Publikationen
Publikationen
QMagFace: Simple and Accurate Quality-Aware Face Recognition
Terhörst, Philipp; Ihlefeld, Malte; Huber, Marco; Damer, Naser; Kirchbuchner, Florian; Raja, Kiran; Kuijper, Arjan
Winter Conference on Applications of Computer Vision 2023
[Conference Paper]
Automated Cone and Vessel Analysis in Adaptive Optics Like Retinal Images for Clinical Diagnostics Support
Hertlein, Anna-Sophia; Wesarg, Stefan; Jessica Schmidt; Boche, Benjamin; Pfeiffer, Norbert; Matlach, Juliane
International Workshop on Clinical Image-Based Procedures 2022
[Conference Paper]
Machine Learning Based Approach for Motion Detection and Estimation in Routinely Acquired Low Resolution Near Infrared Fluorescence Optical Imaging
Zerweck, Lukas; Wesarg, Stefan; Kohlhammer, Jörn; Köhm, Michaela
International Workshop on Clinical Image-Based Procedures 2022
[Conference Paper]
Clinical Image-Based Procedures. 11th Workshop, CLIP 2022. Proceedings
International Workshop on Clinical Image-Based Procedures 2022
[Conference Proceeding]
Association of Phantomless Dual-Energy CT-based Volumetric Bone Mineral Density with the Prevalence of Acute Insufficiency Fractures of the Spine
Gruenewald, Leon D.; Koch, Vitali; Yel, İbrahim; Eichler, Katrin; Gruber-Rouh, Tatjana; Alizadeh, Leona S.; Mahmoudi, Scherwin; D'Angelo, Tommaso; Wichmann, Julian L.; Wesarg, Stefan; Vogl, Thomas J.; Booz, Christian
[Journal Article]
A survey on computer vision based human analysis in the COVID-19 era
Eyi̇okur , Fevzi̇ye İrem; Kantarcı, Alperen; Erakın, Mustafa Ekrem; Damer, Naser; Ofli, Ferda; Imran, Muhammad; Križaj, Janez; Ali Salah, Albert; Waibel, Alexander; Štruc, Vitomir; Ekenel, Hazım Kemal
[Journal Article]
COMPO*SED: Composite Parallel Coordinates for Co-Dependent Multi-Attribute Choices
Cibulski, Lena; May, Thorsten; Johanna Schmidt; Kohlhammer, Jörn
[Journal Article]
Perceptually Optimizing Color Look-up Tables
Reinhard, Johann; Urban, Philipp
[Journal Article]
Measuring the Uptaking of Digital Health Platforms on AAL/AHA Domain
Juiz, Carlos; Bermejo, Belen; Nikolov, Alexander; Rus, Silvia; Carboni, Andrea; Russo, Dario; Moroni, Davide; Karanastasis, Efstathios; Andronikou, Vassiliki; Lievens, Frederic; Berlo, Ad van; Staalduinen, Willeke van; Samuelsson, Christina; Cabrera-Umpierrez, Maria Fernanda
International Congress on Information and Communication Technology 2022
[Conference Paper]
Ein Vorschlag für die datenschutzkonforme Gestaltung von Datenschutz-Grundsätzen und -Schutzmaßnahmen in IT-Systemen
Selzer, Annika; Timm, Ingo J.
[Journal Article]
XDRI Attacks - and - How to Enhance Resilience of Residential Routers
Jeitner, Philipp; Schulmann, Haya; Teichmann, Lucas; Waidner, Michael
31st USENIX Security Symposium (USENIX Security 22), p.4473-4490
[Conference Proceedings]
Stalloris: RPKI Downgrade Attack
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
31st USENIX Security Symposium (USENIX Security 22), p.4455-4471
[Conference Proceedings]
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Hlavacek, Tomas; Schulmann, Haya; Waidner, Michael
Computer Security — ESORICS 2022, p.509-530
[Conference Proceedings]
How (Not) to Deploy Cryptography on the Internet
Schulmann, Haya
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, p.1
[Conference Proceedings]
Poster: DNS in Routers Considered Harmful
Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3471-3473
[Conference Proceedings]
Poster: Insights into Global Deployment of RPKI Validation
Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3467-3469
[Conference Proceedings]
Poster: RPKI Kill Switch
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3423-3425
[Conference Proceedings]
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Heftrig, Elias; Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3363-3365
[Conference Proceedings]
Behind the Scenes of RPKI
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.1413-1426
[Conference Proceedings]
Special issue ESORICS 2021
Bertino, Elisa; Schulmann, Haya; Waidner, Michael
Journal of Computer Security, Vol.30, p.753-755
[Journal Article]
On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas
Biselli, Tom; Steinbrink, Enno; Herbert, Franziska; Schmidbauer-Wolf, Gina M.; Reuter, Christian
22nd Privacy Enhancing Technologies Symposium (PETS 2022)
[Conference Proceedings]
Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D
Schmid, Stefka; Riebe, Thea; Reuter, Christian
Science and Engineering Ethics
[Journal Article]
LoRaWAN Security Issues and Mitigation Options by the Example of Agricultural IoT Scenarios
Kuntke, Franz; Romanenko, Vladimir; Linsner, Sebastian; Steinbrink, Enno; Reuter, Christian
Transactions on Emerging Telecommunications Technologies
[Journal Article]
A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication
Eyilmez, Kaan; Basyurt, Ali Sercan; Stieglitz, Stefan; Fuchß, Christoph; Kaufhold, Marc-André; Reuter, Christian; Mirabaie, Milad
ACIS 2022 Proceedings
[Conference Proceedings]
Towards a Cyber Weapons Assessment Model – Assessment of the Technical Features of Malicious Software
Reinhold, Thomas; Reuter, Christian
IEEE Transactions on Technology and Society, p.226-239
[Journal Article]
Zwischen Destabilisierung und der Ermöglichung von Resilienz: Perspektiven aus den Technikwissenschaften, den Sozialwissenschaften und den Rechtswissenschaften
Reuter, Christian; Göttsche, Malte; Frieß, Friederike; Thielbörger, Pierre; Vüllers, Johannes
Die Friedens-Warte : journal of international peace and organization, p.241-243
[Journal Article]
Trustworthy and Explainable: A European Vision of (Weaponised) Artificial Intelligence
Schmid, Stefka
Die Friedens-Warte : journal of international peace and organization, p.290-315
[Journal Article]
A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead
Reuter, Christian; Lo Iacono, Luigi; Benlian, Alexander
Behaviour & Information Technology, p.2035-2048
[Journal Article]
U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance
Riebe, Thea; Kuehn, Philipp; Imperatori, Philipp; Reuter, Christian
European Journal for Security Research, p.39-65
[Journal Article]
Zur Schnittmenge von Informatik mit Friedens- und Sicherheitsforschung: Erfahrungen aus der interdisziplinären Lehre in der Friedensinformatik
Reuter, Christian; Riebe, Thea; Haunschild, Jasmin; Reinhold, Thomas; Schmid, Stefka
Zeitschrift für Friedens- und Konfliktforschung, p.129-140
[Journal Article]


