Conference Publications

List of peer-reviewed publications below. (*) indicates co-first authorship.

SoK - Anti-Facial Recognition Technology
Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao
Proceedings of the 44th IEEE Symposium on Security and Privacy (SP), May 2023 (to appear)
PDF
SALSA - Attacking Lattice Cryptography with Transformers
Emily Wenger*, Mingjie Chen*, Francois Charton, Kristin Lauter
Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS), November 2022 (to appear)
PDF
Finding Naturally Occurring Physical Backdoors in Image Datasets
Emily Wenger*, Roma Bhattacharjee*, Arjun Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao
Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS), November 2022 (to appear)
PDF Code
Post-breach Recovery - Protection against White-Box Adversarial Examples for Leaked DNN Models
Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao
Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2022 (to appear)
PDF
Blacklight - Defending Black-Box Adversarial Attacks on Deep Neural Networks
Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao
Proceedings of the 31st USENIX Security Symposium, August 2022
PDF
Hello, It's Me - Deep Learning-based Speech Synthesis Attacks in the Real World
Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Zhao
Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2021
PDF
Backdoor Attacks Against Deep Learning Systems in the Physical World
Emily Wenger, Josephine Passananti, Arjun Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao
Proceedings of IEEE/CVF Computer Vision and Pattern Recognition Conference (CVPR), June 2021
PDF Code
Fawkes - Protecting Privacy against Unauthorized Deep Learning Models
Shawn Shan*, Emily Wenger*, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao
Proceedings of the 30th USENIX Security Symposium, August 2020
PDF Code
Gotta Catch'Em All - Using Honeypots to Catch Adversarial Attacks on Neural Networks
Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao
Proceedings of the ACM Conference on Computer and Communciations Security (CCS), November 2020
PDF Code


Preprints

Data Isotopes for Data Provenance in DNNs
Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov
In Submission
PDF
Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao
In Submission
PDF
Piracy Resistant Watermarks for Deep Neural Networks
Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng
In Submission
PDF