Publications

Publications

Privacy-Enhancing Face Biometrics: A Comprehensive Survey
Meden, Blaž; Rot, Peter; Terhörst, Philipp; Damer, Naser; Kuijper, Arjan; Scheirer, Walter J.; Ross, Arun A.; Peer, Peter; Struc, Vitomir
Language: English
[Journal Article, Electronic Publication]


ProBGP: Progressive Visual Analytics of Live BGP Updates
Ulmer, Alex; Sessler, David; Kohlhammer, Jörn
Conference on Visualization (EuroVis) 23, 2021, Online>
Language: English
[Journal Article]


Investigating Simple Privacy Indicators for Supporting Users When Installing New Mobile Apps
Stöver, Alina; Gerber, Nina; Kaushik, Sushma; Mühlhäuser, Max; Marky, Karola
CHI EA'21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems
Language: English
[Conference Proceedings]


On Soft-Biometric Information Stored in Biometric Face Embeddings
Terhörst, Philipp; Fährmann, Daniel; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
Language: English
[Journal Article, Electronic Publication]


MAAD-Face: A Massively Annotated Attribute Dataset for Face Images
Terhörst, Philipp; Fährmann, Daniel; Kolf, Jan Niklas; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
Language: English
[Journal Article, Electronic Publication]


A Systematic Hardening of Java's Information Hiding
Holzinger, Philipp; Boden, Eric
International Symposium on Advanced Security on Software and Systems (ASSS) 1, 2021, Online>
Language: English
[Conference Paper]


OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
WiSec ’21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.374-376
Language: English
[Conference Proceedings]


AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.371-373
Language: English
[Conference Proceedings]


LLVM-based Circuit Compilation for Practical Secure Computation
Heldmann, Tim; Schneider, Thomas; Tkachenko, Oleksandr; Weinert, Christian; Yalame, Mohammad Hossein
Applied Cryptography and Network Security: Proceedings Part II, p.99-121
Language: English
[Conference Proceedings]


Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
Keller, Hannah; Möllering, Helen; Schneider, Thomas; Yalame, Mohammad Hossein
18th International Conference on Security and Cryptography (SECRYPT'21)
Language: English
[Conference Proceedings]


RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies
Stute, Milan; Kohnhauser, Florian; Baumgärtner, Lars; Almon, Lars; Hollick, Matthias; Katzenbeisser, Stefan; Freisleben, Bernd
IEEE Transactions on Dependable and Secure Computing
Language: English
[Journal Article]


Zero-Interaction Security-Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications
Language: English
[Journal Article]


Security and Quality: Two Sides of the Same Coin?
Arzt, Steven
International Workshop on the State Of the Art in Program Analysis (SOAP) 10, 2021, Online>
Language: English
[Conference Paper]


Attack Surface Assessment for Cyber­security Engineering in the Automotive Domain
Plappert, Christian; Zelle, Daniel; Gadacz, Henry; Rieke, Roland; Scheuermann, Dirk; Krauß, Christoph
29th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP
[Conference Proceedings]


Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Bienhaus, Diethelm; Ebner, Andreas; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Si­mu­la­tion Modelling Practice and Theory, Vol.109, p.9
[Journal Article]


Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte
Zeier, A.; Wiesmaier, A.; Heinemann, A.
Tagungsband zum 17. Deutschen IT-Sicherheitskongress, p.381-391
[Conference Proceedings]


Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview
Bender, Tim; Huesmann, Rolf; Heinemann, Andreas
ARES 2021, SSC Workshop: The 16th International Conference on Availability, Reliability and Security, Virtual Event, August 17-20, 2021
[Conference Proceedings]


On the Generalisation capabilities of Fisher Vector based Face Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
IET Biometrics, p.1-12
[Journal Article]


On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
Kolberg, J.; Gomez-Barrero, M.; Busch, C.
IET Biometrics, p.1-15
[Journal Article]


Makeup Presentation Attack Potential Revisited: Skills Pay the Bills
Drozdowski, P.; Grobarek, S.; Schurse, J.; Rathgeb, C.; Stockhardt, F.; Busch, C.
Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Local Feature Encoding for Unknown Presentation Attack Detection: An Analysis of Different Local Feature Descriptors
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Kolberg, J.; Chang, L.; Perez-Suarez, A.; Busch, C.
IET Biometrics, p.1-13
[Journal Article]


Impact of facial tattoos and paintings on face recognition systems
Ibsen, M.; Rathgeb, C.; Fink, T.; Drozdowski, P.; Busch, C.
IET Biometrics
[Journal Article]


Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Chang, L.; Perez-Suarez, A.; Busch, C.
IEEE Access, Vol.9, p.5806-5820
[Journal Article]


Face Morphing Attacks: A Threat to eLearning?
Rathgeb, C.; Pöppelmann, K.; Busch, C.
IEEE Global Engineering Education Conf. (EDUCON 2021), p.1-6
[Conference Proceedings]


Effects of Image Compression on Face Image Manipulation Detection: A Case Study on Facial Retouching
Rathgeb, C.; Bernardo, K.; Haryanto, N. E.; Busch, C.
IET Biometrics, Vol.10
[Journal Article]


Deep Learning-Based Semantic Segmentation for Touchless Fingerprint Recognition
Priesnitz, J.; Rathgeb, C.; Buchmann, N.; Busch, C.
Proc. Intl. Conf. Pattern Recognition (ICPR) (Workshops)
[Conference Proceedings]


Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection
Kolberg, J.; Grimmer, M.; Gomez-Barrero, M.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.3, p.190-202
[Journal Article]


An Overview of touchless 2D Fingerprint Recognition
Priesnitz, J.; Rathgeb, C.; Buchmann, N.; Busch, C.
EURASIP Journal on Image and Video Processing
[Journal Article]


Web server circuit, method and computer program for preventing parasite attacks
Shulman, Haya; Waidner, Michael
Language: English
[Patent, Electronic Publication]


Fingerprints, forever young?
Kessler, Roman; Henniger, Olaf; Busch, Christoph
International Conference on Pattern Recognition (ICPR) 25, 2021, Online>
Language: English
[Conference Paper]