We try to keep this up to date, but a more complete list can be found on Emily’s google scholar profile.
*= co-first authors; ^= co-senior authors
Teaching Transformers Modular Arithmetic At Scale
Eshika Saxena, Alberto Alfarano, Emily Wenger^, Kristin Lauter^
ArXiv, 2024 (Paper)
SALSA Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning with Errors
Samuel Stevens, Emily Wenger, Cathy Li, Niklas Nolte, Eshika Saxena, Francois Charton, Kristin Lauter
ArXiv, 2024 (Paper)
Benchmarking Attacks on Learning with Errors
Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin Lauter
Oakland S&P (Paper, Website)
The Cool and the Cruel: Separating the hard parts of LWE Secrets
Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Li, Francois Charton, Kristin Lauter
AFRICACRYPT, (Paper, Code)
Data Isotopes for Data Provenance in DNNs
Emily Wenger, Xiuyu Li, Vitaly Shmatikov, Ben Y. Zhao
PoPETs (Paper, Code)
SALSA VERDE: A machine learning attack on LWE with small sparse secrets
Cathy Li, Emily Wenger, Zeyuan Allen-Zhu, Francois Charton, Kristin Lauter
NeurIPS (Paper, Code)
SALSA PICANTE: A machine learning attack on LWE with binary secrets
Cathy Li, Jana Sotakova, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, Kristin Lauter.
ACM CCS (Paper)
GLAZE: Protecting Artists from Style Mimicry by Text-to-Image Models
Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao
USENIX Security (Paper, Website)
Distinguished Paper Award, see here for press coverage.
SoK: Anti-Facial Recognition Technology
Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao
Oakland Security & Privacy (Paper)
SALSA: Attacking Lattice Cryptography with Transformers
Emily Wenger, Mingjie Chen, Francois Charton, Kristin Lauter
NeurIPS (Paper, Code)
Finding Naturally Occurring Physical Backdoors in Image Datasets
Emily Wenger, Roma Bhattacharjee, Arjun Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao
NeurIPS (Paper, Code)
Post-breach Recovery: Protection against White-Box Adversarial Examples for Leaked DNN Models
Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao
ACM CCS (Paper)
Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao
USENIX Security (Paper)
Backdoor Attacks on Deep Learning Systems in the Physical World
Emily Wenger, Josephine Passananti, Arjun Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao
CVPR 2021, (Paper, Code)
Hello, It’s Me: Deep Learning-based Speech Synthesis Attacks in the Real World
Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Zhao
ACM CCS 2021, (Paper)
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao
USENIX 2020 (Paper, Code)
Gotta Catch’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao
ACM CCS 2020 (Paper, Code)