Alert button
Picture for Thorsten Eisenhofer

Thorsten Eisenhofer

Alert button

Whispers in the Machine: Confidentiality in LLM-integrated Systems

Add code
Bookmark button
Alert button
Feb 10, 2024
Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer

Viaarxiv icon

A Representative Study on Human Detection of Artificially Generated Media Across Countries

Add code
Bookmark button
Alert button
Dec 10, 2023
Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz

Viaarxiv icon

On the Limitations of Model Stealing with Uncertainty Quantification Models

Add code
Bookmark button
Alert button
May 09, 2023
David Pape, Sina Däubener, Thorsten Eisenhofer, Antonio Emanuele Cinà, Lea Schönherr

Figure 1 for On the Limitations of Model Stealing with Uncertainty Quantification Models
Figure 2 for On the Limitations of Model Stealing with Uncertainty Quantification Models
Figure 3 for On the Limitations of Model Stealing with Uncertainty Quantification Models
Viaarxiv icon

No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning

Add code
Bookmark button
Alert button
Mar 25, 2023
Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck

Figure 1 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Figure 2 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Figure 3 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Figure 4 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Viaarxiv icon

Learned Systems Security

Add code
Bookmark button
Alert button
Jan 10, 2023
Roei Schuster, Jin Peng Zhou, Thorsten Eisenhofer, Paul Grubbs, Nicolas Papernot

Figure 1 for Learned Systems Security
Figure 2 for Learned Systems Security
Figure 3 for Learned Systems Security
Figure 4 for Learned Systems Security
Viaarxiv icon

Verifiable and Provably Secure Machine Unlearning

Add code
Bookmark button
Alert button
Oct 17, 2022
Thorsten Eisenhofer, Doreen Riepel, Varun Chandrasekaran, Esha Ghosh, Olga Ohrimenko, Nicolas Papernot

Figure 1 for Verifiable and Provably Secure Machine Unlearning
Figure 2 for Verifiable and Provably Secure Machine Unlearning
Figure 3 for Verifiable and Provably Secure Machine Unlearning
Figure 4 for Verifiable and Provably Secure Machine Unlearning
Viaarxiv icon

Dompteur: Taming Audio Adversarial Examples

Add code
Bookmark button
Alert button
Feb 10, 2021
Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz

Figure 1 for Dompteur: Taming Audio Adversarial Examples
Figure 2 for Dompteur: Taming Audio Adversarial Examples
Figure 3 for Dompteur: Taming Audio Adversarial Examples
Figure 4 for Dompteur: Taming Audio Adversarial Examples
Viaarxiv icon

VENOMAVE: Clean-Label Poisoning Against Speech Recognition

Add code
Bookmark button
Alert button
Oct 21, 2020
Hojjat Aghakhani, Thorsten Eisenhofer, Lea Schönherr, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna

Figure 1 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Figure 2 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Figure 3 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Figure 4 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Viaarxiv icon

Leveraging Frequency Analysis for Deep Fake Image Recognition

Add code
Bookmark button
Alert button
Mar 20, 2020
Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz

Figure 1 for Leveraging Frequency Analysis for Deep Fake Image Recognition
Figure 2 for Leveraging Frequency Analysis for Deep Fake Image Recognition
Figure 3 for Leveraging Frequency Analysis for Deep Fake Image Recognition
Figure 4 for Leveraging Frequency Analysis for Deep Fake Image Recognition
Viaarxiv icon