Publikationen
Publikationen
Resource‐Efficient Anomaly Detection in Industrial Control Systems with Quantized Recurrent Variational Autoencoder
Fährmann, Daniel; Ihlefeld, Malte; Kuijper, Arjan; Damer, Naser
[Journal Article]
Second FRCSyn-onGoing: Winning Solutions and Post-challenge Analysis to Improve Face Recognition with Synthetic Data
DeAndres-Tame, Ivan; Tolosana, Ruben; Melzi, Pietro; Vera-Rodriguez, Ruben; Kim, Minchul; Rathgeb, Christian; Liu, Xiaoming; Gomez, Luis F.; Morales, Aythami; Fierrez, Julian; Ortega-Garcia, Javier; Zhong, Zhizhou; Huang, Yuge; Mi, Yuxi; Ding, Shouhong; Zhou, Shuigeng; He, Shuai; Fu, Lingzhi; Cong, Heng; Zhang, Rongyu; Xiao, Zhihong; Smirnov, Evgeny; Pimenov, Anton; Grigorev, Aleksei; Timoshenko, Denis; Mesfin Asfaw, Kaleb; Yaw Low, Cheng; Liu, Hao; Wang, Chuyi; Zuo, Qing; He, Zhixiang; Otroshi Shahreza, Hatef; George, Anjith; Unnervik, Alexander; Rahimi, Parsa; Marcel, Sébastien; Neto, Pedro C.; Cardoso, Jaime S.; Kolf, Jan Niklas; Damer, Naser; Boutros, Fadi; Huber, Marco; Sequeira, Ana F.; Atzori, Andrea; Fenu, Gianni; Marras, Mirko; Yu, Jiang; Štruc, Vitomir; Li, Zhangjie; Li, Jichun; Zhao, Weisong; Lei, Zhen; Zhu, Xiangyu; Zhang, Xiao-Yu; Biesseck, Bernardo; Vidal, Pedro; Coelho, Luiz; Granada, Roger; Menotti, David
[Journal Article]
FRoundation: Are Foundation Models Ready for Face Recognition?
Chettaoui, Tahar; Damer, Naser; Boutros, Fadi
[Journal Article]
Erkennung von Desinformationen
Steinebach, Martin
[Journal Article]
KVC-onGoing: Keystroke Verification Challenge
Stragapede, Giuseppe; Vera-Rodriguez, Ruben; Tolosana, Ruben; Morales, Aythami; DeAndres-Tame, Ivan; Damer, Naser; Fierrez, Julian; Ortega-Garcia, Javier; Acien, Alejandro; Gonzalez, Nahuel; Shadrikov, Andrei; Gordin, Dmitrii; Schmitt, Leon; Wimmer, Daniel; Großmann, Christoph; Krieger, Joerdis; Heinz, Florian; Krestel, Ron; Mayer, Christoffer; Haberl, Simon; Gschrey, Helena; Yamagishi, Yosuke; Wickramanayake, Sandareka; Saha, Sanjay; Rasnayaka, Sanka; Gutfeter, Weronika; Sim, Terence; Baran, Adam; Krzysztoń, Mateusz; Jaskóła, Przemysław
[Journal Article]
Model compression techniques in biometrics applications: A survey
Caldeira, Eduarda; Neto, Pedro C.; Huber, Marco; Damer, Naser; Sequeira, Ana F.
[Journal Article]
UAV-based person re-identification: A survey of UAV datasets, approaches, and challenges
Albaluchi, Yousaf; Fu, Biying; Ramachandra, Raghavendra; Damer, Naser; Raja, Kiran
[Journal Article]
Generative AI in the context of assistive technologies: Trends, limitations and future directions
Fu, Biying; Hadid, Abdenour; Damer, Naser
[Journal Article]
Wie stellen sich Nutzende ihren Privatsphäre-Assistenten vor?
Stöver, Alina; Hahn, Sara; Althaus, Simon; Zimmer, Ephraim; Gerber, Nina
Datenschutz und Datensicherheit - DuD, p.633-636
[Journal Article]
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey
Alnahawi, Nouri; Schmitt, Nicolai; Wiesmaier, Alexander; Zok, Chiara-Marie
ACM Trans. Embed. Comput. Syst., Vol.23
[Journal Article]
Presentation Attack Detection using iris periocular visual spectrum images
Valenzuela, A.; Tapia, J.; Chang, V.; Busch, C.
Expert Systems with Applications
[Journal Article]
Impact of Occlusion Masks on Gender Classification from Iris Texture
Tapia, J.; Yanez, C.; Perez, C.; Busch, C.
IET Biometrics
[Journal Article]
Toward Synthetic Physical Fingerprint Targets
Strobl, L. Ruzicka and. B.; Bergmann, S.; Nolden, G.; Michalsky, T.; Domscheit, C.; Priesnitz, J.; Blümel, F.; Kohn, B.; Heitzinger, C.
Sensors, Vol.24
[Journal Article]
Privacy-preserving Multi-biometric Indexing based on Frequent Binary Patterns
Osorio-Roig, D.; Gonzalez-Soler, L. J.; Rathgeb, C.; Busch, C.
IEEE Trans. on Information Forensics and Security (TIFS), Vol.19, p.4835-4850
[Journal Article]
An Overview of Privacy-Enhancing Technologies in Biometric Recognition
Melzi, P.; Rathgeb, C.; Tolosana, R.; Vera, R.; Busch, C.
ACM Computing Surveys (CSUR)
[Journal Article]
FRCSyn-onGoing: Benchmarking and comprehensive evaluation of real and synthetic data to improve face recognition systems
Melzi, P.; Tolosana, R.; Vera-Rodriguez, R.; Kim, M.; Rathgeb, C.
ScienceDirect - Information Fusion
[Journal Article]
Open-Set: ID Card Presentation Attack Detection using Neural Style transfer
Markham, R. P.; Espin, J. M.; Nieto-Hidalgo, M.; Tapia, J.
IEEE Access
[Journal Article]
On the Potential of Algorithm Fusion for Demographic Bias Mitigation in Face Recognition
Kolberg, J.; Schäfer, Y.; Rathgeb, C.; Busch, C.
IET Biometrics
[Journal Article]
Towards minimizing efforts for Morphing Attacks-Deep embeddings for morphing pair selection and improved Morphing Attack Detection
Kessler, R.; Kaja, K.; Tapia, j.; Busch, C.
PLOS ONE
[Journal Article]
Information Fusion and Hand Alignment to Improve Hand Recognition in Forensic Scenarios
Gonzalez-Soler, L. J.; Jónsdóttir, D. K.; Rathgeb, C.; Fischer, D.
IEEE Access, Vol.12, p.52941-52950
[Journal Article]
Contactless Hand Biometrics for Forensics: Review and Performance Benchmark
Gonzalez-Soler, L. J.; Zyla, K.; Rathgeb, C.; Fischer, D.
EURASIP Journal on Image and Video Processing (JIVP), p.34
[Journal Article]
Child Face Recognition at Scale: Synthetic Data Generation and Performance Benchmark
Falkenberg, M.; Ottsen, A. B.; Ibsen, M.; Rathgeb, C.
Frontiers in Signal Processing
[Journal Article]
Analysis of behavioural curves to classify iris images under the influence of alcohol, drugs, and sleepiness conditions
Causa, L.; Tapia, J.; Perez, C.; Busch, C.
Expert Systems With Applications
[Journal Article]
Challenges for automated face recognition systems
Busch, C.
Nature Reviews Electrical Engineering
[Journal Article]
BRAKE: Biometric Resilient Authenticated Key Exchange
Bauspieß, P.; Silde, T.; Poljuha, M.; Tullot, A.; Costache, A.; Rathgeb, C.; Kolberg, J.; Busch, C
IEEE Access, Vol.12, p.46596-46615
[Journal Article]
Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine interdisziplinäre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den Geschlechtseintrag
Seyda, Linda; Brüggemann, Andreas; Hornung, Gerrit; Schneider, Thomas
INFORMATIK 2024, Workshop Recht und Technik: Datenschutz im Diskurs (RuT'24), p.153-167
[Journal Article]
Fuzzerfly Effect: Hardware Fuzzing for Memory Safety
Rostami, Mohamadreza; Chen, Chen; Kande, Rahul; Li, Huimin; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
IEEE Security & Privacy, p.76-86
[Journal Article]
Digital Resilience in Dealing with Misinformation on Social Media during COVID-19: A Web Application to Assist Users in Crises
Schmid, Stefka; Hartwig, Katrin; Cieslinski, Robert; Reuter, Christian
Information Systems Frontiers, p.477-499
[Journal Article]
Marionette: Manipulate Your Touchscreen via A Charging Cable
Jiang, Yan; Ji, Xiaoyu; Wang, Kai; Yan, Chen; Mitev, Richard; Sadeghi, Ahmad-Reza
IEEE Transactions on Dependable and Secure Computing
[Journal Article]
Datenschutz-Vorsorge: Schritte 3-6
Boll, Alina
[Journal Article]