Publikationen

Publikationen

MADation: Face Morphing Attack Detection with Foundation Models
Loureiro Caldeira, Maria Eduarda; Ozgur, Guray; Chettaoui, Tahar; Ivanovska, Marija; Peer, Peter; Boutros, Fadi; Struc, Vitomir; Damer, Naser
Winter Conference on Applications of Computer Vision 2025
[Conference Paper]


FoundPAD: Foundation Models Reloaded for Face Presentation Attack Detection
Ozgur, Guray; Loureiro Caldeira, Maria Eduarda; Chettaoui, Tahar; Boutros, Fadi; Ramachandra, Raghavendra; Damer, Naser
Winter Conference on Applications of Computer Vision 2025
[Conference Paper]


FX-MAD: Frequency-Domain Explainability and Explainability-Driven Unsupervised Detection of Face Morphing Attacks
Huber, Marco; Neto, Pedro C.; Sequeira, Ana F.; Damer, Naser
Winter Conference on Applications of Computer Vision 2025
[Conference Paper]


Resource‐Efficient Anomaly Detection in Industrial Control Systems with Quantized Recurrent Variational Autoencoder
Fährmann, Daniel; Ihlefeld, Malte; Kuijper, Arjan; Damer, Naser
[Journal Article]


Beyond Spatial Explanations: Explainable Face Recognition in the Frequency Domain
Huber, Marco; Damer, Naser
Winter Conference on Applications of Computer Vision 2025
[Conference Paper]


Durchführung der ersten Datenschutz-Vorsorge
Boll, Alina; Geissler, Ines
[Paper]


Revisiting Permission Piggybacking of Third-Party Libraries in Android Apps
Heid, Kris; Sonntag, Elena Julia; Heider, Jens
International Conference on Information Systems Security and Privacy 2025
[Conference Paper]


SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning
Rieger, Phillip; Pegoraro, Alessandro; Kumari, Kavita; Abera, Tigist; Knauer, Jonathan; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2025
[Conference Proceedings]


Second FRCSyn-onGoing: Winning Solutions and Post-challenge Analysis to Improve Face Recognition with Synthetic Data
DeAndres-Tame, Ivan; Tolosana, Ruben; Melzi, Pietro; Vera-Rodriguez, Ruben; Kim, Minchul; Rathgeb, Christian; Liu, Xiaoming; Gomez, Luis F.; Morales, Aythami; Fierrez, Julian; Ortega-Garcia, Javier; Zhong, Zhizhou; Huang, Yuge; Mi, Yuxi; Ding, Shouhong; Zhou, Shuigeng; He, Shuai; Fu, Lingzhi; Cong, Heng; Zhang, Rongyu; Xiao, Zhihong; Smirnov, Evgeny; Pimenov, Anton; Grigorev, Aleksei; Timoshenko, Denis; Mesfin Asfaw, Kaleb; Yaw Low, Cheng; Liu, Hao; Wang, Chuyi; Zuo, Qing; He, Zhixiang; Otroshi Shahreza, Hatef; George, Anjith; Unnervik, Alexander; Rahimi, Parsa; Marcel, Sébastien; Neto, Pedro C.; Cardoso, Jaime S.; Kolf, Jan Niklas; Damer, Naser; Boutros, Fadi; Huber, Marco; Sequeira, Ana F.; Atzori, Andrea; Fenu, Gianni; Marras, Mirko; Yu, Jiang; Štruc, Vitomir; Li, Zhangjie; Li, Jichun; Zhao, Weisong; Lei, Zhen; Zhu, Xiangyu; Zhang, Xiao-Yu; Biesseck, Bernardo; Vidal, Pedro; Coelho, Luiz; Granada, Roger; Menotti, David
[Journal Article]


VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis
Kumari, Kavita; Abbasihafshejani, Maryam; Pegoraro, Alessandro; Rieger, Phillip; Arshi, Kamyar; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium
[Conference Proceedings]


Ent­wicklungen von KI und Desinformation - Erhöhte Vorsicht auf sozialen Medien!
Wittpah, Volker; Steinebach, Martin; Ibisch, Andrea; Kreft, David; Schild, Fabian; Neufert, Caroline


SGX-PrivInfer: A Secure Collaborative System for Quantifying and Mitigating Attribute Inference Risks in Social Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Information Systems Security and Privacy 2025
[Conference Paper]


FRoundation: Are Foundation Models Ready for Face Recognition?
Chettaoui, Tahar; Damer, Naser; Boutros, Fadi
[Journal Article]


Hash & Adjust: Competitive Demand-Aware Consistent Hashing
Pourdamghani, Arash; Avin, Chen; Sama, Robert; Shiran, Maryam; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]


Efficient Algorithms for Demand-Aware Networks and a Connection to Virtual Network Embedding
Figiel, Aleksander; Korhonen, Janne H.; Olver, Neil; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]


Erkennung von Desinformationen
Steinebach, Martin
[Journal Article]


Fraunhofer SIT at GenAI Detection Task 1: Adapter Fusion for AI-generated Text Detection
Schäfer, Karla; Steinebach, Martin
Workshop on GenAI Content Detection 2025
[Conference Paper]


KVC-onGoing: Keystroke Verification Challenge
Stragapede, Giuseppe; Vera-Rodriguez, Ruben; Tolosana, Ruben; Morales, Aythami; DeAndres-Tame, Ivan; Damer, Naser; Fierrez, Julian; Ortega-Garcia, Javier; Acien, Alejandro; Gonzalez, Nahuel; Shadrikov, Andrei; Gordin, Dmitrii; Schmitt, Leon; Wimmer, Daniel; Großmann, Christoph; Krieger, Joerdis; Heinz, Florian; Krestel, Ron; Mayer, Christoffer; Haberl, Simon; Gschrey, Helena; Yamagishi, Yosuke; Wickramanayake, Sandareka; Saha, Sanjay; Rasnayaka, Sanka; Gutfeter, Weronika; Sim, Terence; Baran, Adam; Krzysztoń, Mateusz; Jaskóła, Przemysław
[Journal Article]


Comparative Analysis of Voice Conversion in German
Schäfer, Karla; Choi, Jeong-Eun; Steinebach, Martin
International Conference on Pattern Recognition 2024
[Conference Paper]


Model compression techniques in biometrics applications: A survey
Caldeira, Eduarda; Neto, Pedro C.; Huber, Marco; Damer, Naser; Sequeira, Ana F.
[Journal Article]


AdaDistill: Adaptive Knowledge Distillation for Deep Face Recognition
Boutros, Fadi; Štruc, Vitomir; Damer, Naser
European Conference on Computer Vision 2024
[Conference Paper]


UAV-based person re-identification: A survey of UAV datasets, approaches, and challenges
Albaluchi, Yousaf; Fu, Biying; Ramachandra, Raghavendra; Damer, Naser; Raja, Kiran
[Journal Article]


Generative AI in the context of assistive technologies: Trends, limitations and future directions
Fu, Biying; Hadid, Abdenour; Damer, Naser
[Journal Article]


RPKI: Not Perfect But Good Enough
Haya Schulmann and Niklas Vogel and Michael Waidner
CoRR, Vol.abs/2409.14518
[Journal Article]


Attacking with Something That Does Not Exist: ’Proof of Non-Existence’ Can Exhaust DNS Resolver CPU
Olivia Gruza and Elias Heftrig and Oliver Jacobsen and Haya Schulmann and Niklas Vogel and Michael Waidner
18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), p.45–57
[Conference Proceedings]


Insights into SAV Implementations in the Internet
Haya Schulmann and Shujie Zhao
Passive and Active Measurement, p.69–87
[Conference Proceedings]


Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Jens Frieß and Tobias Gattermayer and Nethanel Gelernter and Haya Schulmann and Michael Waidner
21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), p.1977–1994
[Conference Proceedings]


The CURE to Vulnerabilities in RPKI Validation
Donika Mirdita and Haya Schulmann and Niklas Vogel and Michael Waidner
31st Annual Network and Distributed System Security Symposium
[Conference Proceedings]


Crowdsourced Distributed Domain Validation
Jens Frieß and Haya Schulmann and Michael Waidner
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, p.318–325
[Conference Proceedings]


Poster: From Fort to Foe: The Threat of RCE in RPKI
Oliver Jacobsen and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.5015–5017
[Conference Proceedings]