Publications
Publications
Ubiquitous Multi-Occupant Detection in Smart Environments
Fährmann, Daniel; Boutros, Fadi; Kubon, Philipp; Kirchbuchner, Florian; Kuijper, Arjan; Damer, Naser
[Journal Article]
Short-term predictor for COVID-19 severity from a longitudinal multi-omics study for practical application in intensive care units
Kugler, Sabine; Hahnefeld, Lisa; Kloka, Jan Andreas; Ginzel, Sebastian; Nürenberg-Goloub, Elena; Zinn, Sebastian; Vehrenschild, Maria; Zacharowski, Kai; Lindau, Simone; Ulrich, Evelyn; Burmeister, Jan; Kohlhammer, Jörn; Schwäble, Joachim; Gurke, Robert; Dorochow, Erika; Bennett, Alexandre; Dauth, Stephanie; Campe, Julia; Knape, Tilo; Laux, Volker; Kannt, Aimo; Köhm, Michaela; Geisslinger, Gerd; Resch, Eduard; Behrens, Frank
[Journal Article]
Fairness in Face Presentation Attack Detection
Fang, Meiling; Yang, Wufei; Kuijper, Arjan; S̆truc, Vitomir; Damer, Naser
[Journal Article]
Migrating Monolithic Applications to Function as a Service
Würz, Hendrik Martin; Krämer, Michel; Kaster, Marvin; Kuijper, Arjan
[Journal Article]
Psychotechnik, human factors, engineering psychology, Technikpsychologie — 100 years of interdisciplinary cooperation between engineering and human sciences
Vogt, Joachim; Keil, Udo; Cornel, Christin; Gerber, Nina; Ferreira, Yvonne
Zeitschrift für Arbeitswissenschaft, p.1-6
[Journal Article]
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Bagia, Alexis; Tibouchi, Mehdi; Seifert, Jean-Pierre
[Journal Article]
Datenschutzvorsorge in der offensiven Cybersicherheitsforschung
Selzer, Annika; Spiecker gen. Döhmann, Indra; Boll, Alina
[Journal Article]
Current State of Digital Twins in the Maritime Sector
Lünsdorf, Kai Gerrit; Wrede, Helge; Schmidt, Felix; Bauer, Kristine; Lukas, Uwe Freiherr von
[Journal Article]
Resource Management for Programmable Metasurfaces: Concept, Prospects and Challenges
Liaskos, Christos; Katsalis, Kostas; Triay, Joan; Schmid, Stefan
[Journal Article]
Runtime Verification for Programmable Switches
Shukla, Apoorv; Hudemann, Kevin; Vági, Zsolt; Hügerich, Lily; Smaragdakis, Georgios; Hecker, Artur; Schmid, Stefan; Feldmann, Anja
[Journal Article]
Load-Optimization in Reconfigurable Networks: Algorithms and Complexity of Flow Routing
Dai, Wenkai; Foerster, Klaus-Tycho; Fuchssteiner, David; Schmidt, Stefan
[Journal Article]
Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach
Vitek, M.; Das, A.; Lucio, D.; Zanlorensi, L.; Menotti, D.; Khiarak, J.; Shahpar, M.; Asgari-Chenaghlu, M.; Jaryani, E.; Tapia., J.; Valenzuela, A.; Wang, C.; Wang, Y.; He, Z.; Sun, Z.; Boutros, F.; Damer, N.; Grebe, J.; Kuijper, A.; Raja, K.; Gupta, G.; Zampoukis, G.; Tsochatzidis, L.; Pratikakis, I.; Kumar, A.; Harish, B.; Pal, U.; Peer, P.; \vStruc, V.
IEEE Trans. on Information Forensics and Security, Vol.18, p.190-205
[Journal Article]
Considerations on the Evaluation of Biometric Quality Assessment Algorithms
Schlett, T.; Rathgeb, C.; Tapia, J.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]
On the Potential of Algorithm Fusion for Demographic Bias Mitigation in Face Recognition
Kolberg, J.; Schäfer, Y.; Rathgeb, C.; Busch, C.
IET Biometrics
[Journal Article]
Fairness von Biometrischen Systemen
Kolberg, J.
Datenschutz und Datensicherheit - DuD, Vol.47, p.15-21
[Journal Article]
Attacking Face Recognition With T-Shirts: Database, Vulnerability Assessment, and Detection
Ibsen, M.; Rathgeb, C.; Brechtel, F.; Klepp, R.; Pöppelmann, K.; George, A.; Marcel, S.; Busch, C.
IEEE Access, Vol.11, p.57867-57879
[Journal Article]
Toward Generalizable Facial Presentation Attack Detection Based on the Analysis of Facial Regions
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
IEEE Access, Vol.11, p.68512-68524
[Journal Article]
End-to-End Premature Ventricular Contraction Detection Using Deep Neural Networks
Kraft, Dimitri; Bieber, Gerald; Jokisch, Peter; Rumm, Peter
[Journal Article]
Künstliche Intelligenz als Instrument des Kinder- und Jugendmedienschutzes
Steinebach, Martin
[Journal Article]
Intermezzo. Welcher Technologie kann man vertrauen?
Schulmann, Haya; Waidner, Michael
[Journal Article]
Aktive Cyberabwehr
Schulmann, Haya; Waidner, Michael
[Journal Article]
Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Frieß, Jens; Schulmann, Haya; Waidner, Michael
International Conference on Emerging Networking EXperiments and Technologies 2023
[Journal Article]
Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht
Büscher, Maximilian; Hornung, Gerrit; Schindler, Stephan; Zurawski, Paul; Gutjahr, Amina; Spiecker gen. Döhmann, Indra; Selzer, Annika; Stummer, Sarah; Wilmer, Thomas
[Journal Article]
Zulässigkeit der Zweckänderung durch Auftragsverarbeiter
Boll, Alina; Gärtner, Tanya; Geissler, Ines; Stummer, Sarah
[Journal Article]
Biometric Recognition in 3D Medical Images: A Survey
Fu, Biying; Damer, Naser
[Journal Article]
Animal Behavior for Chicken Identification and Monitoring the Health Condition Using Computer Vision: A Systematic Review
Bhuiyan, Roman; Wree, Philipp
[Journal Article]
Superpolynomial quantum-classical separation for density modeling
Pirnay, Niklas; Sweke, Ryan; Eisert, Jens; Seifert, Jean-Pierre
[Journal Article]
Evaluating the applicability of hardware trust anchors for automotive applications
Plappert, Christian; Lorych, Dominik; Eckel, Michael; Jäger, Lukas; Fuchs, Andreas; Heddergott, Ronald
[Journal Article]
Therapy monitoring of psoriatic arthritis patients with and without skin involvement via objective evaluation of near infrared fluorescence optical imaging: A pilot study
Zerweck, Lukas; Wesarg, Stefan; Köhm, Michaela; Kohlhammer, Jörn
[Journal Article]
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)
Krachenfels, Thilo; Seifert, Jean-Pierre; Tajik, Shahin
[Journal Article]