Publications

Publications

On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
Debiasi, Luca; Damer, Naser; Moseguí Saladié, Alexandra; Rathgeb, Christian; Scherhag, Ulrich; Busch, Christoph; Kirchbuchner, Florian; Uhl, Andreas
International Conference on Image Analysis and Processing (ICIAP) 2019
[Conference Paper]


Habitat-Net: Segmentation of Habitat Images Using Deep Learning
Abrams, Jesse F.; Vashishtha, Anand; Wong, Seth T.; Nguyen, An; Mohamed, Azlan; Wieser, Sebastian; Kuijper, Arjan; Wilting, Andreas; Mukhopadhyay, Anirban
[Journal Article]


Joint Schedule and Layout Autotuning for Sparse Matrices with Compound Entries on GPUs
Mueller-Roemer, Johannes; Stork, André; Fellner, Dieter W.
International Symposium on Vision, Modeling, and Visualization (VMV) 2019
[Conference Paper]


Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains
Sivachev, Alexey V.; Bashmakov, Daniil A.; Mikhailishenko, Olga V.; Korobeynikov, Anatoliy G.; Rieke, Roland
International Symposium on Mobile Internet Security (MobiSec) 2017
[Conference Paper]


Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment
Zimmermann, Sina; Gerber, Nina
i-com, p.271-285
[Journal Article]


I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads
Mayer, Peter; Gerber, Nina; Reinheimer, Benjamin; Rack, Philipp; Braun, Kristoffer; Volkamer, Melanie
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, p.1-12
[Conference Proceedings]


Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen
Kulyk, Oksana; Gerber, Nina; Volkamer, Melanie; Hilt, Annika
Datenschutz und Datensicherheit - DuD, p.81-85
[Journal Article]


Investigating People’s Privacy Risk Perception
Gerber, Nina; Reinheimer, Benjamin; Volkamer, Melanie
Proceedings on Privacy Enhancing Technologies, p.267-288
[Journal Article]


On the Si­mu­la­tion of Smart Grid Environments
Egert, Rolf; Tundis, Andrea; Mühlhäuser, Max
SummerSim '19: Proceedings of the 2019 Summer Si­mu­la­tion Conference
[Conference Proceedings]


Preserving Privacy in Speaker and Speech Characterisation
Nautsch, Andreas; Jiménez, Abelino; Treiber, Amos; Kolberg, Jascha; Jasserand, Catherine; Kindt, Els; Delgado, Héctor; Todisco, Massimiliano; Hmani, Mohamed Amine; Mtibaa, Aymen; Abdelraheem, Mohammed Ahmed; Abad, Alberto; Teixeira, Francisco; Matrouf, Driss; Gomez-Barrero, Marta; Petrovska-Delacrétaz, Dijana; Chollet, Gérard; Evans, Nicholas; Schneider, Thomas; Bonastre, Jean-François; Raj, Bhiksha; Trancoso, Isabel; Busch, Christoph
Computer Speech and Language, p.441-480
[Journal Article]


Encouraging Password Manager Reuse
Renaud, Karen; Zimmermann, Verena
Network Security
[Journal Article]


Assessing Users’ Privacy and Security Concerns of Smart Home Technologies
Zimmermann, Verena; Gerber, Paul; Marky, Karola; Böck, Leon; Kirchbuchner, Florian
i-com Journal of Interactive Media, p.197-216
[Journal Article]


API Usability of Stateful Signature Schemes
Zeier, A.; Wiesmaier, A.; Heinemann, A.
The 14th International Workshop on Security (IWSEC), LNCS 11689, p.1-20
[Conference Proceedings]


Analysis of QoE for Adaptive Video Streaming over Wireless Networks with User Abandonment Behavior
El-Azouzi, R.; Acharya, K.; Poojary, S.; Sunny, A.; Haddad, M.; Altman, E.; Tsilimantos, D.; Valentin, S.
CONF_WCNC
[Conference Proceedings]


Dynamic DASH Aware Scheduling in Cellular Networks
El-Azouzi, R.; Sunny, A.; Zhao, L.; Altman, E.; Tsilimantos, D.; de Pellegrini, F.; Valentin, S.
CONF_WCNC
[Conference Proceedings]


From Click to Playback: A Dataset to Study the Response Time of Mobile YouTube
Loh, F.; Wamser, F.; Moldovan, C.; Zeidler, B.; Hoßfeld, T.; Tsilimantos, D.; Valentin, S.
CONF_MMSYS_WS
[Conference Proceedings]


Is the Uplink Enough? Estimating Video Stalls from Encrypted Network Traffic
Loh, F.; Wamser, F.; Moldovan, C.; Zeidler, B.; Hoßfeld, T.; Tsilimantos, D.; Valentin, S.
CONF_NOMS
[Conference Proceedings]


Security Requirements Engineering in Safety-Critical Railway Signalling Networks
Heinrich, Markus; Vateva-Gurova, Tsvetoslava; Arul, Tolga; Katzenbeisser, Stefan; Suri, Neeraj; Birkholz, Henk; Fuchs, Andreas; Krauß, Christoph; Zhdanova, Maria; Kuzhiyelil, Don; Tverdyshev, Sergey; Schlehuber, Christian
Security and Communication Networks, Vol.vol. 2019, Article ID 8348925, p.14 pages
[Journal Article]


Selbstdatenschutz im vernetzten Fahrzeug und dessen technische Umsetzung
Krauß, Christoph
Grundrechtsschutz im Smart Car: Kommunikation, Sicherheit und Datenschutz im vernetzten Fahrzeug, p.227-244
[Book Article]


Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Bienhaus, Diethelm; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, St. Petersburg, Russia, 7-9 October, 2019., p.521-528
[Conference Proceedings]


Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software
Huesmann, Rolf; Zeier, Alexander; Heinemann, Andreas
Mensch & Computer Workshopband
[Conference Proceedings]


API Usability of Stateful Signature Schemes
Zeier, Alexander; Wiesmaier, Alexander; Heinemann, Andreas
IWSEC, p.221-240
[Conference Proceedings]


Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation
Erbenich, Vivian Ives Philipp; Träder, Daniel; Heinemann, Andreas; Nural, Meltem
HAISA, p.179-188
[Conference Proceedings]


Datenschutz muss benutzbar sein
Heinemann, Andreas; Straub, Tobias
Datenschutz und Datensicherheit, Vol.43, p.7-12
[Journal Article]


Relevant features for Gender Classification in NIR Periocular Images
Viedma, I.; Tapia, J.; Iturriaga, A.; Busch, C.
arXiv e-prints
[Journal Article]


Privacy-preserving PLDA Speaker Verification Using Outsourced Secure Computation
Treiber, A.; Nautsch, A.; Kolberg, J.; Schneider, T.; Busch, C.
Speech Communication, Vol.114, p.60-71
[Journal Article]


Detection of Face Morphing Attacks based on PRNU Analysis
Scherhag, U.; Debiasi, L.; Rathgeb, C.; Busch, C.; Uhl, A.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


Face Recognition Systems under Morphing Attacks: A Survey
Scherhag, U.; Rathgeb, C.; Merkle, J.; Breithaupt, R.; Busch, C.
IEEEAccess
[Journal Article]


Impact and Detection of Facial Beautification in Face Recognition: An Overview
Rathgeb, C.; Dantcheva, A.; Busch, C.
IEEE Access, Vol.7, p.152667-152678
[Journal Article]


Obtaining Stable Iris Codes Exploiting Low-Rank Tensor Space and Spatial Structure Aware Refinement for Better Iris Recognition
K. Raja, R. Raghavendra; Busch, C.
Proc. of the 12th IAPR Intl. Conf. on Biometrics (ICB)
[Conference Proceedings]