Thorsten Eisenhofer

Orcid: 0000-0002-4706-260X

According to our database1, Thorsten Eisenhofer authored at least 19 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Prompt Obfuscation for Large Language Models.
CoRR, 2024

Whispers in the Machine: Confidentiality in LLM-integrated Systems.
CoRR, 2024

A Representative Study on Human Detection of Artificially Generated Media Across Countries.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

SoK: Where to Fuzz? Assessing Target Selection Methods in Directed Fuzzing.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Cross-Language Differential Testing of JSON Parsers.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Security of machine learning systems.
PhD thesis, 2023

No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Venomave: Targeted Poisoning Against Speech Recognition.
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023

Drone Security and the Mysterious Case of DJI's DroneID.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

On the Limitations of Model Stealing with Uncertainty Quantification Models.
Proceedings of the 31st European Symposium on Artificial Neural Networks, 2023

2022
Password-Authenticated Key Exchange from Group Actions.
IACR Cryptol. ePrint Arch., 2022

Exploring accidental triggers of smart speakers.
Comput. Speech Lang., 2022

Learned Systems Security.
CoRR, 2022

Verifiable and Provably Secure Machine Unlearning.
CoRR, 2022

2021
Dompteur: Taming Audio Adversarial Examples.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
VENOMAVE: Clean-Label Poisoning Against Speech Recognition.
CoRR, 2020

Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers.
CoRR, 2020

Leveraging Frequency Analysis for Deep Fake Image Recognition.
Proceedings of the 37th International Conference on Machine Learning, 2020

Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020


  Loading...