Publikationen

Publikationen

Resource‐Efficient Anomaly Detection in Industrial Control Systems with Quantized Recurrent Variational Autoencoder
Fährmann, Daniel; Ihlefeld, Malte; Kuijper, Arjan; Damer, Naser
[Journal Article]


Beyond Spatial Explanations: Explainable Face Recognition in the Frequency Domain
Huber, Marco; Damer, Naser
Winter Conference on Applications of Computer Vision 2025
[Conference Paper]


Durchführung der ersten Datenschutz-Vorsorge
Boll, Alina; Geissler, Ines
[Paper]


Revisiting Permission Piggybacking of Third-Party Libraries in Android Apps
Heid, Kris; Sonntag, Elena Julia; Heider, Jens
International Conference on Information Systems Security and Privacy 2025
[Conference Paper]


SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning
Rieger, Phillip; Pegoraro, Alessandro; Kumari, Kavita; Abera, Tigist; Knauer, Jonathan; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2025
[Conference Proceedings]


Second FRCSyn-onGoing: Winning Solutions and Post-challenge Analysis to Improve Face Recognition with Synthetic Data
DeAndres-Tame, Ivan; Tolosana, Ruben; Melzi, Pietro; Vera-Rodriguez, Ruben; Kim, Minchul; Rathgeb, Christian; Liu, Xiaoming; Gomez, Luis F.; Morales, Aythami; Fierrez, Julian; Ortega-Garcia, Javier; Zhong, Zhizhou; Huang, Yuge; Mi, Yuxi; Ding, Shouhong; Zhou, Shuigeng; He, Shuai; Fu, Lingzhi; Cong, Heng; Zhang, Rongyu; Xiao, Zhihong; Smirnov, Evgeny; Pimenov, Anton; Grigorev, Aleksei; Timoshenko, Denis; Mesfin Asfaw, Kaleb; Yaw Low, Cheng; Liu, Hao; Wang, Chuyi; Zuo, Qing; He, Zhixiang; Otroshi Shahreza, Hatef; George, Anjith; Unnervik, Alexander; Rahimi, Parsa; Marcel, Sébastien; Neto, Pedro C.; Cardoso, Jaime S.; Kolf, Jan Niklas; Damer, Naser; Boutros, Fadi; Huber, Marco; Sequeira, Ana F.; Atzori, Andrea; Fenu, Gianni; Marras, Mirko; Yu, Jiang; Štruc, Vitomir; Li, Zhangjie; Li, Jichun; Zhao, Weisong; Lei, Zhen; Zhu, Xiangyu; Zhang, Xiao-Yu; Biesseck, Bernardo; Vidal, Pedro; Coelho, Luiz; Granada, Roger; Menotti, David
[Journal Article]


VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis
Kumari, Kavita; Abbasihafshejani, Maryam; Pegoraro, Alessandro; Rieger, Phillip; Arshi, Kamyar; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium
[Conference Proceedings]


Ent­wicklungen von KI und Desinformation - Erhöhte Vorsicht auf sozialen Medien!
Wittpah, Volker; Steinebach, Martin; Ibisch, Andrea; Kreft, David; Schild, Fabian; Neufert, Caroline


SGX-PrivInfer: A Secure Collaborative System for Quantifying and Mitigating Attribute Inference Risks in Social Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Information Systems Security and Privacy 2025
[Conference Paper]


FRoundation: Are Foundation Models Ready for Face Recognition?
Chettaoui, Tahar; Damer, Naser; Boutros, Fadi
[Journal Article]


Hash & Adjust: Competitive Demand-Aware Consistent Hashing
Pourdamghani, Arash; Avin, Chen; Sama, Robert; Shiran, Maryam; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]


Efficient Algorithms for Demand-Aware Networks and a Connection to Virtual Network Embedding
Figiel, Aleksander; Korhonen, Janne H.; Olver, Neil; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]


Erkennung von Desinformationen
Steinebach, Martin
[Journal Article]


Fraunhofer SIT at GenAI Detection Task 1: Adapter Fusion for AI-generated Text Detection
Schäfer, Karla; Steinebach, Martin
Workshop on GenAI Content Detection 2025
[Conference Paper]


KVC-onGoing: Keystroke Verification Challenge
Stragapede, Giuseppe; Vera-Rodriguez, Ruben; Tolosana, Ruben; Morales, Aythami; DeAndres-Tame, Ivan; Damer, Naser; Fierrez, Julian; Ortega-Garcia, Javier; Acien, Alejandro; Gonzalez, Nahuel; Shadrikov, Andrei; Gordin, Dmitrii; Schmitt, Leon; Wimmer, Daniel; Großmann, Christoph; Krieger, Joerdis; Heinz, Florian; Krestel, Ron; Mayer, Christoffer; Haberl, Simon; Gschrey, Helena; Yamagishi, Yosuke; Wickramanayake, Sandareka; Saha, Sanjay; Rasnayaka, Sanka; Gutfeter, Weronika; Sim, Terence; Baran, Adam; Krzysztoń, Mateusz; Jaskóła, Przemysław
[Journal Article]


Comparative Analysis of Voice Conversion in German
Schäfer, Karla; Choi, Jeong-Eun; Steinebach, Martin
International Conference on Pattern Recognition 2024
[Conference Paper]


Model compression techniques in biometrics applications: A survey
Caldeira, Eduarda; Neto, Pedro C.; Huber, Marco; Damer, Naser; Sequeira, Ana F.
[Journal Article]


AdaDistill: Adaptive Knowledge Distillation for Deep Face Recognition
Boutros, Fadi; Štruc, Vitomir; Damer, Naser
European Conference on Computer Vision 2024
[Conference Paper]


UAV-based person re-identification: A survey of UAV datasets, approaches, and challenges
Albaluchi, Yousaf; Fu, Biying; Ramachandra, Raghavendra; Damer, Naser; Raja, Kiran
[Journal Article]


Generative AI in the context of assistive technologies: Trends, limitations and future directions
Fu, Biying; Hadid, Abdenour; Damer, Naser
[Journal Article]


RPKI: Not Perfect But Good Enough
Schulmann, Haya; Vogel, Niklas; Waidner, Michael
CoRR, Vol.abs/2409.14518
[Journal Article]


Attacking with Something That Does Not Exist: \textquoterightProof of Non-Existence\textquoteright Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), p.45-57
[Conference Proceedings]


Insights into SAV Implementations in the Internet
Schulmann, Haya; Zhao, Shujie
Passive and Active Measurement, p.69-87
[Conference Proceedings]


Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Jens; Gattermayer, Tobias; Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), p.1977-1994
[Conference Proceedings]


The CURE to Vulnerabilities in RPKI Validation
Mirdita, Donika; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
31st Annual Network and Distributed System Security Symposium
[Conference Proceedings]


Crowdsourced Distributed Domain Validation
Frieß, Jens; Schulmann, Haya; Waidner, Michael
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, p.318-325
[Conference Proceedings]


Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.5015-5017
[Conference Proceedings]


Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly
Jacobsen, Oliver; Schulmann, Haya
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4937-4939
[Conference Proceedings]


Poster: Security of Login Interfaces in Modern Organizations
Tchokodeu, Kevin Nsieyanji; Schulmann, Haya; Sobol, Gil; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4925-4927
[Conference Proceedings]


Poster: Kill Krill or Proxy RPKI
Cattepoel, Louis; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4922-4924
[Conference Proceedings]