Publikationen

Publikationen

Deep Face Age Progression: A Survey
Grimmer, M.; Raghavendra, R.; Busch, C.
IEEE Access, Vol.9, p.83376-83393
[Journal Article]


Analysing the feasibility of using Objectosphere for Face Presentation Attack Detection
Gonzalez-Soler, J.; Gomez-Barrero, M.; Günther, M.; Busch, C.
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]


Multi-Spectral Short Wave Infrared Sensors and Convolutional Neural Networks for Biometric Presentation Attack Detection
Gomez-Barrero, M.; Tolosana, R.; Kolberg, J.; Busch, C.
AI and Deep Learning in Biometric Security: Trends, Potential and Challenges, p.105-132


The Watchlist Imbalance Effect in Biometric Face Identification: Comparing Theoretical Estimates and Empiric Measurements
Drozdowski, P.; Rathgeb, C.; Busch, C.
Intl. Conf. on Computer Vision Workshops (ICCVW), p.1-9
[Conference Proceedings]


Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition with Privacy Protection
Drozdowski, P.; Stockhardt, F.; Rathgeb, C.; Osorio-Roig, D.; Busch, C.
IEEE Access, Vol.9, p.139361-139378
[Journal Article]


A response to the European Data Protection Supervisor Misunderstandings in Biometrics by the European Association for Biometrics
Busch, C.; Czajka, A.; Deravi, F.; Drozdowski, P.; Gomez-Barrero, M.; Hasse, G.; Henniger, O.; Kindt, E.; Kolberg, J.; Nouak, A.; Raja, K.; Raghavendra, R.; Rathgeb, C.; Salomon, J.; Veldhuis, R.
IET Biometrics, Vol.11, p.79-86
[Journal Article]


On the Generalisation capabilities of Fisher Vector based Face Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
IET Biometrics, Vol.10, p.480-496
[Journal Article]


On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
Kolberg, J.; Gomez-Barrero, M.; Busch, C.
IET Biometrics, Vol.10, p.359-373
[Journal Article]


Makeup Presentation Attack Potential Revisited: Skills Pay the Bills
Drozdowski, P.; Grobarek, S.; Schurse, J.; Rathgeb, C.; Stockhardt, F.; Busch, C.
Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Local Feature Encoding for Unknown Presentation Attack Detection: An Analysis of Different Local Feature Descriptors
Gonzalez-Soler, J.; Gomez-Barrero, M.; Kolberg, J.; Chang, L.; Perez-Suarez, A.; Busch, C.
IET Biometrics, Vol.10, p.374-391
[Journal Article]


Impact of facial tattoos and paintings on face recognition systems
Ibsen, M.; Rathgeb, C.; Fink, T.; Drozdowski, P.; Busch, C.
IET Biometrics, Vol.10, p.706-719
[Journal Article]


Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
Gonzalez-Soler, J.; Gomez-Barrero, M.; Chang, L.; Perez-Suarez, A.; Busch, C.
IEEE Access, Vol.9, p.5806-5820
[Journal Article]


Face Morphing Attacks: A Threat to eLearning?
Rathgeb, C.; Pöppelmann, K.; Busch, C.
IEEE Global Engineering Education Conf. (EDUCON 2021), p.1-6
[Conference Proceedings]


Effects of Image Compression on Face Image Manipulation Detection: A Case Study on Facial Retouching
Rathgeb, C.; Bernardo, K.; Haryanto, N.; Busch, C.
IET Biometrics, Vol.10
[Journal Article]


Deep Learning-based Semantic Segmentation for Touchless Fingerprint Recognition
Priesnitz, J.; Rathgeb, C.; Buchmann, N.; Busch, C.
Proc. Intl. Conf. on Pattern Recognition (ICPR), p.154-168
[Conference Proceedings]


Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection
Kolberg, J.; Grimmer, M.; Gomez-Barrero, M.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.3, p.190-202
[Journal Article]


An Overview of touchless 2D Fingerprint Recognition
Priesnitz, J.; Rathgeb, C.; Buchmann, N.; Busch, C.
EURASIP Journal on Image and Video Processing
[Journal Article]


Safe-Error Attacks on SIKE and CSIDH
Campos, Fabio; Krämer, Juliane; Müller, Marcel
International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), p.104-125
[Conference Proceedings]


CTIDH: Faster Constant-Time CSIDH
Banegas, Gustavo; Bernstein, Daniel J; Campos, Fabio; Chou, Tung; Lange, Tanja; Meyer, Michael; Smith, Benjamin; Sotáková, Jana
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2021, p.351-387
[Journal Article]


Zur Benutzbarkeit und Verwendung von API-Dokumentationen
Huesmann, R.; Zeier, A.; Heinemann, A.; Wiesmaier, A.
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]


Is the Uplink Enough? Estimating Video Stalls from Encrypted Network Traffic
Loh, Frank; Wamser, Florian; Moldovan, Christian; Zeidler, Bernd; Tsilimantos, Dimitrios; Valentin, Stefan; Hoßfeld, Tobias
NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020, p.1-9
[Conference Proceedings]


IJNM Special Issue - International Journal of Network Management: QoE-centric analysis and management of communication networks
Wamser, Florian; Alay, Özgü; Metzger, Florian; Valentin, Stefan
Int. J. Netw. Manag., Vol.30
[Journal Article]


Post-Quantum Secure Boot
Kumar, Vinay B. Y.; Gupta, Naina; Chattopadhyay, Anupam; Kasper, Michael; Krauß, Christoph; Niederhagen, Ruben
Design, Automation & Test in Europe Conference & Exhibition, DATE 2020
[Conference Proceedings]


TrustEV: Trustworthy Electric Vehicle Charging and Billing
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Proceedings of the 35th ACM/SIGAPP Symposium on Applied Computing SAC 2020
[Conference Proceedings]


SEPAD - Security Evaluation Platform for Autonomous Driving
Zelle, Daniel; Rieke, Roland; Plappert, Christian; Krauß, Christoph; Levshun, Dmitry; Chechulin, Andrey
28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP
[Conference Proceedings]


Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Bürstinghaus-Steinbach, Kevin; Krauß, Christoph; Niederhagen, Ruben; Schneider, Michael
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS, p.841–852
[Conference Proceedings]


Securing Electric Vehicle Charging Systems through Component Binding
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
39th International Conference on Computer Safety, Reliability and Security, SAFECOMP
[Conference Proceedings]


HIP: HSM-based Identities for Plug-and-Charge
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria; Heddergott, Ronald
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]


Security Analysis of Automotive Protocols
Lauser, Timm; Zelle, Daniel; Krauß, Christoph
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]