Conference Publications

List of peer-reviewed publications below. (*) indicates co-first authorship.

Data Isotopes for Data Provenance in DNNs
Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov
Proceedings of Privacy Enhancing Technologies Symposium (PETS), July 2024
PDF Code
SALSA VERDE - A machine learning attack on LWE with small sparse secrets
Cathy Li, Emily Wenger, Zeyuan Allen-Zhu, Francois Charton, Kristin Lauter
Proceedings of the 37th Conference on Neural Information Processing Systems (NeurIPS), November 2023
PDF Code
SALSA PICANTE - A machine learning attack on LWE with binary secrets
Cathy Li, Jana Sotakova, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, Kristin Lauter
Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2023
PDF Code
GLAZE - Protecting Artists from Style Mimicry by Text-to-Image Models
Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao
Proceedings of the 32nd USENIX Security Symposium, August 2023
PDF Code
SoK - Anti-Facial Recognition Technology
Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao
Proceedings of the 44th IEEE Symposium on Security and Privacy (SP), May 2023
PDF
SALSA - Attacking Lattice Cryptography with Transformers
Emily Wenger*, Mingjie Chen*, Francois Charton, Kristin Lauter
Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS), November 2022
PDF Code
Finding Naturally Occurring Physical Backdoors in Image Datasets
Emily Wenger*, Roma Bhattacharjee*, Arjun Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao
Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS), November 2022
PDF Code
Post-breach Recovery - Protection against White-Box Adversarial Examples for Leaked DNN Models
Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao
Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2022
PDF
Blacklight - Defending Black-Box Adversarial Attacks on Deep Neural Networks
Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao
Proceedings of the 31st USENIX Security Symposium, August 2022
PDF
Hello, It's Me - Deep Learning-based Speech Synthesis Attacks in the Real World
Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Zhao
Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2021
PDF
Backdoor Attacks Against Deep Learning Systems in the Physical World
Emily Wenger, Josephine Passananti, Arjun Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao
Proceedings of IEEE/CVF Computer Vision and Pattern Recognition Conference (CVPR), June 2021
PDF Code
Fawkes - Protecting Privacy against Unauthorized Deep Learning Models
Shawn Shan*, Emily Wenger*, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao
Proceedings of the 30th USENIX Security Symposium, August 2020
PDF Code
Gotta Catch'Em All - Using Honeypots to Catch Adversarial Attacks on Neural Networks
Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao
Proceedings of the ACM Conference on Computer and Communciations Security (CCS), November 2020
PDF Code


Preprints

Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao
In Submission
PDF
Piracy Resistant Watermarks for Deep Neural Networks
Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng
In Submission
PDF