Publications
Publications
Plastic Surgery: An Obstacle for Deep Face Recognition?
Rathgeb, C.; Dogan, D.; Stockhardt, F.; De Marsico, M.; Busch, C.
Proc. 15th IEEE Computer Society Workshop on Biometrics (CVPRW), p.806-807
[Conference Proceedings]
Vulnerability Assessment and Detection of Makeup Presentation Attacks
Rathgeb, C.; Drozdowski, P.; Fischer, D.; Busch, C.
Proc. Int. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]
Touchless Fingerprint Sample Quality: Prerequisites for the Applicability of NFIQ2.0
Priesnitz, J.; Rathgeb, C.; Buchmann, N.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]
Simulation of Print-Scan Transformations for Face Images based on Conditional Adversarial Networks
Mitkovski, A.; Merkle, J.; Rathgeb, C.; Tams, B.; Bernardo, K.; Haryanto, N. E.; Busch, C.
Proc. of 2020 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-8
[Conference Proceedings]
Efficiency Analysis of Post-quantum-secure Face Template Protection Schemes based on Homomorphic Encryption
Kolberg, J.; Drozdowski, P.; Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]
Fisher Vector Encoding of Dense-BSIF Features for Unknown Face Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG 2020), p.1-11
[Conference Proceedings]
Can Generative Colourisation Help Face Recognition?
Drozdowski, P.; Fischer, D.; Rathgeb, C.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.299-307
[Conference Proceedings]
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
Bauspieß, P.; Kolberg, J.; Demmler, D.; Krämer, J.; Busch, C.
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Conference Proceedings]
API Usability of Stateful Signature Schemes
Zeier, A.; Wiesmaier, A.; Heinemann, A.
The 14th International Workshop on Security (IWSEC), LNCS 11689, p.1-20
[Conference Proceedings]
Analysis of QoE for Adaptive Video Streaming over Wireless Networks with User Abandonment Behavior
El-Azouzi, R.; Acharya, K.; Poojary, S.; Sunny, A.; Haddad, M.; Altman, E.; Tsilimantos, D.; Valentin, S.
CONF_WCNC
[Conference Proceedings]
Dynamic DASH Aware Scheduling in Cellular Networks
El-Azouzi, R.; Sunny, A.; Zhao, L.; Altman, E.; Tsilimantos, D.; de Pellegrini, F.; Valentin, S.
CONF_WCNC
[Conference Proceedings]
From Click to Playback: A Dataset to Study the Response Time of Mobile YouTube
Loh, F.; Wamser, F.; Moldovan, C.; Zeidler, B.; Hoßfeld, T.; Tsilimantos, D.; Valentin, S.
CONF_MMSYS_WS
[Conference Proceedings]
Is the Uplink Enough? Estimating Video Stalls from Encrypted Network Traffic
Loh, F.; Wamser, F.; Moldovan, C.; Zeidler, B.; Hoßfeld, T.; Tsilimantos, D.; Valentin, S.
CONF_NOMS
[Conference Proceedings]
Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Bienhaus, Diethelm; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, St. Petersburg, Russia, 7-9 October, 2019., p.521-528
[Conference Proceedings]
Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software
Huesmann, Rolf; Zeier, Alexander; Heinemann, Andreas
Mensch & Computer Workshopband
[Conference Proceedings]
API Usability of Stateful Signature Schemes
Zeier, Alexander; Wiesmaier, Alexander; Heinemann, Andreas
IWSEC, p.221-240
[Conference Proceedings]
Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation
Erbenich, Vivian Ives Philipp; Träder, Daniel; Heinemann, Andreas; Nural, Meltem
HAISA, p.179-188
[Conference Proceedings]
Obtaining Stable Iris Codes Exploiting Low-Rank Tensor Space and Spatial Structure Aware Refinement for Better Iris Recognition
K. Raja, R. Raghavendra; Busch, C.
Proc. of the 12th IAPR Intl. Conf. on Biometrics (ICB)
[Conference Proceedings]
Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
Mandalapu, H.; Raghavendra, R.; Busch, C.
Proc. of the 3rd Intl. Conf. on Biometric Engineering and Applications (ICBEA)
[Conference Proceedings]
On the Impact of Different Fabrication Materials on Fingerprint Presentation Attack Detection
González-Soler, L. J.; Gomez-Barrero, M.; Chang, L.; Perez-Suarez, A.; Busch, C.
Proc. Int. Conf. on Biometrics (ICB)
[Conference Proceedings]
Multi-Modal Fingerprint Presentation Attack Detection: Looking at the Surface and the Inside
Gomez-Barrero, M.; Kolberg, J.; Busch, C.
Proc. Int. Conf. on Biometrics (ICB), p.1-8
[Conference Proceedings]
Multi-Spectral Convolutional Neural Networks for Biometric Presentation Attack Detection
Gomez-Barrero, M.; Busch, C.
Proc. of the Norwegian Information Security Conf. (NISC)
[Conference Proceedings]
Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing
Drozdowski, P.; Rathgeb, C.; Busch, C.
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), p.1-5
[Conference Proceedings]
On the Application of Homomorphic Encryption to Face Identification
Drozdowski, P.; Buchmann, N.; Rathgeb, C.; Margraf, M.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-8
[Conference Proceedings]
On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
Debiasi, L.; Damer, N.; Moseguí-Saladié, A.; Rathgeb, C.; Scherhag, U.; Busch, C.; Kirchbuchner, F.; Uhl, A.
Image Analysis and Processing (ICIAP), p.345-356
[Conference Proceedings]
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems
Birkholz, Henk; Krauß, Christoph; Zhdanova, Maria; Kuzhiyelil, Don; Arul, Tolga; Heinrich, Markus; Katzenbeisser, Stefan; Suri, Neeraj; Vateva-Gurova, Tsvetoslava; Schlehuber, Christian
4th International Workshop on MILS: Architecture and Assurance for Secure Systems, (MILS@DSN 2018)
[Conference Proceedings]
Anonymous Charging and Billing of Electric Vehicles
Zelle, Daniel; Springer, Markus; Zhdanova, Maria; Krauß, Christoph
Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES, p.1-22
[Conference Proceedings]
The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation
Walter, Jonas; Abendroth, Bettina; Von Pape, Thilo; Plappert, Christian; Zelle, Daniel; Krauß, Christoph; Gagzow, Gundula; Decke, Hendrik
Proceedings of the 13th International Conference on Availability, Reliability and Security ARES, p.1-24
[Conference Proceedings]
Open Source Value Chains for Addressing Security Issues Efficiently
Weber, Arnd; Reith, Steffen; Kuhlmann, Dirk; Kasper, Michael; Seifert, Jean-Pierre; Krauß, Christoph
2018 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion, p.599-606
[Conference Proceedings]
Auf dem Weg zu sicheren abgeleiteten Identitäten mit Payment Service Directive 2
Träder, Daniel; Zeier, Alexander; Heinemann, Andreas
Sicherheit, p.183-196
[Conference Proceedings]