Publikationen
Publikationen
Deep Quality-Informed Score Normalization for Privacy-Friendly Speaker Recognition in Unconstrained Environments
A. Nautsch and S. T. Steen and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–4
[Conference Proceedings]
da/sec ASVspoof2017 Submission
Nautsch, A. and Scherhag, U. and Isadskiy, S. and Rathgeb, C. and Busch, C.
Prof. of the ASVspoof evaluation
[Conference Proceedings]
The I4U Mega Fusion and Collaboration for NIST Speaker Recognition Evaluation 2016
K. A. Lee and V. Hautamäki and T. Kinnunen and A. Larcher and C. Zhang and others
Proc. of the Annual Conf. of the Intl. Speech Communication Association (INTERSPEECH)
[Conference Proceedings]
Biometrie symmetry: Implications on template protection
M. Gomez-Barrero and C. Rathgeb and K. B. Raja and R. Raghavendra and C. Busch
25th European Signal Processing Conf. EUSIPCO 2017, p.941–945
[Conference Proceedings]
Biometric Symmetry: Implications on Template Protection
M. Gomez-Barrero and C. Rathgeb and K. B. Raja and R. Raghavendra and C. Busch
Proc. European Signal Processing Conf. (EUSIPCO)
[Conference Proceedings]
Is Your Biometric System Robust to Morphing Attacks?
M. Gomez-Barrero and C. Rathgeb and U. Scherhag and C. Busch
Proc. 5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]
Accuracy Evaluation of Handwritten Signature Verification: Rethinking the Random-Skilled Forgeries Dichotomy
J. Galbally and M. Gomez-Barrero and A. Ross
Proc. Int. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]
SIC-Gen: A Synthetic Iris-Code Generator
P. Drozdowski and C. Rathgeb and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–6
[Conference Proceedings]
Multi-Iris Indexing and Retrieval: Fusion Strategies for Bloom Filter-based Search Structures
P. Drozdowski and C. Rathgeb and C. Busch
Proc. Intl. Joint Conf. on Biometrics (IJCB 2017), p.1–8
[Conference Proceedings]
Towards Pre-alignment of Near-infrared Iris Images
P. Drozdowski and C. Rathgeb and H. Hofbauer and J. Wagner and A. Uhl and C. Busch
Intl. Joint Conf. on Biometrics (IJCB), p.1–8
[Conference Proceedings]
Enhancing Breeder Document Long-Term Security Using Blockchain Technology
N. Buchmann and C. Rathgeb and H. Baier and C. Busch and M. Margraf
41st IEEE Annual Computer Software and Applications Conf. COMPSAC 2017, p.744–748
[Conference Proceedings]
Combining multiple iris texture features for unconstrained recognition in visible wavelengths
E. Andersen-Hoppe and C. Rathgeb and C. Busch
5th Intl. Workshop on Biometrics and Forensics IWBF, p.1–6
[Conference Proceedings]
Neighbor distance ratios and dynamic weighting in multi-biometric fusion
Damer, Naser; Alkhatib, Wael; Braun, Andreas; Kuijper, Arjan
Iberian Conference on Pattern Recognition and Image Analysis (IbPRIA) 2017
[Conference Paper]
Opportunities for biometric technologies in smart environments
Henniger, Olaf; Damer, Naser; Braun, Andreas
European Conference on Ambient Intelligence (AmI) 2017
[Conference Paper]
Indexing of single and multi-instance iris data based on LSH-forest and rotation invariant representation
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
International Conference on Computer Analysis of Images and Patterns (CAIP) 2017
[Conference Paper]
Trust the biometric mainstream: Multi-biometric fusion and score coherence
Damer, Naser; Rhaibani, Chadi Izzou; Braun, Andreas; Kuijper, Arjan
European Signal Processing Conference (EUSIPCO) 2017
[Conference Paper]
Talis - a design study for a wearable device to assist people with depression
Siegmund, Dirk; Hörr, Oliver; Chiesa, Laura; Gabler, Frank; Braun, Andreas; Kuijper, Arjan
Annual Computer Software and Applications Conference (COMPSAC) 2017
[Conference Paper]
Towards enhancing the visual analysis of interdomain routing
Ulmer, Alex; Kohlhammer, Jörn; Shulman, Haya
International Joint Conference on Computer Vision and Computer Graphics Theory and Applications (VISIGRAPP) 2017
[Conference Paper]
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER)
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Ivanko, Natalia Reka; Frieß, Tamara; Mühlhäuser, Max
26th USENIX Security Symposium
[Conference Proceedings]
ID2T - The Intrusion Detection Dataset Generation Toolkit
Garcia Cordero, Carlos; Vasilomanolakis, Emmanouil; Mühlhäuser, Max
Black Hat Europe 2017
[Conference Proceedings]
Measuring privacy in high dimensional microdata collections
Boukoros, Spyros; Katzenbeisser, Stefan
Proceedings of the 12th International Conference on Availability, Reliability and Security
[Conference Proceedings]
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer
Yalame, Mohammad Hossein; Farzam, Mohammad Hossein; Sarmadi, Siavash Bayat
8. International Conference on Applications and Techniques in Information Security (ATIS'17)
[Conference Proceedings]
Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully
Renaud, Karen; Zimmermann, Verena
Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, p.1-9
[Conference Proceedings]
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
Zimmermann, Verena; Gerber, Nina
Human Aspects of Information Security, Privacy and Trust, p.265-283
[Conference Proceedings]
Lessons Learned from Evaluating Eight Password Nudges in the Wild
Renaud, Karen; Maguire, Joseph; Zimmermann, Verena; Draper, Steve
Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, p.25-38
[Conference Proceedings]
Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation
Wiegärtner, Daniel; Reuter, Christian; Müller, Claudia
Mensch & Computer 2017 - Workshopband, p.609-614
[Conference Proceedings]
DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen
Reuter, Christian; Wiegärtner, Daniel; Müller, Claudia
Mensch & Computer 2017: Tagungsband, p.295-298
[Conference Proceedings]
Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter
Reuter, Christian; Pätsch, Katja; Runft, Elena
Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), p.649-663
[Conference Proceedings]
4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
Reuter, Christian; Mentler, Tilo; Geisler, Stefan; Herczeg, Michael; Ludwig, Thomas; Pipek, Volkmar; Nestler, Simon
Mensch und Computer 2017 - Workshopband, p.5-8
[Conference Proceedings]
Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media
Reuter, Christian; Kaufhold, Marc-André; Steinfort, René
Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management; ISCRAM 2017, p.583-591
[Conference Proceedings]


