Publications

Publications

COLFISPOOF: A new Database for Contactless Fingerprint Presentation Attack Detection Research
J. Kolberg and J. Priesnitz and C. Rathgeb and C. Busch
IEEE/CVF Winter Conf. on Applications of Computer Vision (WACV)
[Conference Proceedings]


Attacking Face Recognition With T-Shirts: Database, Vulnerability Assessment, and Detection
M. Ibsen and C. Rathgeb and F. Brechtel and R. Klepp and K. Pöppelmann and A. George and S. Marcel and C. Busch
IEEE Access, Vol.11, p.57867–57879
[Journal Article]


NeutrEx: A 3D Quality Component Measure on Facial Expression Neutrality
M. Grimmer and C. Rathgeb and R. Veldhuis and C. Busch
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1–8
[Conference Proceedings]


Semi-synthetic Data Generation for Tattoo Segmentation
L. J. Gonzalez-Soler and C. Rathgeb and D. Fischer
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]


On the Impact of Tattoos on Hand Recognition
L. J. Gonzalez-Soler and Kacper M. Zyla and C. Rathgeb and D. Fischer
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG 2023), p.1–10
[Conference Proceedings]


Fisher Vectors for Biometric Presentation Attack Detection
J. Gonzalez-Solerr and M. Gomez-Barrero and J. Patino and M. Kamble and M. Todisco and C. Busch
Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment, p.489–519


Toward Generalizable Facial Presentation Attack Detection Based on the Analysis of Facial Regions
J. Gonzalez-Soler and M. Gomez-Barrero and C. Busch
IEEE Access, Vol.11, p.68512–68524
[Journal Article]


Benchmarking Cross-Domain Face Recognition with Avatars, Caricatures and Sketches
A. Foroughi, C. Rathgeb, M. Ibsen and C. Busch
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), p.1–5
[Conference Proceedings]


SynFacePAD 2023: Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data
M. Fang and M. Huber and J. Fierrez and R. Raghavendra and N. Damer and A. Alkhaddour and M. Kasantcev and V. Pryadchenko and Z. Yang and H. Huangfu and Y. Chen and Y. Zhang and Y. Pan and J. Jiang and X. Liu and X. Sun and C. Wang and X. Liu and Z. Chang and Z. Guangzhe and J. Tapia and J. Gonzalez-Soler and C. Aravena and D. Schulz
Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


A Principal Component Analysis-Based Approach for Single Morphing Attack Detection
L. Dargaud and M. Ibsen and J. Tapia and C. Busch
IEEE/CVF Winter Conf. on Applications of Computer Vision Workshops (WACVw)
[Conference Proceedings]


Standards for Biometric Presentation Attack Detection
C. Busch
Handbook of Biometric Anti-Spoofing - Presentation Attack Detection and Vulnerability Assessment, p.571–581


Toward an Efficient Iris Recognition System on Embedded Devices
D. P. Benalcazar and J. Tapia and M. Vasquez and L. Causa and E. L. Droguett and C. Busch
IEEE Access
[Conference Proceedings]


Synthetic ID Card Image Generation for Improving Presentation Attack Detection
D. Benalcazar and J. Tapia and S. Gonzalez and C. Busch
IEEE Trans. on Information Forensics and Security (TIFS)
[Journal Article]


MT-PRO: Multibiometric Template Protection Based On Homomorphic Transciphering
P. Bauspieß and C.-M. Zok and A. Costache and C. Rathgeb and J. Kolberg and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]


Face Image Quality Estimation on Presentation Attack Detection
C. Aravena and D. Pasmino and J. Tapia and C. Busch
Iberoamerican Congress on Pattern Recognition (CIARP), p.358–373
[Conference Proceedings]


Mayo
Beullens, Ward and Campos, Fabio and Celi, Sofía and Hess, Basil and Kannwischer, Matthias J
Specification document of NIST PQC Standardization of Additional Digital Signature Scheme
[Journal Article]


Separating Oil and Vinegar with a Single Trace: Side-Channel Assisted Kipnis-Shamir Attack on UOV
Aulbach, Thomas and Campos, Fabio and Krämer, Juliane and Samardjiska, Simona and Stöttinger, Marc
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2023, p.221–245
[Journal Article]


Roles of data protection in metaverses and in virtual survival: From data subjects to processors to those responsible Datenschutzrechtliche rollen in metaversen und im virtuellen weiterleben
Geissler, Ines
2023 Designing Futures: Zukunfte gestalten, INFORMATIK 2023 - 2023 Designing Futures: Shaping the Future, INFORMATIK 2023
[Conference Paper]


Post pandemic follow-up
Selzer, Annika; Timm, Ingo J.
2023 Designing Futures: Zukunfte gestalten, INFORMATIK 2023 - 2023 Designing Futures: Shaping the Future, INFORMATIK 2023
[Conference Paper]


The planned US Active Cyber Defense Certainty Act: A role model for Germany? Der geplante us active cyber defense certainty act
Kriegel, Jessica; Boll, Alina
2023 Designing Futures: Zukunfte gestalten, INFORMATIK 2023 - 2023 Designing Futures: Shaping the Future, INFORMATIK 2023
[Conference Paper]


Recht und Technik: Datenschutz im Diskurs
Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Spiecker Genannt Döhmann, Indra
Gesellschaft für Informatik (Jahrestagung) 2023
[Conference Paper]


Fraunhofer SIT at CheckThat! 2023: Can LLMs Be Used for Data Augmentation & Few-Shot Classification? Detecting Subjectivity in Text Using ChatGPT
Frick, Raphael Antonius
24th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF-WN 2023
[Conference Paper]


Fuzz on the Beach: Fuzzing Solana Smart Contracts
Smolka, Sven; Giesen, Jens-Rene; Winkler, Pascal; Draissi, Oussama; Davi, Lucas; Karame, Ghassan; Pohl, Klaus
Proc. of the 30th ACM SIGSAC Conference on Computer & Communications Security (CCS), p.1197-1211
[Conference Proceedings]


Towards technologies for trustworthiness in value chains
Anirban, Basu; Birkholz, Henk; de Meer, Jan; Dukanovic, Sinisa; Eckel, Michael; Flubacher, Björn; Houdeau, Detlef; Jänicke, Lutz; Jochem, Michael; Klasen, Wolfgang; Maftun, Aliza; Lieske, Matthias; Rannenberg, Kai; Simo Fhom, Hervais-Clemence
[Paper]


Künstliche Intelligenz (KI) zur Abwehr von Cyber-Angriffen und Cyber-Angriffe auf KI
Grimm, Rüdiger


Exploring the Design of Visualizations of Personal Online Data Based on Users' Mental Models
Dutz, Marija; Starčević, Nataša; Reynolds, Steven Lamarr; Kohlhammer, Jörn
International Conference Information Visualisation 2023
[Conference Paper]


Data augmentation in natural language processing: a novel text generation approach for long and short text classifiers
Bayer, Markus; Kaufhold, Marc-André; Buchhold, Björn; Keller, Marcel; Dallmeyer, Jörg; Reuter, Christian
International Journal of Machine Learning and Cybernetics, p.135-150
[Journal Article]


PSOFuzz: Fuzzing Processors with Particle Swarm Optimization
Chen, Chen; Vasudev, Gohil; Rahul, Kande; Sadeghi, Ahmad-Reza; Rajendran, Jeyavijayan
IEEE/ACM ICCAD Conference Proceedings
[Conference Proceedings]


Psychotechnik, human factors, engineering psychology, Technikpsychologie — 100 years of interdisciplinary cooperation between engineering and human sciences
Vogt, Joachim; Keil, Udo; Cornel, Christin; Gerber, Nina; Ferreira, Yvonne
Zeitschrift für Arbeitswissenschaft, p.1-6
[Journal Article]


From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior
Gerber, Nina; Stöver, Alina
Human Factors in Privacy Research, p.11-25