Publikationen

Publikationen

Digital Resilience in Dealing with Misinformation on Social Media during COVID-19: A Web Application to Assist Users in Crises
Schmid, Stefka; Hartwig, Katrin; Cieslinski, Robert; Reuter, Christian
Information Systems Frontiers, p.477-499
[Journal Article]


Towards a Face Verification System-on-Card with Compound-Eye Camera
Henniger, Olaf; Strübig, Christoph Tilman; Kuijper, Arjan
Future Technologies Conference 2024
[Conference Paper]


Marionette: Manipulate Your Touchscreen via A Charging Cable
Jiang, Yan; Ji, Xiaoyu; Wang, Kai; Yan, Chen; Mitev, Richard; Sadeghi, Ahmad-Reza
IEEE Transactions on Dependable and Secure Computing
[Journal Article]


Da­ten­verarbeitungen in der Gesundheitsbranche
Stummer, Sarah
[Paper]


Comparative Study: Legal Framework of Offensive Cybersecurity Research in Denmark and Sweden
Folschweiller, Maxine Joanne
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]


Der Einsatz von Open Source Intelligence im Darknet: Eine strafrechtliche Bewertung
Schlindwein, Lisa; Kriegel, Jessica
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]


Compliance - Ein Überblick über wichtige Rechtsvorschriften für kleine und mittlere Unternehmen
Stummer, Sarah
[Paper]


Maßnahmen aktiver Cyberabwehr
Boll, Alina; Gärtner, Tanya; Hacke, Tim Maximilian; Köcke, Denise
[Paper]


Datenschutz-Vorsorge: Schritte 3-6
Boll, Alina
[Journal Article]


Zur Strafbarkeit von Datenfunden im Darknet
Kriegel, Jessica; Dejam, Jubin; Durth, Hanno; Franke, Florian; Hemkens, Wolfram
[Journal Article]


Integration der Compliance by Design-Anforderungen in die (agile) Softwareentwicklung
Appelt, Dominik
[Journal Article]


Unvorhersehbare, unplanbare personenbezogene Da­ten­verarbeitungen
Boll, Alina; Esser, Julia; Schröder, Lilly
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]


Neue Tech­no­logien: Chancen nutzen, Risiken vermeiden
Selzer, Annika; Timm, Ingo J.
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]


Rechtlicher Schutz im Metaverse
Geissler, Ines
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]


DiffSeg: Towards Detecting Diffusion-Based Inpainting Attacks Using Multi-Feature Segmentation
Frick, Raphael; Steinebach, Martin
Conference on Computer Vision and Pattern Recognition Workshops 2024
[Conference Paper]


Der gläserne Mitarbeiter - Spannungsfeld Standortdaten
Selzer, Annika; Enzmann, Matthias
[Journal Article]


BIOSIG 2024, 23rd International Conference of the Biometrics Special Interest Group. Proceedings
Gesellschaft für Informatik, Special Interest Group Biometrics (BIOSIG International Conference) 2024
[Conference Proceeding]


Challenges for a Taxonomy of Cyber Defence in International Law
Gärtner, Tanya
[Journal Article]


Prognose Securitybedarf und Bewertung möglicher Sicherheitskonzepte für das System Bahn
Leining, Michael; Schubert, Max; Heinrich, Markus; Katzenbeisser, Stefan; Unger, Simon; Scheuermann, Dirk
[Report]


Die rechtskonforme Veröffentlichung von Forschungsdaten
Rudolph, Louisa
[Journal Article]


Ethik, Recht und Sicherheit des digitalen Weiterlebens
Ammicht Quinn, Regina; Heesen, Jessica; Hennig, Martin; Meitzler, Matthias; Geissler, Ines; Kunz, Thomas; Waldmann, Ulrich
[Study]


Demasq: Unmasking the chatgpt wordsmith
Kumari, Kavita; Pegoraro, Alessandro; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]


MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors
Gohil, Vasudev; Rahul, Kande; Chen, Chen; Sadeghi, Ahmad-Reza; Rajendran, Jeyavijayan
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE): Proceedings
[Conference Proceedings]


DeepEclipse: How to Break White-Box DNN-Watermarking Schemes
Pegoraro, Alessandro; Segna, Carlotta; Kumari, Kavita; Sadeghi, Ahmad-Reza
Proceedings of the 33rd USENIX Security Symposium, p.5287-5304
[Conference Proceedings]


Xplain: Analyzing Invisible Correlations in Model Explanation
Kumari, Kavita; Pegoraro, Alessandro; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Proceedings of the 33rd USENIX Security Symposium, p.2937-2953
[Conference Proceedings]


Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning
Knauer, Jonathan; Rieger, Phillip; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.615-629
[Conference Proceedings]


LayerDBA: Circumventing Similarity-Based Defenses in Federated Learning
Nikolov, Javor; Pegoraro, Alessandro; Rieger, Phillip; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy Workshops: SPW 2024, p.299-305
[Conference Proceedings]


Wettbewerbsfaktor Cybersicherheit
Banse, Christian; Becker, Matthias; Bodden, Eric; Dziwok, Stefan; Hiller, Matthias; Kreutzer, Michael; Laß, Dietmar; Luyken, Richard Johannes; Meyer, Matthias; Nouak, Alexander; Nowak, Johannes; Padilla, Elmar; Pflaum, Alexander; Pordesch, Ulrich; Prasuhn, Pierre; Stefanova, Tina; Steiert, Maximilian
[Paper]


QUD: Unsupervised Knowledge Distillation for Deep Face Recognition
Kolf, Jan Niklas; Damer, Naser; Boutros, Fadi
British Machine Vision Conference 2024
[Conference Paper]


The Data Protection Preventive Assessment (DP-PA): Proposal for a New Instrument in Data Protection Law. Practitioners’ Corner
Boll, Alina; Selzer, Annika
[Journal Article]