Publikationen

Publikationen

ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Zelle, Daniel; Plappert, Christian; Rieke, Roland; Scheuermann, Dirk; Krauß, Christoph
Microprocessors and Microsystems, Vol.90, p.104461
[Journal Article]


Integrating Privacy into the Electric Vehicle Charging Architecture
Kern, Dustin; Lauser, Timm; Krauß, Christoph
Proceedings on Privacy Enhancing Technologies, Vol.2022, p.140-158
[Journal Article]


Towards a maturity model for crypto-agility assessment
Hohm, Julian; Heinemann, Andreas; Wiesmaier, Alexander
CoRR, Vol.abs/2202.07645
[Journal Article]


Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations
Nichols, R.; Rathgeb, C.; Drozdowski, P.; Busch, C.
IEEE Access, Vol.10, p.31359-31376
[Journal Article]


Signal-level fusion for indexing and retrieval of facial biometric data
Drozdowski, P.; Stockhardt, F.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.11, p.1-16
[Journal Article]


Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study
Qin, L.; Peng, F.; Long, M.; Raghavendra, R.; Busch, C.
ACM Trans. on Privacy and Security, Vol.25, p.1-28
[Journal Article]


Mobile Contactless Fingerprint Recognition: Implementation, Performance and Usability Aspects
Priesnitz, J.; Huesmann, R.; Rathgeb, C.; Buchmann, N.; Busch, C.
MDPI Intelligent Sensors
[Journal Article]


Reliable detection of doppelgängers based on deep face representations
Rathgeb, Christian; Fischer, Daniel; Drozdowski, Pawel; Busch, Christoph
IET Biometrics, Vol.11, p.215-224
[Journal Article]


On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
Kolberg, J.; Gläsner, D.; Breithaupt, R.; Gomez-Barrero, M.; Reinhold, J.; von Twickel, A.; Busch, C.
Sensors, Vol.21
[Journal Article]


Generation of Non-Deterministic Synthetic Face Datasets Guided by Identity Priors
Grimmer, M.; Zhang, H.; Raghavendra, R.; Raja, K.; Busch, C.
https://www.ntnu.edu/nikt2021
[Journal Article]


Deep Face Age Progression: A Survey
Grimmer, M.; Raghavendra, R.; Busch, C.
IEEE Access, Vol.9, p.83376-83393
[Journal Article]


Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition with Privacy Protection
Drozdowski, P.; Stockhardt, F.; Rathgeb, C.; Osorio-Roig, D.; Busch, C.
IEEE Access, Vol.9, p.139361-139378
[Journal Article]


A response to the European Data Protection Supervisor Misunderstandings in Biometrics by the European Association for Biometrics
Busch, C.; Czajka, A.; Deravi, F.; Drozdowski, P.; Gomez-Barrero, M.; Hasse, G.; Henniger, O.; Kindt, E.; Kolberg, J.; Nouak, A.; Raja, K.; Raghavendra, R.; Rathgeb, C.; Salomon, J.; Veldhuis, R.
IET Biometrics, Vol.11, p.79-86
[Journal Article]


Microgrid Systems: Towards a Technical Performance Assessment Frame
Marchand, Sophie; Monsalve, Cristian; Reimann, Thorsten; Heckmann, Wolfram; Ungerland, Jakob; Lauer, Hagen; Ruhe, Stephan; Krauß, Christoph
Energies, Vol.14, p.23
[Journal Article]


Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis
Chevalier, Yannick; Fenzl, Florian; Kolomeets, Maxim; Rieke, Roland; Chechulin, Andrey; Krauß, Christoph
Informatics and Automation, Vol.20, p.845-868
[Journal Article]


Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Bienhaus, Diethelm; Ebner, Andreas; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Si­mu­la­tion Modelling Practice and Theory, Vol.109, p.9
[Journal Article]


On the Generalisation capabilities of Fisher Vector based Face Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
IET Biometrics, p.1-12
[Journal Article]


On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
Kolberg, J.; Gomez-Barrero, M.; Busch, C.
IET Biometrics, p.1-15
[Journal Article]


Local Feature Encoding for Unknown Presentation Attack Detection: An Analysis of Different Local Feature Descriptors
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Kolberg, J.; Chang, L.; Perez-Suarez, A.; Busch, C.
IET Biometrics, p.1-13
[Journal Article]


Impact of facial tattoos and paintings on face recognition systems
Ibsen, M.; Rathgeb, C.; Fink, T.; Drozdowski, P.; Busch, C.
IET Biometrics
[Journal Article]


Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Chang, L.; Perez-Suarez, A.; Busch, C.
IEEE Access, Vol.9, p.5806-5820
[Journal Article]


Effects of Image Compression on Face Image Manipulation Detection: A Case Study on Facial Retouching
Rathgeb, C.; Bernardo, K.; Haryanto, N. E.; Busch, C.
IET Biometrics, Vol.10
[Journal Article]


Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection
Kolberg, J.; Grimmer, M.; Gomez-Barrero, M.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.3, p.190-202
[Journal Article]


An Overview of touchless 2D Fingerprint Recognition
Priesnitz, J.; Rathgeb, C.; Buchmann, N.; Busch, C.
EURASIP Journal on Image and Video Processing
[Journal Article]


Biometric Presentation Attack Detection: Beyond the Visible Spectrum
Tolosana, R.; Gomez-Barrero, M.; Busch, C.; Ortega-Garcia, J.
IEEE Trans. on Information Forensics and Security, Vol.15, p.1261-1275
[Journal Article]


An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris
Tapia, J.; Gomez-Barrero, M.; Busch, C.
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]


Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach
Scherhag, U.; Kunze, J.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.9, p.278-289
[Journal Article]


Morphing Attack Detection using Laplace operator based features
Scherhag, U.; Fischer, D.; Isadskiy, S.; Otte, J.; Busch, C.
in Proc. Norwegian Information Security Conf. (NISK)
[Journal Article]


Deep Face Representations for Differential Morphing Attack Detection
Scherhag, U.; Rathgeb, C.; Merkle, J.; Busch, Christoph
IEEE Trans. on Information Forensics and Security
[Journal Article]


Makeup Presentation Attacks: Review and Detection Performance Benchmark
Rathgeb, C.; Drozdowski, P.; Busch, C.
IEEE Access, Vol.8, p.224958-224973
[Journal Article]