Search Results for author: Thorsten Holz

Found 15 papers, 10 papers with code

AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images

no code implementations22 Apr 2024 Jonas Ricker, Dennis Assenmacher, Thorsten Holz, Asja Fischer, Erwin Quiring

Recent advances in the field of generative artificial intelligence (AI) have blurred the lines between authentic and machine-generated content, making it almost impossible for humans to distinguish between such media.

A Representative Study on Human Detection of Artificially Generated Media Across Countries

1 code implementation10 Dec 2023 Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz

To further understand which factors influence people's ability to detect generated media, we include personal variables, chosen based on a literature review in the domains of deepfake and fake news research.

Face Swapping Human Detection

Towards the Detection of Diffusion Model Deepfakes

1 code implementation26 Oct 2022 Jonas Ricker, Simon Damm, Thorsten Holz, Asja Fischer

However, relatively little attention has been paid to the detection of DM-generated images, which is critical to prevent adverse impacts on our society.

Attribute Image Generation

[RE] CNN-generated images are surprisingly easy to spot...for now

1 code implementation7 Apr 2021 Joel Frank, Thorsten Holz

This work evaluates the reproducibility of the paper "CNN-generated images are surprisingly easy to spot... for now" by Wang et al. published at CVPR 2020.

Dompteur: Taming Audio Adversarial Examples

1 code implementation10 Feb 2021 Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz

In this paper we propose a different perspective: We accept the presence of adversarial examples against ASR systems, but we require them to be perceivable by human listeners.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +1

Efficient Calculation of Adversarial Examples for Bayesian Neural Networks

no code implementations pproximateinference AABI Symposium 2021 Sina Däubener, Joel Frank, Thorsten Holz, Asja Fischer

In this paper we propose to efficiently attack Bayesian neural networks with adversarial examples calculated for a deterministic network with parameters given by the mean of the posterior distribution.

VenoMave: Targeted Poisoning Against Speech Recognition

1 code implementation21 Oct 2020 Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna

In a more realistic scenario, when the target audio waveform is played over the air in different rooms, VENOMAVE maintains a success rate of up to 73. 3%.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +3

Leveraging Frequency Analysis for Deep Fake Image Recognition

1 code implementation ICML 2020 Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz

Based on this analysis, we demonstrate how the frequency representation can be used to identify deep fake images in an automated way, surpassing state-of-the-art methods.

Image Forensics

(Un)informed Consent: Studying GDPR Consent Notices in the Field

1 code implementation5 Sep 2019 Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, Thorsten Holz

We also show that the wide-spread practice of nudging has a large effect on the choices users make.

Human-Computer Interaction Computers and Society

Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems

no code implementations5 Aug 2019 Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa

In this paper, we demonstrate the first algorithm that produces generic adversarial examples, which remain robust in an over-the-air attack that is not adapted to the specific environment.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +1

Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding

no code implementations16 Aug 2018 Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa

We use this backpropagation to learn the degrees of freedom for the adversarial perturbation of the input signal, i. e., we apply a psychoacoustic model and manipulate the acoustic signal below the thresholds of human perception.

Cryptography and Security Sound Audio and Speech Processing

We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy

1 code implementation15 Aug 2018 Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz

We categorized all observed cookie consent notices and evaluated 16 common implementations with respect to their technical realization of cookie consent.

Computers and Society

Cannot find the paper you are looking for? You can Submit a new open access paper.