Publications

Publications

BayBFed: Bayesian Backdoor Defense for Federated Learning
Kumari, Kavita; Rieger, Phillip; Fereidooni, Hossein; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Proceedings: 44th IEEE Symposium on Security and Privacy - SP 2023, p.747-764
[Conference Proceedings]


Unsupervised Face Recognition using Unlabeled Synthetic Data
Boutros, Fadi; Klemt, Marcel; Fang, Meiling; Kuijper, Arjan; Damer, Naser
International Conference on Automatic Face and Gesture Recognition 2023
[Conference Paper]


Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit
Schmidbauer-Wolf, Gina Maria; Herbert, Franziska; Reuter, Christian
Mensch und Computer 2019 - Workshopband, p.256-264
[Conference Proceedings]


Wertekonflikte in der Nutzung sozialer Medien zur Vernetzung ungebundener HelferInnen in Krisensituationen – Ein Value-Sensitive Design Ansatz
Riebe, Thea; Langer, Amanda; Kaufhold, Marc-André; Kretschmer, Nina Katharina; Reuter, Christian
Mensch und Computer 2019 - Workshopband, p.308-318
[Conference Proceedings]


6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten
Reuter, Christian; Mentler, Tilo; Nestler, Simon; Herczeg, Michael; Ludwig, Thomas; Pottebaum, Jens; Kaufhold, Marc-André
Mensch und Computer 2019 - Workshopband, p.278-280
[Conference Proceedings]


Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, p.119-124
[Conference Proceedings]


QMagFace: Simple and Accurate Quality-Aware Face Recognition
Terhörst, Philipp; Ihlefeld, Malte; Huber, Marco; Damer, Naser; Kirchbuchner, Florian; Raja, Kiran; Kuijper, Arjan
Winter Conference on Applications of Computer Vision 2023
[Conference Paper]


Automated Cone and Vessel Analysis in Adaptive Optics Like Retinal Images for Clinical Diagnostics Support
Hertlein, Anna-Sophia; Wesarg, Stefan; Jessica Schmidt; Boche, Benjamin; Pfeiffer, Norbert; Matlach, Juliane
International Workshop on Clinical Image-Based Procedures 2022
[Conference Paper]


Machine Learning Based Approach for Motion Detection and Estimation in Routinely Acquired Low Resolution Near Infrared Fluorescence Optical Imaging
Zerweck, Lukas; Wesarg, Stefan; Kohlhammer, Jörn; Köhm, Michaela
International Workshop on Clinical Image-Based Procedures 2022
[Conference Paper]


Clinical Image-Based Procedures. 11th Workshop, CLIP 2022. Proceedings
International Workshop on Clinical Image-Based Procedures 2022
[Conference Proceeding]


Association of Phantomless Dual-Energy CT-based Volumetric Bone Mineral Density with the Prevalence of Acute Insufficiency Fractures of the Spine
Gruenewald, Leon D.; Koch, Vitali; Yel, İbrahim; Eichler, Katrin; Gruber-Rouh, Tatjana; Alizadeh, Leona S.; Mahmoudi, Scherwin; D'Angelo, Tommaso; Wichmann, Julian L.; Wesarg, Stefan; Vogl, Thomas J.; Booz, Christian
[Journal Article]


A survey on computer vision based human analysis in the COVID-19 era
Eyi̇okur , Fevzi̇ye İrem; Kantarcı, Alperen; Erakın, Mustafa Ekrem; Damer, Naser; Ofli, Ferda; Imran, Muhammad; Križaj, Janez; Ali Salah, Albert; Waibel, Alexander; Štruc, Vitomir; Ekenel, Hazım Kemal
[Journal Article]


COMPO*SED: Composite Parallel Coordinates for Co-Dependent Multi-Attribute Choices
Cibulski, Lena; May, Thorsten; Johanna Schmidt; Kohlhammer, Jörn
[Journal Article]


Perceptually Optimizing Color Look-up Tables
Reinhard, Johann; Urban, Philipp
[Journal Article]


Measuring the Uptaking of Digital Health Platforms on AAL/AHA Domain
Juiz, Carlos; Bermejo, Belen; Nikolov, Alexander; Rus, Silvia; Carboni, Andrea; Russo, Dario; Moroni, Davide; Karanastasis, Efstathios; Andronikou, Vassiliki; Lievens, Frederic; Berlo, Ad van; Staalduinen, Willeke van; Samuelsson, Christina; Cabrera-Umpierrez, Maria Fernanda
International Congress on Information and Communication Technology 2022
[Conference Paper]


Ein Vorschlag für die datenschutzkonforme Gestaltung von Datenschutz-Grundsätzen und -Schutz­maß­nahmen in IT-Systemen
Selzer, Annika; Timm, Ingo J.
[Journal Article]


XDRI Attacks - and - How to Enhance Resilience of Residential Routers
Philipp Jeitner and Haya Schulmann and Lucas Teichmann and Michael Waidner
31st USENIX Security Symposium (USENIX Security 22), p.4473–4490
[Conference Proceedings]


Stalloris: RPKI Downgrade Attack
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
31st USENIX Security Symposium (USENIX Security 22), p.4455–4471
[Conference Proceedings]


Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Tomas Hlavacek and Haya Schulmann and Michael Waidner
Computer Security – ESORICS 2022, p.509–530
[Conference Proceedings]


How (Not) to Deploy Cryptography on the Internet
Haya Schulmann
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, p.1
[Conference Proceedings]


Poster: DNS in Routers Considered Harmful
Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3471–3473
[Conference Proceedings]


Poster: Insights into Global Deployment of RPKI Validation
Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3467–3469
[Conference Proceedings]


Poster: RPKI Kill Switch
Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3423–3425
[Conference Proceedings]


Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Elias Heftrig and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3363–3365
[Conference Proceedings]


Behind the Scenes of RPKI
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.1413–1426
[Conference Proceedings]


Special issue ESORICS 2021
Elisa Bertino and Haya Schulmann and Michael Waidner
Journal of Computer Security, Vol.30, p.753–755
[Journal Article]


crypto_lib: Comparing and Selecting Cryptography Libraries
J. Wohlwender and R. Huesmann and A. Heinemann and A. Wiesmaier
European Interdisciplinary Cyber­security Conference (EICC'22), p.6 – 11
[Conference Proceedings]


Efficient Practical Byzantine Consensus Using Random Linear Network Coding
M. Braun and A. Wiesmaier and N. Alnahawi
Springer Annals of Telecommunications (Journal), Vol.78, p.33–51
[Journal Article]


Sussex-Huawei Locomotion and Transportation Dataset
Hristijan Gjoreski and Mathias Ciliberto and Lin Wang and Francisco Javier Ordóñez Morales and Sami Mekki and Stefan Valentin and Daniel Roggen


ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Daniel Zelle and Christian Plappert and Roland Rieke and Dirk Scheuermann and Christoph Krauß
Microprocessors and Microsystems, Vol.90, p.104461
[Journal Article]