Publikationen

Publikationen

The Impact of Optical and Geometrical Thickness on Perceived Translucency Differences
Gigilashvili, Davit; Urban, Philipp; Thomas, Jean-Baptiste; Pedersen, Marius; Hardeberg, Jon Yngve
[Journal Article]


Fallzahlen, Re-Identifikation und der technische Datenschutz
Hamacher, Kay; Kussel, Tobias; Landesberger, Tatiana von; Baumgartl, Tom; Höhn, Markus; Scheithauer, Simone; Marschollek, Michael; Wulff, Antje
[Journal Article]


Inducing robustness and plausibility in deep learning optical 3D printer models
Chen, Danwu; Urban, Philipp
[Journal Article]


SEC-Learn: Sensor Edge Cloud for Federated Learning
Aichroth, Patrick; Antes, Christoph; Gembaczka, Pierre; Graf, Holger; Johnson, David S.; Jung, Matthias; Kämpfe, Thomas; Kleinberger, Thomas; Köllmer, Thomas; Kuhn, Thomas; Kutter, Christoph; Krüger, Jens; Loroch, Dominik M.; Lukashevich, Hanna; Laleni, Nelli; Zhang, Lei; Leugering, Johannes; Martín Fernández, Rodrigo; Mateu, Loreto; Mojumder, Shaown; Prautsch, Benjamin; Pscheidl, Ferdinand; Roscher, Karsten; Schneickert, Sören; Vanselow, Frank; Wallbott, Paul; Walter, Oliver; Weber, Nico
International Conference on Embedded Computer Systems - Architectures, Modeling, and Si­mu­la­tion 2021
[Conference Paper]


Masked Face Recognition: Human versus Machine
Damer, Naser; Boutros, Fadi; Süßmilch, Marius; Fang, Meiling; Kirchbuchner, Florian; Kuijper, Arjan
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG International Conference) 2021
[Journal Article]


Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality
Fu, Biying; Damer, Naser
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG International Conference) 2021
[Journal Article]


The Hijackers Guide to the Galaxy: Off-Path Taking Over Internet Resources
Dai, Tianxiang; Jeitner, Philipp; Shulman, Haya; Waidner, Michael
[Paper]


Konsequenzen des § 4 TTDSG für die Praxis von Telekommunikationsanbietern
Diel, Sarah; Selzer, Annika
[Journal Article]


Android Data Storage Locations and What App Developers do with it from a Security and Privacy Perspective
Heid, Kris; Tefke, Tobias; Heider, Jens; Staudemeyer, Ralf C.
International Conference on Information Systems Security and Privacy (ICISSP) 2022
[Conference Paper]


Local Power Grids at Risk
Zhdanova, Maria; Urbansky, Julian; Hagemeier, Anne; Zelle, Daniel; Herrmann, Isabelle Frederike; Höffner, Dorian
Annual Computer Security Applications Conference 2022
[Conference Paper]


Maschinelles Lernen im Jugendschutz
Steinebach, Martin
[Journal Article]


ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Zelle, Daniel; Plappert, Christian; Rieke, Roland; Scheuermann, Dirk; Krauß, C.
[Journal Article]


Messung der Datenminimierung für den Beschäftigtendatenschutz am Beispiel von Standortdaten
Schleper, Janine; Kohn, Matthias; Jo Pesch, Paulina; Waldmann, Ulrich; Kunz, Thomas
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Towards Image Hashing Robust Against Cropping and Rotation
Steinebach, Martin; Berwanger, Tiberius; Liu, Huajian
International Conference on Availability, Reliability and Security 2022
[Conference Paper]


Datenschutzrecht. Ein Kommentar für Studium und Praxis
[Scientific Anthology]


Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
Paul, S.; Kuzovkova, Y.; Lahr, Norman; Niederhagen, R.
Asia Conference on Computer and Communications Security 2022
[Conference Paper]


Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
Jeitner, Philipp; Shulman, Haya
USENIX Security Symposium 2021
[Paper]


Anwendungsszenarien und Bedenken beim Einsatz Künstlicher Intelligenz in der öffentlichen Verwaltung
Heeremann, Wendy; Abagnale, Giusi
[Journal Article]


Kapitel VII: Zusam­men­arbeit und Kohärenz (Art. 60-76). Teilkommentierung Art. 68, 69, 70, 71, 72, 73, 74, 75, 76 DSGVO
Schreiber, Linda
[Book Article]


Application layer denial-of-service attacks and defense mechanisms: A survey
Tripathi, N.; Hubballi, N.
[Journal Article]


Recognition of objects from looted excavations by smartphone app and deep learning
Berchtold, Waldemar; Liu, Huajian; Bugert, Simon; Yannikos, York; Wang, Jingcun; Heeger, Julian; Steinebach, Martin; Frühwein, Marco
Conference "Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications" 2022
[Journal Article]


Kapitel 5: Vertretung im Europäischen Datenschutzausschuss, zentrale Anlaufstelle, Zusam­men­arbeit der Aufsichtsbehörden des Bundes und der Länder in Angelegenheiten der Europäischen Union (§§ 17-19). Teilkommentierung §§ 17, 18, 19 BDSG
Schreiber, Linda
[Book Article]


Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Hlavacek, Tomas; Shulman, Haya; Waidner, Michael
European Symposium on Research in Computer Security 2022
[Conference Paper]


Robust face recognition: How much face is needed?
Bunzel, Niklas
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]


Desinformationen und Messengerdienste: Herausforderung und Lösungsansätze
Krämer, Nicole; Hornung, Gerrit; Jansen, Carolin; Kluck, Jan Philipp; Rinsdorf, Lars; Setz, Tahireh; Steinebach, Martin; Vogel, Inna; Yannikos, York
[Book Article]


Issues of Verifying Anonymity: An Overview
Stummer-Diel, Sarah
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Simplifying multimodal journeys: An authentication and data sharing framework in the mobility service domain
Gadacz, Henry
[Paper]


Towards a Privacy-Aware Electric Vehicle Architecture
Plappert, Christian; Stancke, Jonathan; Jäger, Lukas
International Conference on Parallel, Distributed and Network-Based Processing 2022
[Conference Paper]


Kapitel I: Allgemeine Bestimmungen (Art. 1-4). Teilkommentierung Art. 4, DSGVO
Schreiber, Linda
[Book Article]


Selbstbestimmung, Privatheit und Datenschutz
[Scientific Anthology]