Publikationen

Publikationen

Explore the World of Audio Deep­fakes: A Guide to Detection Techniques for Non-Experts
Schäfer, Karla; Choi, Jeong-Eun; Zmudzinski, Sascha
International Workshop on Multimedia AI against Disinformation 2024
[Conference Paper]


CrowdGuard: Federated Backdoor Detection in Federated Learning
Rieger, Phillip; Krauß, Torsten; Miettinen, Mark; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]


The Committing Security of MACs with Applications to Generic Composition
Bhaumik, Ritam; Chakraborty, Bishwajit; Choi, Wonseok; Dutta, Avijit; Govinden, Jérôme; Shen, Yaobin
44th Annual International Cryptology Conference (CRYPTO 2024)
[Conference Proceedings]


Adapter fusion for check-worthiness detection - combining a task adapter with a NER adapter
Vogel, Inna; Möhle, Pauline; Meghana, Meghana; Steinebach, Martin
Workshop on Reducing Online Misinformation through Credible Information Retrieval 2024
[Conference Paper]


Improved identification of check-worthiness in social media data through multimodal analyses
Frick, Raphael Antonius; Steinebach, Martin
Workshop on Reducing Online Misinformation through Credible Information Retrieval 2024
[Conference Paper]


Authorship Verification based on the Likelihood Ratio of Grammar Models
Nini, Andrea; Halvani, Oren; Graner, Lukas; Gherardi, Valerio; Ishihara, Shunichi
[Paper]


Chatkontrolle: Methoden, Chancen und Risiken
Steinebach, Martin
Hamburger Sicherheitsrechtstag 2023
[Conference Paper]


FRCSyn Challenge at WACV 2024: Face Recognition Challenge in the Era of Synthetic Data
Melzi, Pietro; Tolosana, Ruben; Vera-Rodriguez, Ruben; Minchul, Kim; Rathgeb, Christian; Xiaoming, Liu; DeAndres-Tame, Ivan; Morales , Aythami; Fierrez, Julian; Ortega-Garcia, Javier; Zhao, Weisong; Zhu, Xiangyu; Yan, Zheyu; Zhang, Xiao-Yu; Wu, Jinlin; Lei, Zhen; Tripathi, Suvidha; Kothari, Mahak; Zama, Md Haider; Deb, Debayan; Biesseck, Bernardo; Vidal, Pedro; Granada, Roger; Fickel, Guilherme; Führ, Gustavo; Menotti, David; Unnervik, Alexander; George, Anjith; Ecabert, Christophe; Hatef Shahreza, Otroshi; Rahimi, Parsa; Marcel, Sébastien; Sarridis, Ioannis; Koutlis, Christos; Baltsou, Georgia; Papadopoulos, Symeon; Diou, Christos; Di Domenico, Nicolò; Borghi, Guido; Pellegrini, Lorenzo; Mas-Candela, Enrique; Sánchez-Pérez, Ángela; Atzori, Andrea; Fenu, Gianni; Boutros, Fadi; Marras, Mirko; Damer, Naser
Winter Conference on Applications of Computer Vision 2024
[Conference Paper]


Positionspapier zur zweiten DSGVO-Evaluation (2024)
Selzer, Annika; Stummer, Sarah; Boll, Alina
[Paper]


Der EU Cyber Resilience Act: Ein Überblick aus rechtlicher Sicht
Arzt, Steven; Fischer, Leonie; Kreutzer, Michael; Scheel, Kirstin; Schneider, Markus; Schreiber, Linda; Selzer, Annika
[Paper]


KIM: Kaos In der Medizin
Ising, Fabian; Saatjohann, Christoph; Schinzel, Sebastian
Gesellschaft für Informatik, Fachbereich Sicherheit (GI Jahrestagung) 2024
[Conference Paper]


Face Presentation Attack Detection by Excavating Causal Clues and Adapting Embedding Statistics
Fang, Meiling; Damer, Naser
Winter Conference on Applications of Computer Vision 2024
[Conference Paper]


Efficient Explainable Face Verification based on Similarity Score Argument Backpropagation
Huber, Marco; Luu, Anh Thi; Terhörst, Philipp; Damer, Naser
Winter Conference on Applications of Computer Vision 2024
[Conference Paper]


Multispectral Imaging for Differential Face Morphing Attack Detection: A Preliminary Study
Ramachandra, Raghavendra; Venkatesh, Sushma; Damer, Naser; Vetrekar, Narayan; Gad, R.S.
Winter Conference on Applications of Computer Vision 2024
[Conference Paper]


Bias and Diversity in Synthetic-based Face Recognition
Huber, Marco; Luu, Anh Thi; Boutros, Fadi; Kuijper, Arjan; Damer, Naser
Winter Conference on Applications of Computer Vision 2024
[Conference Paper]


SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
Degabriele, Jean Paul; Gilcher, Jan; Govinden, Jérôme; Paterson, Kenneth G.
2024 IEEE Symposium on Security and Privacy (SP)
[Conference Proceedings]


GAAlign: Robust Sampling-Based Point Cloud Registration Using Geometric Algebra
Neumann, Kai; Hildenbrand, Dietmar; Stock, Florian; Steinmetz, Christian; Michel, Maximilian
International Conference on Advanced Computational Applications of Geometric Algebra 2022
[Conference Paper]


Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
Elias Heftrig and Haya Schulmann and Michael Waidner
32nd USENIX Security Symposium (USENIX Security 23), p.7429–7444
[Conference Proceedings]


Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Tomas Hlavacek and Haya Schulmann and Niklas Vogel and Michael Waidner
32nd USENIX Security Symposium (USENIX Security 23), p.4841–4858
[Conference Proceedings]


Poster: Off-Path DNSSEC Downgrade Attacks
Elias Heftrig and Haya Schulmann and Michael Waidner
Proceedings of the ACM SIGCOMM 2023 Conference, p.1120–1122
[Conference Proceedings]


Poster: LeMon: Global Route Leak Monitoring Service
Haya Schulmann and Shujie Zhao
Proceedings of the ACM SIGCOMM 2023 Conference, p.1111–1113
[Conference Proceedings]


Beyond Limits: How to Disable Validators in Secure Networks
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the ACM SIGCOMM 2023 Conference, p.950–966
[Conference Proceedings]


Poster: Longitudinal Analysis of DoS Attacks
Fabian Kaiser and Haya Schulmann and Michael Waidner
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.3573–3575
[Conference Proceedings]


QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
D. Kern and C. Krauß and T. Lauser and N. Alnahawi and A. Wiesmaier and R. Niederhagen
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, p.85–111
[Conference Proceedings]


Towards a maturity model for crypto-agility assessment
J. Hohm and A. Heinemann and A. Wiesmaier
15th International Symposium on Foundations & Practice of Security, p.104–119
[Conference Proceedings]


Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics
J. Henrich and A. Heinemann and A. Wiesmaier and N. Schmitt
Information Security Conference (ISC), p.267–287
[Conference Proceedings]


Detecting 5G Signal Jammers with Autoencoders Based on Loose Observations
Matteo Varotto and Stefan Valentin and Stefano Tomasin
IEEE Globecom Workshops 2023, Kuala Lumpur, Malaysia, December 4-8, 2023, p.160–165
[Conference Proceedings]


Detection of e-Mobility-based Attacks on the Power Grid
Kern, Dustin and Krauß, Christoph
53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Conference Proceedings]


QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
Kern, Dustin and Krauß, Christoph and Lauser, Timm and Alnahawi, Nouri and Wiesmaier, Alexander and Niederhagen, Ruben
21st International Conference on Applied Cryptography and Network Security (ACNS)
[Conference Proceedings]


Formal Security Analysis of Vehicle Diagnostic Protocols
Lauser, Timm and Krauß, Christoph
The 17th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]