Publikationen

Publikationen

TetraLoss: Improving the Robustness of Face Recognition against Morphing Attacks
Ibsen, M.; Gonzalez-Soler, L. J.; Rathgeb, C.; Busch, C.
IEEE Intl. Conf. on Automatic Face and Gesture Recognition (FG), p.1-9
[Conference Proceedings]


Multi-Channel Cross Modal Detection of Synthetic Face Images
Ibsen, M.; Rathgeb, C.; Marcel, S.; Busch, C.
IEEE Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Conditional Face Image Manipulation Detection: Combining Algorithm and Human Examiner Decisions
Ibsen, M.; Nichols, R.; Rathgeb, C.; Robertson, D. J.; Davis, J. P.; L\ov\aasdal, F.; Raja, K.; Jenkins, R. E.; Busch, C.
ACM Workshop on Information Hiding and Multimedia Security
[Conference Proceedings]


TattTRN: Template Reconstruction Network for Tattoo Retrieval
Gonzalez-Soler, L. J.; Salwowski, M.; Rathgeb, C.; Fischer, D.
Intl. Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW)
[Conference Proceedings]


PCR-HIQA: Perceptual Classifiability Ratio for Hand Image Quality Assessment
Gonzalez-Soler, L. J.; Grimmer, M.; Fischer, D.; Rathgeb, C.; Busch, C.
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1-10
[Conference Proceedings]


Information Fusion and Hand Alignment to Improve Hand Recognition in Forensic Scenarios
Gonzalez-Soler, L. J.; Jónsdóttir, D. K.; Rathgeb, C.; Fischer, D.
IEEE Access, Vol.12, p.52941-52950
[Journal Article]


Contactless Hand Biometrics for Forensics: Review and Performance Benchmark
Gonzalez-Soler, L. J.; Zyla, K.; Rathgeb, C.; Fischer, D.
EURASIP Journal on Image and Video Processing (JIVP), p.34
[Journal Article]


Child Face Recognition at Scale: Synthetic Data Generation and Performance Benchmark
Falkenberg, M.; Ottsen, A. B.; Ibsen, M.; Rathgeb, C.
Frontiers in Signal Processing
[Journal Article]


Fairness measures for biometric quality assessment
Dörsch, A.; Schlett, T.; Munch, P.; Rathgeb, C.; Busch, C.
Proc. Intl. (ICPR) 2024 workshop on Fairness in Biometrics (FairBio))
[Conference Proceedings]


Analysis of behavioural curves to classify iris images under the influence of alcohol, drugs, and sleepiness conditions
Causa, L.; Tapia, J.; Perez, C.; Busch, C.
Expert Systems With Applications
[Journal Article]


Challenges for automated face recognition systems
Busch, C.
Nature Reviews Electrical Engineering
[Journal Article]


BRAKE: Biometric Resilient Authenticated Key Exchange
Bauspieß, P.; Silde, T.; Poljuha, M.; Tullot, A.; Costache, A.; Rathgeb, C.; Kolberg, J.; Busch, C
IEEE Access, Vol.12, p.46596-46615
[Journal Article]


Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine inter­dis­zi­pli­näre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den Geschlechtseintrag
Seyda, Linda; Brüggemann, Andreas; Hornung, Gerrit; Schneider, Thomas
INFORMATIK 2024, Workshop Recht und Technik: Datenschutz im Diskurs (RuT'24), p.153-167
[Journal Article]


Fuzzerfly Effect: Hardware Fuzzing for Memory Safety
Rostami, Mohamadreza; Chen, Chen; Kande, Rahul; Li, Huimin; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
IEEE Security & Privacy, p.76-86
[Journal Article]


Defying the Odds: Solana’s Unexpected Resilience in Spite of the Security Challenges Faced by Developers
Andreina, Sebastien; Cloosters, Tobias; Davi, Lucas; Giesen, Jens-Rene; Gutfleisch, Marco; Karame, Ghassan; Naiakshina, Alena; Naji, Houda
Proc. of the 31th ACM SIGSAC Conference on Computer & Communications Security (CCS)
[Conference Proceedings]


Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
Rostami, Mohamadreza; Chilese, Marco; Zeitouni, Shaza; Kande, Rahul; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), p.1-6
[Conference Proceedings]


WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors
Borkar, Pallavi; Chen, Chen; Rostami, Mohamadreza; Singh, Nikhilesh; Kande, Rahul; Sadeghi, Ahmad-Reza; Rebeiro, Chester; Rajendran, Jeyavijayan
33rd USENIX Security Symposium (USENIX Security 24), p.5377-5394
[Conference Proceedings]


Broadcast and Consensus in Stochastic Dynamic Networks with Byzantine Nodes and Adversarial Edges
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
International Symposium on Distributed Computing 2024
[Conference Paper]


Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection
Rostami, Mohamadreza; Zeitouni, Shaza; Kande, Rahul; Chen, Chen; Mahmoody, Pouya; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
Proceedings of the 61st ACM/IEEE Design Automation Conference
[Conference Proceedings]


Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]


Reliability Assurance in RIS-Assisted 6G Campus Networks
Tohidi, Ehsan; Franke, Max; Phung, Cao Vien; Khan, Naveed; Drummond, André; Schmid, Stefan; Jukan, Admela; Stanczak, Slawomir
International Conference on the Design of Reliable Communication Networks 2024
[Conference Paper]


RIS as a Network Resource: User Multiplexing and Pricing Algorithms
Papadopoulos, Alexandros; Lalas, Antonios; Votis, Konstantinos; Schmid, Stefan; Katsalis, Kostas; Liaskos, Christos
International Conference on 6G Networking 2024
[Conference Paper]


Baiji: Domain Planning for CDNs under the 95th Percentile Billing Model
Vanerio, Juan; Liu, Huiran; Zhang, Qi; Schmid, Stefan
Networking Conference 2024
[Conference Paper]


L3: Latency-aware Load Balancing in Multi-Cluster Service Mesh
Michaelis, Olivier; Schmid, Stefan; Mostafaei, Habib
International Middleware Conference 2024
[Conference Paper]


HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme
Sayari, Oussama; Marzougui, Soundes; Aulbach, Thomas; Krämer, Juliane; Seifert, Jean-Pierre
International Workshop on Constructive Side-Channel Analysis and Secure Design 2024
[Conference Paper]


MAYo or MAY-not: Exploring Implementation Security of the Post-Quantum Signature Scheme MAYO Against Physical Attacks
Aulbach, Thomas; Marzougui, Soundes; Seifert, Jean-Pierre; Ulitzsch, Vincent Quentin
Workshop on Fault Detection and Tolerance in Cryptography 2024
[Conference Paper]


Poster: Kill Krill or Proxy RPKI
Cattepoel, Luis; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]


Poster: Security of Login Interfaces in Modern Organizations
Nsieyanji Tchokodeu, Kevin; Schulmann, Haya; Sobol, Gil; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]


Recommendations for Implementing Independent Individual Verifiability in Internet Voting
Moser, Florian; Grimm, Rüdiger; Hilt, Tobias; Kirsten, Michael; Niederbudde, Christoph; Volkamer, Melanie
International Joint Conference on Electronic Voting 2024
[Conference Paper]


Recht und Technik - Datenschutz im Diskurs. Vorwort zu den Workshopbeiträgen
Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Döhmann, Indra Spiecker genannt
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]