Thorsten Eisenhofer
Ruhr-Universität Bochum
H-index: 8
Europe-Germany
Top articles of Thorsten Eisenhofer
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Whispers in the Machine: Confidentiality in LLM-integrated Systems | Computing Research Repository (CoRR) | Jonathan Evertz Merlin Chlosta Lea Schönherr Thorsten Eisenhofer | 2024/2/10 |
A Representative Study on Human Detection of Artificially Generated Media Across Countries | Joel Frank Franziska Herbert Jonas Ricker Lea Schönherr Thorsten Eisenhofer | 2024 | |
Drone Security and the Mysterious Case of DJI's DroneID. | Nico Schiller Merlin Chlosta Moritz Schloegel Nils Bars Thorsten Eisenhofer | 2023/2/27 | |
On the Limitations of Model Stealing with Uncertainty Quantification Models | European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN) | David Pape Sina Däubener Thorsten Eisenhofer Antonio Emanuele Cinà Lea Schönherr | 2023 |
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning | USENIX Security Symposium | Thorsten Eisenhofer Erwin Quiring Jonas Möller Doreen Riepel Thorsten Holz | 2023 |
VENOMAVE: Targeted Poisoning Against Speech Recognition | Conference on Secure and Trustworthy Machine Learning (SaTML) | Hojjat Aghakhani Lea Schönherr Thorsten Eisenhofer Dorothea Kolossa Thorsten Holz | 2023 |
Security of Machine Learning Systems | Dissertation | Thorsten Eisenhofer | 2023/10/19 |
Verifiable and Provably Secure Machine Unlearning | Computing Research Repository (CoRR) | Thorsten Eisenhofer Doreen Riepel Varun Chandrasekaran Esha Ghosh Olga Ohrimenko | 2022/10/17 |
Password-Authenticated Key Exchange from Group Actions | Michel Abdalla Thorsten Eisenhofer Eike Kiltz Sabrina Kunzweiler Doreen Riepel | 2022/8/15 | |
Exploring Accidental Triggers of Smart Speakers | Computer Speech & Language (CSL) | Lea Schönherr Maximilian Golla Thorsten Eisenhofer Jan Wiele Dorothea Kolossa | 2022 |
Learned Systems Security | Computing Research Repository (CoRR) | Roei Schuster Jin Peng Zhou Thorsten Eisenhofer Paul Grubbs Nicolas Papernot | 2022/12/20 |
Dompteur: Taming Audio Adversarial Examples | USENIX Security Symposium | Thorsten Eisenhofer Lea Schönherr Joel Frank Lars Speckemeier Dorothea Kolossa | 2021 |
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems | Lea Schönherr Thorsten Eisenhofer Steffen Zeiler Thorsten Holz Dorothea Kolossa | 2020 | |
Leveraging Frequency Analysis for Deep Fake Image Recognition | Joel Frank Thorsten Eisenhofer Lea Schönherr Asja Fischer Dorothea Kolossa | 2020 |