lea

 

Lea Schönherr

Faculty


I am a tenure track faculty at CISPA Helmholtz Center for Information Security interested in information security with a focus on adversarial machine learning . Before that I was working at Ruhr University Bochum (RUB), Germany, in the DFG Cluster of Excellence “Cyber Security in the Age of Large-Scale Adversaries“ (CASA).

 

Our research covers various attacks on machine learning models, including LLMs and generative AI across all types of media and multimodal models. We aim to develop domain-adaptive detection mechanisms and countermeasures, focusing on preventing the misuse of AI-generated media and enhancing model robustness.

 

During my Ph.D., I focused on the robustness of neural networks and the security of speech-based systems. I received my Ph.D. in 2021 from Ruhr University Bochum, where I was advised by Prof. Dr.-Ing. Dorothea Kolossa at the Cognitive Signal Processing group at Ruhr University Bochum (RUB), Germany. I received two scholarships from UbiCrypt (DFG Research Training Group) and CASA (DFG Cluster of Excellence).

 

I obtained my Master's degree in Electrical Engineering and Information Technology at RUB in 2015 after graduating from the University of Applied Science in Mannheim in Biomedical Engineering.

  ·  

 

2024

Edoardo Debenedetti, Javier Rando, Daniel Paleka, Silaghi Fineas Florin, Dragos Albastroiu, Niv Cohen, Yuval Lemberg, Reshmi Ghosh, Rui Wen, Ahmed Salem, Giovanni Cherubin, Santiago Zanella-Beguelin, Robin Schmid, Victor Klem, Takahiro Miki, Chenhao Li, Stefan Kraft, Mario Fritz, Florian Tramèr, Sahar Abdelnabi, and Lea Schönherr

Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition

NeurIPS Datasets and Benchmarks Track    [Paper][BibTex]

Sahar Abdelnabi, Amr Gomaa, Sarath Sivaprasad, Lea Schönherr, and Mario Fritz

Cooperation, Competition, and Maliciousness: LLM-Stakeholders Interactive Negotiation

NeurIPS Datasets and Benchmarks Track    [Paper] [BibTex]

Bhupendra Acharya, Dario Lazzaro, Efrén López-Morales, Adam Oest, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, and Thorsten Holz

The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms

USENIX Security Symposium    [Paper] [BibTex]

Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, and Thorsten Holz

A Representative Study on Human Detection of Artificially Generated Media Across Countries

IEEE Security & Privacy (S&P)    [Paper] [BibTex]

Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, and Thorsten Holz

Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams

IEEE Security & Privacy (S&P)    [Paper] [BibTex]

Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, and Mario Fritz

CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models

IEEE Secure and Trustworthy Machine Learning (SatML)    [Paper] [BibTex]

Soumya Shaw, Ben Nassi, and Lea Schönherr

Generated Audio Detectors are Not Robust in Real-World Conditions

ICML Workshop on Next Generation of AI Safety Workshop    [Paper] [BibTex]

Srishti Gupta, Daniele Angioni, Lea Schönherr, Ambra Demontis, and Battista Biggio

BUILD: Buffer-free Incremental Learning with OOD Detection for the Wild

ICML Workshop on Foundation Models in the Wild    [Paper] [BibTex]

David Pape, Thorsten Eisenhofer, and Lea Schönherr

Prompt Obfuscation for Large Language Models

ArXiv    [Paper][BibTex]

Sina Mavali, Jonas Ricker, David Pape, Yash Sharma, Asja Fischer, Lea Schönherr

Fake It Until You Break It: On the Adversarial Robustness of AI-generated Image Detectors

ArXiv    [Paper][BibTex]

Hossein Hajipour, Lea Schönherr, Thorsten Holz and Mario Fritz

HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data

ArXiv    [Paper][BibTex]

Gianluca De Stefano, Lea Schönherr, and Giancarlo Pellegrino

Rag and Roll: An End-to-End Evaluation of Indirect Prompt Manipulations in LLM-based Application Frameworks

ArXiv    [Paper][BibTex]

Jonathan Evertz, Merlin Chlosta, Lea Schönherr, and Thorsten Eisenhofer

Whispers in the Machine: Confidentiality in LLM-integrated Systems

ArXiv    [Paper][BibTex]

Antonio Emanuele Cinà, Francesco Villani, Maura Pintor, Lea Schönherr, Battista Biggio, and Marcello Pelillo

σ-Zero: Gradient-based Optimization of l0-norm Adversarial Examples

ArXiv    [Paper][BibTex]

2023

David Pape, Sina Däubener, Thorsten Eisenhofer, Antonio Emanuele Cinà, and Lea Schönherr

On the Limitations of Model Stealing with Uncertainty Quantification Models

European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN)    [Paper] [BibTex]

Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, and Thorsten Holz

Drone Security and the Mysterious Case of DJI’s DroneID

Network and Distributed System Security Symposium (NDSS)    [Paper] [BibTex]

Hojjat Aghakhani, Thorsten Eisenhofer, Lea Schönherr, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna

VENOMAVE: Clean-Label Poisoning Against Speech Recognition

IEEE Secure and Trustworthy Machine Learning (SatML)    [Paper] [BibTex]

2022

Timm Koppelmann, Luca Becker, Alexandru Nelus, Rene Glitza, Lea Schönherr, and Rainer Martin

Clustering-based Wake Word Detection in Privacy-aware Acoustic Sensor Networks

INTERSPEECH    [Paper] [BibTex]

Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, and Thorsten Holz

Exploring Accidental Triggers of Smart Speakers

Computer Speech & Language    [Paper] [Website] [BibTex]

2021

Joel Frank and Lea Schönherr

WaveFake: A Data Set to Facilitate Audio DeepFake Detection

NeurIPS Datasets and Benchmarks Track    [Paper][Code] [Talk] [BibTex]

Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, and Thorsten Holz

Dompteur: Taming Audio Adversarial Examples

USENIX Security Symposium    [Paper] [Code] [Talk] [BibTex]

Lea Schönherr

Adverarially Robust Speech and Speaker Recognition

Ruhr University Bochum   [Dissertation] [BibTex]

Timm Koppelmann, Alexandru Nelus, Lea Schönherr, Dorothea Kolossa, and Rainer Martin

Privacy-Preserving Feature Extraction for Cloud-Based Wake Word Verification

INTERSPEECH    [Paper] [BibTex]

2020

Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, and Thorsten Holz

Leveraging Frequency Analysis for Deep Fake Image Recognition

ICML    [Paper] [Code] [Talk] [BibTex]

Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, and Dorothea Kolossa

Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems

ACSAC    [Paper] [Talk] [BibTex]

Sina Däubener, Lea Schönherr, Asja Fischer, and Dorothea Kolossa

Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification

INTERSPEECH    [Paper] [Code] [BibTex]

Jan Freiwald, Lea Schönherr, Christopher Schymura, Steffen Zeiler, and Dorothea Kolossa

Loss Functions for Deep Monaural Speech Enhancement

IJCNN    [Paper] [BibTex]

2019

Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, and Dorothea Kolossa

Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding

Network and Distributed System Security Symposium (NDSS)    [Paper] [Website] [Code] [Talk] [BibTex]

2017

Lea Schönherr, Steffen Zeiler, and Dorothea Kolossa

Spoofing Detection via Simultaneous Verification of Audio-Visual Synchronicity and Transcription

ASRU    [Paper] [BibTex]

2016

Lea Schönherr, Dennis Orth, Martin Heckmann, and Dorothea Kolossa

Environmentally Robust Audio-Visual Speaker Identification

SLT    [Paper] [BibTex]