Publications

Publications

RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies
Stute, Milan; Kohnhauser, Florian; Baumgärtner, Lars; Almon, Lars; Hollick, Matthias; Katzenbeisser, Stefan; Freisleben, Bernd
IEEE Transactions on Dependable and Secure Computing
[Journal Article]


Zero-Interaction Security-Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications
[Journal Article]


Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Bienhaus, Diethelm; Ebner, Andreas; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Si­mu­la­tion Modelling Practice and Theory, Vol.109, p.9
[Journal Article]


On the Generalisation capabilities of Fisher Vector based Face Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
IET Biometrics, p.1-12
[Journal Article]


On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
Kolberg, J.; Gomez-Barrero, M.; Busch, C.
IET Biometrics, p.1-15
[Journal Article]


Local Feature Encoding for Unknown Presentation Attack Detection: An Analysis of Different Local Feature Descriptors
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Kolberg, J.; Chang, L.; Perez-Suarez, A.; Busch, C.
IET Biometrics, p.1-13
[Journal Article]


Impact of facial tattoos and paintings on face recognition systems
Ibsen, M.; Rathgeb, C.; Fink, T.; Drozdowski, P.; Busch, C.
IET Biometrics
[Journal Article]


Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Chang, L.; Perez-Suarez, A.; Busch, C.
IEEE Access, Vol.9, p.5806-5820
[Journal Article]


Effects of Image Compression on Face Image Manipulation Detection: A Case Study on Facial Retouching
Rathgeb, C.; Bernardo, K.; Haryanto, N. E.; Busch, C.
IET Biometrics, Vol.10
[Journal Article]


Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection
Kolberg, J.; Grimmer, M.; Gomez-Barrero, M.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.3, p.190-202
[Journal Article]


An Overview of touchless 2D Fingerprint Recognition
Priesnitz, J.; Rathgeb, C.; Buchmann, N.; Busch, C.
EURASIP Journal on Image and Video Processing
[Journal Article]


Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System
Heinrich, Alexander; Stute, Milan; Kornhuber, Tim; Hollick, Matthias
Proceedings on Privacy Enhancing Technologies, p.227-245
[Journal Article]


Conversion from W to Greenberger-Horne-Zeilinger states in the Rydberg-blockade regime of neutral-atom systems
Haase, Thorsten; Alber, Gernot; Stojanovic, Vladimir M.
Physical Review A
[Journal Article]


FLGUARD: Secure and Private Federated Learning
Nguyen, Thien Duc; Rieger, Phillip; Yalame, Mohammad Hossein; Möllering, Helen; Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
Crytography and Security
[Journal Article]


Data Protection in AI Services: A Survey
Meurisch, Christian; Mühlhäuser, Max
ACM Computing Surveys
[Journal Article]


Scalable W-type entanglement resource in neutral-atom arrays with Rydberg-dressed resonant dipole-dipole interaction
Stojanovic, Vladimir M.
Physical Review A
[Journal Article]


The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions
Zimmermann, Verena; Renaud, Karen
ACM Transactions on Computer-Human Interaction, p.7:1-7:45
[Journal Article]


Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications
Javadi, Mohammad; Yalame, Mohammad Hossein; Mahdiani, Hamid Reza
Transactions on Computers
[Journal Article]


Efficient and Scalable Universal Circuits
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
Journal of Cryptology (JoC)
[Journal Article]


Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Alber, Gernot; Sauer, Alexander
Cryptography
[Journal Article]


Sensing Technology for Human Activity Recognition: A Comprehensive Survey
Fu, Biying; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
[Journal Article]


Demonstration and analysis of an extended adaptive general four-component decomposition
Wang, Yu; Yu, Weidong; Liu, Xiuqing; Wang, Chunle; Kuijper, Arjan; Guthe, Stefan
[Journal Article]


Schnelle und effiziente Verarbeitung von Erdbeobachtungsdaten
Krämer, Michel; Willkomm, Philipp
[Journal Article]


Parametric Shape Optimization for Combined Additive-Subtractive Manufacturing
Tamellini, Lorenzo; Chiumenti, Michele; Altenhofen, Christian; Attene, Marco; Barrowclough, Oliver; Livesu, Marco; Marini, Federico; Martinelli, Massimiliano; Skytt, Vibeke
[Journal Article]


Performing Realistic Workout Activity Recognition on Consumer Smartphones
Fu, Biying; Kirchbuchner, Florian; Kuijper, Arjan
[Journal Article]


Blick in den Körper
Vaniet, Emmanuelle; Wesarg, Stefan
[Journal Article]


Post-comparison Mitigation of Demographic Bias in Face Recognition Using Fair Score Normalization
Terhörst, Philipp; Kolf, Jan Niklas; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
[Journal Article]


Towards 3D Digitization in the GLAM (Galleries, Libraries, Archives, and Museums) Sector. Lessons Learned and Future Outlook
Tausch, Reimar; Domajnko, Matevz; Ritz, Martin; Knuth, Martin; Santos, Pedro; Fellner, Dieter W.
[Journal Article]


OLBVH: Octree linear bounding volume hierarchy for volumetric meshes
Ströter, Daniel; Mueller-Roemer, Johannes; Stork, André; Fellner, Dieter W.
[Journal Article]


GANs for medical image analysis
Kazeminia, Salome; Baur, Christoph; Kuijper, Arjan; Ginneken, Bram van; Navab, Nassir; Albarqouni, Shadi; Mukhopadhyay, Anirban
[Journal Article]