Alert button
Picture for Emily Wenger

Emily Wenger

Alert button

Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors

Add code
Bookmark button
Alert button
Feb 02, 2024
Samuel Stevens, Emily Wenger, Cathy Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin Lauter

Viaarxiv icon

SALSA PICANTE: a machine learning attack on LWE with binary secrets

Add code
Bookmark button
Alert button
Mar 07, 2023
Cathy Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, Kristin Lauter

Figure 1 for SALSA PICANTE: a machine learning attack on LWE with binary secrets
Figure 2 for SALSA PICANTE: a machine learning attack on LWE with binary secrets
Figure 3 for SALSA PICANTE: a machine learning attack on LWE with binary secrets
Figure 4 for SALSA PICANTE: a machine learning attack on LWE with binary secrets
Viaarxiv icon

Data Isotopes for Data Provenance in DNNs

Add code
Bookmark button
Alert button
Aug 29, 2022
Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov

Figure 1 for Data Isotopes for Data Provenance in DNNs
Figure 2 for Data Isotopes for Data Provenance in DNNs
Figure 3 for Data Isotopes for Data Provenance in DNNs
Figure 4 for Data Isotopes for Data Provenance in DNNs
Viaarxiv icon

SALSA: Attacking Lattice Cryptography with Transformers

Add code
Bookmark button
Alert button
Jul 11, 2022
Emily Wenger, Mingjie Chen, François Charton, Kristin Lauter

Figure 1 for SALSA: Attacking Lattice Cryptography with Transformers
Figure 2 for SALSA: Attacking Lattice Cryptography with Transformers
Figure 3 for SALSA: Attacking Lattice Cryptography with Transformers
Figure 4 for SALSA: Attacking Lattice Cryptography with Transformers
Viaarxiv icon

Natural Backdoor Datasets

Add code
Bookmark button
Alert button
Jun 21, 2022
Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao

Figure 1 for Natural Backdoor Datasets
Figure 2 for Natural Backdoor Datasets
Figure 3 for Natural Backdoor Datasets
Figure 4 for Natural Backdoor Datasets
Viaarxiv icon

Assessing Privacy Risks from Feature Vector Reconstruction Attacks

Add code
Bookmark button
Alert button
Feb 11, 2022
Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao

Figure 1 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 2 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 3 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 4 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Viaarxiv icon

SoK: Anti-Facial Recognition Technology

Add code
Bookmark button
Alert button
Dec 08, 2021
Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao

Figure 1 for SoK: Anti-Facial Recognition Technology
Figure 2 for SoK: Anti-Facial Recognition Technology
Figure 3 for SoK: Anti-Facial Recognition Technology
Figure 4 for SoK: Anti-Facial Recognition Technology
Viaarxiv icon

"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World

Add code
Bookmark button
Alert button
Sep 20, 2021
Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao

Figure 1 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Figure 2 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Figure 3 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Figure 4 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Viaarxiv icon

Backdoor Attacks on Facial Recognition in the Physical World

Add code
Bookmark button
Alert button
Jun 25, 2020
Emily Wenger, Josephine Passananti, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao

Figure 1 for Backdoor Attacks on Facial Recognition in the Physical World
Figure 2 for Backdoor Attacks on Facial Recognition in the Physical World
Figure 3 for Backdoor Attacks on Facial Recognition in the Physical World
Figure 4 for Backdoor Attacks on Facial Recognition in the Physical World
Viaarxiv icon

Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks

Add code
Bookmark button
Alert button
Jun 24, 2020
Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao

Figure 1 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 2 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 3 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 4 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Viaarxiv icon