenance in DNNs

Add code
Aug 29, 2022
Figure 1 for Data Isotopes for Data Provenance in DNNs
Figure 2 for Data Isotopes for Data Provenance in DNNs
Figure 3 for Data Isotopes for Data Provenance in DNNs
Figure 4 for Data Isotopes for Data Provenance in DNNs
Viaarxiv icon

SALSA: Attacking Lattice Cryptography with Transformers

Add code
Jul 11, 2022
Figure 1 for SALSA: Attacking Lattice Cryptography with Transformers
Figure 2 for SALSA: Attacking Lattice Cryptography with Transformers
Figure 3 for SALSA: Attacking Lattice Cryptography with Transformers
Figure 4 for SALSA: Attacking Lattice Cryptography with Transformers
Viaarxiv icon

Natural Backdoor Datasets

Add code
Jun 21, 2022
Figure 1 for Natural Backdoor Datasets
Figure 2 for Natural Backdoor Datasets
Figure 3 for Natural Backdoor Datasets
Figure 4 for Natural Backdoor Datasets
Viaarxiv icon

Assessing Privacy Risks from Feature Vector Reconstruction Attacks

Add code
Feb 11, 2022
Figure 1 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 2 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 3 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 4 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Viaarxiv icon

SoK: Anti-Facial Recognition Technology

Add code
Dec 08, 2021
Figure 1 for SoK: Anti-Facial Recognition Technology
Figure 2 for SoK: Anti-Facial Recognition Technology
Figure 3 for SoK: Anti-Facial Recognition Technology
Figure 4 for SoK: Anti-Facial Recognition Technology
Viaarxiv icon

"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World

Add code
Sep 20, 2021
Figure 1 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Figure 2 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Figure 3 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Figure 4 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Viaarxiv icon

Backdoor Attacks on Facial Recognition in the Physical World

Add code
Jun 25, 2020
Figure 1 for Backdoor Attacks on Facial Recognition in the Physical World
Figure 2 for Backdoor Attacks on Facial Recognition in the Physical World
Figure 3 for Backdoor Attacks on Facial Recognition in the Physical World
Figure 4 for Backdoor Attacks on Facial Recognition in the Physical World
Viaarxiv icon

Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks

Add code
Jun 24, 2020
Figure 1 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 2 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 3 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 4 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Viaarxiv icon