Publikationen
Publikationen
Offline Model Guard: Secure and Private ML on Mobile Devices
Bayerl, Sebastian P.; Frassetto, Tommaso; Jauernig, Patrick; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stapf, Emmanuel; Weinert, Christian
23. Design, Automation and Test in Europe Conference (DATE '20)
[Conference Proceedings]
The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes
Zimmermann, Verena; Gerber, Nina
International Journal of Human-Computer Studies, p.26-44
[Journal Article]
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"
Schneider, Thomas; Treiber, Amos
IEEE Transactions on Parallel and Distributed Systems, p.543-546
[Journal Article]
Quo Vadis? Digitalisierung und Soziale Medien im Bevölkerungsschutz
Reuter, Christian
Digitalisierung als Erfolgsfaktor für das Sozial- und Wohlfahrtswesenwesen, p.309-318
Social media in conflicts and crises
Reuter, Christian; Stieglitz, Stefan; Imran, Muhammad
Behaviour & Information Technology (BIT), p.241-251
[Journal Article]
Mitigating Information Overload in Social Media during Conflicts and Crises: Design and Evaluation of a Cross-Platform Alerting System
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Habdank, Matthias
Behaviour & Information Technology, p.319-342
[Journal Article]
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Dessouky, Ghada; Frassetto, Tommaso; Sadeghi, Ahmad-Reza
USENIX Security
[Conference Proceedings]
API Usability of Stateful Signature Schemes
A. Zeier and A. Wiesmaier and A. Heinemann
The 14th International Workshop on Security (IWSEC), LNCS 11689, p.1–20
[Conference Proceedings]
Benchmark Performance for the Sussex-Huawei Locomotion and Transportation
Recognition Challenge 2018
Lin Wang and
Hristijan Gjoreski and
Mathias Ciliberto and
Sami Mekki and
Stefan Valentin and
Daniel Roggen
Human Activity Sensing - Corpus and Applications, p.153–170
Dynamic DASH Aware Scheduling in Cellular Networks
Rachid El Azouzi and
Albert Sunny and
Liang Zhao and
Eitan Altman and
Dimitrios Tsilimantos and
Francesco De Pellegrini and
Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC
2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]
Analysis of QoE for Adaptive Video Streaming over Wireless Networks
with User Abandonment Behavior
Rachid El Azouzi and
Krishna V. Acharya and
Sudheer Poojary and
Albert Sunny and
Majed Haddad and
Eitan Altman and
Dimitrios Tsilimantos and
Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC
2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]
From click to playback: a dataset to study the response time of mobile
YouTube
Frank Loh and
Florian Wamser and
Christian Moldovan and
Bernd Zeidler and
Tobias Hoßfeld and
Dimitrios Tsilimantos and
Stefan Valentin
Proceedings of the 10th ACM Multimedia Systems Conference, MMSys
2019, Amherst, MA, USA, June 18-21, 2019, p.267–272
[Conference Proceedings]
Enforcing Bitrate-Stability for Adaptive Streaming Traffic in Cellular
Networks
Albert Sunny and
Rachid El Azouzi and
Afaf Arfaoui and
Eitan Altman and
Sudheer Poojary and
Dimitrios Tsilimantos and
Stefan Valentin
IEEE Trans. Netw. Serv. Manag., Vol.16, p.1812–1825
[Journal Article]
Enabling Reproducible Research in Sensor-Based Transportation Mode
Recognition With the Sussex-Huawei Dataset
Lin Wang and
Hristijan Gjoreski and
Mathias Ciliberto and
Sami Mekki and
Stefan Valentin and
Daniel Roggen
IEEE Access, Vol.7, p.10870–10891
[Journal Article]
Security Requirements Engineering in Safety-Critical Railway Signalling Networks
Markus Heinrich and Tsvetoslava Vateva-Gurova and Tolga Arul and Stefan Katzenbeisser and Neeraj Suri and Henk
Birkholz and Andreas Fuchs and Christoph Krauß and Maria Zhdanova and Don Kuzhiyelil and Sergey Tverdyshev and Christian
Schlehuber
Security and Communication Networks, Vol.vol. 2019, Article ID 8348925, p.14 pages
[Journal Article]
Selbstdatenschutz im vernetzten Fahrzeug und dessen technische Umsetzung
Krauß, Christoph
Grundrechtsschutz im Smart Car: Kommunikation, Sicherheit und Datenschutz im vernetzten Fahrzeug, p.227–244
[Book Article]
Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Diethelm Bienhaus and Lukas Jäger and Roland Rieke and Christoph Krauß
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC
2019, St. Petersburg, Russia, 7-9 October, 2019., p.521–528
[Conference Proceedings]
Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess
sicherer Software
Rolf Huesmann and
Alexander Zeier and
Andreas Heinemann
Mensch & Computer Workshopband
[Conference Proceedings]
API Usability of Stateful Signature Schemes
Alexander Zeier and
Alexander Wiesmaier and
Andreas Heinemann
IWSEC, p.221–240
[Conference Proceedings]
Phishing Attack Recognition by End-Users: Concepts for URL Visualization
and Implementation
Vivian Ives Philipp Erbenich and
Daniel Träder and
Andreas Heinemann and
Meltem Nural
HAISA, p.179–188
[Conference Proceedings]
Datenschutz muss benutzbar sein
Andreas Heinemann and
Tobias Straub
Datenschutz und Datensicherheit, Vol.43, p.7–12
[Journal Article]
Relevant features for Gender Classification in NIR Periocular Images
I. Viedma and J. Tapia and A. Iturriaga and C. Busch
arXiv e-prints
[Journal Article]
Privacy-preserving PLDA Speaker Verification Using Outsourced Secure Computation
A. Treiber and A. Nautsch and J. Kolberg and T. Schneider and C. Busch
Speech Communication, Vol.114, p.60–71
[Journal Article]
Detection of Face Morphing Attacks based on PRNU Analysis
U. Scherhag and L. Debiasi and C. Rathgeb and C. Busch and A. Uhl
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]
Face Recognition Systems under Morphing Attacks: A Survey
U. Scherhag and C. Rathgeb and J. Merkle and R. Breithaupt and C. Busch
IEEEAccess
[Journal Article]
Impact and Detection of Facial Beautification in Face Recognition: An Overview
C. Rathgeb and A. Dantcheva and C. Busch
IEEE Access, Vol.7, p.152667–152678
[Journal Article]
Obtaining Stable Iris Codes Exploiting Low-Rank Tensor Space and Spatial Structure Aware Refinement for Better Iris Recognition
K. Raja, R. Raghavendra and C. Busch
Proc. of the 12th IAPR Intl. Conf. on Biometrics (ICB)
[Conference Proceedings]
Preserving Privacy in Speaker and Speech Characterisation
A. Nautsch and A. Jiménez and A. Treiber and J. Kolberg and C. Jasserand and others
Computer Speech & Language, Vol.58, p.441–480
[Journal Article]
Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
H. Mandalapu and R. Raghavendra and C. Busch
Proc. of the 3rd Intl. Conf. on Biometric Engineering and Applications (ICBEA)
[Conference Proceedings]
Multi-algorithm Benchmark for Fingerprint Presentation Attack Detection with Laser Speckle Contrast Imaging
J. Kolberg and M. Gomez-Barrero and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5


