Alert button
Picture for Thorsten Holz

Thorsten Holz

Alert button

A Representative Study on Human Detection of Artificially Generated Media Across Countries

Add code
Bookmark button
Alert button
Dec 10, 2023
Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz

Viaarxiv icon

No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning

Add code
Bookmark button
Alert button
Mar 25, 2023
Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck

Figure 1 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Figure 2 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Figure 3 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Figure 4 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Viaarxiv icon

More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models

Add code
Bookmark button
Alert button
Feb 23, 2023
Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, Mario Fritz

Figure 1 for More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models
Figure 2 for More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models
Figure 3 for More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models
Figure 4 for More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models
Viaarxiv icon

Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models

Add code
Bookmark button
Alert button
Feb 08, 2023
Hossein Hajipour, Thorsten Holz, Lea Schönherr, Mario Fritz

Figure 1 for Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models
Figure 2 for Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models
Figure 3 for Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models
Figure 4 for Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models
Viaarxiv icon

Towards the Detection of Diffusion Model Deepfakes

Add code
Bookmark button
Alert button
Oct 26, 2022
Jonas Ricker, Simon Damm, Thorsten Holz, Asja Fischer

Figure 1 for Towards the Detection of Diffusion Model Deepfakes
Figure 2 for Towards the Detection of Diffusion Model Deepfakes
Figure 3 for Towards the Detection of Diffusion Model Deepfakes
Figure 4 for Towards the Detection of Diffusion Model Deepfakes
Viaarxiv icon

[RE] CNN-generated images are surprisingly easy to spot...for now

Add code
Bookmark button
Alert button
Apr 07, 2021
Joel Frank, Thorsten Holz

Figure 1 for [RE] CNN-generated images are surprisingly easy to spot...for now
Figure 2 for [RE] CNN-generated images are surprisingly easy to spot...for now
Figure 3 for [RE] CNN-generated images are surprisingly easy to spot...for now
Figure 4 for [RE] CNN-generated images are surprisingly easy to spot...for now
Viaarxiv icon

Dompteur: Taming Audio Adversarial Examples

Add code
Bookmark button
Alert button
Feb 10, 2021
Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz

Figure 1 for Dompteur: Taming Audio Adversarial Examples
Figure 2 for Dompteur: Taming Audio Adversarial Examples
Figure 3 for Dompteur: Taming Audio Adversarial Examples
Figure 4 for Dompteur: Taming Audio Adversarial Examples
Viaarxiv icon

VENOMAVE: Clean-Label Poisoning Against Speech Recognition

Add code
Bookmark button
Alert button
Oct 21, 2020
Hojjat Aghakhani, Thorsten Eisenhofer, Lea Schönherr, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna

Figure 1 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Figure 2 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Figure 3 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Figure 4 for VENOMAVE: Clean-Label Poisoning Against Speech Recognition
Viaarxiv icon

Leveraging Frequency Analysis for Deep Fake Image Recognition

Add code
Bookmark button
Alert button
Mar 20, 2020
Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz

Figure 1 for Leveraging Frequency Analysis for Deep Fake Image Recognition
Figure 2 for Leveraging Frequency Analysis for Deep Fake Image Recognition
Figure 3 for Leveraging Frequency Analysis for Deep Fake Image Recognition
Figure 4 for Leveraging Frequency Analysis for Deep Fake Image Recognition
Viaarxiv icon