Publikationen
Publikationen
Benchmarking Cross-Domain Face Recognition with Avatars, Caricatures and Sketches
A. Foroughi, C. Rathgeb, M. Ibsen and C. Busch
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), p.1–5
[Conference Proceedings]
SynFacePAD 2023: Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data
M. Fang and M. Huber and J. Fierrez and R. Raghavendra and N. Damer and A. Alkhaddour and M. Kasantcev and V. Pryadchenko and Z. Yang and H. Huangfu and Y. Chen and Y. Zhang and Y. Pan and J. Jiang and X. Liu and X. Sun and C. Wang and X. Liu and Z. Chang and Z. Guangzhe and J. Tapia and J. Gonzalez-Soler and C. Aravena and D. Schulz
Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]
A Principal Component Analysis-Based Approach for Single Morphing Attack Detection
L. Dargaud and M. Ibsen and J. Tapia and C. Busch
IEEE/CVF Winter Conf. on Applications of Computer Vision Workshops (WACVw)
[Conference Proceedings]
Standards for Biometric Presentation Attack Detection
C. Busch
Handbook of Biometric Anti-Spoofing - Presentation Attack Detection and Vulnerability Assessment, p.571–581
Toward an Efficient Iris Recognition System on Embedded Devices
D. P. Benalcazar and J. Tapia and M. Vasquez and L. Causa and E. L. Droguett and C. Busch
IEEE Access
[Conference Proceedings]
Synthetic ID Card Image Generation for Improving Presentation Attack Detection
D. Benalcazar and J. Tapia and S. Gonzalez and C. Busch
IEEE Trans. on Information Forensics and Security (TIFS)
[Journal Article]
MT-PRO: Multibiometric Template Protection Based On Homomorphic Transciphering
P. Bauspieß and C.-M. Zok and A. Costache and C. Rathgeb and J. Kolberg and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]
Face Image Quality Estimation on Presentation Attack Detection
C. Aravena and D. Pasmino and J. Tapia and C. Busch
Iberoamerican Congress on Pattern Recognition (CIARP), p.358–373
[Conference Proceedings]
Mayo
Beullens, Ward and Campos, Fabio and Celi, Sofía and Hess, Basil and Kannwischer, Matthias J
Specification document of NIST PQC Standardization of Additional Digital Signature Scheme
[Journal Article]
Separating Oil and Vinegar with a Single Trace: Side-Channel Assisted Kipnis-Shamir Attack on UOV
Aulbach, Thomas and Campos, Fabio and Krämer, Juliane and Samardjiska, Simona and Stöttinger, Marc
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2023, p.221–245
[Journal Article]
crypto_lib: Comparing and Selecting Cryptography Libraries
J. Wohlwender and R. Huesmann and A. Heinemann and A. Wiesmaier
European Interdisciplinary Cybersecurity Conference (EICC'22), p.6 – 11
[Conference Proceedings]
Efficient Practical Byzantine Consensus Using Random Linear Network Coding
M. Braun and A. Wiesmaier and N. Alnahawi
Springer Annals of Telecommunications (Journal), Vol.78, p.33–51
[Journal Article]
Sussex-Huawei Locomotion and Transportation Dataset
Hristijan Gjoreski and
Mathias Ciliberto and
Lin Wang and
Francisco Javier Ordóñez Morales and
Sami Mekki and
Stefan Valentin and
Daniel Roggen
ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Daniel Zelle and Christian Plappert and Roland Rieke and Dirk Scheuermann and Christoph Krauß
Microprocessors and Microsystems, Vol.90, p.104461
[Journal Article]
Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Lucas Buschlinger and Roland Rieke and Sanat Sarda and Christoph Krauß
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), p.246-254
[Conference Proceedings]
Integrating Privacy into the Electric Vehicle Charging Architecture
Dustin Kern and Timm Lauser and Christoph Krauß
Proceedings on Privacy Enhancing Technologies, Vol.2022, p.140-158
[Journal Article]
On the State of Crypto-Agility
N. Alnahawi and N. Schmitt and A. Wiesmaier and A. Heinemann and T. Graßmeyer
18. Deutscher IT-Sicherheitskongress, p.103 – 126
[Conference Proceedings]
Towards a maturity model for crypto-agility assessment
Julian Hohm and
Andreas Heinemann and
Alexander Wiesmaier
CoRR, Vol.abs/2202.07645
[Journal Article]
Future Trends in Digital Face Manipulation and Detection
R. Tolosana and C. Rathgeb and R. Vera-Rodriguez and C. Busch and Luisa Verdoliva and S. Lyu and others
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.463–482
Selfie Periocular Verification using an Efficient Super-Resolution Approach
J. Tapia and A. Valenzuela and R. Lara and M. Gomez-Barrero and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]
Alcohol Consumption Detection from Periocular NIR Images Using Capsule Network
J. Tapia and E. Lopez-Droguett and C. Busch
26th Intl. Conf. on Pattern Recognition (ICPR), p.959–966
[Conference Proceedings]
Identity Documents Image Quality Assessment
D. Schulz and J. Maureira and J. Tapia and C. Busch
30th European Signal Processing Conf. (EUSIPCO), p.1017–1021
[Conference Proceedings]
Analysis of the synthetic periocular iris images for robust Presentation Attacks Detection algorithms
J. Maureira and J. Tapia and C. Arellano, C. Busch
IET Biometrics, Vol.n/a, p.1–12
[Journal Article]
A novel Capsule Neural Network based model for drowsiness detection using electroencephalography signals
L. Guarda and J. Tapia and E. Lopez-Droguett and M. Ramos
Expert Systems with Applications, Vol.201, p.116977
[Journal Article]
Evaluating Face Image Quality Score Fusion for Modern Deep Learning Models
T. Schlett and C. Rathgeb and J. Tapia and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–8
[Conference Proceedings]
Face Morphing Attack Detection Methods
U. Scherhag and C. Rathgeb and C. Busch
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.331–349
Reliable detection of doppelgängers based on deep face representations
C. Rathgeb and D. Fischer and P. Drozdowski and C. Busch
IET Biometrics, Vol.11, p.215–224
[Journal Article]
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks
C. Rathgeb and R. Tolosana and R. Vera and C. Busch
[Book]
Demographic fairness in biometric systems: What do the experts say?
C. Rathgeb and P. Drozdowski and D. C. Frings and N. Damer and C. Busch
IEEE Technology and Society Magazine, Vol.41, p.71–82
[Journal Article]
Deep face fuzzy vault: Implementation and performance
C. Rathgeb and J. Merkle and J. Scholz and B. Tams and V. Nesterowicz
Computers & Security
[Journal Article]


