Publications
Publications
Efficient Algorithms for Demand-Aware Networks and a Connection to Virtual Network Embedding
Figiel, Aleksander; Korhonen, Janne H.; Olver, Neil; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]
Erkennung von Desinformationen
Steinebach, Martin
[Journal Article]
Fraunhofer SIT at GenAI Detection Task 1: Adapter Fusion for AI-generated Text Detection
Schäfer, Karla; Steinebach, Martin
Workshop on GenAI Content Detection 2025
[Conference Paper]
KVC-onGoing: Keystroke Verification Challenge
Stragapede, Giuseppe; Vera-Rodriguez, Ruben; Tolosana, Ruben; Morales, Aythami; DeAndres-Tame, Ivan; Damer, Naser; Fierrez, Julian; Ortega-Garcia, Javier; Acien, Alejandro; Gonzalez, Nahuel; Shadrikov, Andrei; Gordin, Dmitrii; Schmitt, Leon; Wimmer, Daniel; Großmann, Christoph; Krieger, Joerdis; Heinz, Florian; Krestel, Ron; Mayer, Christoffer; Haberl, Simon; Gschrey, Helena; Yamagishi, Yosuke; Wickramanayake, Sandareka; Saha, Sanjay; Rasnayaka, Sanka; Gutfeter, Weronika; Sim, Terence; Baran, Adam; Krzysztoń, Mateusz; Jaskóła, Przemysław
[Journal Article]
Comparative Analysis of Voice Conversion in German
Schäfer, Karla; Choi, Jeong-Eun; Steinebach, Martin
International Conference on Pattern Recognition 2024
[Conference Paper]
Model compression techniques in biometrics applications: A survey
Caldeira, Eduarda; Neto, Pedro C.; Huber, Marco; Damer, Naser; Sequeira, Ana F.
[Journal Article]
AdaDistill: Adaptive Knowledge Distillation for Deep Face Recognition
Boutros, Fadi; Štruc, Vitomir; Damer, Naser
European Conference on Computer Vision 2024
[Conference Paper]
UAV-based person re-identification: A survey of UAV datasets, approaches, and challenges
Albaluchi, Yousaf; Fu, Biying; Ramachandra, Raghavendra; Damer, Naser; Raja, Kiran
[Journal Article]
Generative AI in the context of assistive technologies: Trends, limitations and future directions
Fu, Biying; Hadid, Abdenour; Damer, Naser
[Journal Article]
Deepfakes: A New Kind of Adversarial Attacks Against Face Recognition Systems?
Frick, Raphael Antonius; Graner, Lukas
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
[Conference Paper]
Adapter fusion for check-worthiness detection - combining a task adapter with a NER adapter
Vogel, Inna; Möhle, Pauline; Meghana, Meghana; Steinebach, Martin
4th Workshop on Reducing Online Misinformation through Credible Information Retrieval, ROMCIR 2024
[Conference Paper]
Improved identification of check-worthiness in social media data through multimodal analyses
Frick, Raphael Antonius; Steinebach, Martin
4th Workshop on Reducing Online Misinformation through Credible Information Retrieval, ROMCIR 2024
[Conference Paper]
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Johannes L.; Gattermayer, Tobias; Gelernter, Nethanel; Shulman, Haya; Waidner, Michael
21st USENIX Symposium on Networked Systems Design and Implementation, NSDI 2024
[Conference Paper]
Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Tibouchi, Mehdi; Seifert, Jean Pierre
29th International Conference on Selected Areas in Cryptography, SAC 2022
[Conference Paper]
Color calibration for multicolored barcodes using smartphones
Bugert, Simon; Heeger, Julian; Berchtold, Waldemar
IS and T International Symposium on Electronic Imaging 2024: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2024
[Conference Paper]
FraunhoferSIT@EXIST2024: Leveraging Stacking Ensemble Learning for Sexism Detection
Fan, Shiying; Frick, Raphael Antonius; Steinebach, Martin
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
[Conference Paper]
Fraunhofer SIT at CheckThat! 2024: Adapter Fusion for Check-Worthiness Detection
Vogel, Inna; Möhle, Pauline
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
[Conference Paper]
Sovereign document verification by smartphones
Berchtold, Waldemar; Heeger, Julian; Bugert, Simon; Biermann, Lukas; Liu, Huajian
IS and T International Symposium on Electronic Imaging 2024: Media Watermarking, Security, and Forensics, MWSF 2024
[Conference Paper]
Evaluating an Open-Source Hardware Approach from HDL to GDS for a Security Chip Design - a Review of the Final Stage of Project HEP
Henkes, Tim; Reith, Steffen; Stöttinger, Marc; Herfurth, Norbert; Panić, Goran; Wälde, Julian; Buschkowski, Fabian; Sasdrich, Pascal; Lüth, Christoph; Funck, Milan; Kiyan, Tuba; Weber, Arnd; Boeck, Detlef; Rathfelder, Rene; Grawunder, Torsten
2024 Design, Automation and Test in Europe Conference and Exhibition, DATE 2024
[Conference Paper]
Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem
Conrad, Jonathan; Eisert, Jens; Seifert, Jean Pierre
[Journal Article]
Fraunhofer SIT at WASSA 2024 Empathy and Personality Shared Task: Use of Sentiment Transformers and Data Augmentation With Fuzzy Labels to Predict Emotional Reactions in Conversations and Essays
Frick, Raphael Antonius; Steinebach, Martin
14th Workshop on Computational Approaches to Subjectivity, Sentiment, and Social Media Analysis, WASSA 2024
[Conference Paper]
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Schröder, Robin Leander; Gast, Stefan; Guo, Qian
33rd USENIX Security Symposium, USENIX Security 2024
[Conference Paper]
LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet Scale
Kaspereit, Jonas; Öndarö, Gurur; Cesar, Gustavo Luvizotto; Ebbers, Simon; Ising, Fabian; Saatjohann, Christoph; Jonker, Mattijs; Holz, Ralph G.; Schinzel, Sebastian
33rd USENIX Security Symposium, USENIX Security 2024
[Conference Paper]
Attacking with Something That Does Not Exist: ‘Proof of Non-Existence’ Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Shulman, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024
[Conference Paper]
What All the Phuzz Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications
Neef, Sebastian; Kleissner, Lorenz; Seifert, Jean Pierre
19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024
[Conference Paper]
Dynamically Generating Callback Summaries for Enhancing Static Analysis
Arzt, Steven; Miltenberger, Marc; Näumann, Julius
38th European Conference on Object-Oriented Programming, ECOOP 2024
[Conference Paper]
Toward Self-Adjusting k-Ary Search Tree Networks
Feder, Evgeniy; Paramonov, Anton; Mavrin, P. A.; Salem, Iosif; Aksenov, Vitaly E.; Schmid, Stefan
32nd Annual European Symposium on Algorithms, ESA 2024
[Conference Paper]
Musketeer: Incentive-Compatible Rebalancing for Payment Channel Networks
Avarikioti, Zeta; Schmid, Stefan; Tiwari, Samarth
6th Conference on Advances in Financial Technologies, AFT 2024
[Conference Paper]
Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and Trends
Buchta, Robin; Gkoktsis, Georgios; Heine, Felix; Kleiner, Carsten
[Journal Article]
RPKI: Not Perfect But Good Enough
Haya Schulmann and Niklas Vogel and Michael Waidner
CoRR, Vol.abs/2409.14518
[Journal Article]


