Publikationen
Publikationen
Double Trouble? Impact and Detection of Duplicates in Face Image Datasets
T. Schlett and C. Rathgeb and J. Tapia and C. Busch
13th Intl. Conf. on Pattern Recognition Applications and Methods (ICPRAM), p.801–808
[Conference Proceedings]
Testing the Performance of Face Recognition for People with Down Syndrome
C. Rathgeb and M. Ibsen and D. Hartmann and S. Hradetzky and B. Ólafsdóttir
Intl. Conf. on Automatic Face and Gesture Recognition (FG), p.1–5
[Conference Proceedings]
On the Use of Synthetic Hand Images for Biometric Recognition
R. Nichols and L. J. Gonzalez-Soler and C. Rathgeb
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG 2024), p.0–0
[Conference Proceedings]
FRCSyn Challenge at WACV 2024: Face Recognition Challenge in the Era of Synthetic Data
P. Melzi and R. Tolosana and R. Vera-Rodriguez and M. Kim and C. Rathgeb and others
IEEE/CVF Winter Conf. on Applications of Computer Vision Workshops (WACVw), p.892–901
[Conference Proceedings]
SynChildFace: Fine-tuning Face Recognition for Children with Synthetic Data
F. V. S. Kouam and C. Rathgeb and M. Ibsen and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]
Demographic Variability in Face Image Quality Measures
W. Kabbani and K. Raja and R. Raghavendra and C. Busch
Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]
Deep Learning-based Compression Detection for explainable Face Image Quality Assessment
L. Jonientz and J. Merkle and C. Rathgeb and B. Tams and G. Merz
Intl. Conf. on Pattern Recognition Workshops (ICPRW), p.1–14
[Conference Proceedings]
TetraLoss: Improving the Robustness of Face Recognition against Morphing Attacks
M. Ibsen and L. J. Gonzalez-Soler and C. Rathgeb and C. Busch
IEEE Intl. Conf. on Automatic Face and Gesture Recognition (FG), p.1–9
[Conference Proceedings]
Multi-Channel Cross Modal Detection of Synthetic Face Images
M. Ibsen and C. Rathgeb and S. Marcel and C. Busch
IEEE Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]
Conditional Face Image Manipulation Detection: Combining Algorithm and Human Examiner Decisions
M. Ibsen and R. Nichols and C. Rathgeb and D. Robertson and J. Davis and F. Løvåsdal and K. Raja and R. Jenkins and C. Busch
ACM Workshop on Information Hiding and Multimedia Security
[Conference Proceedings]
Efficient Expression Neutrality Estimation with Application to Face Recognition Utility Prediction
M. Grimmer and R. Veldhuis and C. Busch
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]
TattTRN: Template Reconstruction Network for Tattoo Retrieval
L. J. Gonzalez-Soler and M. Salwowski and C. Rathgeb and D. Fischer
Intl. Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW)
[Conference Proceedings]
PCR-HIQA: Perceptual Classifiability Ratio for Hand Image Quality Assessment
L. J. Gonzalez-Soler and M. Grimmer and D. Fischer and C. Rathgeb and C. Busch
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1–10
[Conference Proceedings]
Detection and Mitigation of Bias in Under Exposure Estimation for Face Image Quality Assessment
A. Dörsch and C. Rathgeb and M. Grimmer and C. Busch
Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5
[Conference Proceedings]
Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints
Bunzel, Niklas; Klause, Gerrit
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Shulman, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]
Integrating Causality in Messaging Channels
Chen, Shan; Fischlin, Marc
Advances in Cryptology - EUROCRYPT 2024, p.251-282
[Conference Proceedings]
BUFFing FALCON Without Increasing the Signature Size
Düzlü, Samed; Fiedler, Rune; Fischlin, Marc
Selected Areas in Cryptography - SAC 2024, p.131-150
[Conference Proceedings]
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication
Fischlin, Marc; Sanina, Olga
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4762-4776
[Conference Proceedings]
Post-Quantum Asynchronous Remote Key Generation for FIDO2
Brendel, Jacqueline; Clermont, Sebastian; Fischlin, Marc
Advances in Cryptology - ASIACRYPT 2024, p.465-493
[Conference Proceedings]
WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]
Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine interdisziplinäre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den Geschlechtseintrag
Seyda, Linda; Brüggemann, Andreas; Hornung, Gerrit; Schneider, Thomas
INFORMATIK 2024, Workshop Recht und Technik: Datenschutz im Diskurs (RuT'24), p.153-167
[Journal Article, Conference Proceedings]
Defying the Odds: Solana’s Unexpected Resilience in Spite of the Security Challenges Faced by Developers
Andreina, Sebastien; Cloosters, Tobias; Davi, Lucas; Giesen, Jens-Rene; Gutfleisch, Marco; Karame, Ghassan; Naiakshina, Alena; Naji, Houda
Proc. of the 31th ACM SIGSAC Conference on Computer & Communications Security (CCS)
[Conference Proceedings]
Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
Rostami, Mohamadreza; Chilese, Marco; Zeitouni, Shaza; Kande, Rahul; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), p.1-6
[Conference Proceedings]
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors
Borkar, Pallavi; Chen, Chen; Rostami, Mohamadreza; Singh, Nikhilesh; Kande, Rahul; Sadeghi, Ahmad-Reza; Rebeiro, Chester; Rajendran, Jeyavijayan
33rd USENIX Security Symposium (USENIX Security 24), p.5377-5394
[Conference Proceedings]
Broadcast and Consensus in Stochastic Dynamic Networks with Byzantine Nodes and Adversarial Edges
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
International Symposium on Distributed Computing 2024
[Conference Paper]
Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection
Rostami, Mohamadreza; Zeitouni, Shaza; Kande, Rahul; Chen, Chen; Mahmoody, Pouya; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
Proceedings of the 61st ACM/IEEE Design Automation Conference
[Conference Proceedings]
Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]
Reliability Assurance in RIS-Assisted 6G Campus Networks
Tohidi, Ehsan; Franke, Max; Phung, Cao Vien; Khan, Naveed; Drummond, André; Schmid, Stefan; Jukan, Admela; Stanczak, Slawomir
International Conference on the Design of Reliable Communication Networks 2024
[Conference Paper]
RIS as a Network Resource: User Multiplexing and Pricing Algorithms
Papadopoulos, Alexandros; Lalas, Antonios; Votis, Konstantinos; Schmid, Stefan; Katsalis, Kostas; Liaskos, Christos
International Conference on 6G Networking 2024
[Conference Paper]


