Publications
Publications
Iterative Next Boundary Detection for Instance Segmentation of Tree Rings in Microscopy Images of Shrub Cross Sections
Gillert, Alexander; Resente, Giulia; Anadon-Rosell, Alba; Wilmking, Martin; Lukas, Uwe Freiherr von
Conference on Computer Vision and Pattern Recognition 2023
[Paper]
Deep Fake - Visuelle Manipulation medialer Inhalte
Steinebach, Martin
Tagung "Interkommunale Zusammenarbeit (IKZ) im Bereich der Cybersicherheit" 2022
[Conference Paper]
Greetings From the New EIC
Stork, Andre
Multi-Printer Learning Framework for Efficient Optical Printer Characterization
Chen, Danwu; Urban, Philipp
[Journal Article]
As good as human experts in detecting plant roots in minirhizotron images but efficient and reproducible: the convolutional neural network "RootDetector"
Peters, Bo; Blume-Werry, Gesche; Gillert, Alexander; Schwieger, Sarah; Lukas, Uwe Freiherr von; Kreyling, Jürgen
[Journal Article]
Tracking Growth and Decay of Plant Roots in Minirhizotron Images
Gillert, Alexander; Peters, Bo; Lukas, Uwe Freiherr von; Kreyling, Jürgen; Blume-Werry, Gesche
Winter Conference on Applications of Computer Vision 2023
[Conference Paper]
Pixel-Level Face Image Quality Assessment for Explainable Face Recognition
Terhörst, Philipp; Huber, Marco; Damer, Naser; Kirchbuchner, Florian; Raja, Kiran; Kuijper, Arjan
[Journal Article]
Wie gefährlich ist ChatGPT?
Vogel, Inna; Steinebach, Martin
Wenn aus Worten Bilder werden
Steinebach, Martin
[Journal Article]
Deepfakes Erstellen und Erkennen in Echtzeit
Steinebach, Martin
Hamburger Sicherheitsrechtstag 2022
[Conference Paper]
Detection of deepfakes using background-matching
Blümer, Stefanie; Steinebach, Martin; Frick, Raphael; Bunzel, Niklas
International Symposium on Electronic Imaging 2023
[Journal Article]
Predicting positions of flipped bits in robust image hashes
Hammann, Marius; Steinebach, Martin; Liu, Huajian; Bunzel, Niklas
International Symposium on Electronic Imaging 2023
[Journal Article]
Privacy preserving leak detection in peer-to-peer communication
Heeger, Julian; Bugert, Simon; Berchtold, Waldemar; Gruler, Alexander; Steinebach, Martin
International Symposium on Electronic Imaging 2023
[Journal Article]
Deepfakes, Dall-E & Co.
Frick, Raphael; Steinebach, Martin; Zmudzinski, Sascha
[Journal Article]
Audio captcha breaking and consequences for human users
Oberthür, Fabian; Steinebach, Martin; Battis, Verena
International Symposium on Electronic Imaging 2023
[Journal Article]
Integrity and authenticity verification of printed documents by smartphones
Bugert, Simon; Heeger, Julian; Berchtold, Waldemar
International Symposium on Electronic Imaging 2023
[Journal Article]
Erkennung von Kindesmissbrauch in Medien
Steinebach, Martin
[Journal Article]
Digital Twins, Damage Detection and Material Analysis
Weber, Peter-Karl; Santos, Pedro; Rentschler, Lisa; Fuchs, Theobald; Bauer, Maris; Friederich, Fabian; Jelen, Erich; Drezen, Erell Le; Rauch, Thomas; Jelito, Vanessa; Erdogmus, Cansel; Humanicka, Wiktoria
[Book Article]
Intra and Cross-spectrum Iris Presentation Attack Detection in the NIR and Visible Domains
Fang, Meiling; Boutros, Fadi; Damer, Naser
[Book Article]
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung
Riebe, Thea; Nordmann, Alfred; Reuter, Christian
Wissenschaft & Frieden, p.60-61
[Journal Article]
E-Sports Player Performance Metrics for Predicting the Outcome of League of Legends Matches Considering Player Roles
Bahrololloomi, Farnod; Klonowski, Fabio; Sauer, Sebastian; Horst, Robin; Dörner, Ralf
[Journal Article]
Transferring Dense Object Detection Models to Event-Based Data
Mechler, Vinzenz; Rojtberg, Pavel
International Conference on Artificial Intelligence and Virtual Reality 2022
[Conference Paper]
Comments on “Privacy-Enhanced Federated Learning Against Poisoning Adversaries”
Schneider, Thomas; Suresh, Ajith; Yalame, Hossein
IEEE Transactions on Information Forensics and Security, p.1407-1409
[Journal Article]
Verantwortungsbewusster Umgang mit IT-Sicherheitslücken: Problemlagen und Optimierungsoptionen für ein effizientes Zusammenwirken zwischen IT-Sicherheitsforschung und IT-Verantwortlichen
Wagner, Manuela; Vettermann, Oliver; Arzt, Steven; Brodowski, Dominik; Dickmann, Roman; Golla, Sebastian; Goerke, Niklas; Kreutzer, Michael; Leicht, Maximilian; Obermaier, Johannes; Schink, Marc; Schreiber, Linda; Sorge, Christoph
[Book]
Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden, p.46-48
[Journal Article]
Integrating GPU-Accelerated Tetrahedral Mesh Editing and Simulation
Ströter, Daniel; Halm, Andreas; Krispel, Ulrich; Mueller-Roemer, Johannes Sebastian; Fellner, Dieter
International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH) 2021
[Conference Paper]
Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André; Spielhofer, Thomas
Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, p.64-66
[Journal Article]
Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms
Fereidooni, Hossein; König, Jan; Rieger, Phillip; Chilese, Marco; Goekbakan, Bora; Finke, Moritz; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2023
[Conference Proceedings]
Coverage-Guided Fuzzing of Embedded Systems Leveraging Hardware Tracing
Beckmann, Maximilian; Steffan, Jan
European Symposium on Research in Computer Security 2022
[Conference Paper]