Conference Publications
List of peer-reviewed publications below. (*) indicates co-first authorship.
Benchmarking Attacks on Learning with Errors
Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin Lauter
Proceedings of the 46th IEEE Symposium on Security and Privacy (SP), May 2025
PDF
Code
The Cool and the Cruel - Separating Hard Parts of LWE Secrets
Niklas Nolte*, Mohamed Malhou*, Emily Wenger*, Samuel Stevens, Cathy Li, Francois Charton, Kristin Lauter
Proceedings of AFRICACRYPT, July 2024
PDF
Code
Data Isotopes for Data Provenance in DNNs
Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov
Proceedings of Privacy Enhancing Technologies Symposium (PETS), July 2024
PDF
Code
SALSA VERDE - A machine learning attack on LWE with small sparse secrets
Cathy Li, Emily Wenger, Zeyuan Allen-Zhu, Francois Charton, Kristin Lauter
Proceedings of the 37th Conference on Neural Information Processing Systems (NeurIPS), November 2023
PDF
Code
SALSA PICANTE - A machine learning attack on LWE with binary secrets
Cathy Li, Jana Sotakova, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, Kristin Lauter
Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2023
PDF
Code
GLAZE - Protecting Artists from Style Mimicry by Text-to-Image Models
Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao
Proceedings of the 32nd USENIX Security Symposium, August 2023
PDF
Code
SoK - Anti-Facial Recognition Technology
Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao
Proceedings of the 44th IEEE Symposium on Security and Privacy (SP), May 2023
PDF
SALSA - Attacking Lattice Cryptography with Transformers
Emily Wenger*, Mingjie Chen*, Francois Charton, Kristin Lauter
Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS), November 2022
PDF
Code
Finding Naturally Occurring Physical Backdoors in Image Datasets
Emily Wenger*, Roma Bhattacharjee*, Arjun Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao
Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS), November 2022
PDF
Code
Post-breach Recovery - Protection against White-Box Adversarial Examples for Leaked DNN Models
Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao
Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2022
PDF
Blacklight - Defending Black-Box Adversarial Attacks on Deep Neural Networks
Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao
Proceedings of the 31st USENIX Security Symposium, August 2022
PDF
Hello, It's Me - Deep Learning-based Speech Synthesis Attacks in the Real World
Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Zhao
Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2021
PDF
Backdoor Attacks Against Deep Learning Systems in the Physical World
Emily Wenger, Josephine Passananti, Arjun Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao
Proceedings of IEEE/CVF Computer Vision and Pattern Recognition Conference (CVPR), June 2021
PDF
Code
Preprints
SALSA Fresca - Angular Embeddings and Pre-Training for ML Attacks on LWE
Samuel Stevens, Emily Wenger, Cathy Li, Eshika Saxena, Francois Charton, Kristin Lauter
In Submission
PDF
Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao
In Submission
PDF
Piracy Resistant Watermarks for Deep Neural Networks
Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng
In Submission
PDF