Publikationen

Publikationen

Adapter fusion for check-worthiness detection - combining a task adapter with a NER adapter
Vogel, Inna; Möhle, Pauline; Meghana, Meghana; Steinebach, Martin
Workshop on Reducing Online Misinformation through Credible Information Retrieval 2024
[Conference Paper]


Improved identification of check-worthiness in social media data through multimodal analyses
Frick, Raphael Antonius; Steinebach, Martin
Workshop on Reducing Online Misinformation through Credible Information Retrieval 2024
[Conference Paper]


KI-generierte Abbildungen von Kindesmissbrauch
Steinebach, Martin
[Journal Article]


Comparing Attitudes Toward Different Consent Mediums: Semistructured Qualitative Study
Doan, Xengie; Rossi, Arianna; Botes, Marietjie; Selzer, Annika
[Journal Article]


UN-Cybercrime-Konvention: Ein Schritt vor, zwei Schritte zurück?
Gärtner, Tanya


Authorship Verification based on the Likelihood Ratio of Grammar Models
Nini, Andrea; Halvani, Oren; Graner, Lukas; Gherardi, Valerio; Ishihara, Shunichi
[Paper]


Chatkontrolle: Methoden, Chancen und Risiken
Steinebach, Martin
Hamburger Sicherheitsrechtstag 2023
[Conference Paper]


Positionspapier zur zweiten DSGVO-Evaluation (2024)
Selzer, Annika; Stummer, Sarah; Boll, Alina
[Paper]


Der EU Cyber Resilience Act: Ein Überblick aus rechtlicher Sicht
Arzt, Steven; Fischer, Leonie; Kreutzer, Michael; Scheel, Kirstin; Schneider, Markus; Schreiber, Linda; Selzer, Annika
[Paper]


KIM: Kaos In der Medizin
Ising, Fabian; Saatjohann, Christoph; Schinzel, Sebastian
Gesellschaft für Informatik, Fachbereich Sicherheit (GI Jahrestagung) 2024
[Conference Paper]


Virtuelles Weiterleben. Rechtmäßigkeit der Da­ten­verarbeitung und Umsetzung von Informationspflichten
Geissler, Ines
[Journal Article]


Datenschutz-Vorsorge. Anwendbarkeit jenseits der Forschung und Einbettung in das geltende Datenschutzrecht
Boll, Alina; Stummer, Sarah; Selzer, Annika
[Journal Article]


Die Datenschutz-Vorsorge (DS-V)
Boll, Alina; Selzer, Annika
[Journal Article]


Erste Schritte im Rahmen der Datenschutz-Vorsorge
Boll, Alina; Stummer, Sarah
[Journal Article]


Robustness and Collision-Resistance of PhotoDNA
Steinebach, Martin
[Journal Article]


Datenschutzsensibilisierung - Mit Kindern spielerisch ins Gespräch über die Wichtigkeit des Datenschutzes kommen
Appelt, Dominik; Geissler, Ines
[Journal Article]


Erste Schritte im Rahmen der Datenschutz-Vorsorge
Boll, Alina; Stummer, Sarah
[Journal Article]


A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet
Vincenzi, Marco de; Costantino, Gianpiero; Matteucci, Ilaria; Fenzl, Florian; Plappert, Christian; Rieke, Roland; Zelle, Daniel
[Journal Article]


Breaking the Quadratic Barrier: Quantum Cryptanalysis of Milenage, Telecommunications’ Cryptographic Backbone
Ulitzsch, Vincent Quentin; Seifert, Jean-Pierre
International Workshop on Post-Quantum Cryptography 2023
[Conference Paper]


faulTPM: Exposing AMD fTPMs' Deepest Secrets
Jacob, Hans Christian; Werling, Christian; Buhren, Robert; Seifert, Jean-Pierre
[Paper]


LAT-UP: Exposing Layout-Level Analog Hardware Trojans Using Contactless Optical Probing
Parvin, Sajjad; Goli, Mehran; Krachenfels, Thilo; Tajik, Shahin; Seifert, Jean-Pierre; Sill Torres, Frank; Drechsler, Rolf
IEEE Computer Society Annual Symposium on VLSI 2023
[Conference Paper]


Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis
Saß, Xhani Marvin; Krachenfels, Thilo; Dermot Pustelnik, Frederik; Seifert, Jean-Pierre; Altmann, Frank
Workshop on Attacks and Solutions in Hardware Security 2023
[Conference Paper]


Poster: Longitudinal Analysis of DoS Attacks
Schulmann, Haya; Waidner, Michael; Kaiser, Fabian
Conference on Computer and Communications Security 2023
[Conference Paper]


Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Bagia, Alexis; Tibouchi, Mehdi; Seifert, Jean-Pierre
[Journal Article]


Content-type: multipart/oracle - tapping into format oracles in email end-to-end encryption
Ising, Fabian; Poddebniak, Damian; Kappert, Tobias; Saatjohann, Christoph; Schinzel, Sebastian
USENIX Security Symposium 2023
[Conference Paper]


Datenschutzvorsorge in der offensiven Cyber­sicher­heits­forschung
Selzer, Annika; Spiecker gen. Döhmann, Indra; Boll, Alina
[Journal Article]


Darknet
Steinebach, Martin; Yannikos, York


Resource Management for Programmable Metasurfaces: Concept, Prospects and Challenges
Liaskos, Christos; Katsalis, Kostas; Triay, Joan; Schmid, Stefan
[Journal Article]


SeedTree: A Dynamically Optimal and Local Self-Adjusting Tree
Pourdamghani, Arash; Avin, Chen; Sama, Robert; Schmid, Stefan
[Paper]


Self-Adjusting Partially Ordered Lists
Addanki, Vamsi; Pacut, Maciej; Pourdamghani, Arash; Rétvári, Gabor; Schmid, Stefan; Vanerio, Juan
Conference on Computer Communications 2023
[Conference Paper]