_thrsten Profile Banner
Thorsten Eisenhofer Profile
Thorsten Eisenhofer

@_thrsten

Followers
185
Following
289
Media
0
Statuses
19

Postdoctoral Researcher @ TU Berlin • ML & Computer Security

Joined September 2019
Don't wanna be here? Send us removal request.
@_thrsten
Thorsten Eisenhofer
2 years
RT @leaschnherr: A Representative Study on Human Detection of Artificially Generated Media Across Countries (n=3,002) covering audio, image….
0
9
0
@_thrsten
Thorsten Eisenhofer
2 years
RT @maurapintor: That's a wrap!.The 16th AISec workshop went great!.Three outstanding keynote speakers and two insightful poster sessions.….
0
6
0
@_thrsten
Thorsten Eisenhofer
2 years
RT @mlsec: Get rid of bad reviewers? 🤔.Today, @_thrsten presents our work @USENIXSecurity on misleading the automatic assignment of reviewe….
0
19
0
@_thrsten
Thorsten Eisenhofer
2 years
RT @thorstenholz: Congratulations Dr. @_thrsten
Tweet media one
Tweet media two
0
9
0
@_thrsten
Thorsten Eisenhofer
2 years
RT @thorstenholz: Systems for automatic paper-reviewer assignments (e.g., TPMS - are used during the reviewing pro….
0
12
0
@_thrsten
Thorsten Eisenhofer
2 years
RT @BochumCrypto: Congratulations Dr. @doreenriepel!
Tweet media one
0
6
0
@_thrsten
Thorsten Eisenhofer
2 years
RT @WIRED: Hackers are revealing that quadcopter operators aren’t nearly as hidden as they might think, but researchers have released a too….
0
16
0
@_thrsten
Thorsten Eisenhofer
2 years
RT @NDSSSymposium: Nico Schiller from Ruhr-Universität Bochum is presenting his work on Drone Security and the Mysterious Case of DJI's Dro….
0
6
0
@_thrsten
Thorsten Eisenhofer
3 years
RT @CASA_EXC: For the 9th role model in our #WomenInITS series, everything circles around #cryptographic keys and mathematical puzzles: @do….
0
5
0
@_thrsten
Thorsten Eisenhofer
3 years
RT @biggiobattista: ⁦@dagstuhl⁩ seminar on Security of Machine Learning - having a great time!
Tweet media one
0
7
0
@_thrsten
Thorsten Eisenhofer
3 years
RT @doreenriepel: I am happy to announce that our paper "Password-Authenticated Key Exchange from Group Actions" has been accepted to CRYPT….
0
11
0
@_thrsten
Thorsten Eisenhofer
3 years
RT @74ck_0: This is what DJI’s Drone-ID packets look like. every drone broadcasts this data all the time. we managed to receive + decode th….
0
355
0
@_thrsten
Thorsten Eisenhofer
3 years
RT @MKW_NRW: Ein ganz praktisches Beispiel ist der "Alexa-Hacking-Demonstrator" – PhD-Student @_thrsten vom @CASA_EXC zeigt, wie #Sprachass….
0
4
0
@_thrsten
Thorsten Eisenhofer
5 years
RT @sveckert: Watch me at #rc3 in Chaos West Stream, 18:00 Berlin time. I am sharing insights from a research I did for @STRG_F. I collecte….
0
8
0
@_thrsten
Thorsten Eisenhofer
5 years
RT @AdamBatesOrg: #ACSAC2020 Voice Security pt 2 -- Pivoting from defense to attack, @leaschnherr presents a robust approach for over-the-a….
0
6
0
@_thrsten
Thorsten Eisenhofer
5 years
RT @joool_f: Want to hear about detecting deep fakes using frequency analysis? Check out my talk at #icml2020 (11 am CEST). 🧾 Paper: https….
0
13
0
@_thrsten
Thorsten Eisenhofer
5 years
RT @thorstenholz: Achievement unlocked: @zdf_logo, a news program for kids, featured our work on smart speakers and my daughters watched it….
0
5
0
@_thrsten
Thorsten Eisenhofer
5 years
RT @thorstenholz: We performed a study of accidental triggers, i.e., sounds that should not have triggered a voice assistant. You can find….
0
9
0
@_thrsten
Thorsten Eisenhofer
5 years
RT @DorotheaKolossa: very happy to announce our #ICML2020 paper on better detecting #fakeimages with the help of frequency transforms :) t….
0
4
0