Publications

Publications

Assessing Users' Privacy and Security Concerns of Smart Home Technologies
Zimmermann, Verena; Gerber, Paul; Marky, Karola; Böck, Leon; Kirchbuchner, Florian
[Journal Article]


Visual-Interactive Preprocessing of Multivariate Time Series Data
Bernard, Jürgen; Hutter, Marco; Reinemuth, Heiko; Pfeifer, Hendrik; Bors, Christian; Kohlhammer, Jörn
Eurographics Conference on Visualization (EuroVis) 2019
[Journal Article]


Investigating large curved interaction devices
Braun, Andreas; Zander-Walz, Sebastian; Majewski, Martin; Kuijper, Arjan
[Journal Article]


Fuzzy tissue detection for real-time focal control in corneal confocal microscopy
Bartschat, Andreas; Allgeier, Stephan; Scherr, Tim; Stegmaier, Johannes; Bohn, Sebastian; Reichert, Klaus-Martin; Kuijper, Arjan; Reischl, Markus; Stachs, Oliver; Köhler, Bernd; Mikut, Ralf
[Journal Article]


Performing indoor localization with electric potential sensing
Fu, Biying; Kirchbuchner, Florian; Wilmsdorff, Julian von; Große-Puppendahl, Tobias; Braun, Andreas; Kuijper, Arjan
[Journal Article]


Efficient slicing of Catmull-Clark solids for 3D printed objects with functionally graded material
Luu, Thu Huong; Altenhofen, Christian; Ewald, Tobias; Stork, André; Fellner, Dieter W.
[Journal Article]


Habitat-Net: Segmentation of Habitat Images Using Deep Learning
Abrams, Jesse F.; Vashishtha, Anand; Wong, Seth T.; Nguyen, An; Mohamed, Azlan; Wieser, Sebastian; Kuijper, Arjan; Wilting, Andreas; Mukhopadhyay, Anirban
[Journal Article]


Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment
Zimmermann, Sina; Gerber, Nina
i-com, p.271-285
[Journal Article]


Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen
Kulyk, Oksana; Gerber, Nina; Volkamer, Melanie; Hilt, Annika
Datenschutz und Datensicherheit - DuD, p.81-85
[Journal Article]


Investigating People’s Privacy Risk Perception
Gerber, Nina; Reinheimer, Benjamin; Volkamer, Melanie
Proceedings on Privacy Enhancing Technologies, p.267-288
[Journal Article]


Preserving Privacy in Speaker and Speech Characterisation
Nautsch, Andreas; Jiménez, Abelino; Treiber, Amos; Kolberg, Jascha; Jasserand, Catherine; Kindt, Els; Delgado, Héctor; Todisco, Massimiliano; Hmani, Mohamed Amine; Mtibaa, Aymen; Abdelraheem, Mohammed Ahmed; Abad, Alberto; Teixeira, Francisco; Matrouf, Driss; Gomez-Barrero, Marta; Petrovska-Delacrétaz, Dijana; Chollet, Gérard; Evans, Nicholas; Schneider, Thomas; Bonastre, Jean-François; Raj, Bhiksha; Trancoso, Isabel; Busch, Christoph
Computer Speech and Language, p.441-480
[Journal Article]


Encouraging Password Manager Reuse
Renaud, Karen; Zimmermann, Verena
Network Security
[Journal Article]


Assessing Users’ Privacy and Security Concerns of Smart Home Technologies
Zimmermann, Verena; Gerber, Paul; Marky, Karola; Böck, Leon; Kirchbuchner, Florian
i-com Journal of Interactive Media, p.197-216
[Journal Article]


Security Requirements Engineering in Safety-Critical Railway Signalling Networks
Heinrich, Markus; Vateva-Gurova, Tsvetoslava; Arul, Tolga; Katzenbeisser, Stefan; Suri, Neeraj; Birkholz, Henk; Fuchs, Andreas; Krauß, Christoph; Zhdanova, Maria; Kuzhiyelil, Don; Tverdyshev, Sergey; Schlehuber, Christian
Security and Communication Networks, Vol.vol. 2019, Article ID 8348925, p.14 pages
[Journal Article]


Datenschutz muss benutzbar sein
Heinemann, Andreas; Straub, Tobias
Datenschutz und Datensicherheit, Vol.43, p.7-12
[Journal Article]


Relevant features for Gender Classification in NIR Periocular Images
Viedma, I.; Tapia, J.; Iturriaga, A.; Busch, C.
arXiv e-prints
[Journal Article]


Privacy-preserving PLDA Speaker Verification Using Outsourced Secure Computation
Treiber, A.; Nautsch, A.; Kolberg, J.; Schneider, T.; Busch, C.
Speech Communication, Vol.114, p.60-71
[Journal Article]


Detection of Face Morphing Attacks based on PRNU Analysis
Scherhag, U.; Debiasi, L.; Rathgeb, C.; Busch, C.; Uhl, A.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


Face Recognition Systems under Morphing Attacks: A Survey
Scherhag, U.; Rathgeb, C.; Merkle, J.; Breithaupt, R.; Busch, C.
IEEEAccess
[Journal Article]


Impact and Detection of Facial Beautification in Face Recognition: An Overview
Rathgeb, C.; Dantcheva, A.; Busch, C.
IEEE Access, Vol.7, p.152667-152678
[Journal Article]


Preserving Privacy in Speaker and Speech Characterisation
Nautsch, A.; Jiménez, A.; Treiber, A.; Kolberg, J.; Jasserand, C.; others
Computer Speech \& Language, Vol.58, p.441-480
[Journal Article]


Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
González-Soler, L. J.; Gomez-Barrero, M.; Chang, L.; Pérez-Suárez, A.; Busch, C.
arXiv preprint
[Journal Article]


Light Fields for Face Analysis
Galdi, C.; Chiesa, V.; Busch, C.; Correia, P. Lobato; Dugelay, J.-L.; Guillemot, C.
IEEE Sensors Journal, Vol.19, p.2687
[Journal Article]


Computational Workload in Biometric Identification Systems: An Overview
Drozdowski, P.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.8, p.351-368
[Journal Article]


Assessing Users’ Privacy and Security Concerns of Smart Home Technologies
Zimmermann, Verena; Gerber, Paul; Marky, Karola; Böck, Leon; Kirchbuchner, Florian
i-com Journal of Interactive Media, Vol.18, p.197-216
[Journal Article]


Post-Quantum Cryptography and its Application to the IoT
Krämer, Juliane
Informatik Spektrum, p.343-344
[Journal Article]


Language-integrated privacy-aware distributed queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.167
[Journal Article]


CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Krüger, Stefan; Späth, Johannes; Ali, Karim; Bodden, Eric; Mezini, Mira
IEEE Transactions on Software Engineering
[Journal Article]


Zero-Interaction Security - Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications, p.16-21
[Journal Article]


Long-term integrity protection of genomic data
Buchmann, Johannes; Geihs, Matthias; Hamacher, Kay; Katzenbeisser, Stefan; Stammler, Sebastian
EURASIP Journal on Information Security, p.16
[Journal Article]