Publikationen

Publikationen

On Soft-Biometric Information Stored in Biometric Face Embeddings
Terhörst, Philipp; Fährmann, Daniel; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
Sprache: English
[Journal Article, Electronic Publication]

MAAD-Face: A Massively Annotated Attribute Dataset for Face Images
Terhörst, Philipp; Fährmann, Daniel; Kolf, Jan Niklas; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
Sprache: English
[Journal Article, Electronic Publication]

A Systematic Hardening of Java's Information Hiding
Holzinger, Philipp; Boden, Eric
International Symposium on Advanced Security on Software and Systems (ASSS) <1, 2021, Online>
Sprache: English
[Conference Paper]

OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
WiSec ’21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.374-376
Sprache: English
[Conference Proceedings]

AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.371-373
Sprache: English
[Conference Proceedings]

LLVM-based Circuit Compilation for Practical Secure Computation
Heldmann, Tim; Schneider, Thomas; Tkachenko, Oleksandr; Weinert, Christian; Yalame, Mohammad Hossein
Applied Cryptography and Network Security: Proceedings Part II, p.99-121
Sprache: English
[Conference Proceedings]

Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
Keller, Hannah; Möllering, Helen; Schneider, Thomas; Yalame, Mohammad Hossein
18th International Conference on Security and Cryptography (SECRYPT'21)
Sprache: English
[Conference Proceedings]

RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies
Stute, Milan; Kohnhauser, Florian; Baumgärtner, Lars; Almon, Lars; Hollick, Matthias; Katzenbeisser, Stefan; Freisleben, Bernd
IEEE Transactions on Dependable and Secure Computing
Sprache: English
[Journal Article]

Zero-Interaction Security-Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications
Sprache: English
[Journal Article]

Security and Quality: Two Sides of the Same Coin?
Arzt, Steven
International Workshop on the State Of the Art in Program Analysis (SOAP) <10, 2021, Online>
Sprache: English
[Conference Paper]

Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain
Plappert, Christian; Zelle, Daniel; Gadacz, Henry; Rieke, Roland; Scheuermann, Dirk; Krauß, Christoph
29th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP
[Conference Proceedings]

Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Bienhaus, Diethelm; Ebner, Andreas; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Si­mu­la­tion Modelling Practice and Theory, Vol.109, p.9
[Journal Article]

Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte
Zeier, Alexander; Wiesmaier, Alexander; Heinemann, Andreas
Tagungsband zum 17. Deutschen IT-Sicherheitskongress, p.381-391
[Conference Proceedings]

On PQC Migration and Crypto-Agility
Alnahawi, Nouri; Wiesmaier, Alexander; Graßmeyer, Tobias; Geißler, Julian; Zeier, Alexander; Bauspieß, Pia; Heinemann, Andreas
[Report]

Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview
Bender, Tim; Huesmann, Rolf; Heinemann, Andreas
ARES 2021, SSC Workshop: The 16th International Conference on Availability, Reliability and Security, Virtual Event, August 17-20, 2021
[Conference Proceedings]

On the Generalisation capabilities of Fisher Vector based Face Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
IET Biometrics, p.1-12
[Journal Article]

On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
Kolberg, J.; Gomez-Barrero, M.; Busch, C.
IET Biometrics, p.1-15
[Journal Article]

Makeup Presentation Attack Potential Revisited: Skills Pay the Bills
Drozdowski, P.; Grobarek, S.; Schurse, J.; Rathgeb, C.; Stockhardt, F.; Busch, C.
Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]

Local Feature Encoding for Unknown Presentation Attack Detection: An Analysis of Different Local Feature Descriptors
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Kolberg, J.; Chang, L.; Perez-Suarez, A.; Busch, C.
IET Biometrics, p.1-13
[Journal Article]

Impact of facial tattoos and paintings on face recognition systems
Ibsen, M.; Rathgeb, C.; Fink, T.; Drozdowski, P.; Busch, C.
IET Biometrics
[Journal Article]

Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Chang, L.; Perez-Suarez, A.; Busch, C.
IEEE Access, Vol.9, p.5806-5820
[Journal Article]

Face Morphing Attacks: A Threat to eLearning?
Rathgeb, C.; Pöppelmann, K.; Busch, C.
IEEE Global Engineering Education Conf. (EDUCON 2021), p.1-6
[Conference Proceedings]

Effects of Image Compression on Face Image Manipulation Detection: A Case Study on Facial Retouching
Rathgeb, C.; Bernardo, K.; Haryanto, N. E.; Busch, C.
IET Biometrics, Vol.10
[Journal Article]

Deep Learning-Based Semantic Segmentation for Touchless Fingerprint Recognition
Priesnitz, J.; Rathgeb, C.; Buchmann, N.; Busch, C.
Proc. Intl. Conf. Pattern Recognition (ICPR) (Workshops)
[Conference Proceedings]

Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection
Kolberg, J.; Grimmer, M.; Gomez-Barrero, M.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.3, p.190-202
[Journal Article]