Picture for Emily Wenger

Emily Wenger

Teaching Transformers Modular Arithmetic at Scale

Add code
Oct 04, 2024
Figure 1 for Teaching Transformers Modular Arithmetic at Scale
Figure 2 for Teaching Transformers Modular Arithmetic at Scale
Figure 3 for Teaching Transformers Modular Arithmetic at Scale
Figure 4 for Teaching Transformers Modular Arithmetic at Scale
Viaarxiv icon

Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors

Add code
Feb 02, 2024
Viaarxiv icon

SALSA PICANTE: a machine learning attack on LWE with binary secrets

Add code
Mar 07, 2023
Viaarxiv icon

Data Isotopes for Data Provenance in DNNs

Add code
Aug 29, 2022
Figure 1 for Data Isotopes for Data Provenance in DNNs
Figure 2 for Data Isotopes for Data Provenance in DNNs
Figure 3 for Data Isotopes for Data Provenance in DNNs
Figure 4 for Data Isotopes for Data Provenance in DNNs
Viaarxiv icon

SALSA: Attacking Lattice Cryptography with Transformers

Add code
Jul 11, 2022
Figure 1 for SALSA: Attacking Lattice Cryptography with Transformers
Figure 2 for SALSA: Attacking Lattice Cryptography with Transformers
Figure 3 for SALSA: Attacking Lattice Cryptography with Transformers
Figure 4 for SALSA: Attacking Lattice Cryptography with Transformers
Viaarxiv icon

Natural Backdoor Datasets

Add code
Jun 21, 2022
Figure 1 for Natural Backdoor Datasets
Figure 2 for Natural Backdoor Datasets
Figure 3 for Natural Backdoor Datasets
Figure 4 for Natural Backdoor Datasets
Viaarxiv icon

Assessing Privacy Risks from Feature Vector Reconstruction Attacks

Add code
Feb 11, 2022
Viaarxiv icon

SoK: Anti-Facial Recognition Technology

Add code
Dec 08, 2021
Figure 1 for SoK: Anti-Facial Recognition Technology
Figure 2 for SoK: Anti-Facial Recognition Technology
Figure 3 for SoK: Anti-Facial Recognition Technology
Figure 4 for SoK: Anti-Facial Recognition Technology
Viaarxiv icon

"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World

Add code
Sep 20, 2021
Figure 1 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Figure 2 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Figure 3 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Figure 4 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Viaarxiv icon

Backdoor Attacks on Facial Recognition in the Physical World

Add code
Jun 25, 2020
Figure 1 for Backdoor Attacks on Facial Recognition in the Physical World
Figure 2 for Backdoor Attacks on Facial Recognition in the Physical World
Figure 3 for Backdoor Attacks on Facial Recognition in the Physical World
Figure 4 for Backdoor Attacks on Facial Recognition in the Physical World
Viaarxiv icon