Publikationen

Publikationen

Simulating the overload of medical processes due to system failures during a cyberattack
Willing, Markus; Ebbers, Simon; Dresen, Christian; Czolbe, Marc; Saatjohann, Christoph; Schinzel, Sebastian
[Journal Article]


Device Fingerprinting Remediation in Android and iOS Apps
Heid, Kris; Heider, Jens
International Conference on Risks and Security of Internet and Systems 2024
[Conference Paper]


Face Swap Forensics
Steinebach, Martin; Frühwein, Marco
International Symposium on Electronic Imaging 2025
[Journal Article]


Natural Language Watermarking with ChatGPT
Steinebach, Martin; Frick, Raphael
International Symposium on Electronic Imaging 2025
[Journal Article]


Identification of Cultural Artifacts using Deep Learning
Liu, Huajian; Yang, Xiaoying; Frick, Raphael; Steinebach, Martin
International Symposium on Electronic Imaging 2025
[Journal Article]


Automated Monitoring of Stolen Cultural Artifacts on Online Marketplaces
Liu, Huajian; Yannikos, York; Heeger, Julian; Bugert, Simon; Berchtold, Waldemar; Steinebach, Martin
International Symposium on Electronic Imaging 2025
[Journal Article]


Sicherheitsanforderungen an KI-Systeme
Halvani, Oren; Müller, Luca
[Journal Article]


Organisierte Kriminalität. Systematische Analyse der Phänomenbereiche und mögliche staatliche Reaktionen
[Scientific Anthology]


Datenschutz-Folgenabschätzung
Selzer, Annika
[Book Article]


Informationspflichten
Selzer, Annika
[Book Article]


Durchführung der ersten Datenschutz-Vorsorge
Boll, Alina; Geissler, Ines
[Paper]


Revisiting Permission Piggybacking of Third-Party Libraries in Android Apps
Heid, Kris; Sonntag, Elena Julia; Heider, Jens
International Conference on Information Systems Security and Privacy 2025
[Conference Paper]


Ent­wicklungen von KI und Desinformation - Erhöhte Vorsicht auf sozialen Medien!
Wittpah, Volker; Steinebach, Martin; Ibisch, Andrea; Kreft, David; Schild, Fabian; Neufert, Caroline


SGX-PrivInfer: A Secure Collaborative System for Quantifying and Mitigating Attribute Inference Risks in Social Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Information Systems Security and Privacy 2025
[Conference Paper]


Hash & Adjust: Competitive Demand-Aware Consistent Hashing
Pourdamghani, Arash; Avin, Chen; Sama, Robert; Shiran, Maryam; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]


Efficient Algorithms for Demand-Aware Networks and a Connection to Virtual Network Embedding
Figiel, Aleksander; Korhonen, Janne H.; Olver, Neil; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]


Erkennung von Desinformationen
Steinebach, Martin
[Journal Article]


Fraunhofer SIT at GenAI Detection Task 1: Adapter Fusion for AI-generated Text Detection
Schäfer, Karla; Steinebach, Martin
Workshop on GenAI Content Detection 2025
[Conference Paper]


Comparative Analysis of Voice Conversion in German
Schäfer, Karla; Choi, Jeong-Eun; Steinebach, Martin
International Conference on Pattern Recognition 2024
[Conference Paper]


WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]


Broadcast and Consensus in Stochastic Dynamic Networks with Byzantine Nodes and Adversarial Edges
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
International Symposium on Distributed Computing 2024
[Conference Paper]


Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]


Reliability Assurance in RIS-Assisted 6G Campus Networks
Tohidi, Ehsan; Franke, Max; Phung, Cao Vien; Khan, Naveed; Drummond, André; Schmid, Stefan; Jukan, Admela; Stanczak, Slawomir
International Conference on the Design of Reliable Communication Networks 2024
[Conference Paper]


RIS as a Network Resource: User Multiplexing and Pricing Algorithms
Papadopoulos, Alexandros; Lalas, Antonios; Votis, Konstantinos; Schmid, Stefan; Katsalis, Kostas; Liaskos, Christos
International Conference on 6G Networking 2024
[Conference Paper]


Baiji: Domain Planning for CDNs under the 95th Percentile Billing Model
Vanerio, Juan; Liu, Huiran; Zhang, Qi; Schmid, Stefan
Networking Conference 2024
[Conference Paper]


L3: Latency-aware Load Balancing in Multi-Cluster Service Mesh
Michaelis, Olivier; Schmid, Stefan; Mostafaei, Habib
International Middleware Conference 2024
[Conference Paper]


HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme
Sayari, Oussama; Marzougui, Soundes; Aulbach, Thomas; Krämer, Juliane; Seifert, Jean-Pierre
International Workshop on Constructive Side-Channel Analysis and Secure Design 2024
[Conference Paper]


MAYo or MAY-not: Exploring Implementation Security of the Post-Quantum Signature Scheme MAYO Against Physical Attacks
Aulbach, Thomas; Marzougui, Soundes; Seifert, Jean-Pierre; Ulitzsch, Vincent Quentin
Workshop on Fault Detection and Tolerance in Cryptography 2024
[Conference Paper]


Poster: Kill Krill or Proxy RPKI
Cattepoel, Luis; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]


Poster: Security of Login Interfaces in Modern Organizations
Nsieyanji Tchokodeu, Kevin; Schulmann, Haya; Sobol, Gil; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]