Publications

Publications

Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Bagia, Alexis; Tibouchi, Mehdi; Seifert, Jean-Pierre
[Journal Article]


Datenschutzvorsorge in der offensiven Cyber­sicher­heits­forschung
Selzer, Annika; Spiecker gen. Döhmann, Indra; Boll, Alina
[Journal Article]


Current State of Digital Twins in the Maritime Sector
Lünsdorf, Kai Gerrit; Wrede, Helge; Schmidt, Felix; Bauer, Kristine; Lukas, Uwe Freiherr von
[Journal Article]


Resource Management for Programmable Metasurfaces: Concept, Prospects and Challenges
Liaskos, Christos; Katsalis, Kostas; Triay, Joan; Schmid, Stefan
[Journal Article]


Runtime Verification for Programmable Switches
Shukla, Apoorv; Hudemann, Kevin; Vági, Zsolt; Hügerich, Lily; Smaragdakis, Georgios; Hecker, Artur; Schmid, Stefan; Feldmann, Anja
[Journal Article]


Load-Optimization in Reconfigurable Networks: Algorithms and Complexity of Flow Routing
Dai, Wenkai; Foerster, Klaus-Tycho; Fuchssteiner, David; Schmidt, Stefan
[Journal Article]


Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach
Vitek, M.; Das, A.; Lucio, D.; Zanlorensi, L.; Menotti, D.; Khiarak, J.; Shahpar, M.; Asgari-Chenaghlu, M.; Jaryani, E.; Tapia., J.; Valenzuela, A.; Wang, C.; Wang, Y.; He, Z.; Sun, Z.; Boutros, F.; Damer, N.; Grebe, J.; Kuijper, A.; Raja, K.; Gupta, G.; Zampoukis, G.; Tsochatzidis, L.; Pratikakis, I.; Kumar, A.; Harish, B.; Pal, U.; Peer, P.; \vStruc, V.
IEEE Trans. on Information Forensics and Security, Vol.18, p.190-205
[Journal Article]


Considerations on the Evaluation of Biometric Quality Assessment Algorithms
Schlett, T.; Rathgeb, C.; Tapia, J.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


On the Potential of Algorithm Fusion for Demographic Bias Mitigation in Face Recognition
Kolberg, J.; Schäfer, Y.; Rathgeb, C.; Busch, C.
IET Biometrics
[Journal Article]


Fairness von Biometrischen Systemen
Kolberg, J.
Datenschutz und Datensicherheit - DuD, Vol.47, p.15-21
[Journal Article]


Attacking Face Recognition With T-Shirts: Database, Vulnerability Assessment, and Detection
Ibsen, M.; Rathgeb, C.; Brechtel, F.; Klepp, R.; Pöppelmann, K.; George, A.; Marcel, S.; Busch, C.
IEEE Access, Vol.11, p.57867-57879
[Journal Article]


Toward Generalizable Facial Presentation Attack Detection Based on the Analysis of Facial Regions
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
IEEE Access, Vol.11, p.68512-68524
[Journal Article]


End-to-End Premature Ventricular Contraction Detection Using Deep Neural Networks
Kraft, Dimitri; Bieber, Gerald; Jokisch, Peter; Rumm, Peter
[Journal Article]


Künstliche Intelligenz als Instrument des Kinder- und Jugendmedienschutzes
Steinebach, Martin
[Journal Article]


Intermezzo. Welcher Technologie kann man vertrauen?
Schulmann, Haya; Waidner, Michael
[Journal Article]


Aktive Cyberabwehr
Schulmann, Haya; Waidner, Michael
[Journal Article]


Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Frieß, Jens; Schulmann, Haya; Waidner, Michael
International Conference on Emerging Networking EXperiments and Technologies 2023
[Journal Article]


Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht
Büscher, Maximilian; Hornung, Gerrit; Schindler, Stephan; Zurawski, Paul; Gutjahr, Amina; Spiecker gen. Döhmann, Indra; Selzer, Annika; Stummer, Sarah; Wilmer, Thomas
[Journal Article]


Zulässigkeit der Zweckänderung durch Auftragsverarbeiter
Boll, Alina; Gärtner, Tanya; Geissler, Ines; Stummer, Sarah
[Journal Article]


Biometric Recognition in 3D Medical Images: A Survey
Fu, Biying; Damer, Naser
[Journal Article]


Animal Behavior for Chicken Identification and Monitoring the Health Condition Using Computer Vision: A Systematic Review
Bhuiyan, Roman; Wree, Philipp
[Journal Article]


Superpolynomial quantum-classical separation for density modeling
Pirnay, Niklas; Sweke, Ryan; Eisert, Jens; Seifert, Jean-Pierre
[Journal Article]


Evaluating the applicability of hardware trust anchors for automotive applications
Plappert, Christian; Lorych, Dominik; Eckel, Michael; Jäger, Lukas; Fuchs, Andreas; Heddergott, Ronald
[Journal Article]


Therapy monitoring of psoriatic arthritis patients with and without skin involvement via objective evaluation of near infrared fluorescence optical imaging: A pilot study
Zerweck, Lukas; Wesarg, Stefan; Köhm, Michaela; Kohlhammer, Jörn
[Journal Article]


Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)
Krachenfels, Thilo; Seifert, Jean-Pierre; Tajik, Shahin
[Journal Article]


Securing the Future Railway System: Technology Forecast, Security Measures, and Research Demands
Unger, Simon; Heinrichs, Markus; Scheuermann, Dirk; Katzenbeisser, Stefan; Schubert, Max; Hagemann, Leon; Iffländer, Lukas
[Journal Article]


Performance Analysis of Machine Learning Centered Workload Prediction Models for Cloud
Saxena, Deepika; Kumar, Jitendra; Singh, Ashutosh Kumar; Schmid, Stefan
[Journal Article]


Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires
Nieminen, Raine; Schneider, Thomas
Journal of Cryptology
[Journal Article]


Single-Energy Metal Artifact Reduction (SEMAR) in Ultra-High-Resolution CT Angiography of Patients with Intracranial Implants
Jabas, Abdullah; Abello Mercado, Mario Alberto; Altmann, Sebastian; Ringel, Florian Alexander; Booz, Christian; Kronfeld, Andrea; Sanner, Antoine P.; Brockmann, Marc Alexander; Othman, Ahmed E.
[Journal Article]


Duo: A High-Throughput Reconfigurable Datacenter Network Using Local Routing and Control
Zerwas, Johannes; Györgyi, Csaba; Blenk, Andreas; Schmid, Stefan; Avin, Chen
Association for Computing Machinery, Special Interest Group on Performance Evaluation (ACM SIGMETRICS Conference) 2023
[Journal Article]