Остановите войну!
for scientists:
default search action
Lea Schönherr
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i15]Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, Thorsten Holz:
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. CoRR abs/2401.09824 (2024) - [i14]Antonio Emanuele Cinà, Francesco Villani, Maura Pintor, Lea Schönherr, Battista Biggio, Marcello Pelillo:
σ-zero: Gradient-based Optimization of 𝓁0-norm Adversarial Examples. CoRR abs/2402.01879 (2024) - [i13]Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer:
Whispers in the Machine: Confidentiality in LLM-integrated Systems. CoRR abs/2402.06922 (2024) - 2023
- [c12]Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, Thorsten Holz:
Drone Security and the Mysterious Case of DJI's DroneID. NDSS 2023 - [i12]Hossein Hajipour, Thorsten Holz, Lea Schönherr, Mario Fritz:
Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models. CoRR abs/2302.04012 (2023) - [i11]David Pape, Sina Däubener, Thorsten Eisenhofer, Antonio Emanuele Cinà, Lea Schönherr:
On the Limitations of Model Stealing with Uncertainty Quantification Models. CoRR abs/2305.05293 (2023) - [i10]Sahar Abdelnabi, Amr Gomaa, Sarath Sivaprasad, Lea Schönherr, Mario Fritz:
LLM-Deliberation: Evaluating LLMs with Interactive Multi-Agent Negotiation Games. CoRR abs/2309.17234 (2023) - [i9]Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz:
A Representative Study on Human Detection of Artificially Generated Media Across Countries. CoRR abs/2312.05976 (2023) - 2022
- [j1]Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz:
Exploring accidental triggers of smart speakers. Comput. Speech Lang. 73: 101328 (2022) - [c11]Timm Koppelmann, Luca Becker, Alexandru Nelus, Rene Glitza, Lea Schönherr, Rainer Martin:
Clustering-based Wake Word Detection in Privacy-aware Acoustic Sensor Networks. INTERSPEECH 2022: 719-723 - 2021
- [b1]Lea Schönherr:
Adversarially robust speech and speaker recognition. Ruhr University Bochum, Germany, 2021 - [c10]Timm Koppelmann, Alexandru Nelus, Lea Schönherr, Dorothea Kolossa, Rainer Martin:
Privacy-Preserving Feature Extraction for Cloud-Based Wake Word Verification. Interspeech 2021: 876-880 - [c9]Joel Frank, Lea Schönherr:
WaveFake: A Data Set to Facilitate Audio Deepfake Detection. NeurIPS Datasets and Benchmarks 2021 - [c8]Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz:
Dompteur: Taming Audio Adversarial Examples. USENIX Security Symposium 2021: 2309-2326 - [i8]Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz:
Dompteur: Taming Audio Adversarial Examples. CoRR abs/2102.05431 (2021) - [i7]Joel Frank, Lea Schönherr:
WaveFake: A Data Set to Facilitate Audio Deepfake Detection. CoRR abs/2111.02813 (2021) - 2020
- [c7]Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems. ACSAC 2020: 843-855 - [c6]Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz:
Leveraging Frequency Analysis for Deep Fake Image Recognition. ICML 2020: 3247-3258 - [c5]Jan Freiwald, Lea Schönherr, Christopher Schymura, Steffen Zeiler, Dorothea Kolossa:
Loss Functions for Deep Monaural Speech Enhancement. IJCNN 2020: 1-7 - [c4]Sina Däubener, Lea Schönherr, Asja Fischer, Dorothea Kolossa:
Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification. INTERSPEECH 2020: 4661-4665 - [i6]Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz:
Leveraging Frequency Analysis for Deep Fake Image Recognition. CoRR abs/2003.08685 (2020) - [i5]Sina Däubener, Lea Schönherr, Asja Fischer, Dorothea Kolossa:
Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification. CoRR abs/2005.14611 (2020) - [i4]Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz:
Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers. CoRR abs/2008.00508 (2020) - [i3]Hojjat Aghakhani, Thorsten Eisenhofer, Lea Schönherr, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
VENOMAVE: Clean-Label Poisoning Against Speech Recognition. CoRR abs/2010.10682 (2020)
2010 – 2019
- 2019
- [c3]Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. NDSS 2019 - [i2]Lea Schönherr, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Robust Over-the-Air Adversarial Examples Against Automatic Speech Recognition Systems. CoRR abs/1908.01551 (2019) - 2018
- [i1]Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. CoRR abs/1808.05665 (2018) - 2017
- [c2]Lea Schonherr, Steffen Zeiler, Dorothea Kolossa:
Spoofing detection via simultaneous verification of audio-visual synchronicity and transcription. ASRU 2017: 591-598 - 2016
- [c1]Lea Schonherr, Dennis Orth, Martin Heckmann, Dorothea Kolossa:
Environmentally robust audio-visual speaker identification. SLT 2016: 312-318
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-19 20:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint