Publications
Publications
Conversion from W to Greenberger-Horne-Zeilinger states in the Rydberg-blockade regime of neutral-atom systems
Haase, Thorsten; Alber, Gernot; Stojanovic, Vladimir M.
Physical Review A
[Journal Article]
FLGUARD: Secure and Private Federated Learning
Nguyen, Thien Duc; Rieger, Phillip; Yalame, Mohammad Hossein; Möllering, Helen; Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
[Journal Article, Report]
Data Protection in AI Services: A Survey
Meurisch, Christian; Mühlhäuser, Max
ACM Computing Surveys
[Journal Article]
Scalable W-type entanglement resource in neutral-atom arrays with Rydberg-dressed resonant dipole-dipole interaction
Stojanovic, Vladimir M.
Physical Review A
[Journal Article]
The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions
Zimmermann, Verena; Renaud, Karen
ACM Transactions on Computer-Human Interaction, p.7:1-7:45
[Journal Article]
IJNM Special Issue - International Journal of Network Management:
QoE-centric analysis and management of communication networks
Florian Wamser and
Özgü Alay and
Florian Metzger and
Stefan Valentin
Int. J. Netw. Manag., Vol.30
[Journal Article]
Biometric Presentation Attack Detection: Beyond the Visible Spectrum
R. Tolosana and M. Gomez-Barrero and C. Busch and J. Ortega-Garcia
IEEE Trans. on Information Forensics and Security, Vol.15, p.1261–1275
[Journal Article]
An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris
J. Tapia and M. Gomez-Barrero and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]
Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach
U. Scherhag and J. Kunze and C. Rathgeb and C. Busch
IET Biometrics, Vol.9, p.278–289
[Journal Article]
Morphing Attack Detection using Laplace operator based features
U. Scherhag and D. Fischer and S. Isadskiy and J. Otte and C. Busch
in Proc. Norwegian Information Security Conf. (NISK)
[Journal Article]
Deep Face Representations for Differential Morphing Attack Detection
U. Scherhag and C. Rathgeb and J. Merkle and Christoph Busch
IEEE Trans. on Information Forensics and Security
[Journal Article]
Makeup Presentation Attacks: Review and Detection Performance Benchmark
C. Rathgeb and P. Drozdowski and C. Busch
IEEE Access, Vol.8, p.224958–224973
[Journal Article]
Differential Detection of Facial Retouching: A Multi-Biometric Approach
C. Rathgeb and C.-I. Satnoianu and N. E. Haryanto and K. Bernardo and C. Busch
IEEE Access, Vol.8, p.106373–106385
[Journal Article]
Morphing Attack Detection - Database, Evaluation Platform and Benchmarking
K. Raja and M. Ferrara and A. Franco and L. Spreeuwers and I. Batskos and others
IEEE Trans. on Information Forensics and Security
[Journal Article]
Morphing-Angriffe - Ein Sicherheitsrisiko für Gesichtserkennungssysteme
J. Merkle and C. Rathgeb and U. Scherhag and C. Busch
Datenschutz und Datensicherheit - DuD, Vol.44, p.38–42
[Journal Article]
Reversing the irreversible: A survey on inverse biometrics
M. Gomez-Barrero and J. Galbally
Computers & Security, Vol.90
[Journal Article]
Erkennung von Präsentationsangriffen auf Fingerabdruck Systemen
M. Gomez-Barrero and J. Kolberg and C. Busch
Datenschutz und Datensicherheit - DuD, Vol.44, p.26–31
[Journal Article]
Demographic Bias in Biometrics: A Survey on an Emerging Challenge
P. Drozdowski and C. Rathgeb and A. Dantcheva and N. Damer and C. Busch
Trans. on Technology and Society (TTS), Vol.1, p.89–103
[Journal Article]
PRNU-based Detection of Facial Retouching
C. Rathgeb and A. Botaljov and F. Stockhardt and S. Isadskiy and L. Debiasi and A.Uhl and C. Busch
IET Biometrics, Vol.9, p.154–164
[Journal Article]
Multi-biometric Identification with Cascading Database Filtering
P. Drozdowski and C. Rathgeb and B.-A. Mokroß and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.2, p.210–222
[Journal Article]
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications
Javadi, Mohammad; Yalame, Mohammad Hossein; Mahdiani, Hamid Reza
Transactions on Computers
[Journal Article]
Efficient and Scalable Universal Circuits
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
Journal of Cryptology (JoC)
[Journal Article]
Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Alber, Gernot; Sauer, Alexander
Cryptography
[Journal Article]
Sensing Technology for Human Activity Recognition: A Comprehensive Survey
Fu, Biying; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
[Journal Article]
Demonstration and analysis of an extended adaptive general four-component decomposition
Wang, Yu; Yu, Weidong; Liu, Xiuqing; Wang, Chunle; Kuijper, Arjan; Guthe, Stefan
[Journal Article]
Schnelle und effiziente Verarbeitung von Erdbeobachtungsdaten
Krämer, Michel; Willkomm, Philipp
[Journal Article]
Parametric Shape Optimization for Combined Additive-Subtractive Manufacturing
Tamellini, Lorenzo; Chiumenti, Michele; Altenhofen, Christian; Attene, Marco; Barrowclough, Oliver; Livesu, Marco; Marini, Federico; Martinelli, Massimiliano; Skytt, Vibeke
[Journal Article]
Performing Realistic Workout Activity Recognition on Consumer Smartphones
Fu, Biying; Kirchbuchner, Florian; Kuijper, Arjan
[Journal Article]
Blick in den Körper
Vaniet, Emmanuelle; Wesarg, Stefan
[Journal Article]
Post-comparison Mitigation of Demographic Bias in Face Recognition Using Fair Score Normalization
Terhörst, Philipp; Kolf, Jan Niklas; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
[Journal Article]


