Conference Publications

List of peer-reviewed publications below. (*) indicates co-first authorship.

2025

Making Hard Problems Easier with Custom Data Distributions and Loss Regularization - A Case Study in Modular Arithmetic
Eshika Saxena, Alberto Alfarano, Emily Wenger, Kristin Lauter
Proceedings of the International Conference on Machine Learning (ICML)
PDF
SALSA Fresca - Angular Embeddings and Pre-Training for ML Attacks on LWE
Samuel Stevens, Emily Wenger, Cathy Li, Eshika Saxena, Francois Charton, Kristin Lauter
Transactions on Machine Learning Research (TMLR)
PDF
Benchmarking Attacks on Learning with Errors
Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin Lauter
Proceedings of the 46th IEEE Symposium on Security and Privacy (SP)
PDF Code

2024

The Cool and the Cruel - Separating Hard Parts of LWE Secrets
Niklas Nolte*, Mohamed Malhou*, Emily Wenger*, Samuel Stevens, Cathy Li, Francois Charton, Kristin Lauter
Proceedings of AFRICACRYPT
PDF Code
Data Isotopes for Data Provenance in DNNs
Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov
Proceedings of Privacy Enhancing Technologies Symposium (PETS)
PDF Code

2023

SALSA VERDE - A machine learning attack on LWE with small sparse secrets
Cathy Li, Emily Wenger, Zeyuan Allen-Zhu, Francois Charton, Kristin Lauter
Proceedings of the 37th Conference on Neural Information Processing Systems (NeurIPS)
PDF Code
SALSA PICANTE - A machine learning attack on LWE with binary secrets
Cathy Li, Jana Sotakova, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, Kristin Lauter
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
PDF Code
GLAZE - Protecting Artists from Style Mimicry by Text-to-Image Models
Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao
Proceedings of the 32nd USENIX Security Symposium
PDF Code
SoK - Anti-Facial Recognition Technology
Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao
Proceedings of the 44th IEEE Symposium on Security and Privacy (SP)
PDF

2022

SALSA - Attacking Lattice Cryptography with Transformers
Emily Wenger*, Mingjie Chen*, Francois Charton, Kristin Lauter
Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS)
PDF Code
Finding Naturally Occurring Physical Backdoors in Image Datasets
Emily Wenger*, Roma Bhattacharjee*, Arjun Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao
Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS)
PDF Code
Post-breach Recovery - Protection against White-Box Adversarial Examples for Leaked DNN Models
Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
PDF
Blacklight - Defending Black-Box Adversarial Attacks on Deep Neural Networks
Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao
Proceedings of the 31st USENIX Security Symposium
PDF

2021

Hello, It's Me - Deep Learning-based Speech Synthesis Attacks in the Real World
Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Zhao
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
PDF
Backdoor Attacks Against Deep Learning Systems in the Physical World
Emily Wenger, Josephine Passananti, Arjun Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao
Proceedings of IEEE/CVF Computer Vision and Pattern Recognition Conference (CVPR)
PDF Code

2020

Fawkes - Protecting Privacy against Unauthorized Deep Learning Models
Shawn Shan*, Emily Wenger*, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao
Proceedings of the 30th USENIX Security Symposium
PDF Code
Gotta Catch'Em All - Using Honeypots to Catch Adversarial Attacks on Neural Networks
Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao
Proceedings of the ACM Conference on Computer and Communciations Security (CCS)
PDF Code


Preprints

We're Different, We're the Same - Creative Homogeneity in Large Language Models
Emily Wenger, Yoed N. Kenett
In Submission
PDF
Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao
In Submission
PDF
Piracy Resistant Watermarks for Deep Neural Networks
Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng
In Submission
PDF