Publikationen

Publikationen

Künstliche Intelligenz bei Webanwendungen
Wilmer, Thomas
Datenschutz und Internet


Rechtsgrundlagen der Verarbeitung in der Datenschutz-Grundverordnung
Wilmer, Thomas
Datenschutz und Internet


Grundsätze für die Verarbeitung personenbezogener Daten nach Art.\ 5 DS-GVO
Wilmer, Thomas
Datenschutz und Internet


TDDDG Telekommunikation-Digitale-Dienste-Datenschutz-Gesetz Kommentar
Riechert, Anne; Wilmer, Thomas; Brock, Marc Oliver; Golland, Alexander; Keppeler, Lutz Martin; Raji, Behrang; Riechert, Anne; Sesing-Wagenpfeil, Andreas; Ströbel, Lukas; Voß, Jan Peter; Wilmer, Thomas
[Book]


Post-Quantum Cryptography in eMRTDs — Evaluating PAKE and PKI for Travel Documents
Alnahawi, N.; Azouaoui, M.; Bos, J.; Davies, G.; Moon, S.; van Vredendaal, C.; Wiesmaier, A.
Security Standardisation Research Conference (SSR 25)
[Conference Proceedings]


Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial Networks
Ha The, Viet; Kern, Dustin; Nguyen Tan, Phat; Krauß, Christoph
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1800–1809
[Conference Proceedings]


Anomaly Detection and Mitigation for Electric Vehicle Charging-Based Attacks on the Power Grid
Kern, Dustin; Krauß, Christoph; Hollick, Matthias
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1790–1799
[Conference Proceedings]


Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard
Lauser, Timm; Müller, Maximilian; Baumgart, Ingmar; Krauß, Christoph
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1839–1848
[Conference Proceedings]


Streamlining Plug-and-Charge Authorization for Electric Vehicles with OAuth 2 and OpenID Federation
Primbs, Jonas; Kern, Dustin; Menth, Michael; Krauß, Christoph
IEEE Access, Vol.13, p.168711-168731
[Journal Article]


RollCAN – CAN-bus based RollJam-Attack
Hamborg, Jannis; Lauser, Timm; Krauß, Christoph
Proceedings of the 2nd Cyber Security in CarS Workshop
[Conference Proceedings]


Towards a Holistic and Multi-Modal Vehicle Security Monitoring
Yekta, Ali Recai; Spychalski, Dominik; Yekta, Cenk; Heinrich, Markus; Krauß, Christoph; Katzenbeisser, Stefan
Proceedings of the 20th International Conference on Critical Information Infrastructures Security (CRITIS)
[Conference Proceedings]


CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set
Hellemans, Wouter; Hamborg, Jannis; Lauser, Timm; Rabbani, Md Masoom; Preneel, Bart; Krauß, Christoph; Mentens, Nele
Proceedings of the 41st Annual Computer Security Applications Conference (ACSAC)
[Conference Proceedings]


DemoQuanDT: a carrier-grade QKD network
Horoschenkoff, P.; Henrich, J.; Böhn, R.; Khan, I.; Rödiger, J.; Gunkel, M.; Bauch, M.; Benda, J.; Bläcker, P.; Eichhammer, E.; Eismann, U.; Frenck, G.; Griesser, H.; Jontofsohn, W.; Kopshoff, N.; Röhrich, S.; Seidl, F.; Schark, N.; Sollner, E.; von Blanckenburg, D.; Heinemann, A.; Stiemerling, M.; Gärtner, M.
J. Opt. Commun. Netw., Vol.17, p.743-756
[Journal Article]


Syn-IDPass: Passport Synthetic Dataset for Presentation Attack Detection?
Tapia, J. E.; Stockhardt, F.; Gonzalez-Soler, L. J.; Busch, C.
Proc. IEEE Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Single-morphing attack detection using few-shot learning and triplet-loss
Tapia, J. E.; Schulz, D.; Busch, C.
Neurocomputing
[Conference Proceedings]


Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications
Tapia, J. E.; Russo, M.; Busch, C.
IEEE Access
[Conference Proceedings]


Towards Iris Presentation Attack Detection with Foundation Models
Tapia, J. E.; Gonzalez-Soler, L. J.; Busch, C.
The 19th IEEE International Conference on Automatic Face and Gesture
[Conference Proceedings]


Are Morphed Periocular Iris Images a Threat to Iris Recognition?
J. Tapia, S. Gonzalez, D. Benalcazar; Busch, C.
IEEE Trans. on Information Forensics and Security, Vol.20, p.12417-12428
[Journal Article]


Can Foundation Models Predict Fitness for Duty?
Tapia, J. E.; Busch, C.
The IEEE International Joint Conference on Biometrics (IJCB)
[Conference Proceedings]


Forged Presentation Attack Detection for ID Cards on Remote Verification Systems
Tapia, J.; Gonzalez, S.
ScienceDirect - Pattern Recognition
[Journal Article]


Are Morphed Periocular Iris Images a Threat to Iris Recognition?
J. Tapia, D. Schulz; Busch, C.
IEEE Trans. on Information Forensics and Security, Vol.20, p.12417-12428
[Journal Article]


Classification of Alcohol, Drugs and Sleepiness Condition using Periocular Iris Images to Evaluate Fitness For Duty
Tapia, J.; Benalcazar, D.; Valenzuela, A.; Causa, L.; Lopez-Droguett, E.; Busch, C.
ScienceDirect - Expert Systems with Applications
[Journal Article]


Enhanced Deep Learning DeepFake Detection Integrating Handcrafted Features
Hinke-Navarro, A.; Nieto-Hidalgo, M.; Espin, J. M.; Tapia, J. E.
21st International Conference in Computer Analysis of Images and Patterns (CAIP) September 22-25
[Conference Proceedings]


Second Competition on Presentation Attack Detection on ID Card
Tapia, J. E.; Nieto, M.; Espin, J. M.; Rocamora, A. S.; Barrachina, J.; Damer, N.; Busch, C.
International Joint Conference in Biometrics (IJCB) 2025
[Conference Proceedings]


Impact and Mitigation of Quality Degradation for Differential Morphing Attack Detection
Schlett, T.; Rathgeb, C.; Tapia, J. E.; Busch, C.
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Training humans for synthetic face image detection
Rehman, S.; Meier, E.; Ibsen, M.; Rathgeb, C.; Nichols, R.; Busch, C.
Frontiers in Artificial Intelligence, Vol.8, p.1568267
[Journal Article]


Secure Multi-Party Homomorphic Encryption for Post-Quantum Biometric Recognition
Paaske, H.; Bayer, F.; Rathgeb, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


LivDet 2025: Toward Robust and Generalizable Fingerprint Presentation Attack Detection
Orru, G.; Micheletto, M.; Casula, R.; Zedda, S.; Fenu, D.; Igene, L.; Priesnitz, J.; Busch, C.; Rathgeb, C.; Schuckers, S. C.; Marcialis, G. L.
Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Cancelable Face Biometrics With Soft-Biometric Privacy Enhancement
Melzi, P.; Otroshi, H.; Rathgeb, C.; Tolosana, R.; Vera-Rodriguez, R.; Fierrez, J.; Marcel, S.; Busch, C.
IEEE Access
[Journal Article]


Iris Liveness Detection Competition (LivDet-Iris)
Mahsa Mitcheff, Afzal Hossain, Samuel Webster, Siamul Khan, Katarzyna Roszczewska, Juan E. Tapia, Fabian Stockhardt, Lazaro J. Gonzalez-Soler,Ji-Young Lim, Mirko Pollok, Felix Kreuzer, Caiyong Wang, Lin Li, Fukang Guo, Jiayin Gu, Debasmita Pal, Parisa Farmanifard, Renu Sharma, Arun Ross, Geetanjali Sharma, Shubham Ashwani, Aditya Nigam, Raghavendra Ramachandra, Lambert Igene, Jesse Dykes, Ada Sawilska, Aleksandra Dzieniszewska, Jakub Januszkiewicz, Ewelina Bartuzi-Trokielewicz, Alicja Martinek, Mateusz Trokielewicz, Adrian Kordas, Kevin Bowyer, Stephanie Schuckers, Adam Czajka
Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]