Publikationen
Publikationen
Differential Anomaly Detection for Facial Images
M. Ibsen and L. J. Gonzalez-Soler and C. Rathgeb and P. Drozdowski and M. Gomez-Barrero and C. Busch
IEEE Intl. Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]
Generation of Non-Deterministic Synthetic Face Datasets Guided by Identity Priors
M. Grimmer and H. Zhang and R. Raghavendra and K. Raja and C. Busch
https://www.ntnu.edu/nikt2021
[Journal Article]
Deep Face Age Progression: A Survey
M. Grimmer and R. Raghavendra and C. Busch
IEEE Access, Vol.9, p.83376–83393
[Journal Article]
Analysing the feasibility of using Objectosphere for Face Presentation Attack Detection
J. Gonzalez-Soler and M. Gomez-Barrero and M. Günther and C. Busch
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]
Multi-Spectral Short Wave Infrared Sensors and Convolutional Neural Networks for Biometric Presentation Attack Detection
M. Gomez-Barrero and R. Tolosana and J. Kolberg and C. Busch
AI and Deep Learning in Biometric Security: Trends, Potential and Challenges, p.105–132
The Watchlist Imbalance Effect in Biometric Face Identification: Comparing Theoretical Estimates and Empiric Measurements
P. Drozdowski and C. Rathgeb and C. Busch
Intl. Conf. on Computer Vision Workshops (ICCVW), p.1–9
[Conference Proceedings]
Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition with Privacy Protection
P. Drozdowski and F. Stockhardt and C. Rathgeb and D. Osorio-Roig and C. Busch
IEEE Access, Vol.9, p.139361–139378
[Journal Article]
A response to the European Data Protection Supervisor 'Misunderstandings in Biometrics' by the European Association for Biometrics
C. Busch and A. Czajka and F. Deravi and P. Drozdowski and M. Gomez-Barrero and G. Hasse and O. Henniger and E. Kindt and J. Kolberg and A. Nouak and K. Raja and R. Raghavendra and C. Rathgeb and J. Salomon and R. Veldhuis
IET Biometrics, Vol.11, p.79–86
[Journal Article]
On the Generalisation capabilities of Fisher Vector based Face Presentation Attack Detection
L. J. Gonzalez-Soler and M. Gomez-Barrero and C. Busch
IET Biometrics, Vol.10, p.480–496
[Journal Article]
On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
J. Kolberg and M. Gomez-Barrero and C. Busch
IET Biometrics, Vol.10, p.359–373
[Journal Article]
Makeup Presentation Attack Potential Revisited: Skills Pay the Bills
P. Drozdowski and S. Grobarek and J. Schurse and C. Rathgeb and F. Stockhardt and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]
Local Feature Encoding for Unknown Presentation Attack Detection: An Analysis of Different Local Feature Descriptors
J. Gonzalez-Soler and M. Gomez-Barrero and J. Kolberg and L. Chang and A. Perez-Suarez and C. Busch
IET Biometrics, Vol.10, p.374–391
[Journal Article]
Impact of facial tattoos and paintings on face recognition systems
M. Ibsen and C. Rathgeb and T. Fink and P. Drozdowski and C. Busch
IET Biometrics, Vol.10, p.706–719
[Journal Article]
Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
J. Gonzalez-Soler and M. Gomez-Barrero and L. Chang and A. Perez-Suarez and C. Busch
IEEE Access, Vol.9, p.5806–5820
[Journal Article]
Face Morphing Attacks: A Threat to eLearning?
C. Rathgeb and K. Pöppelmann and C. Busch
IEEE Global Engineering Education Conf. (EDUCON 2021), p.1–6
[Conference Proceedings]
Effects of Image Compression on Face Image Manipulation Detection: A Case Study on Facial Retouching
C. Rathgeb and K. Bernardo and N. Haryanto and C. Busch
IET Biometrics, Vol.10
[Journal Article]
Deep Learning-based Semantic Segmentation for Touchless Fingerprint Recognition
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
Proc. Intl. Conf. on Pattern Recognition (ICPR), p.154–168
[Conference Proceedings]
Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection
J. Kolberg and M. Grimmer and M. Gomez-Barrero and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.3, p.190–202
[Journal Article]
An Overview of touchless 2D Fingerprint Recognition
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
EURASIP Journal on Image and Video Processing
[Journal Article]
Safe-Error Attacks on SIKE and CSIDH
Campos, Fabio and Krämer, Juliane and Müller, Marcel
International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), p.104–125
[Conference Proceedings]
CTIDH: Faster Constant-Time CSIDH
Banegas, Gustavo and Bernstein, Daniel J and Campos, Fabio and Chou, Tung and Lange, Tanja and Meyer, Michael and Smith, Benjamin and Sotáková, Jana
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2021, p.351–387
[Journal Article]
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities
Zeitouni, Shaza; Dessouky, Ghada; Sadeghi, Ahmad-Reza
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021)
[Conference Proceedings]
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
Rodler, Michael; Li, Wenting; Karame, Ghassan O.; Davi, Lucas
30th USENIX Security Symposium
[Conference Proceedings]
SoK: Efficient Privacy-preserving Clustering
Hedge, Aditya; Möllering, Helen; Schneider, Thomas; Yalame, Mohammad Hossein
21st Privacy Enhancing Technologies Symposium (PETS 2021)
[Conference Proceedings]
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants
Chen, Yanjiao; Bai, Yijie; Wang, Kaibo; Mitev, Richard; Xu, Wenyuan; Sadeghi, Ahmad-Reza
ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]
CURE: A Security Architecture with CUstomizable and Resilient Enclaves
Bahmani, Raad; Brasser, Ferdinand; Dessouky, Ghada; Jauernig, Patrick; Klimmek, Matthias; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
30th USENIX Security Symposium (USENIX Security'21)
[Conference Proceedings]
BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Alkeilani Alkadri, Nabil; Harasser, Patrick; Janson, Christian
20th International Conference on Cryptology and Network Security (CANS 2021)
[Conference Proceedings]
The Cost of Path Information: Routing in Anonymous Communication
Grube, Tim; Egert, Rolf; Daubert, Jörg; Mühlhäuser, Max
Consumer Communications & Networking Conference (CCNC 2021)
[Conference Proceedings]
SAFELearn: Secure Aggregation for private FEderated Learning
Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Möllering, Helen; Nguyen, Thien Duc; Rieger, Phillip; Sadeghi, Ahmad-Reza; Schneider, Thomas; Yalame, Mohammad Hossein; Zeitouni, Shaza
4th Deep Learning and Security Workshop (DLS'21)
[Conference Proceedings]
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
Demmler, Daniel; Katzenbeisser, Stefan; Schneider, Thomas; Schuster, Tom; Weinert, Christian
18th International Conference on Security and Cryptography (SECRYPT'21)
[Conference Proceedings]


