Alert button
Picture for Lea Schönherr

Lea Schönherr

Alert button

Whispers in the Machine: Confidentiality in LLM-integrated Systems

Add code
Bookmark button
Alert button
Feb 10, 2024
Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer

Viaarxiv icon

$σ$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples

Add code
Bookmark button
Alert button
Feb 02, 2024
Antonio Emanuele Cinà, Francesco Villani, Maura Pintor, Lea Schönherr, Battista Biggio, Marcello Pelillo

Viaarxiv icon

A Representative Study on Human Detection of Artificially Generated Media Across Countries

Add code
Bookmark button
Alert button
Dec 10, 2023
Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz

Viaarxiv icon

LLM-Deliberation: Evaluating LLMs with Interactive Multi-Agent Negotiation Games

Add code
Bookmark button
Alert button
Sep 29, 2023
Sahar Abdelnabi, Amr Gomaa, Sarath Sivaprasad, Lea Schönherr, Mario Fritz

Figure 1 for LLM-Deliberation: Evaluating LLMs with Interactive Multi-Agent Negotiation Games
Figure 2 for LLM-Deliberation: Evaluating LLMs with Interactive Multi-Agent Negotiation Games
Figure 3 for LLM-Deliberation: Evaluating LLMs with Interactive Multi-Agent Negotiation Games
Figure 4 for LLM-Deliberation: Evaluating LLMs with Interactive Multi-Agent Negotiation Games
Viaarxiv icon

On the Limitations of Model Stealing with Uncertainty Quantification Models

Add code
Bookmark button
Alert button
May 09, 2023
David Pape, Sina Däubener, Thorsten Eisenhofer, Antonio Emanuele Cinà, Lea Schönherr

Figure 1 for On the Limitations of Model Stealing with Uncertainty Quantification Models
Figure 2 for On the Limitations of Model Stealing with Uncertainty Quantification Models
Figure 3 for On the Limitations of Model Stealing with Uncertainty Quantification Models
Viaarxiv icon

Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models

Add code
Bookmark button
Alert button
Feb 08, 2023
Hossein Hajipour, Thorsten Holz, Lea Schönherr, Mario Fritz

Figure 1 for Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models
Figure 2 for Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models
Figure 3 for Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models
Figure 4 for Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models
Viaarxiv icon

WaveFake: A Data Set to Facilitate Audio Deepfake Detection

Add code
Bookmark button
Alert button
Nov 04, 2021
Joel Frank, Lea Schönherr

Figure 1 for WaveFake: A Data Set to Facilitate Audio Deepfake Detection
Figure 2 for WaveFake: A Data Set to Facilitate Audio Deepfake Detection
Figure 3 for WaveFake: A Data Set to Facilitate Audio Deepfake Detection
Figure 4 for WaveFake: A Data Set to Facilitate Audio Deepfake Detection
Viaarxiv icon

Dompteur: Taming Audio Adversarial Examples

Add code
Bookmark button
Alert button
Feb 10, 2021
Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz

Figure 1 for Dompteur: Taming Audio Adversarial Examples
Figure 2 for Dompteur: Taming Audio Adversarial Examples
Figure 3 for Dompteur: Taming Audio Adversarial Examples
Figure 4 for Dompteur: Taming Audio Adversarial Examples
Viaarxiv icon

VENOMAVE: Clean-Label Poisoning Against Speech Recognition

Add code
Bookmark button
Alert button
Oct 21, 2020
Hojjat Aghakhani, Thorsten Eisenhofer, Lea Schönherr, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna

Figure 1 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Figure 2 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Figure 3 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Figure 4 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Viaarxiv icon

Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification

Add code
Bookmark button
Alert button
May 24, 2020
Sina Däubener, Lea Schönherr, Asja Fischer, Dorothea Kolossa

Figure 1 for Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification
Figure 2 for Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification
Figure 3 for Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification
Figure 4 for Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification
Viaarxiv icon