Follow
Lea Schönherr
Lea Schönherr
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
Leveraging Frequency Analysis for Deep Fake Image Recognition
J Frank, T Eisenhofer, L Schönherr, A Fischer, D Kolossa, T Holz
International Conference on Machine Learning (ICML), 2020
6122020
Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding
L Schönherr, K Kohls, S Zeiler, T Holz, D Kolossa
Network and Distributed System Security Symposium (NDSS), 2019
3722019
WaveFake: a data set to facilitate audio deepfake detection
J Frank, L Schönherr
NeurIPS Dataset and Benchmark Track, 2021
1402021
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems
L Schönherr, T Eisenhofer, S Zeiler, T Holz, D Kolossa
Annual Computer Security Applications Conference (ACSAC), 2020
87*2020
Exploring accidental triggers of smart speakers
L Schönherr, M Golla, T Eisenhofer, J Wiele, D Kolossa, T Holz
Computer Speech & Language 73, 2022
74*2022
Cooperation, Competition, and Maliciousness: LLM-Stakeholders Interactive Negotiation
S Abdelnabi, A Gomaa, S Sivaprasad, L Schönherr, M Fritz
NeurIPS Dataset and Benchmark Track, 2024
49*2024
CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models
H Hajipour, K Hassler, T Holz, L Schönherr, M Fritz
Secure and Trustworthy Machine Learning (SatML), 2024
44*2024
Drone Security and the Mysterious Case of DJI's DroneID.
N Schiller, M Chlosta, M Schloegel, N Bars, T Eisenhofer, T Scharnowski, ...
Network and Distributed System Security Symposium (NDSS), 2023
392023
Dompteur: Taming Audio Adversarial Examples
T Eisenhofer, L Schönherr, J Frank, L Speckemeier, D Kolossa, T Holz
USENIX Security Symposium, 2021
392021
VENOMAVE: Clean-label poisoning against speech recognition
H Aghakhani, T Eisenhofer, L Schönherr, D Kolossa, T Holz, C Kruegel, ...
Secure and Trustworthy Machine Learning (SatML), 2023
38*2023
Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification
S Däubener, L Schönherr, A Fischer, D Kolossa
INTERSPEECH, 2020
232020
Whispers in the Machine: Confidentiality in LLM-integrated Systems
J Evertz, M Chlosta, L Schönherr, T Eisenhofer
arXiv preprint arXiv:2402.06922, 2024
152024
Environmentally robust audio-visual speaker identification
L Schönherr, D Orth, M Heckmann, D Kolossa
IEEE Spoken Language Technology Workshop (SLT), 2016
122016
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams
B Acharya, M Saad, AE Cinà, L Schönherr, HD Nguyen, A Oest, ...
IEEE Security & Privacy (S&P), 2024
92024
A Representative Study on Human Detection of Artificially Generated Media Across Countries
J Frank, F Herbert, J Ricker, L Schönherr, T Eisenhofer, A Fischer, ...
IEEE Security & Privacy (S&P), 2024
92024
Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition
E Debenedetti, J Rando, D Paleka, SF Florin, D Albastroiu, N Cohen, ...
NeurIPS Dataset and Benchmark Track, 2024
82024
Privacy-Preserving Feature Extraction for Cloud-Based Wake Word Verification
AN Timm Koppelmann, L Schönherr, D Kolossa, R Martin
INTERSPEECH, 2021
82021
Clustering-based Wake Word Detection in Privacy-aware Acoustic Sensor Networks
T Koppelmann, L Becker, A Nelus, R Glitza, L Schönherr, R Martin
Proc. Interspeech 2022, 719-723, 2022
62022
Rag and roll: An end-to-end evaluation of indirect prompt manipulations in llm-based application frameworks
G De Stefano, L Schönherr, G Pellegrino
arXiv preprint arXiv:2408.05025, 2024
42024
σ-zero: Gradient-based Optimization of 𝓁0-norm Adversarial Examples.
AE Cinà, F Villani, M Pintor, L Schönherr, B Biggio, M Pelillo
International Conference on Learning Representations (ICLR), 2025
32025
The system can't perform the operation now. Try again later.
Articles 1–20