Publications
Publications
Design eines BCM-Dashboards für kleine und mittlere Unternehmen
Kaufhold, Marc-André; Reuter, Christian; Riebe, Thea; von Radziewski, Elmar
Mensch und Computer 2018: Workshopband, p.579-586
[Conference Proceedings]
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU
Kaufhold, Marc-André; Reuter, Christian; Ermert, Tobias
Mensch und Computer 2018 Tagungsband, p.309-312
[Conference Proceedings]
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft
Bernardi, Ansgar; Reuter, Christian; Schneider, Wolfgang; Linsner, Sebastian; Kaufhold, Marc-André
Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, p.25-30
[Conference Proceedings]
BayBFed: Bayesian Backdoor Defense for Federated Learning
Kumari, Kavita; Rieger, Phillip; Fereidooni, Hossein; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Proceedings: 44th IEEE Symposium on Security and Privacy - SP 2023, p.747-764
[Conference Proceedings]
Unsupervised Face Recognition using Unlabeled Synthetic Data
Boutros, Fadi; Klemt, Marcel; Fang, Meiling; Kuijper, Arjan; Damer, Naser
International Conference on Automatic Face and Gesture Recognition 2023
[Conference Paper]
Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit
Schmidbauer-Wolf, Gina Maria; Herbert, Franziska; Reuter, Christian
Mensch und Computer 2019 - Workshopband, p.256-264
[Conference Proceedings]
Wertekonflikte in der Nutzung sozialer Medien zur Vernetzung ungebundener HelferInnen in Krisensituationen – Ein Value-Sensitive Design Ansatz
Riebe, Thea; Langer, Amanda; Kaufhold, Marc-André; Kretschmer, Nina Katharina; Reuter, Christian
Mensch und Computer 2019 - Workshopband, p.308-318
[Conference Proceedings]
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten
Reuter, Christian; Mentler, Tilo; Nestler, Simon; Herczeg, Michael; Ludwig, Thomas; Pottebaum, Jens; Kaufhold, Marc-André
Mensch und Computer 2019 - Workshopband, p.278-280
[Conference Proceedings]
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, p.119-124
[Conference Proceedings]
QMagFace: Simple and Accurate Quality-Aware Face Recognition
Terhörst, Philipp; Ihlefeld, Malte; Huber, Marco; Damer, Naser; Kirchbuchner, Florian; Raja, Kiran; Kuijper, Arjan
Winter Conference on Applications of Computer Vision 2023
[Conference Paper]
Automated Cone and Vessel Analysis in Adaptive Optics Like Retinal Images for Clinical Diagnostics Support
Hertlein, Anna-Sophia; Wesarg, Stefan; Jessica Schmidt; Boche, Benjamin; Pfeiffer, Norbert; Matlach, Juliane
International Workshop on Clinical Image-Based Procedures 2022
[Conference Paper]
Machine Learning Based Approach for Motion Detection and Estimation in Routinely Acquired Low Resolution Near Infrared Fluorescence Optical Imaging
Zerweck, Lukas; Wesarg, Stefan; Kohlhammer, Jörn; Köhm, Michaela
International Workshop on Clinical Image-Based Procedures 2022
[Conference Paper]
Measuring the Uptaking of Digital Health Platforms on AAL/AHA Domain
Juiz, Carlos; Bermejo, Belen; Nikolov, Alexander; Rus, Silvia; Carboni, Andrea; Russo, Dario; Moroni, Davide; Karanastasis, Efstathios; Andronikou, Vassiliki; Lievens, Frederic; Berlo, Ad van; Staalduinen, Willeke van; Samuelsson, Christina; Cabrera-Umpierrez, Maria Fernanda
International Congress on Information and Communication Technology 2022
[Conference Paper]
XDRI Attacks - and - How to Enhance Resilience of Residential Routers
Philipp Jeitner and Haya Schulmann and Lucas Teichmann and Michael Waidner
31st USENIX Security Symposium (USENIX Security 22), p.4473–4490
[Conference Proceedings]
Stalloris: RPKI Downgrade Attack
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
31st USENIX Security Symposium (USENIX Security 22), p.4455–4471
[Conference Proceedings]
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Tomas Hlavacek and Haya Schulmann and Michael Waidner
Computer Security – ESORICS 2022, p.509–530
[Conference Proceedings]
How (Not) to Deploy Cryptography on the Internet
Haya Schulmann
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, p.1
[Conference Proceedings]
Poster: DNS in Routers Considered Harmful
Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3471–3473
[Conference Proceedings]
Poster: Insights into Global Deployment of RPKI Validation
Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3467–3469
[Conference Proceedings]
Poster: RPKI Kill Switch
Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3423–3425
[Conference Proceedings]
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Elias Heftrig and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3363–3365
[Conference Proceedings]
Behind the Scenes of RPKI
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.1413–1426
[Conference Proceedings]
crypto_lib: Comparing and Selecting Cryptography Libraries
J. Wohlwender and R. Huesmann and A. Heinemann and A. Wiesmaier
European Interdisciplinary Cybersecurity Conference (EICC'22), p.6 – 11
[Conference Proceedings]
Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Lucas Buschlinger and Roland Rieke and Sanat Sarda and Christoph Krauß
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), p.246-254
[Conference Proceedings]
On the State of Crypto-Agility
N. Alnahawi and N. Schmitt and A. Wiesmaier and A. Heinemann and T. Graßmeyer
18. Deutscher IT-Sicherheitskongress, p.103 – 126
[Conference Proceedings]
Alcohol Consumption Detection from Periocular NIR Images Using Capsule Network
J. Tapia and E. Lopez-Droguett and C. Busch
26th Intl. Conf. on Pattern Recognition (ICPR), p.959–966
[Conference Proceedings]
Identity Documents Image Quality Assessment
D. Schulz and J. Maureira and J. Tapia and C. Busch
30th European Signal Processing Conf. (EUSIPCO), p.1017–1021
[Conference Proceedings]
Evaluating Face Image Quality Score Fusion for Modern Deep Learning Models
T. Schlett and C. Rathgeb and J. Tapia and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–8
[Conference Proceedings]
Crowd-powered Face Manipulation Detection: Fusing Human Examiner Decisions
C. Rathgeb and R. Nichols and M. Ibsen and P. Drozdowski and C. Busch
Intl. Conf. on Image Processing (ICIP), p.181–185
[Conference Proceedings]
Hybrid Protection of Biometric Templates by Combining Homomorphic Encryption and Cancelable Biometrics
H. Otroshi-Shahreza and C. Rathgeb and D. Osorio-Roig and V. Krivokuća and S. Marcel and C. Busch
Proc. of the 2022 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


