Publikationen

Publikationen

NIR Iris Challenge Evaluation in Non-cooperative Environments: Segmentation and Localization
Wang, C.; Tapia, J.
Proc. of the 2021 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Image Quality Assessment on Identity Documents
Yanez, C.; Tapia, J.
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]


Morphing Attack Detection: A Fusion Approach
Lorenz, S.; Scherhag, U.; Rathgeb, C.; Busch, C.
2021 IEEE 24th Intl. Conf. on Information Fusion (FUSION), p.703-709
[Conference Proceedings]


On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
Kolberg, J.; Gläsner, D.; Breithaupt, R.; Gomez-Barrero, M.; Reinhold, J.; von Twickel, A.; Busch, C.
Sensors, Vol.21
[Journal Article]


Differential Anomaly Detection for Facial Images
Ibsen, M.; Gonzalez-Soler, L. J.; Rathgeb, C.; Drozdowski, P.; Gomez-Barrero, M.; Busch, C.
IEEE Intl. Workshop on Information Forensics and Security (WIFS), p.1-6
[Conference Proceedings]


Generation of Non-Deterministic Synthetic Face Datasets Guided by Identity Priors
Grimmer, M.; Zhang, H.; Raghavendra, R.; Raja, K.; Busch, C.
https://www.ntnu.edu/nikt2021
[Journal Article]


Deep Face Age Progression: A Survey
Grimmer, M.; Raghavendra, R.; Busch, C.
IEEE Access, Vol.9, p.83376-83393
[Journal Article]


Analysing the feasibility of using Objectosphere for Face Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Günther, M.; Busch, C.
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]


Multi-Spectral Short Wave Infrared Sensors and Convolutional Neural Networks for Biometric Presentation Attack Detection
Gomez-Barrero, M.; Tolosana, R.; Kolberg, J.; Busch, C.
AI and Deep Learning in Biometric Security: Trends, Potential and Challenges, p.105-132


The Watchlist Imbalance Effect in Biometric Face Identification: Comparing Theoretical Estimates and Empiric Measurements
Drozdowski, P.; Rathgeb, C.; Busch, C.
Intl. Conf. on Computer Vision Workshops (ICCVW), p.1-9
[Conference Proceedings]


Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition with Privacy Protection
Drozdowski, P.; Stockhardt, F.; Rathgeb, C.; Osorio-Roig, D.; Busch, C.
IEEE Access, Vol.9, p.139361-139378
[Journal Article]


A response to the European Data Protection Supervisor Misunderstandings in Biometrics by the European Association for Biometrics
Busch, C.; Czajka, A.; Deravi, F.; Drozdowski, P.; Gomez-Barrero, M.; Hasse, G.; Henniger, O.; Kindt, E.; Kolberg, J.; Nouak, A.; Raja, K.; Raghavendra, R.; Rathgeb, C.; Salomon, J.; Veldhuis, R.
IET Biometrics, Vol.11, p.79-86
[Journal Article]


SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities
Zeitouni, Shaza; Dessouky, Ghada; Sadeghi, Ahmad-Reza
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021)
[Conference Proceedings]


EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
Rodler, Michael; Li, Wenting; Karame, Ghassan O.; Davi, Lucas
30th USENIX Security Symposium
[Conference Proceedings]


SoK: Efficient Privacy-preserving Clustering
Hedge, Aditya; Möllering, Helen; Schneider, Thomas; Yalame, Mohammad Hossein
21st Privacy Enhancing Technologies Symposium (PETS 2021)
[Conference Proceedings]


FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants
Chen, Yanjiao; Bai, Yijie; Wang, Kaibo; Mitev, Richard; Xu, Wenyuan; Sadeghi, Ahmad-Reza
ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


CURE: A Security Architecture with CUstomizable and Resilient Enclaves
Bahmani, Raad; Brasser, Ferdinand; Dessouky, Ghada; Jauernig, Patrick; Klimmek, Matthias; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
30th USENIX Security Symposium (USENIX Security'21)
[Conference Proceedings]


BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Alkeilani Alkadri, Nabil; Harasser, Patrick; Janson, Christian
20th International Conference on Cryptology and Network Security (CANS 2021)
[Conference Proceedings]


The Cost of Path Information: Routing in Anonymous Communication
Grube, Tim; Egert, Rolf; Daubert, Jörg; Mühlhäuser, Max
Consumer Communications & Networking Conference (CCNC 2021)
[Conference Proceedings]


SAFELearn: Secure Aggregation for private FEderated Learning
Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Möllering, Helen; Nguyen, Thien Duc; Rieger, Phillip; Sadeghi, Ahmad-Reza; Schneider, Thomas; Yalame, Mohammad Hossein; Zeitouni, Shaza
4th Deep Learning and Security Workshop (DLS'21)
[Conference Proceedings]


Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
Demmler, Daniel; Katzenbeisser, Stefan; Schneider, Thomas; Schuster, Tom; Weinert, Christian
18th International Conference on Security and Cryptography (SECRYPT'21)
[Conference Proceedings]


Who are Vulnerability Reporters? A Large-scale Empirical Study on FLOSS
Alexopoulos, Nikolaos; Meneely, Andy; Arnouts, Dorian; Mühlhäuser, Max
ESEM '21: Proceedings of the 15th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
[Conference Proceedings]


DIY-PressMat: A Smart Sensor Mat for Posture Detection Applicable for Bed-exit Intention Detection, Pressure Ulcer Prevention, and Sleep Apnea Mitigation
Matthies, Denys J.C.; Haescher, Marian; Chodan, Wencke; Bieber, Gerald
International Conference on PErvasive Technologies Related to Assistive Environments (PETRA) 2021
[Conference Paper]


Prototyping Smart Eyewear with Capacitive Sensing for Facial and Head Gesture Detection
Matthies, Denys J.C.; Woodall, Alex; Urban, Bodo
International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp) 2021
[Conference Paper]


Mask, Train, Repeat! Artificial Intelligence for Quantitative Wood Anatomy
Resente, G.; Gillert, A.; Trouillier, M.; Anadon-Rosell, A.; Peters, R.L.; Arx, G. von; Lukas, U. von; Wilmking, M.
[Journal Article]


AI-assisted Automated Pipeline for Length Estimation, Visual Assessment of the Digestive Tract and Counting of Shrimp in Aquaculture Production
Hashisho, Yousif; Dolereit, Tim; Segelken-Voigt, Alexandra; Bochert, Ralf; Vahl, Matthias
International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP) 2021
[Conference Paper]


Towards more robust fashion recognition by combining of deep-learning-based detection with semantic reasoning
Reiz, Achim; Albadawi, Mohamad; Sandkuhl, Kurt; Vahl, Matthias; Sidin, Dennis
Spring Symposium on Combining Machine Learning and Knowledge Engineering (AAAI-MAKE) 2021
[Conference Paper]


The Security of ChaCha20-Poly1305 in the Multi-User Setting
Degabriele, Jean Paul; Govinden, Jérôme; Günther, Felix; Paterson, Kenneth G.
CCS´21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.1981-2003
[Conference Proceedings]


The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography
Mittelbach, Arno; Fischlin, Marc
[Book]


An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records
Fejrskov, Martin; Pedersen, Jens Myrup; Böck, Leon; Vasilomanolakis, Emmanouil
IEEE Conference on Communications and Network Security
[Conference Proceedings]