Publikationen

Publikationen

Deep Face Age Progression: A Survey
M. Grimmer and R. Raghavendra and C. Busch
IEEE Access, Vol.9, p.83376–83393
[Journal Article]


Analysing the feasibility of using Objectosphere for Face Presentation Attack Detection
J. Gonzalez-Soler and M. Gomez-Barrero and M. Günther and C. Busch
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]


Multi-Spectral Short Wave Infrared Sensors and Convolutional Neural Networks for Biometric Presentation Attack Detection
M. Gomez-Barrero and R. Tolosana and J. Kolberg and C. Busch
AI and Deep Learning in Biometric Security: Trends, Potential and Challenges, p.105–132


The Watchlist Imbalance Effect in Biometric Face Identification: Comparing Theoretical Estimates and Empiric Measurements
P. Drozdowski and C. Rathgeb and C. Busch
Intl. Conf. on Computer Vision Workshops (ICCVW), p.1–9
[Conference Proceedings]


Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition with Privacy Protection
P. Drozdowski and F. Stockhardt and C. Rathgeb and D. Osorio-Roig and C. Busch
IEEE Access, Vol.9, p.139361–139378
[Journal Article]


A response to the European Data Protection Supervisor 'Misunderstandings in Biometrics' by the European Association for Biometrics
C. Busch and A. Czajka and F. Deravi and P. Drozdowski and M. Gomez-Barrero and G. Hasse and O. Henniger and E. Kindt and J. Kolberg and A. Nouak and K. Raja and R. Raghavendra and C. Rathgeb and J. Salomon and R. Veldhuis
IET Biometrics, Vol.11, p.79–86
[Journal Article]


On the Generalisation capabilities of Fisher Vector based Face Presentation Attack Detection
L. J. Gonzalez-Soler and M. Gomez-Barrero and C. Busch
IET Biometrics, Vol.10, p.480–496
[Journal Article]


On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
J. Kolberg and M. Gomez-Barrero and C. Busch
IET Biometrics, Vol.10, p.359–373
[Journal Article]


Makeup Presentation Attack Potential Revisited: Skills Pay the Bills
P. Drozdowski and S. Grobarek and J. Schurse and C. Rathgeb and F. Stockhardt and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]


Local Feature Encoding for Unknown Presentation Attack Detection: An Analysis of Different Local Feature Descriptors
J. Gonzalez-Soler and M. Gomez-Barrero and J. Kolberg and L. Chang and A. Perez-Suarez and C. Busch
IET Biometrics, Vol.10, p.374–391
[Journal Article]


Impact of facial tattoos and paintings on face recognition systems
M. Ibsen and C. Rathgeb and T. Fink and P. Drozdowski and C. Busch
IET Biometrics, Vol.10, p.706–719
[Journal Article]


Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
J. Gonzalez-Soler and M. Gomez-Barrero and L. Chang and A. Perez-Suarez and C. Busch
IEEE Access, Vol.9, p.5806–5820
[Journal Article]


Face Morphing Attacks: A Threat to eLearning?
C. Rathgeb and K. Pöppelmann and C. Busch
IEEE Global Engineering Education Conf. (EDUCON 2021), p.1–6
[Conference Proceedings]


Effects of Image Compression on Face Image Manipulation Detection: A Case Study on Facial Retouching
C. Rathgeb and K. Bernardo and N. Haryanto and C. Busch
IET Biometrics, Vol.10
[Journal Article]


Deep Learning-based Semantic Segmentation for Touchless Fingerprint Recognition
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
Proc. Intl. Conf. on Pattern Recognition (ICPR), p.154–168
[Conference Proceedings]


Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection
J. Kolberg and M. Grimmer and M. Gomez-Barrero and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.3, p.190–202
[Journal Article]


An Overview of touchless 2D Fingerprint Recognition
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
EURASIP Journal on Image and Video Processing
[Journal Article]


Safe-Error Attacks on SIKE and CSIDH
Campos, Fabio and Krämer, Juliane and Müller, Marcel
International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), p.104–125
[Conference Proceedings]


CTIDH: Faster Constant-Time CSIDH
Banegas, Gustavo and Bernstein, Daniel J and Campos, Fabio and Chou, Tung and Lange, Tanja and Meyer, Michael and Smith, Benjamin and Sotáková, Jana
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2021, p.351–387
[Journal Article]


Zur Benutzbarkeit und Verwendung von API-Dokumentationen
R. Huesmann and A. Zeier and A. Heinemann and A. Wiesmaier
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]


Is the Uplink Enough? Estimating Video Stalls from Encrypted Network Traffic
Frank Loh and Florian Wamser and Christian Moldovan and Bernd Zeidler and Dimitrios Tsilimantos and Stefan Valentin and Tobias Hoßfeld
NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020, p.1–9
[Conference Proceedings]


IJNM Special Issue - International Journal of Network Management: QoE-centric analysis and management of communication networks
Florian Wamser and Özgü Alay and Florian Metzger and Stefan Valentin
Int. J. Netw. Manag., Vol.30
[Journal Article]


Post-Quantum Secure Boot
Vinay B. Y. Kumar and Naina Gupta and Anupam Chattopadhyay and Michael Kasper and Christoph Krauß and Ruben Niederhagen
Design, Automation & Test in Europe Conference & Exhibition, DATE 2020
[Conference Proceedings]


TrustEV: Trustworthy Electric Vehicle Charging and Billing
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 35th ACM/SIGAPP Symposium on Applied Computing SAC 2020
[Conference Proceedings]


SEPAD - Security Evaluation Platform for Autonomous Driving
Daniel Zelle and Roland Rieke and Christian Plappert and Christoph Krauß and Dmitry Levshun and Andrey Chechulin
28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP
[Conference Proceedings]


Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS, p.841–852
[Conference Proceedings]


Securing Electric Vehicle Charging Systems through Component Binding
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
39th International Conference on Computer Safety, Reliability and Security, SAFECOMP
[Conference Proceedings]


HIP: HSM-based Identities for Plug-and-Charge
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova and Ronald Heddergott
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]


Security Analysis of Automotive Protocols
Timm Lauser and Daniel Zelle and Christoph Krauß
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]