Conference Publications
List of peer-reviewed publications below. (*) indicates co-first authorship.
2025
                
                  
                  
                  NeurIPS Math AI Workshop
                  
                  
                
              
              
              
                
                  Scrapers Selectively Respect robots.txt Directives - Evidence from a Large-Scale Empirical Study
                  Taein Kim, Karstan Bock, Claire Luo, Amanda Liswood, Chloe Poroslay, Emily Wenger
                  Proceedings of the ACM Internet Measurement Conference (IMC)
                  
                    PDF
                  
                  
                
              
              
              
                
                  TAPAS - Datasets for Learning the Learning with Errors Problem
                  Eshika Saxena, Alberto Alfarano, Francois Charton, Emily Wenger, Kristin Lauter
                  Proceedings of Neural Information Processing Systems (NeurIPS)
                  
                  
                
              
              
              
                
                  Making Hard Problems Easier with Custom Data Distributions and Loss Regularization - A Case Study in Modular Arithmetic
                  Eshika Saxena, Alberto Alfarano, Emily Wenger, Kristin Lauter
                  Proceedings of the International Conference on Machine Learning (ICML)
                  
                    PDF
                  
                  
                
              
              
              
                
                  SALSA Fresca - Angular Embeddings and Pre-Training for ML Attacks on LWE
                  Samuel Stevens, Emily Wenger, Cathy Li, Eshika Saxena, Francois Charton, Kristin Lauter
                  Transactions on Machine Learning Research (TMLR)
                  
                    PDF
                  
                  
                
              
              
              
                
                  Benchmarking Attacks on Learning with Errors
                   Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin Lauter
                  Proceedings of the 46th IEEE Symposium on Security and Privacy (SP)
                  
                    PDF
                  
                  
                    Code
                  
                
              
              
            2024
                
                  The Cool and the Cruel - Separating Hard Parts of LWE Secrets
                  Niklas Nolte*, Mohamed Malhou*, Emily Wenger*, Samuel Stevens, Cathy Li, Francois Charton, Kristin Lauter
                  Proceedings of AFRICACRYPT
                  
                    PDF
                  
                  
                    Code
                  
                
              
              
              
                
                  Data Isotopes for Data Provenance in DNNs
                  Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov
                  Proceedings of Privacy Enhancing Technologies Symposium (PETS)
                  
                    PDF
                  
                  
                    Code
                  
                
              
              
            2023
                
                  SALSA VERDE - A machine learning attack on LWE with small sparse secrets
                  Cathy Li, Emily Wenger, Zeyuan Allen-Zhu, Francois Charton, Kristin Lauter
                  Proceedings of the 37th Conference on Neural Information Processing Systems (NeurIPS)
                  
                    PDF
                  
                  
                    Code
                  
                
              
              
              
                
                  SALSA PICANTE - A machine learning attack on LWE with binary secrets
                  Cathy Li, Jana Sotakova, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, Kristin Lauter
                  Proceedings of the ACM Conference on Computer and Communications Security (CCS)
                  
                    PDF
                  
                  
                    Code
                  
                
              
              
              
                
                  GLAZE - Protecting Artists from Style Mimicry by Text-to-Image Models
                  Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao
                  Proceedings of the 32nd USENIX Security Symposium
                  
                    PDF
                  
                  
                    Code
                  
                
              
              
              
                
                  SoK - Anti-Facial Recognition Technology
                  Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao
                  Proceedings of the 44th IEEE Symposium on Security and Privacy (SP)
                  
                    PDF
                  
                  
                
              
              
            2022
                
                  SALSA - Attacking Lattice Cryptography with Transformers
                  Emily Wenger*, Mingjie Chen*, Francois Charton, Kristin Lauter
                  Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS)
                  
                    PDF
                  
                  
                    Code
                  
                
              
              
              
                
                  Finding Naturally Occurring Physical Backdoors in Image Datasets
                  Emily Wenger*, Roma Bhattacharjee*, Arjun Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao
                  Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS)
                  
                    PDF
                  
                  
                    Code
                  
                
              
              
              
                
                  Post-breach Recovery - Protection against White-Box Adversarial Examples for Leaked DNN Models
                  Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao
                  Proceedings of the ACM Conference on Computer and Communications Security (CCS)
                  
                    PDF
                  
                  
                
              
              
              
                
                  Blacklight - Defending Black-Box Adversarial Attacks on Deep Neural Networks
                  Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao
                  Proceedings of the 31st USENIX Security Symposium
                  
                    PDF
                  
                  
                
              
              
            2021
                
                  Hello, It's Me - Deep Learning-based Speech Synthesis Attacks in the Real World
                  Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Zhao
                  Proceedings of the ACM Conference on Computer and Communications Security (CCS)
                  
                    PDF
                  
                  
                
              
              
              
                
                  Backdoor Attacks Against Deep Learning Systems in the Physical World
                  Emily Wenger, Josephine Passananti, Arjun Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao
                  Proceedings of IEEE/CVF Computer Vision and Pattern Recognition Conference (CVPR)
                  
                    PDF
                  
                  
                    Code
                  
                
              
              
            2020
                
                  Fawkes - Protecting Privacy against Unauthorized Deep Learning Models
                  Shawn Shan*, Emily Wenger*, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao
                  Proceedings of the 30th USENIX Security Symposium
                  
                    PDF
                  
                  
                    Code
                  
                
              
              
              
                
                  Gotta Catch'Em All - Using Honeypots to Catch Adversarial Attacks on Neural Networks
                  Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao
                  Proceedings of the ACM Conference on Computer and Communciations Security (CCS)
                  
                    PDF
                  
                  
                    Code
                  
                
              
              
            Preprints
              
                Exploring Causes of Representational Similarity in Machine Learning Models
                Zeyu Michael Li*, Hung Ahn Vu*, Damilola Awofisayo, Emily Wenger
                In Submission
                
                PDF
                
                
              
            
          
            
              
                What Happens when Generative Models Train Recursively on Each Others' Generated Outputs?
                Hung Ahn Vu, Galen Reeves, Emily Wenger
                In Submission
                
                PDF
                
                
              
            
          
            
              
                We're Different, We're the Same - Creative Homogeneity in Large Language Models
                Emily Wenger, Yoed N. Kenett
                In Submission
                
                PDF
                
                
              
            
          
            
              
                Assessing Privacy Risks from Feature Vector Reconstruction Attacks
                Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao
                In Submission
                
                PDF
                
                
              
            
          
            
              
                Piracy Resistant Watermarks for Deep Neural Networks
                Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng
                In Submission
                
                PDF
                
                
              
            
          
        