Publikationen

Publikationen

Offline Model Guard: Secure and Private ML on Mobile Devices
Bayerl, Sebastian P.; Frassetto, Tommaso; Jauernig, Patrick; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stapf, Emmanuel; Weinert, Christian
23. Design, Automation and Test in Europe Conference (DATE '20)
[Conference Proceedings]


The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes
Zimmermann, Verena; Gerber, Nina
International Journal of Human-Computer Studies, p.26-44
[Journal Article]


A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"
Schneider, Thomas; Treiber, Amos
IEEE Transactions on Parallel and Distributed Systems, p.543-546
[Journal Article]


Quo Vadis? Digitalisierung und Soziale Medien im Bevölkerungsschutz
Reuter, Christian
Digitalisierung als Erfolgsfaktor für das Sozial- und Wohlfahrtswesenwesen, p.309-318


Social media in conflicts and crises
Reuter, Christian; Stieglitz, Stefan; Imran, Muhammad
Behaviour & Information Technology (BIT), p.241-251
[Journal Article]


Mitigating Information Overload in Social Media during Conflicts and Crises: Design and Evaluation of a Cross-Platform Alerting System
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Habdank, Matthias
Behaviour & Information Technology, p.319-342
[Journal Article]


HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Dessouky, Ghada; Frassetto, Tommaso; Sadeghi, Ahmad-Reza
USENIX Security
[Conference Proceedings]


API Usability of Stateful Signature Schemes
A. Zeier and A. Wiesmaier and A. Heinemann
The 14th International Workshop on Security (IWSEC), LNCS 11689, p.1–20
[Conference Proceedings]


Benchmark Performance for the Sussex-Huawei Locomotion and Transportation Recognition Challenge 2018
Lin Wang and Hristijan Gjoreski and Mathias Ciliberto and Sami Mekki and Stefan Valentin and Daniel Roggen
Human Activity Sensing - Corpus and Applications, p.153–170


Dynamic DASH Aware Scheduling in Cellular Networks
Rachid El Azouzi and Albert Sunny and Liang Zhao and Eitan Altman and Dimitrios Tsilimantos and Francesco De Pellegrini and Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]


Analysis of QoE for Adaptive Video Streaming over Wireless Networks with User Abandonment Behavior
Rachid El Azouzi and Krishna V. Acharya and Sudheer Poojary and Albert Sunny and Majed Haddad and Eitan Altman and Dimitrios Tsilimantos and Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]


From click to playback: a dataset to study the response time of mobile YouTube
Frank Loh and Florian Wamser and Christian Moldovan and Bernd Zeidler and Tobias Hoßfeld and Dimitrios Tsilimantos and Stefan Valentin
Proceedings of the 10th ACM Multimedia Systems Conference, MMSys 2019, Amherst, MA, USA, June 18-21, 2019, p.267–272
[Conference Proceedings]


Enforcing Bitrate-Stability for Adaptive Streaming Traffic in Cellular Networks
Albert Sunny and Rachid El Azouzi and Afaf Arfaoui and Eitan Altman and Sudheer Poojary and Dimitrios Tsilimantos and Stefan Valentin
IEEE Trans. Netw. Serv. Manag., Vol.16, p.1812–1825
[Journal Article]


Enabling Reproducible Research in Sensor-Based Transportation Mode Recognition With the Sussex-Huawei Dataset
Lin Wang and Hristijan Gjoreski and Mathias Ciliberto and Sami Mekki and Stefan Valentin and Daniel Roggen
IEEE Access, Vol.7, p.10870–10891
[Journal Article]


Security Requirements Engineering in Safety-Critical Railway Signalling Networks
Markus Heinrich and Tsvetoslava Vateva-Gurova and Tolga Arul and Stefan Katzenbeisser and Neeraj Suri and Henk Birkholz and Andreas Fuchs and Christoph Krauß and Maria Zhdanova and Don Kuzhiyelil and Sergey Tverdyshev and Christian Schlehuber
Security and Communication Networks, Vol.vol. 2019, Article ID 8348925, p.14 pages
[Journal Article]


Selbstdatenschutz im vernetzten Fahrzeug und dessen technische Umsetzung
Krauß, Christoph
Grundrechtsschutz im Smart Car: Kommunikation, Sicherheit und Datenschutz im vernetzten Fahrzeug, p.227–244
[Book Article]


Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Diethelm Bienhaus and Lukas Jäger and Roland Rieke and Christoph Krauß
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, St. Petersburg, Russia, 7-9 October, 2019., p.521–528
[Conference Proceedings]


Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software
Rolf Huesmann and Alexander Zeier and Andreas Heinemann
Mensch & Computer Workshopband
[Conference Proceedings]


API Usability of Stateful Signature Schemes
Alexander Zeier and Alexander Wiesmaier and Andreas Heinemann
IWSEC, p.221–240
[Conference Proceedings]


Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation
Vivian Ives Philipp Erbenich and Daniel Träder and Andreas Heinemann and Meltem Nural
HAISA, p.179–188
[Conference Proceedings]


Datenschutz muss benutzbar sein
Andreas Heinemann and Tobias Straub
Datenschutz und Datensicherheit, Vol.43, p.7–12
[Journal Article]


Relevant features for Gender Classification in NIR Periocular Images
I. Viedma and J. Tapia and A. Iturriaga and C. Busch
arXiv e-prints
[Journal Article]


Privacy-preserving PLDA Speaker Verification Using Outsourced Secure Computation
A. Treiber and A. Nautsch and J. Kolberg and T. Schneider and C. Busch
Speech Communication, Vol.114, p.60–71
[Journal Article]


Detection of Face Morphing Attacks based on PRNU Analysis
U. Scherhag and L. Debiasi and C. Rathgeb and C. Busch and A. Uhl
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


Face Recognition Systems under Morphing Attacks: A Survey
U. Scherhag and C. Rathgeb and J. Merkle and R. Breithaupt and C. Busch
IEEEAccess
[Journal Article]


Impact and Detection of Facial Beautification in Face Recognition: An Overview
C. Rathgeb and A. Dantcheva and C. Busch
IEEE Access, Vol.7, p.152667–152678
[Journal Article]


Obtaining Stable Iris Codes Exploiting Low-Rank Tensor Space and Spatial Structure Aware Refinement for Better Iris Recognition
K. Raja, R. Raghavendra and C. Busch
Proc. of the 12th IAPR Intl. Conf. on Biometrics (ICB)
[Conference Proceedings]


Preserving Privacy in Speaker and Speech Characterisation
A. Nautsch and A. Jiménez and A. Treiber and J. Kolberg and C. Jasserand and others
Computer Speech & Language, Vol.58, p.441–480
[Journal Article]


Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
H. Mandalapu and R. Raghavendra and C. Busch
Proc. of the 3rd Intl. Conf. on Biometric Engineering and Applications (ICBEA)
[Conference Proceedings]


Multi-algorithm Benchmark for Fingerprint Presentation Attack Detection with Laser Speckle Contrast Imaging
J. Kolberg and M. Gomez-Barrero and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5