Picture for Thorsten Eisenhofer

Thorsten Eisenhofer

Prompt Obfuscation for Large Language Models

Add code
Sep 17, 2024
Viaarxiv icon

Whispers in the Machine: Confidentiality in LLM-integrated Systems

Add code
Feb 10, 2024
Viaarxiv icon

A Representative Study on Human Detection of Artificially Generated Media Across Countries

Add code
Dec 10, 2023
Viaarxiv icon

On the Limitations of Model Stealing with Uncertainty Quantification Models

Add code
May 09, 2023
Viaarxiv icon

No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning

Add code
Mar 25, 2023
Viaarxiv icon

Learned Systems Security

Add code
Jan 10, 2023
Viaarxiv icon

Verifiable and Provably Secure Machine Unlearning

Add code
Oct 17, 2022
Figure 1 for Verifiable and Provably Secure Machine Unlearning
Figure 2 for Verifiable and Provably Secure Machine Unlearning
Figure 3 for Verifiable and Provably Secure Machine Unlearning
Figure 4 for Verifiable and Provably Secure Machine Unlearning
Viaarxiv icon

Dompteur: Taming Audio Adversarial Examples

Add code
Feb 10, 2021
Figure 1 for Dompteur: Taming Audio Adversarial Examples
Figure 2 for Dompteur: Taming Audio Adversarial Examples
Figure 3 for Dompteur: Taming Audio Adversarial Examples
Figure 4 for Dompteur: Taming Audio Adversarial Examples
Viaarxiv icon

VENOMAVE: Clean-Label Poisoning Against Speech Recognition

Add code
Oct 21, 2020
Figure 1 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Figure 2 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Figure 3 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Figure 4 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Viaarxiv icon

Leveraging Frequency Analysis for Deep Fake Image Recognition

Add code
Mar 20, 2020
Figure 1 for Leveraging Frequency Analysis for Deep Fake Image Recognition
Figure 2 for Leveraging Frequency Analysis for Deep Fake Image Recognition
Figure 3 for Leveraging Frequency Analysis for Deep Fake Image Recognition
Figure 4 for Leveraging Frequency Analysis for Deep Fake Image Recognition
Viaarxiv icon