Publikationen
Publikationen
Digital Resilience in Dealing with Misinformation on Social Media during COVID-19: A Web Application to Assist Users in Crises
Schmid, Stefka; Hartwig, Katrin; Cieslinski, Robert; Reuter, Christian
Information Systems Frontiers, p.477-499
[Journal Article]
Towards a Face Verification System-on-Card with Compound-Eye Camera
Henniger, Olaf; Strübig, Christoph Tilman; Kuijper, Arjan
Future Technologies Conference 2024
[Conference Paper]
Marionette: Manipulate Your Touchscreen via A Charging Cable
Jiang, Yan; Ji, Xiaoyu; Wang, Kai; Yan, Chen; Mitev, Richard; Sadeghi, Ahmad-Reza
IEEE Transactions on Dependable and Secure Computing
[Journal Article]
Datenverarbeitungen in der Gesundheitsbranche
Stummer, Sarah
[Paper]
Comparative Study: Legal Framework of Offensive Cybersecurity Research in Denmark and Sweden
Folschweiller, Maxine Joanne
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]
Der Einsatz von Open Source Intelligence im Darknet: Eine strafrechtliche Bewertung
Schlindwein, Lisa; Kriegel, Jessica
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]
Compliance - Ein Überblick über wichtige Rechtsvorschriften für kleine und mittlere Unternehmen
Stummer, Sarah
[Paper]
Maßnahmen aktiver Cyberabwehr
Boll, Alina; Gärtner, Tanya; Hacke, Tim Maximilian; Köcke, Denise
[Paper]
Datenschutz-Vorsorge: Schritte 3-6
Boll, Alina
[Journal Article]
Zur Strafbarkeit von Datenfunden im Darknet
Kriegel, Jessica; Dejam, Jubin; Durth, Hanno; Franke, Florian; Hemkens, Wolfram
[Journal Article]
Integration der Compliance by Design-Anforderungen in die (agile) Softwareentwicklung
Appelt, Dominik
[Journal Article]
Unvorhersehbare, unplanbare personenbezogene Datenverarbeitungen
Boll, Alina; Esser, Julia; Schröder, Lilly
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]
Neue Technologien: Chancen nutzen, Risiken vermeiden
Selzer, Annika; Timm, Ingo J.
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]
Rechtlicher Schutz im Metaverse
Geissler, Ines
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]
DiffSeg: Towards Detecting Diffusion-Based Inpainting Attacks Using Multi-Feature Segmentation
Frick, Raphael; Steinebach, Martin
Conference on Computer Vision and Pattern Recognition Workshops 2024
[Conference Paper]
Der gläserne Mitarbeiter - Spannungsfeld Standortdaten
Selzer, Annika; Enzmann, Matthias
[Journal Article]
BIOSIG 2024, 23rd International Conference of the Biometrics Special Interest Group. Proceedings
Gesellschaft für Informatik, Special Interest Group Biometrics (BIOSIG International Conference) 2024
[Conference Proceeding]
Challenges for a Taxonomy of Cyber Defence in International Law
Gärtner, Tanya
[Journal Article]
Prognose Securitybedarf und Bewertung möglicher Sicherheitskonzepte für das System Bahn
Leining, Michael; Schubert, Max; Heinrich, Markus; Katzenbeisser, Stefan; Unger, Simon; Scheuermann, Dirk
[Report]
Die rechtskonforme Veröffentlichung von Forschungsdaten
Rudolph, Louisa
[Journal Article]
Ethik, Recht und Sicherheit des digitalen Weiterlebens
Ammicht Quinn, Regina; Heesen, Jessica; Hennig, Martin; Meitzler, Matthias; Geissler, Ines; Kunz, Thomas; Waldmann, Ulrich
[Study]
Demasq: Unmasking the chatgpt wordsmith
Kumari, Kavita; Pegoraro, Alessandro; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2024
[Conference Proceedings]
MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors
Gohil, Vasudev; Rahul, Kande; Chen, Chen; Sadeghi, Ahmad-Reza; Rajendran, Jeyavijayan
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE): Proceedings
[Conference Proceedings]
DeepEclipse: How to Break White-Box DNN-Watermarking Schemes
Pegoraro, Alessandro; Segna, Carlotta; Kumari, Kavita; Sadeghi, Ahmad-Reza
Proceedings of the 33rd USENIX Security Symposium, p.5287-5304
[Conference Proceedings]
Xplain: Analyzing Invisible Correlations in Model Explanation
Kumari, Kavita; Pegoraro, Alessandro; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Proceedings of the 33rd USENIX Security Symposium, p.2937-2953
[Conference Proceedings]
Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning
Knauer, Jonathan; Rieger, Phillip; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.615-629
[Conference Proceedings]
LayerDBA: Circumventing Similarity-Based Defenses in Federated Learning
Nikolov, Javor; Pegoraro, Alessandro; Rieger, Phillip; Sadeghi, Ahmad-Reza
Proceedings: 45th IEEE Symposium on Security and Privacy Workshops: SPW 2024, p.299-305
[Conference Proceedings]
Wettbewerbsfaktor Cybersicherheit
Banse, Christian; Becker, Matthias; Bodden, Eric; Dziwok, Stefan; Hiller, Matthias; Kreutzer, Michael; Laß, Dietmar; Luyken, Richard Johannes; Meyer, Matthias; Nouak, Alexander; Nowak, Johannes; Padilla, Elmar; Pflaum, Alexander; Pordesch, Ulrich; Prasuhn, Pierre; Stefanova, Tina; Steiert, Maximilian
[Paper]
QUD: Unsupervised Knowledge Distillation for Deep Face Recognition
Kolf, Jan Niklas; Damer, Naser; Boutros, Fadi
British Machine Vision Conference 2024
[Conference Paper]
The Data Protection Preventive Assessment (DP-PA): Proposal for a New Instrument in Data Protection Law. Practitioners’ Corner
Boll, Alina; Selzer, Annika
[Journal Article]