Publikationen

Publikationen

Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Jens Frieß and Haya Schulmann and Michael Waidner
Proceedings of the ACM on Networking (PACMNET), Vol.1, p.26:1–26:20
[Journal Article]


Aktive Cyberabwehr
Haya Schulmann and Michael Waidner
Datenschutz und Datensicherheit, Vol.47, p.497–502
[Journal Article]


Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach
M. Vitek and A. Das and D. Lucio and L. Zanlorensi and D. Menotti and J. Khiarak and M. Shahpar and M. Asgari-Chenaghlu and E. Jaryani and J. Tapia. and A. Valenzuela and C. Wang and Y. Wang and Z. He and Z. Sun and F. Boutros and N. Damer and J. Grebe and A. Kuijper and K. Raja and G. Gupta and G. Zampoukis and L. Tsochatzidis and I. Pratikakis and A. Kumar and B. Harish and U. Pal and P. Peer and V. Štruc
IEEE Trans. on Information Forensics and Security, Vol.18, p.190–205
[Journal Article]


Face Feature Visualisation of Single Morphing Attack Detection
J. Tapia and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF)
[Journal Article]


Considerations on the Evaluation of Biometric Quality Assessment Algorithms
T. Schlett and C. Rathgeb and J. Tapia and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


Fairness von Biometrischen Systemen
J. Kolberg
Datenschutz und Datensicherheit - DuD, Vol.47, p.15–21
[Journal Article]


Attacking Face Recognition With T-Shirts: Database, Vulnerability Assessment, and Detection
M. Ibsen and C. Rathgeb and F. Brechtel and R. Klepp and K. Pöppelmann and A. George and S. Marcel and C. Busch
IEEE Access, Vol.11, p.57867–57879
[Journal Article]


Toward Generalizable Facial Presentation Attack Detection Based on the Analysis of Facial Regions
J. Gonzalez-Soler and M. Gomez-Barrero and C. Busch
IEEE Access, Vol.11, p.68512–68524
[Journal Article]


Synthetic ID Card Image Generation for Improving Presentation Attack Detection
D. Benalcazar and J. Tapia and S. Gonzalez and C. Busch
IEEE Trans. on Information Forensics and Security (TIFS)
[Journal Article]


Mayo
Beullens, Ward and Campos, Fabio and Celi, Sofía and Hess, Basil and Kannwischer, Matthias J
Specification document of NIST PQC Standardization of Additional Digital Signature Scheme
[Journal Article]


Separating Oil and Vinegar with a Single Trace: Side-Channel Assisted Kipnis-Shamir Attack on UOV
Aulbach, Thomas and Campos, Fabio and Krämer, Juliane and Samardjiska, Simona and Stöttinger, Marc
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2023, p.221–245
[Journal Article]


Data augmentation in natural language processing: a novel text generation approach for long and short text classifiers
Bayer, Markus; Kaufhold, Marc-André; Buchhold, Björn; Keller, Marcel; Dallmeyer, Jörg; Reuter, Christian
International Journal of Machine Learning and Cybernetics, p.135-150
[Journal Article]


Psychotechnik, human factors, engineering psychology, Technikpsychologie — 100 years of interdisciplinary cooperation between engineering and human sciences
Vogt, Joachim; Keil, Udo; Cornel, Christin; Gerber, Nina; Ferreira, Yvonne
Zeitschrift für Arbeitswissenschaft, p.1-6
[Journal Article]


Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Bagia, Alexis; Tibouchi, Mehdi; Seifert, Jean-Pierre
[Journal Article]


Datenschutzvorsorge in der offensiven Cyber­sicher­heits­forschung
Selzer, Annika; Spiecker gen. Döhmann, Indra; Boll, Alina
[Journal Article]


Current State of Digital Twins in the Maritime Sector
Lünsdorf, Kai Gerrit; Wrede, Helge; Schmidt, Felix; Bauer, Kristine; Lukas, Uwe Freiherr von
[Journal Article]


Resource Management for Programmable Metasurfaces: Concept, Prospects and Challenges
Liaskos, Christos; Katsalis, Kostas; Triay, Joan; Schmid, Stefan
[Journal Article]


Runtime Verification for Programmable Switches
Shukla, Apoorv; Hudemann, Kevin; Vági, Zsolt; Hügerich, Lily; Smaragdakis, Georgios; Hecker, Artur; Schmid, Stefan; Feldmann, Anja
[Journal Article]


Load-Optimization in Reconfigurable Networks: Algorithms and Complexity of Flow Routing
Dai, Wenkai; Foerster, Klaus-Tycho; Fuchssteiner, David; Schmidt, Stefan
[Journal Article]


End-to-End Premature Ventricular Contraction Detection Using Deep Neural Networks
Kraft, Dimitri; Bieber, Gerald; Jokisch, Peter; Rumm, Peter
[Journal Article]


Künstliche Intelligenz als Instrument des Kinder- und Jugendmedienschutzes
Steinebach, Martin
[Journal Article]


Intermezzo. Welcher Technologie kann man vertrauen?
Schulmann, Haya; Waidner, Michael
[Journal Article]


Aktive Cyberabwehr
Schulmann, Haya; Waidner, Michael
[Journal Article]


Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Frieß, Jens; Schulmann, Haya; Waidner, Michael
International Conference on Emerging Networking EXperiments and Technologies 2023
[Journal Article]


Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht
Büscher, Maximilian; Hornung, Gerrit; Schindler, Stephan; Zurawski, Paul; Gutjahr, Amina; Spiecker gen. Döhmann, Indra; Selzer, Annika; Stummer, Sarah; Wilmer, Thomas
[Journal Article]


Zulässigkeit der Zweckänderung durch Auftragsverarbeiter
Boll, Alina; Gärtner, Tanya; Geissler, Ines; Stummer, Sarah
[Journal Article]


Biometric Recognition in 3D Medical Images: A Survey
Fu, Biying; Damer, Naser
[Journal Article]


Animal Behavior for Chicken Identification and Monitoring the Health Condition Using Computer Vision: A Systematic Review
Bhuiyan, Roman; Wree, Philipp
[Journal Article]


Superpolynomial quantum-classical separation for density modeling
Pirnay, Niklas; Sweke, Ryan; Eisert, Jens; Seifert, Jean-Pierre
[Journal Article]


Evaluating the applicability of hardware trust anchors for automotive applications
Plappert, Christian; Lorych, Dominik; Eckel, Michael; Jäger, Lukas; Fuchs, Andreas; Heddergott, Ronald
[Journal Article]