Publikationen

Publikationen

Revisiting Permission Piggybacking of Third-Party Libraries in Android Apps
Heid, Kris; Sonntag, Elena Julia; Heider, Jens
International Conference on Information Systems Security and Privacy 2025
[Conference Paper]


SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning
Rieger, Phillip; Pegoraro, Alessandro; Kumari, Kavita; Abera, Tigist; Knauer, Jonathan; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2025
[Conference Proceedings]


Second FRCSyn-onGoing: Winning Solutions and Post-challenge Analysis to Improve Face Recognition with Synthetic Data
DeAndres-Tame, Ivan; Tolosana, Ruben; Melzi, Pietro; Vera-Rodriguez, Ruben; Kim, Minchul; Rathgeb, Christian; Liu, Xiaoming; Gomez, Luis F.; Morales, Aythami; Fierrez, Julian; Ortega-Garcia, Javier; Zhong, Zhizhou; Huang, Yuge; Mi, Yuxi; Ding, Shouhong; Zhou, Shuigeng; He, Shuai; Fu, Lingzhi; Cong, Heng; Zhang, Rongyu; Xiao, Zhihong; Smirnov, Evgeny; Pimenov, Anton; Grigorev, Aleksei; Timoshenko, Denis; Mesfin Asfaw, Kaleb; Yaw Low, Cheng; Liu, Hao; Wang, Chuyi; Zuo, Qing; He, Zhixiang; Otroshi Shahreza, Hatef; George, Anjith; Unnervik, Alexander; Rahimi, Parsa; Marcel, Sébastien; Neto, Pedro C.; Cardoso, Jaime S.; Kolf, Jan Niklas; Damer, Naser; Boutros, Fadi; Huber, Marco; Sequeira, Ana F.; Atzori, Andrea; Fenu, Gianni; Marras, Mirko; Yu, Jiang; Štruc, Vitomir; Li, Zhangjie; Li, Jichun; Zhao, Weisong; Lei, Zhen; Zhu, Xiangyu; Zhang, Xiao-Yu; Biesseck, Bernardo; Vidal, Pedro; Coelho, Luiz; Granada, Roger; Menotti, David
[Journal Article]


VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis
Kumari, Kavita; Abbasihafshejani, Maryam; Pegoraro, Alessandro; Rieger, Phillip; Arshi, Kamyar; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium
[Conference Proceedings]


Ent­wicklungen von KI und Desinformation - Erhöhte Vorsicht auf sozialen Medien!
Wittpah, Volker; Steinebach, Martin; Ibisch, Andrea; Kreft, David; Schild, Fabian; Neufert, Caroline


SGX-PrivInfer: A Secure Collaborative System for Quantifying and Mitigating Attribute Inference Risks in Social Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Information Systems Security and Privacy 2025
[Conference Paper]


FRoundation: Are Foundation Models Ready for Face Recognition?
Chettaoui, Tahar; Damer, Naser; Boutros, Fadi
[Journal Article]


Hash & Adjust: Competitive Demand-Aware Consistent Hashing
Pourdamghani, Arash; Avin, Chen; Sama, Robert; Shiran, Maryam; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]


Efficient Algorithms for Demand-Aware Networks and a Connection to Virtual Network Embedding
Figiel, Aleksander; Korhonen, Janne H.; Olver, Neil; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]


Erkennung von Desinformationen
Steinebach, Martin
[Journal Article]


Fraunhofer SIT at GenAI Detection Task 1: Adapter Fusion for AI-generated Text Detection
Schäfer, Karla; Steinebach, Martin
Workshop on GenAI Content Detection 2025
[Conference Paper]


KVC-onGoing: Keystroke Verification Challenge
Stragapede, Giuseppe; Vera-Rodriguez, Ruben; Tolosana, Ruben; Morales, Aythami; DeAndres-Tame, Ivan; Damer, Naser; Fierrez, Julian; Ortega-Garcia, Javier; Acien, Alejandro; Gonzalez, Nahuel; Shadrikov, Andrei; Gordin, Dmitrii; Schmitt, Leon; Wimmer, Daniel; Großmann, Christoph; Krieger, Joerdis; Heinz, Florian; Krestel, Ron; Mayer, Christoffer; Haberl, Simon; Gschrey, Helena; Yamagishi, Yosuke; Wickramanayake, Sandareka; Saha, Sanjay; Rasnayaka, Sanka; Gutfeter, Weronika; Sim, Terence; Baran, Adam; Krzysztoń, Mateusz; Jaskóła, Przemysław
[Journal Article]


Comparative Analysis of Voice Conversion in German
Schäfer, Karla; Choi, Jeong-Eun; Steinebach, Martin
International Conference on Pattern Recognition 2024
[Conference Paper]


Model compression techniques in biometrics applications: A survey
Caldeira, Eduarda; Neto, Pedro C.; Huber, Marco; Damer, Naser; Sequeira, Ana F.
[Journal Article]


AdaDistill: Adaptive Knowledge Distillation for Deep Face Recognition
Boutros, Fadi; Štruc, Vitomir; Damer, Naser
European Conference on Computer Vision 2024
[Conference Paper]


UAV-based person re-identification: A survey of UAV datasets, approaches, and challenges
Albaluchi, Yousaf; Fu, Biying; Ramachandra, Raghavendra; Damer, Naser; Raja, Kiran
[Journal Article]


Generative AI in the context of assistive technologies: Trends, limitations and future directions
Fu, Biying; Hadid, Abdenour; Damer, Naser
[Journal Article]


Decision-based Data Distribution (D3): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios
Linsner, Sebastian; Demuth, Kilian; Fischlin, Marc; Reuter, Christian
Proceedings on Privacy Enhancing Technologies (PoPETs), p.185-208
[Journal Article]


Integrating Causality in Messaging Channels
Chen, Shan; Fischlin, Marc
Advances in Cryptology - EUROCRYPT 2024, p.251-282
[Conference Proceedings]


BUFFing FALCON Without Increasing the Signature Size
Düzlü, Samed; Fiedler, Rune; Fischlin, Marc
Selected Areas in Cryptography - SAC 2024, p.131-150
[Conference Proceedings]


Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication
Fischlin, Marc; Sanina, Olga
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4762-4776
[Conference Proceedings]


Post-Quantum Asynchronous Remote Key Generation for FIDO2
Brendel, Jacqueline; Clermont, Sebastian; Fischlin, Marc
Advances in Cryptology - ASIACRYPT 2024, p.465-493
[Conference Proceedings]


Detection and Mitigation of Bias in Under Exposure Estimation
Dörsch, A.; Rathgeb, C.; Grimmer, M.; Busch, C.
Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]


Wie stellen sich Nutzende ihren Privatsphäre-Assistenten vor?
Stöver, Alina; Hahn, Sara; Althaus, Simon; Zimmer, Ephraim; Gerber, Nina
Datenschutz und Datensicherheit - DuD, p.633-636
[Journal Article]


Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey
Alnahawi, Nouri; Schmitt, Nicolai; Wiesmaier, Alexander; Zok, Chiara-Marie
ACM Trans. Embed. Comput. Syst., Vol.23
[Journal Article]


"On Criteria and Tooling for Cryptographic Inventories"
"Schmitt, Nicolai; Henrich, Johanna; Heinz, Dominik; Alnahawi, Nouri; Wiesmaier, Alexander"
"Sicherheit 2024", p.49-63


PMMP-PQC Migration Management Process
Von Nethen, Nils; Wiesmaier, Alexander; Alnahawi, Nouri; Henrich, Johanna
Proceedings of the 2024 European Interdisciplinary Cyber­security Conference, p.144–154
[Conference Proceedings]


Hornung/Schallbruch (Hrsg.): IT-Sicherheitsrecht. Praxishandbuch. 2. Auflage
Margraf, Marian; Heinemann, Andreas
[Book Article]


""Pass auf!" - Child-Oriented Cyber Safety & Security Educational Content"
"Bopp, Karen; Heinemann, Andreas; Renaud, Karen"