Publikationen

Publikationen

Keystroke Verification Challenge (KVC): Biometric and Fairness Benchmark Evaluation
Stragapede, Giuseppe; Vera-Rodriguez, Ruben; Tolosana, Ruben; Morales , Aythami; Damer, Naser; Fierrez, Julian; Ortega-Garcia, Javier
[Journal Article]


Ubiquitous Multi-Occupant Detection in Smart Environments
Fährmann, Daniel; Boutros, Fadi; Kubon, Philipp; Kirchbuchner, Florian; Kuijper, Arjan; Damer, Naser
[Journal Article]


Short-term predictor for COVID-19 severity from a longitudinal multi-omics study for practical application in intensive care units
Kugler, Sabine; Hahnefeld, Lisa; Kloka, Jan Andreas; Ginzel, Sebastian; Nürenberg-Goloub, Elena; Zinn, Sebastian; Vehrenschild, Maria; Zacharowski, Kai; Lindau, Simone; Ulrich, Evelyn; Burmeister, Jan; Kohlhammer, Jörn; Schwäble, Joachim; Gurke, Robert; Dorochow, Erika; Bennett, Alexandre; Dauth, Stephanie; Campe, Julia; Knape, Tilo; Laux, Volker; Kannt, Aimo; Köhm, Michaela; Geisslinger, Gerd; Resch, Eduard; Behrens, Frank
[Journal Article]


Fairness in Face Presentation Attack Detection
Fang, Meiling; Yang, Wufei; Kuijper, Arjan; S̆truc, Vitomir; Damer, Naser
[Journal Article]


Migrating Monolithic Applications to Function as a Service
Würz, Hendrik Martin; Krämer, Michel; Kaster, Marvin; Kuijper, Arjan
[Journal Article]


Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Bagia, Alexis; Tibouchi, Mehdi; Seifert, Jean-Pierre
[Journal Article]


Datenschutzvorsorge in der offensiven Cyber­sicher­heits­forschung
Selzer, Annika; Spiecker gen. Döhmann, Indra; Boll, Alina
[Journal Article]


Current State of Digital Twins in the Maritime Sector
Lünsdorf, Kai Gerrit; Wrede, Helge; Schmidt, Felix; Bauer, Kristine; Lukas, Uwe Freiherr von
[Journal Article]


Resource Management for Programmable Metasurfaces: Concept, Prospects and Challenges
Liaskos, Christos; Katsalis, Kostas; Triay, Joan; Schmid, Stefan
[Journal Article]


Runtime Verification for Programmable Switches
Shukla, Apoorv; Hudemann, Kevin; Vági, Zsolt; Hügerich, Lily; Smaragdakis, Georgios; Hecker, Artur; Schmid, Stefan; Feldmann, Anja
[Journal Article]


Load-Optimization in Reconfigurable Networks: Algorithms and Complexity of Flow Routing
Dai, Wenkai; Foerster, Klaus-Tycho; Fuchssteiner, David; Schmidt, Stefan
[Journal Article]


Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach
Vitek, M.; Das, A.; Lucio, D.; Zanlorensi, L.; Menotti, D.; Khiarak, J.; Shahpar, M.; Asgari-Chenaghlu, M.; Jaryani, E.; Tapia., J.; Valenzuela, A.; Wang, C.; Wang, Y.; He, Z.; Sun, Z.; Boutros, F.; Damer, N.; Grebe, J.; Kuijper, A.; Raja, K.; Gupta, G.; Zampoukis, G.; Tsochatzidis, L.; Pratikakis, I.; Kumar, A.; Harish, B.; Pal, U.; Peer, P.; \vStruc, V.
IEEE Trans. on Information Forensics and Security, Vol.18, p.190-205
[Journal Article]


Considerations on the Evaluation of Biometric Quality Assessment Algorithms
Schlett, T.; Rathgeb, C.; Tapia, J.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


On the Potential of Algorithm Fusion for Demographic Bias Mitigation in Face Recognition
Kolberg, J.; Schäfer, Y.; Rathgeb, C.; Busch, C.
IET Biometrics
[Journal Article]


Fairness von Biometrischen Systemen
Kolberg, J.
Datenschutz und Datensicherheit - DuD, Vol.47, p.15-21
[Journal Article]


Attacking Face Recognition With T-Shirts: Database, Vulnerability Assessment, and Detection
Ibsen, M.; Rathgeb, C.; Brechtel, F.; Klepp, R.; Pöppelmann, K.; George, A.; Marcel, S.; Busch, C.
IEEE Access, Vol.11, p.57867-57879
[Journal Article]


Toward Generalizable Facial Presentation Attack Detection Based on the Analysis of Facial Regions
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
IEEE Access, Vol.11, p.68512-68524
[Journal Article]


End-to-End Premature Ventricular Contraction Detection Using Deep Neural Networks
Kraft, Dimitri; Bieber, Gerald; Jokisch, Peter; Rumm, Peter
[Journal Article]


Künstliche Intelligenz als Instrument des Kinder- und Jugendmedienschutzes
Steinebach, Martin
[Journal Article]


Intermezzo. Welcher Technologie kann man vertrauen?
Schulmann, Haya; Waidner, Michael
[Journal Article]


Aktive Cyberabwehr
Schulmann, Haya; Waidner, Michael
[Journal Article]


Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Frieß, Jens; Schulmann, Haya; Waidner, Michael
International Conference on Emerging Networking EXperiments and Technologies 2023
[Journal Article]


Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht
Büscher, Maximilian; Hornung, Gerrit; Schindler, Stephan; Zurawski, Paul; Gutjahr, Amina; Spiecker gen. Döhmann, Indra; Selzer, Annika; Stummer, Sarah; Wilmer, Thomas
[Journal Article]


Zulässigkeit der Zweckänderung durch Auftragsverarbeiter
Boll, Alina; Gärtner, Tanya; Geissler, Ines; Stummer, Sarah
[Journal Article]


Biometric Recognition in 3D Medical Images: A Survey
Fu, Biying; Damer, Naser
[Journal Article]


Animal Behavior for Chicken Identification and Monitoring the Health Condition Using Computer Vision: A Systematic Review
Bhuiyan, Roman; Wree, Philipp
[Journal Article]


Superpolynomial quantum-classical separation for density modeling
Pirnay, Niklas; Sweke, Ryan; Eisert, Jens; Seifert, Jean-Pierre
[Journal Article]


Evaluating the applicability of hardware trust anchors for automotive applications
Plappert, Christian; Lorych, Dominik; Eckel, Michael; Jäger, Lukas; Fuchs, Andreas; Heddergott, Ronald
[Journal Article]


Therapy monitoring of psoriatic arthritis patients with and without skin involvement via objective evaluation of near infrared fluorescence optical imaging: A pilot study
Zerweck, Lukas; Wesarg, Stefan; Köhm, Michaela; Kohlhammer, Jörn
[Journal Article]


Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)
Krachenfels, Thilo; Seifert, Jean-Pierre; Tajik, Shahin
[Journal Article]