Publikationen
Publikationen
Detecting Voice Cloning and Text to Speech Audio in Real Time on Mobile Devices
Berchtold, Waldemar; Heeger, Julian; Bugert, Simon; Steinebach, Martin
International Symposium on Electronic Imaging 2025
[Journal Article]
EU AI-Act: Tagging GenAI Content
Heeger, Julian; Berchtold, Waldemar; Bugert, Simon; Steinebach, Martin
International Symposium on Electronic Imaging 2025
[Journal Article]
Metaverse - eine Datenschutzfalle?
Steenbergen, Marina
[Journal Article]
European Union ∙ The Future of ePrivacy in Europe: Where Are We Heading?
Sluiter, Amelie Sofie; Selzer, Annika; Bretthauer, Sebastian; Döhmann, Indra Spiecker gen.; Knorre, Ria von
[Journal Article]
Cybersicherheit im Energiesektor
Appelt, Dominik; Enzmann, Matthias; Selzer, Annika
[Journal Article]
Online-Altersverifikation zur Gewährleistung des Minderjährigenschutzes
Kunz, Thomas; Waldmann, Ulrich
[Journal Article]
Datensparsame Altersverifikation
Yannikos, York; Steinebach, Martin
[Journal Article]
Chancen und Risiken künstlicher Intelligenz bei der Erkennung von sexuellen Übergriffen
Steinebach, Martin
[Journal Article]
Simulating the overload of medical processes due to system failures during a cyberattack
Willing, Markus; Ebbers, Simon; Dresen, Christian; Czolbe, Marc; Saatjohann, Christoph; Schinzel, Sebastian
[Journal Article]
Face Swap Forensics
Steinebach, Martin; Frühwein, Marco
International Symposium on Electronic Imaging 2025
[Journal Article]
Natural Language Watermarking with ChatGPT
Steinebach, Martin; Frick, Raphael
International Symposium on Electronic Imaging 2025
[Journal Article]
Identification of Cultural Artifacts using Deep Learning
Liu, Huajian; Yang, Xiaoying; Frick, Raphael; Steinebach, Martin
International Symposium on Electronic Imaging 2025
[Journal Article]
Automated Monitoring of Stolen Cultural Artifacts on Online Marketplaces
Liu, Huajian; Yannikos, York; Heeger, Julian; Bugert, Simon; Berchtold, Waldemar; Steinebach, Martin
International Symposium on Electronic Imaging 2025
[Journal Article]
Sicherheitsanforderungen an KI-Systeme
Halvani, Oren; Müller, Luca
[Journal Article]
Resource‐Efficient Anomaly Detection in Industrial Control Systems with Quantized Recurrent Variational Autoencoder
Fährmann, Daniel; Ihlefeld, Malte; Kuijper, Arjan; Damer, Naser
[Journal Article]
Second FRCSyn-onGoing: Winning Solutions and Post-challenge Analysis to Improve Face Recognition with Synthetic Data
DeAndres-Tame, Ivan; Tolosana, Ruben; Melzi, Pietro; Vera-Rodriguez, Ruben; Kim, Minchul; Rathgeb, Christian; Liu, Xiaoming; Gomez, Luis F.; Morales, Aythami; Fierrez, Julian; Ortega-Garcia, Javier; Zhong, Zhizhou; Huang, Yuge; Mi, Yuxi; Ding, Shouhong; Zhou, Shuigeng; He, Shuai; Fu, Lingzhi; Cong, Heng; Zhang, Rongyu; Xiao, Zhihong; Smirnov, Evgeny; Pimenov, Anton; Grigorev, Aleksei; Timoshenko, Denis; Mesfin Asfaw, Kaleb; Yaw Low, Cheng; Liu, Hao; Wang, Chuyi; Zuo, Qing; He, Zhixiang; Otroshi Shahreza, Hatef; George, Anjith; Unnervik, Alexander; Rahimi, Parsa; Marcel, Sébastien; Neto, Pedro C.; Cardoso, Jaime S.; Kolf, Jan Niklas; Damer, Naser; Boutros, Fadi; Huber, Marco; Sequeira, Ana F.; Atzori, Andrea; Fenu, Gianni; Marras, Mirko; Yu, Jiang; Štruc, Vitomir; Li, Zhangjie; Li, Jichun; Zhao, Weisong; Lei, Zhen; Zhu, Xiangyu; Zhang, Xiao-Yu; Biesseck, Bernardo; Vidal, Pedro; Coelho, Luiz; Granada, Roger; Menotti, David
[Journal Article]
FRoundation: Are Foundation Models Ready for Face Recognition?
Chettaoui, Tahar; Damer, Naser; Boutros, Fadi
[Journal Article]
Erkennung von Desinformationen
Steinebach, Martin
[Journal Article]
KVC-onGoing: Keystroke Verification Challenge
Stragapede, Giuseppe; Vera-Rodriguez, Ruben; Tolosana, Ruben; Morales, Aythami; DeAndres-Tame, Ivan; Damer, Naser; Fierrez, Julian; Ortega-Garcia, Javier; Acien, Alejandro; Gonzalez, Nahuel; Shadrikov, Andrei; Gordin, Dmitrii; Schmitt, Leon; Wimmer, Daniel; Großmann, Christoph; Krieger, Joerdis; Heinz, Florian; Krestel, Ron; Mayer, Christoffer; Haberl, Simon; Gschrey, Helena; Yamagishi, Yosuke; Wickramanayake, Sandareka; Saha, Sanjay; Rasnayaka, Sanka; Gutfeter, Weronika; Sim, Terence; Baran, Adam; Krzysztoń, Mateusz; Jaskóła, Przemysław
[Journal Article]
Model compression techniques in biometrics applications: A survey
Caldeira, Eduarda; Neto, Pedro C.; Huber, Marco; Damer, Naser; Sequeira, Ana F.
[Journal Article]
UAV-based person re-identification: A survey of UAV datasets, approaches, and challenges
Albaluchi, Yousaf; Fu, Biying; Ramachandra, Raghavendra; Damer, Naser; Raja, Kiran
[Journal Article]
Generative AI in the context of assistive technologies: Trends, limitations and future directions
Fu, Biying; Hadid, Abdenour; Damer, Naser
[Journal Article]
RPKI: Not Perfect But Good Enough
Haya Schulmann and Niklas Vogel and Michael Waidner
CoRR, Vol.abs/2409.14518
[Journal Article]
ZPredict: ML-Based IPID Side-channel Measurements
Haya Schulmann and Shujie Zhao
ACM Trans. Priv. Secur., Vol.27
[Journal Article]
Wie Deutschland zur Cybernation wird
Haya Schulmann and Michael Waidner
Datenschutz und Datensicherheit, Vol.48, p.11–15
[Journal Article]
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey
N. Alnahawi and N. Schmitt and A. Wiesmaier and C.M. Zok
ACM Trans. Embed. Comput. Syst. (Journal), Vol.23
[Journal Article]
One-Class Classification as GLRT for Jamming Detection in Private
5G Networks
Matteo Varotto and
Stefan Valentin and
Francesco Ardizzon and
Samuele Marzotto and
Stefano Tomasin
CoRR, Vol.abs/2405.09565
[Journal Article]
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and
Support Vector Machines
Matteo Varotto and
Florian Heinrichs and
Timo Schuerg and
Stefano Tomasin and
Stefan Valentin
CoRR, Vol.abs/2405.09564
[Journal Article]
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey
Alnahawi, Nouri and Schmitt, Nicolai and Wiesmaier, Alexander and Zok, Chiara-Marie
ACM Trans. Embed. Comput. Syst., Vol.23
[Journal Article]
Presentation Attack Detection using iris periocular visual spectrum images
A. Valenzuela and J.Tapia and V. Chang and C. Busch
Frontiers on Image
[Journal Article]


