Publikationen

Publikationen

SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning
Rieger, Phillip; Pegoraro, Alessandro; Kumari, Kavita; Abera, Tigist; Knauer, Jonathan; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2025
[Conference Proceedings]


Second FRCSyn-onGoing: Winning Solutions and Post-challenge Analysis to Improve Face Recognition with Synthetic Data
DeAndres-Tame, Ivan; Tolosana, Ruben; Melzi, Pietro; Vera-Rodriguez, Ruben; Kim, Minchul; Rathgeb, Christian; Liu, Xiaoming; Gomez, Luis F.; Morales, Aythami; Fierrez, Julian; Ortega-Garcia, Javier; Zhong, Zhizhou; Huang, Yuge; Mi, Yuxi; Ding, Shouhong; Zhou, Shuigeng; He, Shuai; Fu, Lingzhi; Cong, Heng; Zhang, Rongyu; Xiao, Zhihong; Smirnov, Evgeny; Pimenov, Anton; Grigorev, Aleksei; Timoshenko, Denis; Mesfin Asfaw, Kaleb; Yaw Low, Cheng; Liu, Hao; Wang, Chuyi; Zuo, Qing; He, Zhixiang; Otroshi Shahreza, Hatef; George, Anjith; Unnervik, Alexander; Rahimi, Parsa; Marcel, Sébastien; Neto, Pedro C.; Cardoso, Jaime S.; Kolf, Jan Niklas; Damer, Naser; Boutros, Fadi; Huber, Marco; Sequeira, Ana F.; Atzori, Andrea; Fenu, Gianni; Marras, Mirko; Yu, Jiang; Štruc, Vitomir; Li, Zhangjie; Li, Jichun; Zhao, Weisong; Lei, Zhen; Zhu, Xiangyu; Zhang, Xiao-Yu; Biesseck, Bernardo; Vidal, Pedro; Coelho, Luiz; Granada, Roger; Menotti, David
[Journal Article]


VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis
Kumari, Kavita; Abbasihafshejani, Maryam; Pegoraro, Alessandro; Rieger, Phillip; Arshi, Kamyar; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium
[Conference Proceedings]


Ent­wicklungen von KI und Desinformation - Erhöhte Vorsicht auf sozialen Medien!
Wittpah, Volker; Steinebach, Martin; Ibisch, Andrea; Kreft, David; Schild, Fabian; Neufert, Caroline


SGX-PrivInfer: A Secure Collaborative System for Quantifying and Mitigating Attribute Inference Risks in Social Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Information Systems Security and Privacy 2025
[Conference Paper]


FRoundation: Are Foundation Models Ready for Face Recognition?
Chettaoui, Tahar; Damer, Naser; Boutros, Fadi
[Journal Article]


Hash & Adjust: Competitive Demand-Aware Consistent Hashing
Pourdamghani, Arash; Avin, Chen; Sama, Robert; Shiran, Maryam; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]


Efficient Algorithms for Demand-Aware Networks and a Connection to Virtual Network Embedding
Figiel, Aleksander; Korhonen, Janne H.; Olver, Neil; Schmid, Stefan
International Conference on Principles of Distributed Systems 2024
[Conference Paper]


Erkennung von Desinformationen
Steinebach, Martin
[Journal Article]


Fraunhofer SIT at GenAI Detection Task 1: Adapter Fusion for AI-generated Text Detection
Schäfer, Karla; Steinebach, Martin
Workshop on GenAI Content Detection 2025
[Conference Paper]


KVC-onGoing: Keystroke Verification Challenge
Stragapede, Giuseppe; Vera-Rodriguez, Ruben; Tolosana, Ruben; Morales, Aythami; DeAndres-Tame, Ivan; Damer, Naser; Fierrez, Julian; Ortega-Garcia, Javier; Acien, Alejandro; Gonzalez, Nahuel; Shadrikov, Andrei; Gordin, Dmitrii; Schmitt, Leon; Wimmer, Daniel; Großmann, Christoph; Krieger, Joerdis; Heinz, Florian; Krestel, Ron; Mayer, Christoffer; Haberl, Simon; Gschrey, Helena; Yamagishi, Yosuke; Wickramanayake, Sandareka; Saha, Sanjay; Rasnayaka, Sanka; Gutfeter, Weronika; Sim, Terence; Baran, Adam; Krzysztoń, Mateusz; Jaskóła, Przemysław
[Journal Article]


Comparative Analysis of Voice Conversion in German
Schäfer, Karla; Choi, Jeong-Eun; Steinebach, Martin
International Conference on Pattern Recognition 2024
[Conference Paper]


Model compression techniques in biometrics applications: A survey
Caldeira, Eduarda; Neto, Pedro C.; Huber, Marco; Damer, Naser; Sequeira, Ana F.
[Journal Article]


AdaDistill: Adaptive Knowledge Distillation for Deep Face Recognition
Boutros, Fadi; Štruc, Vitomir; Damer, Naser
European Conference on Computer Vision 2024
[Conference Paper]


UAV-based person re-identification: A survey of UAV datasets, approaches, and challenges
Albaluchi, Yousaf; Fu, Biying; Ramachandra, Raghavendra; Damer, Naser; Raja, Kiran
[Journal Article]


Generative AI in the context of assistive technologies: Trends, limitations and future directions
Fu, Biying; Hadid, Abdenour; Damer, Naser
[Journal Article]


Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine interdisziplinäre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den Geschlechtseintrag
Seyda, Linda; Brüggemann, Andreas; Hornung, Gerrit; Schneider, Thomas
INFORMATIK 2024, Workshop Recht und Technik: Datenschutz im Diskurs (RuT'24), p.153-167
[Journal Article]


Fuzzerfly Effect: Hardware Fuzzing for Memory Safety
Rostami, Mohamadreza; Chen, Chen; Kande, Rahul; Li, Huimin; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
IEEE Security & Privacy, p.76-86
[Journal Article]


Defying the Odds: Solana’s Unexpected Resilience in Spite of the Security Challenges Faced by Developers
Andreina, Sebastien; Cloosters, Tobias; Davi, Lucas; Giesen, Jens-Rene; Gutfleisch, Marco; Karame, Ghassan; Naiakshina, Alena; Naji, Houda
Proc. of the 31th ACM SIGSAC Conference on Computer & Communications Security (CCS)
[Conference Proceedings]


Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
Rostami, Mohamadreza; Chilese, Marco; Zeitouni, Shaza; Kande, Rahul; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), p.1-6
[Conference Proceedings]


WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors
Borkar, Pallavi; Chen, Chen; Rostami, Mohamadreza; Singh, Nikhilesh; Kande, Rahul; Sadeghi, Ahmad-Reza; Rebeiro, Chester; Rajendran, Jeyavijayan
33rd USENIX Security Symposium (USENIX Security 24), p.5377-5394
[Conference Proceedings]


Broadcast and Consensus in Stochastic Dynamic Networks with Byzantine Nodes and Adversarial Edges
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
International Symposium on Distributed Computing 2024
[Conference Paper]


Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection
Rostami, Mohamadreza; Zeitouni, Shaza; Kande, Rahul; Chen, Chen; Mahmoody, Pouya; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
Proceedings of the 61st ACM/IEEE Design Automation Conference
[Conference Proceedings]


Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]


Reliability Assurance in RIS-Assisted 6G Campus Networks
Tohidi, Ehsan; Franke, Max; Phung, Cao Vien; Khan, Naveed; Drummond, André; Schmid, Stefan; Jukan, Admela; Stanczak, Slawomir
International Conference on the Design of Reliable Communication Networks 2024
[Conference Paper]


RIS as a Network Resource: User Multiplexing and Pricing Algorithms
Papadopoulos, Alexandros; Lalas, Antonios; Votis, Konstantinos; Schmid, Stefan; Katsalis, Kostas; Liaskos, Christos
International Conference on 6G Networking 2024
[Conference Paper]


Baiji: Domain Planning for CDNs under the 95th Percentile Billing Model
Vanerio, Juan; Liu, Huiran; Zhang, Qi; Schmid, Stefan
Networking Conference 2024
[Conference Paper]


L3: Latency-aware Load Balancing in Multi-Cluster Service Mesh
Michaelis, Olivier; Schmid, Stefan; Mostafaei, Habib
International Middleware Conference 2024
[Conference Paper]


HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme
Sayari, Oussama; Marzougui, Soundes; Aulbach, Thomas; Krämer, Juliane; Seifert, Jean-Pierre
International Workshop on Constructive Side-Channel Analysis and Secure Design 2024
[Conference Paper]


MAYo or MAY-not: Exploring Implementation Security of the Post-Quantum Signature Scheme MAYO Against Physical Attacks
Aulbach, Thomas; Marzougui, Soundes; Seifert, Jean-Pierre; Ulitzsch, Vincent Quentin
Workshop on Fault Detection and Tolerance in Cryptography 2024
[Conference Paper]