Browse by Research Area

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 657.

Conference or Workshop Item (A Paper)

Zhang, Boyang and Zheng, Li and Yang, Ziqing and He, Xinlei and Backes, Michael and Fritz, Mario and Zhang, Yang
(2024) SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models.
In: 33rd USENIX Security Symposium, Philadelphia, PA, USA.
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Hanzlik, Lucjan and Loss, Julian and Thyagarajan, Sri AravindaKrishnan and Wagner, Benedikt
(2024) Sweep-UC: Swapping Coins Privately.
In: 45th IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Jiang, Xiaowen and Stich, Sebastian U.
(2023) Adaptive SGD with Polyak stepsize and Line-search: Robust Convergence and Variance Reduction.
In: Conference on Neural Information Processing Systems, 11.12.2023-16.12.2023, New Orleans, USA.
Conference: NeurIPS Conference on Neural Information Processing Systems

Nasrabadi, Faezeh and Künnemann, Robert and Nemati, Hamed
(2023) CryptoBap: A Binary Analysis Platform for Cryptographic Protocols.
In: ACM SIGSAC Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Qu, Yiting and Shen, Xinyue and He, Xinlei and Backes, Michael and Zannettou, Savvas and Zhang, Yang
(2023) Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models.
In: CCS 2023, 26-30 Nov 2023, Copenhagen, Denmark.
Conference: CCS ACM Conference on Computer and Communications Security
(Submitted)

Beutner, Raven and Finkbeiner, Bernd and Frenkel, Hadar and Siber, Julian
(2023) Checking and Sketching Causes on Temporal Sequences.
In: ATVA 2023.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis
(Submitted)

Balliu, Alkida and Brandt, Sebastian and Kuhn, Fabian and Olivetti, Dennis and Schmid, Gustav
(2023) On the Node-Averaged Complexity of Locally Checkable Problems on Trees.
In: DISC 2023.
Conference: DISC International Symposium on Distributed Computing (was WDAG)
(Submitted)

Pan, Jiaxin and Wagner, Benedikt and Zeng, Runzhi
(2023) Lattice-based Authenticated Key Exchange with Tight Security.
In: CRYPTO 2023.
Conference: CRYPTO Advances in Cryptology

Gunsing, Aldo and Bhaumik, Ritam and Jha, Ashwin and Mennink, Bart and Shen, Yaobin
(2023) Revisiting the Indifferentiability of the Sum of Permutations.
In: IACR CRYPTO 2023, 19-24 August 2023, Santa Barbara, USA.
Conference: CRYPTO Advances in Cryptology
(Submitted)

Abdelnabi, Sahar and Fritz, Mario
(2023) Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems.
In: 32nd USENIX Security Symposium, 9-11 Aug 2023, Anaheim, CA, USA.
Conference: USENIX Usenix Annual Technical Conference
(In Press)

Wang, Haiming and Zhang, Zhikun and Wang, Tianhao and He, Shibo and Backes, Michael and Chen, Jiming and Zhang, Yang
(2023) PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model.
In: USENIX Security Symposium 2023.
Conference: USENIX-Security Usenix Security Symposium

Li, Zheng and Yu, Ning and Salem, Ahmed and Backes, Michael and Fritz, Mario and Zhang, Yang
(2023) UnGANable: Defending Against GAN-based Face Manipulation.
In: USENIX Security.
Conference: USENIX-Security Usenix Security Symposium

Gadhikar, Advait and Mukherjee, Sohom and Burkholz, Rebekka
(2023) Why Random Pruning Is All We Need to Start Sparse.
In: 40th International Conference on Machine Learning.
Conference: ICML International Conference on Machine Learning

Koloskova, Anastasia and Hendrikx, Hadrien and Stich, Sebastian U.
(2023) Revisiting Gradient Clipping: Stochastic bias and tight convergence guarantees.
In: International Conference on Machine Learning (ICML), Honolulu, USA.
Conference: ICML International Conference on Machine Learning

Mohtashami, Amirkeivan and Jaggi, Martin and Stich, Sebastian U.
(2023) Special Properties of Gradient Descent with Large Learning Rates.
In: International Conference on Machine Learning (ICML), Honolulu, USA.
Conference: ICML International Conference on Machine Learning

Bo, Li and Schmidt, Mikkel N. and Alstrøm, Tommy S. and Stich, Sebastian U.
(2023) On the effectiveness of partial variance reduction in federated learning with heterogeneous data.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Vancouver, Canada.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Wang, Boya and Lueks, Wouter and Sukaitis, Justinas and Graf Narbel, Vincent and Troncoso, Carmela
(2023) Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution.
In: 44rd IEEE Symposium on Security and Privacy, May 22-25, 2023, San Francisco, CA, USA.
Conference: SP IEEE Symposium on Security and Privacy
(In Press)

Hanzlik, Lucjan and Loss, Julian and Wagner, Benedikt
(2023) Token meets Wallet: Formalizing Privacy and Revocation for FIDO2.
In: 44rd IEEE Symposium on Security and Privacy, May 22-25, 2023, San Francisco, CA, USA.
Conference: SP IEEE Symposium on Security and Privacy

Doron-Arad, Ilan and Kulik, Ariel and Shachnai, Hadas
(2023) An EPTAS for Budgeted Matching and Budgeted Matroid Intersection via Representative Sets.
In: International Colloquium on Automata, Languages and Programming.
Conference: ICALP International Colloquium on Automata Languages and Programming
(In Press)

Pan, Jiaxin and Wagner, Benedikt
(2023) Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions.
In: Eurocrypt 2023.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Hanzlik, Lucjan and Loss, Julian and Wagner, Benedikt
(2023) Rai-Choo! Evolving Blind Signatures to the Next Level.
In: Eurocrypt 2023.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Aghakhani, Hojjat and Schönherr, Lea and Eisenhofer, Thorsten and Kolossa, Dorothea and Holz, Thorsten and Kruegel, Christopher and Vigna, Giovanni
(2023) VENOMAVE: Targeted Poisoning Against Speech Recognition.
In: IEEE SaTML.
Conference: UNSPECIFIED

Yuan, Xiaojian and Chen, Kejiang and Zhang, Jie and Zhang, Weiming and Yu, Nenghai and Zhang, Yang
(2023) Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network.
In: AAAI 2023.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Esiyok, Ilkan and Berrang, Pascal and Cohn-Gordon, Katriel and Künnemann, Robert
(2023) Accountable Javascript Code Delivery.
In: NDSS Symposium 2023, 27 February - 3 March, San Diego.
Conference: NDSS Network and Distributed System Security Symposium

Qu, Yiting and He, Xinlei and Pierson, Shannon and Backes, Michael and Zhang, Yang and Zannettou, Savvas
(2023) On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.
In: 44th IEEE Symposium on Security and Privacy (S&P '23), 22-25 May 2023, HYATT REGENCY, SAN FRANCISCO, CA.
Conference: SP IEEE Symposium on Security and Privacy

Agrawal, Akanksha and Marx, Dániel and Neuen, Daniel and Slusallek, Jasper
(2023) Computing Square Colorings on Bounded-Treewidth and Planar Graphs.
In: ACM-SIAM Symposium on Discrete Algorithms (SODA 2023).
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms
(In Press)

Focke, Jacob and Marx, Dániel and Mc Inerney, Fionn and Neuen, Daniel and Sankar, Govind and Schepper, Philipp and Wellnitz, Philip
(2023) Tight Complexity Bounds for Counting Generalized Dominating Sets in Bounded-Treewidth Graphs.
In: ACM-SIAM Symposium on Discrete Algorithms (SODA 2023).
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms
(In Press)

Balliu, Alkida and Brandt, Sebastian and Kuhn, Fabian and Olivetti, Dennis
(2023) Distributed Maximal Matching and Maximal Independent Set on Hypergraphs.
In: SODA 2023.
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms
(Submitted)

Doron-Arad, Ilan and Kulik, Ariel and Shachnai, Hadas
(2023) An EPTAS for Budgeted Matroid Independent Set.
In: SIAM Symposium on Simplicity in Algorithms (SOSA23).
Conference: UNSPECIFIED
(In Press)

Chattopadhyay, Soumya and Jha, Ashwin and Nandi, Mridul
(2022) Towards Tight Security Bounds for OMAC, XCBC and TMAC.
In: ASIACRYPT 2022, 5-9 December 2022, Taipei, Taiwan.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(Submitted)

Burkholz, Rebekka
(2022) Most Activation Functions Can Win the Lottery Without Excessive Depth.
In: NeurIPS 2022.
Conference: NeurIPS Conference on Neural Information Processing Systems

Marx, Dániel and Sankar, Govind and Schepper, Philipp
(2022) Anti-Factor is FPT Parameterized by Treewidth and List Size (but Counting is Hard).
In: 17th International Symposium on Parameterized and Exact Computation (IPEC 2022).
Conference: IPEC International Symposium on Parameterized and Exact Computation (was IWPEC pre 2004)
(In Press)

Esmer, Baris Can and Kulik, Ariel and Marx, Dániel and Schepper, Philipp and Węgrzycki, Karol
(2022) Computing Generalized Convolutions Faster Than Brute Force.
In: 17th International Symposium on Parameterized and Exact Computation (IPEC 2022).
Conference: IPEC International Symposium on Parameterized and Exact Computation (was IWPEC pre 2004)
(In Press)

Galby, Esther and Marx, Dániel and Schepper, Philipp and Sharma, Roohani and Tale, Prafullkumar
(2022) Domination and Cut Problems on Chordal Graphs with Bounded Leafage.
In: 17th International Symposium on Parameterized and Exact Computation (IPEC 2022).
Conference: IPEC International Symposium on Parameterized and Exact Computation (was IWPEC pre 2004)
(In Press)

Döttling, Nico and Garg, Sanjam and Wang, Mingyuan
(2022) IBE with Incompressible Master Secret and Small Identity Secrets.
In: TCC 2022.
Conference: TCC Theory of Cryptography Conference

Dodwadmath, Akshay and Stich, Sebastian U.
(2022) Preserving privacy with PATE for heterogeneous data.
In: NeurIPS 2022 Workshop on Distribution Shifts: Connecting Methods and Applications, 28.11.2022-9.12.2022, New Orleans, USA.
Conference: NeurIPS-W Workshop on Neural Information Processing Systems

Branco, Pedro and Döttling, Nico and Dujmovic, Jesko
(2022) Rate-1 Incompressible Encryption from Standard Assumptions.
In: TCC 2022.
Conference: TCC Theory of Cryptography Conference

Branco, Pedro and Döttling, Nico and Wohnig, Stella
(2022) Universal Ring Signatures in the Standard Model.
In: ASIACRYPT 2022, 5-9 December 2022, Taipei, Taiwan.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Chen, Yufei and Shen, Chao and Shen, Yun and Wang, Cong and Zhang, Yang
(2022) Amplifying Membership Exposure via Data Poisoning.
In: NeurIPS 2022.
Conference: NeurIPS Conference on Neural Information Processing Systems

Beznosikov, Aleksandr and Dvurechensky, Pavel and Koloskova, Anastasia and Samokhin, Valentin and Stich, Sebastian U. and Gasnikov, Alexander
(2022) Decentralized Local Stochastic Extra-Gradient for Variational Inequalities.
In: NeurIPS, 28.11.2022-9.12.2022, New Orleans, USA.
Conference: NeurIPS Conference on Neural Information Processing Systems

Koloskova, Anastasia and Stich, Sebastian U. and Jaggi, Martin
(2022) Sharper Convergence Guarantees for Asynchronous SGD for Distributed and Federated Learning.
In: NeurIPS, 28.11.2022-9.12.2022, New Orleans, USA.
Conference: NeurIPS Conference on Neural Information Processing Systems

Dalleiger, Sebastian and Vreeken, Jilles
(2022) Efficiently Factorizing Boolean Matrices using Proximal Gradient Descent.
In: Advances in Neural Information Processing Systems.
Conference: NeurIPS Conference on Neural Information Processing Systems

Li, Zheng and Liu, Yiyong and He, Xinlei and Yu, Ning and Backes, Michael and Zhang, Yang
(2022) Auditing Membership Leakages of Multi-Exit Networks.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Shen, Yun and Han, Yufei and Zhang, Zhikun and Chen, Min and Yu, Ting and Backes, Michael and Zhang, Yang and Stringhini, Gianluca
(2022) Finding MNEMON: Reviving Memories of Node Embeddings.
In: The 29th ACM Conference on Computer and Communications Security (CCS), November 7-11, 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Chen, Min and Zhang, Zhikun and Wang, Tianhao and Backes, Michael and Humbert, Mathias and Zhang, Yang
(2022) Graph Unlearning.
In: ACM SIGSAC Conference on Computer and Communications Security, November 7-11, 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Liu, Yiyong and Zhao, Zhengyu and Backes, Michael and Zhang, Yang
(2022) Membership Inference Attacks by Exploiting Loss Trajectory.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Huang, Hai and Zhang, Zhikun and Shen, Yun and Backes, Michael and Li, Qi and Zhang, Yang
(2022) On the Privacy Risks of Cell-Based NAS Architectures.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Si, Wai Man and Backes, Michael and Blackburn, Jeremy and De Cristofaro, Emiliano and Stringhini, Gianluca and Zannettou, Savvas and Zhang, Yang
(2022) Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Ruffing, Tim and Ronge, Viktoria and Jin, Elliott and Schneider-Bensch, Jonas and Schröder, Dominique
(2022) ROAST: Robust Asynchronous Schnorr Threshold Signatures.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Cong, Tianshuo and He, Xinlei and Zhang, Yang
(2022) SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Chen, Dingfan and Kerkouche, Raouf and Fritz, Mario
(2022) Private Set Generation with Discriminative Information.
In: Thirty-sixth Conference on Neural Information Processing Systems, New Orleans, Louisiena, USA.
Conference: NeurIPS Conference on Neural Information Processing Systems

Galby, Esther and Marx, Dániel and Schepper, Philipp and Sharma, Roohani and Tale, Prafullkumar
(2022) Parameterized Complexity of Weighted Multicut in Trees.
In: 48th International Workshop on Graph-Theoretic Concepts in Computer Science (WG2022).
Conference: WG International Workshop on Graph-Theoretic Concepts in Computer Science

Kastner, Julia and Loss, Julian and Xu, Jiayu
(2022) The Abe-Okamoto Partially Blind Signature Scheme Revisited.
In: ASIACRYPT 2022, 5-9 December 2022, Taipei, Taiwan.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Anagnostides, Ioannis and Lenzen, Christoph and Haeupler, Bernhard and Zuzic, Goran and Gouleakis, Themis
(2022) Almost Universally Optimal Distributed Laplacian Solvers via Low-Congestion Shortcuts.
In: DISC 2022.
Conference: DISC International Symposium on Distributed Computing (was WDAG)
(In Press)

Mujkanovic, Felix and Geisler, Simon and Günnemann, Stephan and Bojchevski, Aleksandar
(2022) Are Defenses for Graph Neural Networks Robust?
In: NeurIPS.
Conference: NeurIPS Conference on Neural Information Processing Systems

Balliu, Alkida and Brandt, Sebastian and Chang, Yi-Jun and Olivetti, Dennis and Studený, Jan and Suomela, Jukka
(2022) Efficient Classification of Locally Checkable Problems in Regular Trees.
In: DISC 2022.
Conference: DISC International Symposium on Distributed Computing (was WDAG)
(Submitted)

Balliu, Alkida and Brandt, Sebastian and Fischer, Manuela and Latypov, Rustam and Maus, Yannic and Olivetti, Dennis and Uitto, Jara
(2022) Exponential Speedup Over Locality in MPC with Optimal Memory.
In: DISC 2022.
Conference: DISC International Symposium on Distributed Computing (was WDAG)
(Submitted)

Bhangale, Amey and Liu-Zhang, Chen-Da and Loss, Julian and Nayak, Kartik
(2022) Efficient Adaptively-Secure Byzantine Agreement for Long Messages.
In: ASIACRYPT 2022, 5-9 December 2022, Taipei, Taiwan.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Kluczniak, Kamil
(2022) NTRU-$\nu$-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Scholten, Yan and Schuchardt, Jan and Geisler, Simon and Bojchevski, Aleksandar and Günnemann, Stephan
(2022) Randomized Message-Interception Smoothing: Gray-box Certificates for Graph Neural Networks.
In: NeurIPS.
Conference: NeurIPS Conference on Neural Information Processing Systems

Alexandru, Andreea B. and Blum, Erica and Katz, Jonathan and Loss, Julian
(2022) State Machine Replication under Changing Network Conditions.
In: ASIACRYPT 2022, 5-9 December 2022, Taipei, Taiwan.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Frenkel, Hadar and Sheinvald, Sarai
(2022) Realizable and Context-Free Hyperlanguages.
In: GandALF.
Conference: GandALF GandALF - games, automata, logics, and formal methods

Can Esmer, Baris and Kulik, Ariel and Marx, Dániel and Neuen, Daniel and Sharma, Roohani
(2022) Faster Exponential-Time Approximation Algorithms Using Approximate Monotone Local Search.
In: 30th Annual European Symposium on Algorithms (ESA 2022).
Conference: ESA European Symposium on Algorithms

Allcock, Jonathan and Hamoudi, Yassine and Joux, Antoine and Klingelhöfer, Felix and Santha, Miklos
(2022) Classical and Quantum Algorithms for Variants of Subset-Sum via Dynamic Programming.
In: ESA 2022.
Conference: ESA European Symposium on Algorithms

Backes, Michael and Berrang, Pascal and Hanzlik, Lucjan and Pryvalov, Ivan
(2022) A framework for constructing Single Secret Leader Election from MPC.
In: ESORICS 2022.
Conference: ESORICS European Symposium On Research In Computer Security
(In Press)

Liu, Yugeng and Wen, Rui and He, Xinlei and Salem, Ahmed and Zhang, Zhikun and Backes, Michael and De Cristofaro, Emiliano and Fritz, Mario and Zhang, Yang
(2022) ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium

Mameche, Sara and Kaltenpoth, David and Vreeken, Jilles
(2022) Discovering Invariant and Changing Mechanisms from Data.
In: KDD [ACM International Conference on Knowledge Discovery and Data Mining].
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Dalleiger, Sebastian and Vreeken, Jilles
(2022) Discovering Significant Patterns under Sequential False Discovery Control.
In: ACM SIGKDD Conference on Knowledge Discovery and Data Mining.
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Zhang, Zhikun and Chen, Min and Backes, Michael and Shen, Yun and Zhang, Yang
(2022) Inference Attacks Against Graph Neural Networks.
In: 31st USENIX Security Symposium, August 10-12, 2022, Boston, MA, USA.
Conference: USENIX-Security Usenix Security Symposium

Chen, Yufei and Shen, Chao and Wang, Cong and Zhang, Yang
(2022) Teacher Model Fingerprinting Attacks Against Transfer Learning.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Beutner, Raven and Finkbeiner, Bernd
(2022) Prophecy Variables for Hyperproperty Verification.
In: CSF 2022.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)
(In Press)

Beutner, Raven and Finkbeiner, Bernd
(2022) Software Verification of Hyperproperties Beyond k-Safety.
In: CAV 2022.
Conference: CAV Computer Aided Verification
(In Press)

Feneuil, Thibauld and Joux, Antoine and Rivain, Matthieu
(2022) Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs.
In: Crypto 2022.
Conference: CRYPTO Advances in Cryptology

Wang, Hui-Po and Stich, Sebastian U. and He, Yang and Fritz, Mario
(2022) ProgFed: Effective, Communication, and Computation Efficient Federated Learning by Progressive Training.
In: International Conference on Machine Learning (ICML), 19.7.2022 - 21.7.2022, Baltimore, USA.
Conference: ICML International Conference on Machine Learning

Burkholz, Rebekka
(2022) Convolutional and Residual Networks Provably Contain Lottery Tickets.
In: International Conference on Machine Learning (ICML), 17.07.2022-23.07.2022, Baltimore.
Conference: ICML International Conference on Machine Learning

Xu, Sascha and Mian, Osman and Vreeken, Jilles
(2022) Inferring Cause and Effect in the Presence of Heteroscedastic Noise.
In: ICML.
Conference: ICML International Conference on Machine Learning

Hedderich, M and Fischer, Jonas and Klakow, Dietrich and Vreeken, Jilles
(2022) Label-Descriptive Patterns and their Application to Characterizing Classification Errors.
In: International Conference on Machine Learning (ICML).
Conference: ICML International Conference on Machine Learning

Döttling, Nico and Dujmovic, Jesko
(2022) Maliciously Circuit-Private FHE from Information-Theoretic Principles.
In: 3rd Conference on Information-Theoretic Cryptography (ITC 2022), Boston, MA, USA.
Conference: UNSPECIFIED

Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2022) Factoring and Pairings Are Not Necessary for IO: Circular-Secure LWE Suffices.
In: ICALP 2022.
Conference: ICALP International Colloquium on Automata Languages and Programming

Kepkowski, Michal and Hanzlik, Lucjan and Wood, Ian D. and Kaafar, Mohamed Ali
(2022) How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy.
In: 22nd Privacy Enhancing Technologies Symposium (PETS 2022).
Conference: PETS Privacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)
(In Press)

Esmer, Baris Can and Nakos, Vasileios
(2022) On (1+ϵ)-Approximate Block Sparse Recovery.
In: ISIT 2022.
Conference: ISIT IEEE International Symposium on Information Theory
(Submitted)

Focke, Jacob and Roth, Marc
(2022) Counting Small Induced Subgraphs with Hereditary Properties.
In: STOC 2022.
Conference: STOC ACM Symposium on Theory of Computing

Focke, Jacob and Goldberg, Leslie Ann and Roth, Marc and Živný, Stanislav
(2022) Approximately Counting Answers to Conjunctive Queries with Disequalities and Negations.
In: PODS '22.
Conference: PODS ACM SIGMOD-SIGACT-SIGART Conference on Principles of Database Systems

Salem, Ahmed and Wen, Rui and Backes, Michael and Ma, Shiqing and Zhang, Yang
(2022) Dynamic Backdoor Attacks Against Machine Learning Models.
In: EuroS&P 2022.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Shen, Xinyue and He, Xinlei and Backes, Michael and Blackburn, Jeremy and Zannettou, Savvas and Zhang, Yang
(2022) On Xing Tian and the Perseverance of Anti-China Sentiment Online.
In: ICWSM 2022.
Conference: ICWSM International Conference on Web and Social Media

Bringmann, Karl and Kisfaludi-Bak, Sándor and Künnemann, Marvin and Marx, Dániel and Nusser, André
(2022) Dynamic Time Warping Under Translation: Approximation Guided by Space-Filling Curves.
In: 38th International Symposium on Computational Geometry (SoCG 2022).
Conference: SoCG International Symposium on Computational Geometry

Böhle, Moritz and Fritz, Mario and Schiele, Bernt
(2022) B-Cos Networks: Alignment Is All We Need for Interpretability.
In: Conference on Computer Vision and Pattern Recognition, 21-24.06.2022, New Orleans, Louisiena, USA.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Brakerski, Zvika and Branco, Pedro and Döttling, Nico and Pu, Sihang
(2022) Batch-OT with Optimal Rate.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Beutner, Raven and Ong, C.H. Luke and Zaiser, Fabian
(2022) Guaranteed Bounds for Posterior Inference in Universal Probabilistic Programming.
In: PLDI 2022, San Diego, CA, USA.
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation
(In Press)

Eldefrawy, Karim and Loss, Julian and Terner, Ben
(2022) How Byzantine is a Send Corruption?
In: ACNS 2022.
Conference: ACNS International Conference on Applied Cryptography and Network Security

Abdelnabi, Sahar and Hasan, Rakibul and Fritz, Mario
(2022) Open-Domain, Content-Based, Multi-Modal Fact-Checking of Out-of-Context Images via Online Resources.
In: Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Shen, Yun and He, Xinlei and Han, Yufei and Zhang, Yang
(2022) Model Stealing Attacks Against Inductive Graph Neural Networks.
In: S&P 2022.
Conference: SP IEEE Symposium on Security and Privacy

Hanzlik, Lucjan and Kluczniak, Kamil
(2022) Explainable Arguments.
In: FC 2022.
Conference: FC Financial Cryptography and Data Security Conference
(In Press)

Chairattana-Apirom, Rutchathon and Wagner, Benedikt and Hanzlik, Lucjan and Loss, Julian and Lysyanskaya, Anna
(2022) PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.
In: Crypto 2022.
Conference: CRYPTO Advances in Cryptology
(In Press)

Tang, Dang and Duong, Dung Hoang and Joux, Antoine and Plantard, Thomas and Qiao, Youming and Susilo, Willy
(2022) Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.
In: Eurocrypt'2022.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Burkholz, Rebekka and Laha, Nilanjana and Mukherjee, Rajarshi and Gotovos, Alkis
(2022) On the Existence of Universal Lottery Tickets.
In: The Tenth International Conference on Learning Representations, 25-29 Apr 2022, virtual.
Conference: ICLR International Conference on Learning Representations

Fischer, Jonas and Burkholz, Rebekka
(2022) Plant 'n' Seek: Can You Find the Winning Ticket?
In: The Tenth International Conference on Learning Representations.
Conference: ICLR International Conference on Learning Representations

Chen, Dingfan and Yu, Ning and Fritz, Mario
(2022) RelaxLoss: Defending Membership Inference Attacks without Losing Utility.
In: The Tenth International Conference on Learning Representations.
Conference: ICLR International Conference on Learning Representations

Yu, Ning and Skripniuk, Vladislav and Chen, Dingfan and Davis, Larry S. and Fritz, Mario
(2022) Responsible Disclosure of Generative Models Using Scalable Fingerprinting.
In: The Tenth International Conference on Learning Representations, Virtual.
Conference: ICLR International Conference on Learning Representations

Salem, Ahmed and Backes, Michael and Zhang, Yang
(2022) Get a Model! Model Hijacking Attack Against Machine Learning Models.
In: NDSS 2022, 24 - 28 April 2022, San Diego, California.
Conference: NDSS Network and Distributed System Security Symposium

Zhou, Junhao and Chen, Yufei and Shen, Chao and Zhang, Yang
(2022) Property Inference Attacks Against GANs.
In: NDSS 2022, 24 - 28 April 2022, San Diego, California.
Conference: NDSS Network and Distributed System Security Symposium

Rahimian, Shadi and Kerkouche, Raouf and Kurth, Ina and Fritz, Mario
(2022) Practical Challenges in Differentially-Private Federated Survival Analysis of Medical Data.
In: Conference on Health, Inference, and Learning, April 7-8, 2022, Virtual.
Conference: UNSPECIFIED

Pan, Jiaxin and Wagner, Benedikt
(2022) Lattice-based Signatures with Tight Adaptive Corruptions and More.
In: PKC.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

Hasan, Rakibul and Fritz, Mario
(2022) Understanding Utility and Privacy of Demographic Data in Education Technology by Causal Analysis and Adversarial-Censoring.
In: Privacy Enhancing Technologies.
Conference: PETS Privacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)

Marx, Alexander and Vreeken, Jilles
(2022) Formally Justifying MDL-based Inference of Cause and Effect.
In: AAAI Workshop on Information-Theoretic Causal Inference and Discovery (ITCI'22).
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Kluczniak, Kamil
(2022) Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.
In: PKC 2022: Public-Key Cryptography.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

Coupette, Corinna and Dalleiger, Sebastian and Vreeken, Jilles
(2022) Differentially Describing Groups of Graphs.
In: AAAI Conference on Artificial Intelligence.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Wiegand, Boris and Klakow, Dietrich and Vreeken, Jilles
(2022) Discovering Interpretable Data-to-Sequence Generators.
In: AAAI Conference on Artificial Intelligence.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Kalofolias, Janis and Vreeken, Jilles
(2022) Naming the most Anomalous Cluster in Hilbert Space for Structures with Attribute Information.
In: AAAI Conference on Artificial Intelligence.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Kastner, Julia and Loss, Julian and Xu, Jiayu
(2022) On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.
In: PKC 2022: Public-Key Cryptography.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

Branco, Pedro and Döttling, Nico and Mateus, Paulo
(2022) Two-Round Oblivious Linear Evaluation from Learning with Errors.
In: PKC 2022: Public-Key Cryptography.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

Aggarwal, Divesh and Döttling, Nico and Dujmovic, Jesko and Hajiabadi, Mohammad and Malavolta, Giulio and Obremski, Maciej
(2022) Algebraic Restriction Codes and their Applications.
In: 13th Innovations in Theoretical Computer Science Conference.
Conference: ITCS Innovations in Theoretical Computer Science

Brandt, Sebastian and Chang, Yi-Jun and Grebı́k, Jan and Grunau, Christoph and Rozhoň, Václav and Vidnyánszky, Zoltán
(2022) Local Problems on Trees from the Perspectives of Distributed Algorithms, Finitary Factors, and Descriptive Combinatorics.
In: 13th Innovations in Theoretical Computer Science Conference.
Conference: ITCS Innovations in Theoretical Computer Science
(In Press)

Bund, Johannes and Lenzen, Christoph and Medina, Moti
(2022) Small Hazard-Free Transducers.
In: 13th Innovations in Theoretical Computer Science (ITCS).
Conference: ITCS Innovations in Theoretical Computer Science
(In Press)

Chistikov, Dmitry and Majumdar, Rupak and Schepper, Philipp
(2022) Subcubic certificates for CFL reachability.
In: POPL 2022.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Focke, Jacob and Marx, Dániel and Rzążewski, Paweł
(2022) Counting list homomorphisms from graphs of bounded treewidth: tight complexity bounds.
In: SODA 2022 - ACM/SIAM Symposium on Discrete Algorithms.
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms

Marx, Dániel and Misra, Pranabendu and Neuen, Daniel and Tale, Prafullkumar
(2022) A Framework for Parameterized Subexponential Algorithms for Generalized Cycle Hitting Problems on Planar Graphs.
In: UNSPECIFIED.
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms
(Submitted)

Geisler, Simon and Sommer, Johanna and Schuchardt, Jan and Bojchevski, Aleksandar and Günnemann, Stephan
(2022) Generalization of Neural Combinatorial Solvers Through the Lens of Adversarial Robustness.
In: ICLR.
Conference: ICLR International Conference on Learning Representations

Döttling, Nico and Goyal, Vipul and Malavolta, Giulio and Raizes, Justin
(2022) Interaction-Preserving Compilers for Secure Computation.
In: ITCS 2022.
Conference: ITCS Innovations in Theoretical Computer Science

Neuen, Daniel
(2022) Isomorphism Testing for Graphs Excluding Small Topological Subgraphs.
In: UNSPECIFIED.
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms
(Submitted)

Liu, Yehao and Pagliardini, Matteo and Chavdarova, Tatjana and Stich, Sebastian U.
(2021) The Peril of Popular Deep Learning Uncertainty Estimation Methods.
In: Bayesian Deep Learning Workshop at NeurIPS 2021, 14.12.2021, online.
Conference: BDL Bayesian Deep Learning Workshop

Chakraborti, Avik and Datta, Nilanjan and Jha, Ashwin and Mancillas-Lopez, Cuauhtemoc and Nandi, Mridul and Sasaki, Yu
(2021) Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.
In: 22nd International Conference on Cryptology in India.
Conference: INDOCRYPT International Conference on Cryptology in India

Gueron, Shay and Jha, Ashwin and Nandi, Mridul
(2021) Revisiting the Security of COMET Authenticated Encryption Scheme.
In: 22nd International Conference on Cryptology in India.
Conference: INDOCRYPT International Conference on Cryptology in India

Chakraborti, Avik and Datta, Nilanjan and Jha, Ashwin and Mancillas-Lopez, Cuauhtemoc and Nandi, Mridul
(2021) tHyENA: Making HyENA Even Smaller.
In: 22nd International Conference on Cryptology in India.
Conference: INDOCRYPT International Conference on Cryptology in India

Chakraborti, Avik and Datta, Nilanjan and Jha, Ashwin and Mancillas-Lopez, Cuauhtemoc and Nandi, Mridul
(2021) Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security.
In: 11th International Conference on Security, Privacy and Applied Cryptographic Engineering.
Conference: SPACE International Conference on Security, Privacy and Applied Cryptographic Engineering

Chattopadhyay, Soumya and Jha, Ashwin and Nandi, Mridul
(2021) Fine-tuning the ISO/IEC Standard Lightmac.
In: ASIACRYPT 2021.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(Submitted)

Du, Linkang and Zhang, Zhikun and Bai, Shaojie and Liu, Changchang and Ji, Shouling and Cheng, Peng and Chen, Jiming
(2021) AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy.
In: CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security

Wang, Tianhao and Chen, Joann Qiongna and Zhang, Zhikun and Su, Dong and Cheng, Yueqiang and Li, Zhou and Li, Ninghui and Jha, Somesh
(2021) Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
In: CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security

Rahimian, Shadi and Orekondy, Tribhuvanesh and Fritz, Mario
(2021) Differential Privacy Defenses and Sampling Attacks for Membership Inference.
In: 14th ACM Workshop on Artificial Intelligence and Security, co-located with the 28th ACM Conference on Computer and Communications Security.
Conference: AISec ACM Workshop on Artificial Intelligence and Security

Zhang, Minxing and Ren, Zhaochun and Wang, Zihan and Ren, Pengjie and Chen, Zhumin and Hu, Pengfei and Zhang, Yang
(2021) Membership Inference Attacks Against Recommender Systems.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Li, Zheng and Zhang, Yang
(2021) Membership Leakage in Label-Only Exposures.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

He, Xinlei and Zhang, Yang
(2021) Quantifying and Mitigating Privacy Risks of Contrastive Learning.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Abdelnabi, Sahar and Fritz, Mario
(2021) "What's in the box?!": Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models.
In: Moving Target Defense Workshop in conjuncture with CCS.
Conference: UNSPECIFIED

Chen, Min and Zhang, Zhikun and Wang, Tianhao and Backes, Michael and Humbert, Mathias and Zhang, Yang
(2021) When Machine Unlearning Jeopardizes Privacy.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Alamati, Navid and Branco, Pedro and Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Pu, Sihang
(2021) Laconic Private Set Intersection and Applications.
In: TCC 2021: Theory of Cryptography.
Conference: TCC Theory of Cryptography Conference

Döttling, Nico and Hartmann, Dominik and Hofheinz, Dennis and Kiltz, Eike and Schäge, Sven and Ursu, Bogdan
(2021) On the Impossibility of Purely Algebraic Signatures.
In: TCC 2021.
Conference: TCC Theory of Cryptography Conference

Chardouvelis, Orestis and Döttling, Nico and Malavolta, Giulio
(2021) Rate-1 Quantum Fully Homomorphic Encryption.
In: TCC 2021: Theory of Cryptography.
Conference: TCC Theory of Cryptography Conference

Buiras, Pablo and Nemati, Hamed and Lindner, Andreas and Guanciale, Roberto
(2021) Validation of Side-Channel Models via Observation Refinement.
In: MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, Virtual Event, Greece, October 18-22, 2021.
Conference: MICRO International Symposium on Microarchitecture

Yu, Ning and Skripniuk, Vladislav and Abdelnabi, Sahar and Fritz, Mario
(2021) Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data.
In: IEEE International Conference on Computer Vision (ICCV), 2021, Virtual.
Conference: ICCV IEEE International Conference on Computer Vision

Yu, Ning and Liu, Guilin and Dundar, Aysegul and Tao, Andrew and Catanzaro, Bryan and Davis, Larry and Fritz, Mario
(2021) Dual Contrastive Loss and Attention for GANs.
In: IEEE International Conference on Computer Vision (ICCV) 2021, Virtual.
Conference: ICCV IEEE International Conference on Computer Vision

Hanzlik, Lucjan and Slamanig, Daniel
(2021) With a Little Help from My Friends: Constructing Practical Anonymous Credentials.
In: ACM CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Hajipour, Hossein and Malinowski, Mateusz and Fritz, Mario
(2021) IReEn: Iterative Reverse-Engineering of Black-Box Functions via Neural Program Synthesis.
In: International Workshop on Machine Learning in Software Engineering in conjunction with ECML PKDD.
Conference: UNSPECIFIED

Hajipour, Hossein and Bhattacharyya, Apratim and Staicu, Cristian-Alexandru and Fritz, Mario
(2021) SampleFix: Learning to Generate Functionally Diverse Fixes.
In: International Workshop on Machine Learning in Software Engineering in conjuncture with ECML PKDD.
Conference: UNSPECIFIED

Hajipour, Hossein and Bhattacharyya, Apratim and Staicu, Cristian-Alexandru and Fritz, Mario
(2021) SampleFix: Learning to Generate Functionally Diverse Fixes.
In: 1st International Workshop on Machine Learning in Software Engineering, 17 Sep 2021.
Conference: UNSPECIFIED
(Submitted)

Neuen, Daniel
(2021) Isomorphism Testing Parameterized by Genus and Beyond.
In: European Symposium on Algorithms.
Conference: ESA European Symposium on Algorithms

Zhang, Zhikun and Wang, Tianhao and Honorio, Jean and Li, Ninghui and Backes, Michael and He, Shibo and Chen, Jiming and Zhang, Yang
(2021) PrivSyn: Differentially Private Data Synthesis.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

He, Xinlei and Jia, Jinyuan and Gong, Neil Zhenqiang and Backes, Michael and Zhang, Yang
(2021) Stealing Links from Graph Neural Networks.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

He, Yang and Yu, Ning and Keuper, Margret and Fritz, Mario
(2021) Beyond the Spectrum: Detecting Deepfakes via Re-Synthesis.
In: 30th International Joint Conference on Artificial Intelligence (IJCAI).
Conference: IJCAI International Joint Conference on Artificial Intelligence

Marx, Dániel and Sankar, Govind S. and Schepper, Philipp
(2021) Degrees and Gaps: Tight Complexity Results of General Factor Problems Parameterized by Treewidth and Cutwidth.
In: ICALP 2021.
Conference: ICALP International Colloquium on Automata Languages and Programming

Wang, Hui-Po and Orekondy, Tribhuvanesh and Fritz, Mario
(2021) InfoScrub: Towards Attribute Privacy by Targeted Obfuscation.
In: 2021 IEEE CVPR Workshop on Fair, Data Efficient and Trusted Computer Vision.
Conference: ECCV European Conference on Computer Vision

Marx, Dániel
(2021) Modern Lower Bound Techniques in Database Theory and Constraint Satisfaction.
In: 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database System.
Conference: PODS ACM SIGMOD-SIGACT-SIGART Conference on Principles of Database Systems

Böhle, Moritz and Fritz, Mario and Schiele, Bernt
(2021) Convolutional Dynamic Alignment Networks for Interpretable Classifications.
In: 34th IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Wang, Hui-Po and Yu, Ning and Fritz, Mario
(2021) Hijack-GAN: Unintended-Use of Pretrained, Black-Box GANs.
In: 34th IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Maximilian and Backes, Michael and Fritz, Mario
(2021) MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
In: 2021 IEEE CVPR Workshop on Fair, Data Efficient and Trusted Computer Vision.
Conference: ECCV European Conference on Computer Vision

Baumann, Christoph and Dam, Mads and Guanciale, Roberto and Nemati, Hamed
(2021) On Compositional Information Flow Aware Refinement.
In: 34th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Cohen-Addad, Vincent and Klein, Philip N. and Marx, Dániel and Wheeler, Archer and Wolfram, Christopher
(2021) On the Computational Tractability of a Geographic Clustering Problem Arising in Redistricting.
In: 2nd Symposium on Foundations of Responsible Computing, FORC 2021, June 9-11, 2021, Virtual Conference.
Conference: UNSPECIFIED

Branco, Pedro and Döttling, Nico and Pu, Sihang
(2021) Multiparty Cardinality Testing for Threshold Private Intersection.
In: PKC 2021: Public-Key Cryptography.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

Döttling, Nico and Nishimaki, Ryo
(2021) Universal Proxy Re-Encryption.
In: PKC 2021: Public-Key Cryptography.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

Abdelnabi, Sahar and Fritz, Mario
(2021) Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding.
In: 42nd IEEE Symposium on Security and Privacy (S&P'21), May 24-28, Virtual.
Conference: SP IEEE Symposium on Security and Privacy

Tahmasbi, Fatemeh and Schild, Leonard and Ling, Chen and Blackburn, Jeremy and Stringhini, Gianluca and Zhang, Yang and Zannettou, Savvas
(2021) “Go eat a bat, Chang!”: On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19.
In: The Web Conference.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Grosse, Kathrin and Backes, Michael
(2021) Do winning tickets exist before DNN training?
In: SDM21.
Conference: SDM SIAM International Conference on Data Mining

Torralba, Àlvaro and Speicher, Patrick and Künnemann, Robert and Hoffmann, Jörg and Steinmetz, Marcel
(2021) Faster Stackelberg Planning via Symbolic Search and Information Sharing.
In: 35th AAAI Conference on Artificial Intelligence, February 2-9, 2021, virtual conference.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Ke, Qiuhong and Fritz, Mario and Schiele, Bernt
(2021) Future Moment Assessment for Action Query.
In: IEEE Winter Conference on Applications of Computer Vision (WACV ’21).
Conference: WACV IEEE Workshop on Applications of Computer Vision

Patrignani, Marco and Martin, Eric Mark and Devriese, Dominique
(2021) On the Semantic Expressiveness of Recursive Types.
In: POPL 2021.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Chen, Xiaoyi and Salem, Ahmed and Chen, Dingfan and Backes, Michael and Ma, Shiqing and Shen, Qingni and Wu, Zhonghai and Zhang, Yang
(2021) BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
In: ACSAC 2021.
Conference: ACSAC Annual Computer Security Applications Conference

Brakerski, Zvika and Branco, Pedro and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2020) Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions.
In: Theory of Cryptography - 18th International Conference.
Conference: TCC Theory of Cryptography Conference

Brakerski, Zvika and Döttling, Nico
(2020) Lossiness and Entropic Hardness for Ring-LWE.
In: Theory of Cryptography - 18th International Conference.
Conference: TCC Theory of Cryptography Conference

Saurabh, Saket and Tale, Prafullkumar
(2020) On the Parameterized Complexity of Maximum Degree Contraction Problem.
In: 15th International Symposium on Parameterized and Exact Computation (IPEC 2020).
Conference: IPEC International Symposium on Parameterized and Exact Computation (was IWPEC pre 2004)

Hajipour, Hossein and Bhattacharyya, Apratim and Fritz, Mario
(2020) SampleFix: Learning to Correct Programs by Sampling Diverse Fixes.
In: NeurIPS Workshop on Computer-Assisted Programming.
Conference: ECCV European Conference on Computer Vision

Döttling, Nico and Malavolta, Giulio and Pu, Sihang
(2020) A Combinatorial Approach to Quantum Random Functions.
In: 26th International Conference on the Theory and Application of Cryptology and Information Security.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Chen, Dingfan and Orekondy, Tribhuvanesh and Fritz, Mario
(2020) GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators.
In: 34th Conference on Neural Information Processing Systems (NeurIPS 2020).
Conference: NeurIPS Conference on Neural Information Processing Systems

Espitau, Thomas and Joux, Antoine and Kharchenko, Natalia
(2020) On a dual/hybrid approach to small secret LWE.
In: 21st International Conference on Cryptology in India.
Conference: INDOCRYPT International Conference on Cryptology in India

Grohe, Martin and Neuen, Daniel and Wiebking, Daniel
(2020) Isomorphism Testing for Graphs Excluding Small Minors.
In: 2020 IEEE 61st Annual Symposium on Foundations of Computer Science.
Conference: FOCS IEEE Symposium on Foundations of Computer Science

Chen, Dingfan and Yu, Ning and Zhang, Yang and Fritz, Mario
(2020) GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models.
In: ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Wen, Rui and Yu, Yu and Xie, Xiang and Zhang, Yang
(2020) LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Abdelnabi, Sahar and Krombholz, Katharina and Fritz, Mario
(2020) VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity.
In: ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Deuber, Dominic and Döttling, Nico and Magri, Bernardo and Malavolta, Giulio and Thyagarajan, Sri Aravinda Krishnan
(2020) Minting Mechanisms for (PoS) Blockchains.
In: ACNS.
Conference: ACNS International Conference on Applied Cryptography and Network Security

Bhattacharyya, Apratim and Straehle, Christoph-Nikolas and Fritz, Mario and Schiele, Bernt
(2020) Haar Wavelet based Block Autoregressive Flows for Trajectories.
In: German Conference on Pattern Recognition (GCPR).
Conference: GCPR German Conference on Pattern Recognition

Sharma, Saurabh and Yu, Ning and Fritz, Mario and Schiele, Bernt
(2020) Long-Tailed Recognition Using Class-Balanced Experts.
In: German Conference on Pattern Recognition (GCPR).
Conference: GCPR German Conference on Pattern Recognition

Losch, Max and Fritz, Mario and Schiele, Bernt
(2020) Semantic Bottlenecks: Quantifying and Improving Inspectability of Deep Representations.
In: German Conference on Patter Recognition (GCPR).
Conference: GCPR German Conference on Pattern Recognition

Hagestedt, Inken and Humbert, Mathias and Berrang, Pascal and Lehmann, Irina and Eils, Roland and Backes, Michael and Zhang, Yang
(2020) Membership Inference Against DNA Methylation Databases.
In: IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Durst, David and Feldman, Matthew and Huff, Dillon and Akeley, David and Daly, Ross and Bernstein, Gilbert Louis and Patrignani, Marco and Fatahalian, Kayvon and Hanrahan, Pat
(2020) Type-Directed Scheduling of Streaming Accelerators.
In: Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation.
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Sattar, Hosnieh and Krombholz, Katharina and Pons-Moll, Gerard and Fritz, Mario
(2020) Body Shape Privacy in Images: Understanding Privacy and Preventing Automatic Shape Extraction.
In: Workshop on The Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security CVCOPS at European Conference on Computer Vision (ECCV-W).
Conference: ECCV European Conference on Computer Vision

Marx, Dániel and Sandeep, R.B.
(2020) Incompressibility of H-Free Edge Modification Problems: Towards a Dichotomy.
In: ESA 2020.
Conference: ESA European Symposium on Algorithms

He, Yang and Schiele, Bernt and Fritz, Mario
(2020) Synthetic Convolutional Features for Improved Semantic Segmentation.
In: Workshop on Assistive Computer Vision and Robotics at European Conference on Computer Vision (ECCV-Workshop).
Conference: ACVR International Workshop on Assistive Computer Vision and Robotics

Marx, Dániel
(2020) Chordless Cycle Packing Is Fixed-Parameter Tractable.
In: ESA 2020.
Conference: ESA European Symposium on Algorithms

Schepper, Philipp
(2020) Fine-Grained Complexity of Regular Expression Pattern Matching and Membership.
In: European Symposium on Algorithms.
Conference: ESA European Symposium on Algorithms

Yu, Ning and Li, Ke and Zhou, Peng and Malik, Jitendra and Davis, Larry S. and Fritz, Mario
(2020) Inclusive GAN: Improving Data and Minority Coverage in Generative Models.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

He, Yang and Rahimian, Shadi and Schiele, Bernt and Fritz, Mario
(2020) Segmentations-Leak: Membership Inference Attacks and Defenses in Semantic Image Segmentation.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

Shetty, Rakshith and Fritz, Mario and Schiele, Bernt
(2020) Towards Automated Testing and Robustification by Semantic Adversarial Data Generation.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

Cogliati, Benoît-Michel and Jha, Ashwin and Nandi, Mridul
(2020) How to Build Optimally Secure PRFs Using Block Ciphers.
In: ASIACRYPT 2020.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Salem, Ahmed and Bhattacharya, Apratim and Backes, Michael and Fritz, Mario and Zhang, Yang
(2020) Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Gunda, Spoorthy and Jain, Pallavi and Lokshtanov, Daniel and Saurabh, Saket and Tale, Prafullkumar
(2020) On the Parameterized Approximability of Contraction to Classes of Chordal Graphs.
In: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2020, August 17-19, 2020, Virtual Conference.
Conference: APPROX International Workshop on Approximation Algorithms for Combinatorial Optimization Problems

Birtel, Benedikt and Rossow, Christian
(2020) Slitheen++: Stealth TLS-based Decoy Routing.
In: FOCI'20, August 2020.
Conference: FOCI USENIX Workshop on Free and Open Communications on the Internet

Khosrowjerdi, Hojat and Nemati, Hamed and Meinke, Karl
(2020) Spatio-Temporal Model-Checking of Cyber-Physical Systems Using Graph Queries.
In: Tests and Proofs - 14th International Conference, TAP@STAF 2020, Bergen, Norway, June 22-23, 2020, Proceedings postponed.
Conference: TAP International Conference on Tests and Proofs

Hajipour, Hossein and Malinowski, Mateusz and Fritz, Mario
(2020) IReEn: Iterative Reverse-Engineering of Black-Box Functions via Neural Program Synthesis.
In: NeurIPS Workshop on Computer-Assisted Programming.
Conference: ECCV European Conference on Computer Vision

Bhattacharyya, Apratim and Mahajan, Shweta and Fritz, Mario and Schiele, Bernt and Roth, Stefan
(2020) Normalizing Flows with Multi-scale Autoregressive Priors.
In: IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Agarwal, Vedika and Shetty, Rakshith and Fritz, Mario
(2020) Towards Causal VQA: Revealing and Reducing Spurious Correlations by Invariant and Covariant Semantic Editing.
In: IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Chou, Edward and Tramer, Florian and Pellegrino, Giancarlo
(2020) SentiNet: Detecting Localized Universal Attack Against Deep Learning Systems.
In: 3rd Deep Learning and Security Workshop (DLS 2020), May 21, 2020, All-digital.
Conference: IEEE SPW IEEE Symposium on Security and Privacy Workshops

Hasan, Rakibul and Crandall, David and Fritz, Mario and Kapadia, Apu
(2020) Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.
In: IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Abate, Carmine and Blanco, Roberto and Ciobaca, Stefan and Durier, Adrien and Garg, Deepak and Hritcu, Catalin and Patrignani, Marco and Tanter, Éric and Thibault, Jérémy
(2020) Trace-Relating Compiler Correctness and Secure Compilation.
In: Programming Languages and Systems.
Conference: ESOP European Symposium on Programming

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2020) Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks.
In: International Conference on Representation Learning (ICLR).
Conference: ICLR International Conference on Learning Representations

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2020) Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks.
In: International Conference on Representation Learning (ICLR).
Conference: ICLR International Conference on Learning Representations

Esiyok, Ilkan and Hanzlik, Lucjan and Künnemann, Robert and Budde, Lena Marie and Backes, Michael
(2020) TrollThrottle — Raising the Cost of Astroturfing.
In: ACNS 2020, 19-22 October 2020, Rome, Italy.
Conference: ACNS International Conference on Applied Cryptography and Network Security

Zhang, Yang and Humbert, Mathias and Surma, Bartlomiej and Manoharan, Praveen and Vreeken, Jilles and Backes, Michael
(2020) Towards Plausible Graph Anonymization.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Network and Distributed System Security Symposium

Dalleiger, Sebastian and Vreeken, Jilles
(2020) Explainable Data Decompositions.
In: Proceedings of the AAAI Conference on Artificial Intelligence (AAAI).
Conference: AAAI National Conference of the American Association for Artificial Intelligence
(In Press)

Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2020) Candidate iO from Homomorphic Encryption Schemes.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques
(In Press)

Brakerski, Zvika and Döttling, Nico
(2020) Hardness of LWE on General Entropic Distribution.
In: Eurocrypt 2020.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Döttling, Nico and Garg, Sanjam and Malavolta, Giulio and Vasudevan, Prashant Nalini
(2020) Tight Verifiable Delay Functions.
In: SCN 2020.
Conference: SCN Conference on Security and Cryptography for Networks

Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel and Wichs, Daniel
(2020) Two-Round Oblivious Transfer from CDH or LPN.
In: Eurocrypt 2020.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques
(In Press)

Thyagarajan, Sri Aravinda Krishnan and Bhat, Adithya and Malavolta, Giulio and Nico, Döttling and Kate, Aniket and Schröder, Dominique
(2020) Verifiable Timed Signatures Made Practical.
In: CCS 2020.
Conference: CCS ACM Conference on Computer and Communications Security

Li, Zheng and Hu, Chengyu and Guo, Shanqing and Zhang, Yang
(2019) How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN.
In: Annual Computer Security Applications Conference.
Conference: ACSAC Annual Computer Security Applications Conference

Jia, Jinyuan and Salem, Ahmed and Backes, Michael and Gong, Neil Zhenqiang and Zhang, Yang
(2019) MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Döttling, Nico and Garg, Sanjam and Goyal, Vipul and Malavolta, Giulio
(2019) Laconic Conditional Disclosure of Secrets and Applications.
In: FOCS 2019.
Conference: FOCS IEEE Symposium on Foundations of Computer Science
(In Press)

Yu, Ning and Davis, Larry and Fritz, Mario
(2019) Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints.
In: International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Maximov, Maxim and Leal-Taixe, Laura and Fritz, Mario and Ritschel, Tobias
(2019) Deep Appearance Maps.
In: International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Döttling, Nico and Garg, Sanjam and Ishai, Yuval and Malavolta, Giulio and Mour, Tamer and Ostrovsky, Rafail
(2019) Trapdoor Hash Functions and Their Applications.
In: CRYPTO 2019.
Conference: CRYPTO Advances in Cryptology

Rahman, Tahleen and Surma, Bartlomiej and Backes, Michael and Zhang, Yang
(2019) Fairwalk: Towards Fair Graph Embedding.
In: International Joint Conference on Artificial Intelligence.
Conference: IJCAI International Joint Conference on Artificial Intelligence

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2019) Knockoff Nets: Stealing Functionality of Black-Box Models.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2019) Not Using the Car to See the Sidewalk: Quantifying and Controlling the Effects of Context in Classification and Segmentation.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Ke, Qiuhong and Fritz, Mario and Schiele, Bernt
(2019) Time-Conditioned Action Anticipation in One Shot.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Zhang, Yang
(2019) Language in Our Time: An Empirical Analysis of Hashtags.
In: The Web Conference.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2019) ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code.
In: Proceedings of the Fourteenth EuroSys Conference 2019, March 25-28, 2019, Dresden, Germany.
Conference: EuroSys Eurosys Conference

Hagestedt, Inken and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Haixu, Tang and XiaoFeng, Wang and Backes, Michael
(2019) MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Network and Distributed System Security Symposium

Salem, Ahmed and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Fritz, Mario and Backes, Michael
(2019) ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Network and Distributed System Security Symposium

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2019) Bayesian Prediction of Future Street Scenes using Synthetic Likelihoods.
In: International Conference on Representation Learning (ICLR).
Conference: ICLR International Conference on Learning Representations

Aggarwal, Divesh and Döttling, Nico and Nielsen, Jesper Buus and Obremski, Maciej and Purwanto, Erick
(2019) Continuous Non-Malleable Codes in the 8-Split-State Model.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Reliable Correlations in Categorical Data.
In: IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Reliable Dependencies from Data: Hardness and Improved Algorithms (Extended Abstract).
In: International Joint Conference on Artificial Intelligence (IJCAI).
Conference: IJCAI International Joint Conference on Artificial Intelligence

Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Robustly Connected Subgraphs with Simple Descriptions.
In: ACM SIGKDD Workshop on Mining and Learning from Graphs (MLG).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Robustly Connected Subgraphs with Simple Descriptions.
In: ECMLPKDD Workshop on Graph Embedding and Mining (GEM).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Robustly Connected Subgraphs with Simple Descriptions.
In: IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019) Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
In: PKC 2019.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography
(In Press)

Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Dowsley, Rafael and Giacomelli, Irene
(2019) Efficient UC Commitment Extension with Homomorphism for Free (and Applications).
In: ASIACRYPT 2019.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Sattar, Hosnieh and Pons-Moll, Gerard and Fritz, Mario
(2019) Fashion is Taking Shape: Understanding Clothing Preference Based on Body Shape From Online Sources.
In: IEEE Winter Conference on Applications of Computer Vision (WACV).
Conference: WACV IEEE Workshop on Applications of Computer Vision

Kutylowski, Miroslaw and Lemiesz, Jakub and Slowik, Marta and Slowik, Marcin and Kluczniak, Kamil and Gebala, Maciej
(2019) GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures.
In: Information Security Practice and Experience Conference (ISPEC).
Conference: ISPEC Information Security Practice and Experience Conference

Döttling, Nico and Lai, Russell and Malavolta, Giulio
(2019) Incremental Proofs of Sequential Work.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques
(Unpublished)

Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2019) Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
In: TCC 2019.
Conference: TCC Theory of Cryptography Conference
(In Press)

Steil, Julian and Hagestedt, Inken and Huang, Michael Xuelin and Bulling, Andreas
(2019) Privacy-aware eye tracking using differential privacy.
In: Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications, ETRA 2019, Denver , CO, USA, June 25-28, 2019.
Conference: ETRA ACM Symposium on Eye Tracking Research & Applications

Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Liu, Kevin and Malavolta, Giulio
(2019) Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
In: ASIACRYPT 2019.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Backes, Michael and Döttling, Nico and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2019) Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions.
In: IACR Eurocrypt 2019.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Shetty, Rakshith and Fritz, Mario and Schiele, Bernt
(2018) Adversarial Scene Editing: Automatic Object Removal from Weak Supervision.
In: Conference on Neural Information Processing Systems.
Conference: NeurIPS Conference on Neural Information Processing Systems

Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018) A Hybrid Model for Identity Obfuscation by Face Replacement.
In: European Conference on Computer Vision.
Conference: ECCV European Conference on Computer Vision

He, Yang and Fritz, Mario and Schiele, Bernt
(2018) Diverse Conditional Image Generation by Stochastic Regression with Latent Drop-Out Codes.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

Tretschk, Edgar and Oh, Seong Joon and Fritz, Mario
(2018) Sequential Attacks on Agents for Long-Term Adversarial Goals.
In: 2. ACM Computer Science in Cars Symposium -- Future Challenges in Artificial Intelligence & Security for Autonomous Vehicles.
Conference: CSCS ACM Computer Science in Cars Symposium
(In Press)

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2018) A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security Usenix Security Symposium

Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2018) Long-Term Image Boundary Prediction.
In: Association for the Advancement of Artificial Intelligence (AAAI).
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Berrang, Pascal and Humbert, Mathias and Zhang, Yang and Lehmann, Irina and Eils, Roland and Backes, Michael
(2018) Dissecting Privacy Risks in Biomedical Data.
In: IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Zhang, Yang and Humbert, Mathias and Rahman, Tahleen and Li, Cheng-Te and Pang, Jun and Backes, Michael
(2018) Tagvisor: A Privacy Advisor for Sharing Hashtags.
In: The Web Conference.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Bhattacharyya, Apratim and Schiele, Bernt and Fritz, Mario
(2018) Accurate and Diverse Sampling of Sequences Based on a “Best of Many” Sample Objective.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Wagner, Misha and Basevi, Hector and Shetty, Rakshith and Li, Wenbin and Malinowski, Mateusz and Fritz, Mario and Leonardis, Ales
(2018) Answering Visual What-If Questions: From Actions to Predicted Scene Descriptions.
In: Visual Learning and Embodied Agents in Simulation Environments Workshop at European Conference on Computer Vision.
Conference: ECCV European Conference on Computer Vision

Orekondy, Tribhuvanesh and Fritz, Mario and Schiele, Bernt
(2018) Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Ma, Liqian and Sun, Qianru and Georgoulis, Stamatios and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Disentangled Person Image Generation.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2018) Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Natural and Effective Obfuscation by Head Inpainting.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel
(2018) New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
In: PKC.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

Döttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Mukherjee, Pratyay
(2018) Obfuscation from Low Noise Multilinear Maps.
In: INDOCRYPT.
Conference: INDOCRYPT International Conference on Cryptology in India

Asghar, Muhammad Rizwan and Backes, Michael and Simeonovski, Milivoj
(2018) PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
In: 2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018.
Conference: ICC IEEE International Conference on Communications

Salem, Ahmed and Berrang, Pascal and Humbert, Mathias and Backes, Michael
(2018) Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
In: The 19th Privacy Enhancing Technologies Symposium (PETS).
Conference: PETS Privacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)
(In Press)

Speicher, Patrick and Steinmetz, Marcel and Backes, Michael and Hoffmann, Jörg and Künnemann, Robert
(2018) Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
In: The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18), New Orleans, Louisiana, USA.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Oh, Seong Joon and Augustin, Max and Schiele, Bernt and Fritz, Mario
(2018) Towards Reverse-Engineering Black-Box Neural Networks.
In: International Conference on Learning Representations (ICLR).
Conference: ICLR International Conference on Learning Representations

Brakerski, Zvika and Döttling, Nico
(2018) Two-Message Statistically Sender-Private OT from LWE.
In: TCC (2).
Conference: TCC Theory of Cryptography Conference

Backes, Michael and Gomez-Rodriguez, Manuel and Manoharan, Praveen and Surma, Bartlomiej
(2017) Reconciling Privacy and Utility in Continuous-Time Diffusion Networks.
In: Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2017) Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling.
In: Mutual Benefits of Cognitive and Computer Vision Workshop at International Conference on Computer Vision (ICCV-W).

Backes, Michael and Berrang, Pascal and Bieg, Matthias and Elis, Roland and Herrmann, Carl and Humbert, Mathias and Lehmann, Irina
(2017) Identifying Personal DNA Methylation Profiles by Genotype Inference.
In: Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Pang, Jun and Zhang, Yang
(2017) DeepCity: A Feature Learning Framework for Mining Location Check-ins.
In: International Conference on Web and Social Media.

Frenkel, Hadar and Grumberg, Orna and Sheinvald, Sarai
(2017) An Automata-Theoretic Approach to Modeling Systems and Specifications over Infinite Data.
In: NFM 2017.
Conference: NFM NASA Formal Methods Symposium

Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2017) P2P Mixing and Unlinkable Bitcoin Transactions.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS Network and Distributed System Security Symposium

Tabibian, Behzad and Valera, Isabel and Farajtabar, Mehrdad and Song, Le and Schölkopf, Bernhard and Gomez-Rodriguez, Manuel
(2017) Distilling Information Reliability and Source Trustworthiness from Digital Traces.
In: 26th International World Wide Web Conference (WWW'17).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Sun, Qianru and Schiele, Bernt and Fritz, Mario
(2017) A Domain Based Approach to Social Relation Recognition.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Oh, Seong Joon and Benenson, Rodrigo and Khoreva, Anna and Akata, Zeynep and Fritz, Mario and Schiele, Bernt
(2017) Exploiting saliency for object segmentation from image level labels.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Zafar, Bilal and Valera, Isabel and Gomez-Rodriguez, Manuel and Gummadi, Krishna P.
(2017) Fairness Beyond Disparate Treatment & Disparate Impact: Learning Classification without Disparate Mistreatment.
In: 26th International World Wide Web Conference (WWW'17).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

He, Yang and Chiu, Wei-Chen and Keuper, Margret and Fritz, Mario
(2017) STD2P: RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017) Adversarial Image Perturbation for Privacy Protection — A Game Theory Perspective.
In: IEEE International Conference on Computer Vision (ICCV), 2017.
Conference: ICCV IEEE International Conference on Computer Vision

Broadnax, Brandon and Döttling, Nico and Hartung, Gunnar and Müller-Quade, Jörn and Nagel, Matthias
(2017) Concurrently Composable Security with Shielded Super-Polynomial Simulators.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Apon, Daniel and Döttling, Nico and Garg, Sanjam and Mukherjee, Pratyay
(2017) Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13.
In: ICALP.
Conference: ICALP International Colloquium on Automata Languages and Programming

Döttling, Nico and Garg, Sanjam
(2017) From Selective IBE to Full IBE and Selective HIBE.
In: TCC.
Conference: TCC Theory of Cryptography Conference

Döttling, Nico and Garg, Sanjam
(2017) Identity-Based Encryption from the Diffie-Hellman Assumption.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2017) It's Written All Over Your Face: Full-Face Appearance-Based Gaze Estimation.
In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops, Honolulu, HI, USA, July 21-26, 2017.

Cho, Chongwon and Döttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Polychroniadou, Antigoni
(2017) Laconic Oblivious Transfer and Its Applications.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

He, Yang and Keuper, Margret and Schiele, Bernt and Fritz, Mario
(2017) Learning Dilation Factors for Semantic Segmentation of Street Scenes.
In: Pattern Recognition - 39th German Conference, GCPR 2017, Basel, Switzerland, September 12-15, 2017, Proceedings.

Cramer, Ronald and and Nico Döttling, Ivan Damgård and Giacomelli, Irene and Xing, Chaoping
(2017) Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model.
In: ICITS.

Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017) Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Döttling, Nico and Ghosh, Satrajit and Nielsen, Jesper Buus and Nilges, Tobias and Trifiletti, Roberto
(2017) TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.
In: ACM Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017) Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Li, Wenbin and Leonardis, Ales and Fritz, Mario
(2017) Visual stability prediction for robotic manipulation.
In: 2017 IEEE International Conference on Robotics and Automation, ICRA 2017, Singapore, Singapore, May 29 - June 3, 2017.

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne and Gool, Luc Van
(2017) What is Around the Camera?
In: IEEE International Conference on Computer Vision, ICCV 2017, Venice, Italy, October 22-29, 2017.
Conference: ICCV IEEE International Conference on Computer Vision

Schneider, Jonas and Fleischhacker, Nils and Schröder, Dominique and Backes, Michael
(2016) Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Manoharan, Praveen
(2016) Membership Privacy in MicroRNA-based Studies.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS ACM Conference on Computer and Communications Security

Brakerski, Zvika and Brzuska, Christina and Fleischhacker, Nils
(2016) On Statistically Secure Obfuscation with Approximate Correctness.
In: Proceedings of the 36th International Cryptology Conference (CRYPTO '16).

Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016) Two Message Oblivious Evaluation of Cryptographic Functionalities.
In: Proceedings of the 36th International Cryptology Conference (CRYPTO '16).
Conference: CRYPTO Advances in Cryptology

Backes, Michael and Berrang, Pascal and Hecksteden, Anne and Humbert, Mathias and Keller, Andreas and Meyer, Tim
(2016) Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Ohrimenko, Olga and Costa, Manuel and Fournet, Cédric and Nowozin, Sebastian and Mehta, Aastha and Schuster, Felix and Vaswani, Kapil
(2016) SGX-Enabled Oblivious Machine Learning.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Biega, Joanna Asia and Gummadi, Krishna P. and Mele, Ida and Milchevski, Dragan and Tryfonopoulos, Christos and Weikum, Gerhard
(2016) R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities.
In: Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval (SIGIR '16).
Conference: SIGIR ACM International Conference on Research and Development in Information Retrieval

Schiele, Bernt and Bhattacharjee, Bobby and Fritz, Mario and Aditya, Paarijaat and Druschel, Peter and Sen, Rijurekha and Oh, Seong Joon and Benenson, Rodrigo and Wu, Tong Tong
(2016) Demo: I-Pic: A Platform for Privacy-Compliant Image Capture.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16).

Krupp, Johannes and Schröder, Dominique and Simkin, Mark and Fiore, Dario and Ateniese, Giuseppe and Nürnberger, Stefan
(2016) Nearly Optimal Verifiable Data Streaming.
In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.

Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016) Anonymous RAM.
In: 21st European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Lai, Russell W F and Zhang, Tao and Chow, Sherman S M and Schröder, Dominique
(2016) Efficient Sanitizable Signatures Without Random Oracles.
In: Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS'16).
Conference: ESORICS European Symposium On Research In Computer Security

Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2016) Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016) Faceless Person Recognition: Privacy Implications in Social Media.
In: Computer Vision - ECCV 2016 - 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part III.
Conference: ECCV European Conference on Computer Vision

Mondal, Mainack and Messias, Johnnatan and Ghosh, Saptarshi and Gummadi, Krishna P. and Kate, Aniket
(2016) Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
In: 12th Symposium on Usable Privacy and Security (SOUPS'16).

Aditya, Paarijaat and Sen, Rijurekha and Druschel, Peter and Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt and Bhattacharjee, Bobby and Wu, Tong Tong
(2016) I-Pic: A Platform for Privacy-Compliant Image Capture.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16).

Reed, Scott and Akata, Zeynep and Lee, Honglak and Schiele, Bernt
(2016) Learning Deep Representations of Fine-Grained Visual Descriptions.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2016) Loss Functions for Top-k Error: Analysis and Insights.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Gnad, Daniel and Steinmetz, Marcel and Jany, Mathäus and Hoffmann, Jörg and Serina, Ivan and Gerevini, Alfonso
(2016) Partial Delete Relaxation, Unchained: On Intractable Red-Black Planning and Its Applications.
In: Proceedings of the 9th Annual Symposium on Combinatorial Search (SOCS'16).

Daum, Jeanette and Torralba, Àlvaro and Hoffmann, Jörg and Haslum, Patrik and Weber, Ingo
(2016) Practical Undoability Checking via Contingent Planning.
In: Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Li, Wenbin and Fritz, Mario
(2016) Recognition of Ongoing Complex Activities by Sequence Prediction over a Hierarchical Label Space.
In: IEEE Winter Conference on Applications of Computer Vision (WACV).
Conference: WACV IEEE Workshop on Applications of Computer Vision

Steinmetz, Marcel and Hoffmann, Jörg and Buffet, Olivier
(2016) Revisiting Goal Probability Analysis in Probabilistic Planning.
In: Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Jiang, Ke and Eles, Petru and Peng, Zebo and Chattopadhyay, Sudipta and Batina, Lejla
(2016) SPARTA: A Scheduling Policy for Thwarting Differential Power Analysis Attacks.
In: 21st Asia and South Pacific Design Automation Conference (ASP-DAC).

Venkatadri, Giridhari and Goga, Oana and Zhong, Changtao and Viswanath, Bimal and Gummadi, Krishna P. and Sastry, Nishanth R
(2016) Strengthening Weak Identities Through Inter-Domain Trust Transfer.
In: Proceedings of the 25th International Conference on World Wide Web (WWW'16).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gavves, Efstratios and Tuytelaars, Tinne
(2016) Deep Reflectance Maps.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Scheer, Jonas and Fritz, Mario and Grau, Oliver
(2016) Learning to Select Long-Track Features for Structure-From-Motion and Visual SLAM.
In: Pattern Recognition - 38th German Conference, GCPR 2016, Hannover, Germany, September 12-15, 2016, Proceedings.

Malinowski, Mateusz and Mokarian, Ashkan and Fritz, Mario
(2016) Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task.
In: Proceedings of the British Machine Vision Conference 2016, BMVC 2016, York, UK, September 19-22, 2016.

Akata, Zeynep and Malinowski, Mateusz and Fritz, Mario and Schiele, Bernt
(2016) Multi-cue Zero-Shot Learning with Strong Supervision.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Nielsen, Jesper Buus
(2016) Rate-1, Linear Time and Additively Homomorphic UC Commitments.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

Chiu, Wei-Chen and Galasso, Fabio and Fritz, Mario
(2016) Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles.
In: Computer Vision - ACCV 2016 - 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part V.

Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016) Two-Message, Oblivious Evaluation of Cryptographic Functionalities.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

Sharma, Abhishek and Grau, Oliver and Fritz, Mario
(2016) VConv-DAE: Deep Volumetric Shape Learning Without Object Labels.
In: Computer Vision - ECCV 2016 Workshops - Amsterdam, The Netherlands, October 8-10 and 15-16, 2016, Proceedings, Part III.

Chowdhury, Sreyasi Nag and Malinowski, Mateusz and Bulling, Andreas and Fritz, Mario
(2016) Xplore-M-Ego: Contextual Media Retrieval Using Natural Language Queries.
In: Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval, ICMR 2016, New York, New York, USA, June 6-9, 2016.

Backes, Michael and Meiser, Sebastian and Slowik, Marcin
(2015) Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
In: Proceedings on Privacy Enhancing Technologies.

Ruffing, Tim and Kate, Aniket and Schröder, Dominique
(2015) Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins.
In: Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015) POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Schröder, Dominique and Döttling, Nico
(2015) Efficient Pseudorandom Functions via On-the-Fly Adaptation.
In: Proceedings of the 35th International Cryptology Conference (CRYPTO '15).
Conference: CRYPTO Advances in Cryptology

Mohammadi, Esfandiar and Bendun, Fabian and Pecina, Kim and Maffei, Matteo and Backes, Michael
(2015) Symbolic Malleable Zero-knowledge Proofs.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Schneider, Jonas and Schröder, Dominique
(2015) Foundations of Reconfigurable PUFs.
In: Proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, New York, NY, USA, June 2-5, 2015.

Backes, Michael and Barbosa, Manuel and Fiore, Dario and Reischuk, Raphael M.
(2015) ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2015) Privacy and Access Control for Outsourced Personal Records.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Bendun, Fabian and Hoffmann, Jörg and Marnau, Ninja
(2015) PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law.
In: Proceedings of the 4th Conference on Principles of Security and Trust (POST).

Backes, Michael and Gagné, Martin and Thyagarajan, Sri Aravinda Krishnan
(2015) Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext.
In: ACM ASIACCS Security in Cloud Computing Workshop 2015.

Farajtabar, Mehrdad and Gomez-Rodriguez, Manuel and Du, Nan and Zamani, Mohammad and Zha, Hongyuan and Song, Le
(2015) Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades.
In: Proceedings of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS).
Conference: AISTATS International Conference on Artificial Intelligence and Statistics

Khoreva, Anna and Galasso, Fabio and Hein, Matthias and Schiele, Bernt
(2015) Classifier based graph construction for video segmentation.
In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'15).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Jawanpuria, Pratik and Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2015) Efficient Output Kernel Learning for Multiple Tasks.
In: Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada.
Conference: NeurIPS Conference on Neural Information Processing Systems

Blond, Stevens Le and Choffnes, David R. and Caldwell, William and Druschel, Peter and Merritt, Nicholas
(2015) Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
In: Proc. of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15).
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Gnad, Daniel and Hoffmann, Jörg
(2015) Red-Black Planning: A New Tractability Analysis and Heuristic Function.
In: Proceedings of the 8th Annual Symposium on Combinatorial Search (SOCS'15).

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015) Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
In: Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15).

Hoffmann, Jörg
(2015) Simulated Penetration Testing: From "Dijkstra" to "Turing Test++".
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2015).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Viswanath, Bimal and Bashir, Muhammad Ahmad and Zafar, Muhammad Bilal and Bouget, Simon and Guha, Saikat and Gummadi, Krishna P. and Kate, Aniket and Mislove, Alan
(2015) Strength in Numbers: Robust Tamper Detection in Crowd Computations.
In: Proceedings of the 2015 ACM on Conference on Online Social Networks, COSN 2015, Palo Alto, California, USA, November 2-3, 2015.

Schröder, Dominique and Simkin, Mark
(2015) VeriStream - A Framework for Verifiable Data Streaming.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers.

Hanser, Christian and Rabkin, Max and Schröder, Dominique
(2015) Verifiably Encrypted Signatures: Security Revisited and a New Construction.
In: Proc. of the 20th European Symposium on Research in Computer Security (ESORICS 2015).
Conference: ESORICS European Symposium On Research In Computer Security

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2015) Appearance-based gaze estimation in the wild.
In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2015) Ask Your Neurons: A Neural-Based Approach to Answering Questions about Images.
In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015.
Conference: ICCV IEEE International Conference on Computer Vision

Döttling, Nico and Schröder, Dominique
(2015) Efficient Pseudorandom Functions via On-the-Fly Adaptation.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn and Nilges, Tobias
(2015) From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
In: ProvSec.

Kraschewski, Daniel and Nilges, Tobias and Döttling, Nico and Müller-Quade, Jörn
(2015) General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
In: TCC.
Conference: TCC Theory of Cryptography Conference

Seiter, Julia and Wei-Chen, Chiu and Fritz, Mario and Amft, Oliver and Tröster, Gerhard
(2015) Joint segmentation and activity discovery using semantic and temporal priors.
In: 2015 IEEE International Conference on Pervasive Computing and Communications, PerCom 2015, St. Louis, MO, USA, 23-27 March, 2015.
Conference: PERCOM IEEE International Conference on Pervasive Computing and Communications

Cramer, Ronald and Damgård, Ivan Bjerre and Döttling, Nico and Fehr, Serge and Spini, Gabriele
(2015) Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Döttling, Nico
(2015) Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.
In: PKC.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2015) Person Recognition in Personal Photo Collections.
In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015.
Conference: ICCV IEEE International Conference on Computer Vision

Sattar, Hosnieh and Müller, Sabine and Fritz, Mario and Bulling, Andreas
(2015) Prediction of search targets from fixations in open-world settings.
In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Wei-Chen, Walon and Fritz, Mario
(2015) See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG.
In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015.
Conference: ICCV IEEE International Conference on Computer Vision

Li, Wenbin and Fritz, Mario
(2015) Teaching robots the use of human tools from demonstration with non-dexterous end-effectors.
In: 15th IEEE-RAS International Conference on Humanoid Robots, Humanoids 2015, Seoul, South Korea, November 3-5, 2015.

Krupp, Johannes and Schröder, Dominique and Simkin, Mark
(2014) DEMO: Enhancing Security and Privacy with Google Glass.
In: Proceedings of the 21st ACM Conference on Computer and Communication Security (CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Mohammadi, Esfandiar
(2014) (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
In: Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2014) Lime: Data Lineage in the Malicious Environment.
In: Proceedings of 10th International Workshopon Security and Trust Management (STM).

Dachman-Soled, Dana and Fleischhacker, Nils and Katz, Jonathan and Lysyanskaya, Anna and Schröder, Dominique
(2014) Feasibility and Infeasibility of Secure Computation with Malicious PUFs.
In: Proceedings of the 34th International Cryptology Conference (Crypto '14).
Conference: CRYPTO Advances in Cryptology

Backes, Michael and Bendun, Fabian and Choudhury, Ashish and Kate, Aniket
(2014) Asynchronous MPC with a Strict Honest Majority Using Non-equivocation.
In: ACM Symposium on Principles of Distributed Computing 2014.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014) BackRef: Accountability in Anonymous Communication Networks.
In: Applied Cryptography and Network Security.

Backes, Michael and Gerling, Sebastian and Lorenz, Stefan and Lukas, Stephan
(2014) X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.
In: 29th ACM Symposium on Applied Computing (SAC 2014).

Mondal, Mainack and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan
(2014) Beyond Access Control: Managing Online Privacy via Exposure.
In: Proceedings of the Workshop on Useable Security (USEC'14).

Simkin, Mark and Schröder, Dominique and Bulling, Andreas and Fritz, Mario
(2014) Bridging the Gap Between Digital Cryptography and the Physical World.
In: European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2014) Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-party Setting.
In: Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2014) CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
In: Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014).

Choi, Seung Geol and Katz, Jonathan and Schröder, Dominique and Yerukhimovich, Arkady and Zhou, Hong-Sheng
(2014) (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings.
Conference: TCC Theory of Cryptography Conference

Fawcett, Chris and Vallati, Mauro and Hutter, Frank and Hoffmann, Jörg and Hoos, Holger H. and Leyton-Brown, Kevin
(2014) Improved Features for Runtime Prediction of Domain-Independent Planners.
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Krajnanský, Michal and Hoffmann, Jörg and Buffet, Olivier and Fern, Alan
(2014) Learning Pruning Rules for Heuristic Search Planning.
In: Proc. of the 21st European Conference on Artificial Intelligence (ECAI 2014).
Conference: ECAI European Conference on Artificial Intelligence

Platenius, Marie Christin and Arifulina, Svetlana and Petrlic, Ronald and Schäfer, Wilhelm
(2014) Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.
In: Proceedings of The 4th International Workshop on Adaptive Services for the Future Internet.

Fleischhacker, Nils and Manulis, Mark and Azodi, Amir
(2014) A Modular Framework for Multi-Factor Authentication and Key Exchange.
In: Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings.

Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique
(2014) On Tight Security Proofs for Schnorr Signatures.
In: Proc. of the 20th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014).
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Areces, Carlos and Bustos, Facundo and Dominguez, Martín Ariel and Hoffmann, Jörg
(2014) Optimizing Planning Domains by Automatic Action Schema Splitting.
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Asghar, Muhammad Rizwan and Gehani, Ashish and Crispo, Bruno and Russello, Giovanni
(2014) PIDGIN: Privacy-preserving Interest and Content Sharing in Opportunistic Networks.
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security.

Reznichenko, Alexey and Francis, Paul
(2014) Private-by-Design Advertising Meets the Real World.
In: Proc. of the 20th ACM Conference on Computer and Communication Security (CCS 2014).
Conference: CCS ACM Conference on Computer and Communications Security

Lapin, Maksim and Schiele, Bernt and Hein, Matthias
(2014) Scalable Multitask Representation Learning for Scene Classification.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Brangewitz, Sonja and Jungmann, Alexander and Petrlic, Ronald and Platenius, Marie Christin
(2014) Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services.
In: Proceedings of The Sixth International Conferences on Advanced Service Computing.

Karayev, Sergey and Fritz, Mario and Darrell, Trevor
(2014) Anytime Recognition of Objects and Scenes.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2014) Image-Based Synthesis and Re-synthesis of Viewpoints Guided by 3D Models.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Malinowski, Mateusz and Fritz, Mario
(2014) A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input.
In: Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada.
Conference: NeurIPS Conference on Neural Information Processing Systems

Wei-Chen, Walon and Johnson, Gregory and McCulley, Daniel and Grau, Oliver and Fritz, Mario
(2014) Object Disambiguation for Augmented Reality Applications.
In: British Machine Vision Conference, BMVC 2014, Nottingham, UK, September 1-5, 2014.

Backes, Michael and Fiore, Dario and Reischuk, Raphael M.
(2013) Verifiable Delegation of Computation on Outsourced Data.
In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Meiser, Sebastian
(2013) Differentially Private Smart Metering with Battery Recharging.
In: Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013).

Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013) AnoA: A Framework For Analyzing Anonymous Communication Protocols.
In: Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Fischlin, Marc and Fleischhacker, Nils
(2013) Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
In: Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT '13).
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Backes, Michael and Doychev, Goran and Köpf, Boris
(2013) Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
In: Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13).
Conference: NDSS Network and Distributed System Security Symposium

Catalano, Dario and Fiore, Dario and Gennaro, Rosario and Vamvourellis, Konstantinos
(2013) Algebraic (Trapdoor) One-Way Functions and Their Applications.
In: Proc. of the 10th Theory of Cryptography Conference (TCC 2013).

Backes, Michael and Datta, Amit and Kate, Aniket
(2013) Asynchronous Computational VSS with Reduced Communication Complexity.
In: Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013).

Gagné, Martin and Lafourcade, Pascal and Lakhnech, Yassine
(2013) Automated Security Proofs for Almost-Universal Hash for MAC Verification.
In: Proc. of the 18th European Symposium on Research in Computer Security (ESORICS 2013).

Bühler, Thomas and Rangapuram, Syama Sundar and Setzer, Simon and Hein, Matthias
(2013) Constrained fractional set programs and their application in local clustering and community detection.
In: Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 16-21 June 2013.
Conference: ICML International Conference on Machine Learning

Schmidt, Jens M
(2013) Contractions, Removals and How to Certify 3-Connectivity in Linear Time.
In: SIAM Journal on Computing.

Eigner, Fabienne and Maffei, Matteo
(2013) Differential Privacy by Typing in Security Protocols.
In: Proc. 1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013).

Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013) Identity-Based Steganography and Its Applications to Censorship Resistance.
In: 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013).

Tang, Siyu and Andriluka, Mykhaylo and Milan, Anton and Schindler, Konrad and Roth, Stefan and Schiele, Bernt
(2013) Learning People Detectors for Tracking in Crowded Scenes.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Fischlin, Marc and Fleischhacker, Nils
(2013) Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
In: Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT 2013).
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013) Poster: Identity-Based Steganography and Its Applications to Censorship Resistance.
In: Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS '13).
Conference: CCS ACM Conference on Computer and Communications Security

Catalano, Dario and Fiore, Dario
(2013) Practical Homomorphic MACs for Arithmetic Circuits.
In: Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT 2013).
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Backes, Michael and Fiore, Dario and Mohammadi, Esfandiar
(2013) Privacy-Preserving Accountable Computation.
In: Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Fleischhacker, Nils and Günther, Felix and Kiefer, Franziskus and Manulis, Mark and Poettering, Bertram
(2013) Pseudorandom signatures.
In: Proc. of the 8th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2013).

Yan, Junjie and Zhang, Xucong and Lei, Zhen and Li, Stan Z
(2013) Real-time High Performance Deformable Models for Face Detection in the Wild.
In: Proceedings of the IAPR International Conference on Biometrics (ICB).

Yan, Junjie and Zhang, Xucong and Lei, Zhen and Liao, ShengCai and Li, Stan Z
(2013) Robust Multi-resolution Pedestrian Detection in Traffic Scenes.
In: IEEE Conference Computer Vision and Pattern Recognition (CVPR).

Chen, Ruichuan and Akkus, Istemi Ekin and Francis, Paul
(2013) SplitX: high-performance private analytics.
In: Proc. of the ACM SIGCOMM 2013 Conference.
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Pishchulin, Leonid and Andriluka, Mykhaylo and Gehler, Peter and Schiele, Bernt
(2013) Strong Appearance and Expressive Spatial Models for Human Pose Estimation.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Asghar, Muhammad Rizwan and Russello, Giovanni and Crispo, Bruno and Ion, Mihaela
(2013) Supporting Complex Queries and Access Policies for Multi-user Encrypted Databases.
In: Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop.

Blond, Stevens Le and Choffnes, David and Zhou, Wenxuan and Druschel, Peter and Ballani, Hitesh and Francis, Paul
(2013) Towards Efficient Traffic-analysis Resistant Anonymity Networks.
In: Proc. of the ACM SIGCOMM 2013 Conference.
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Joshi, Nakul and Petrlic, Ronald
(2013) Towards practical privacy-preserving Digital Rights Management for Cloud Computing.
In: Proceedings of The 10th Annual IEEE Consumer Communications & Networking Conference (CCNC 2013).

Rangapuram, Syama Sundar and Bühler, Thomas and Hein, Matthias
(2013) Towards realistic team formation in social networks based on densest subgraphs.
In: 22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Chowdhury, Soudip Roy and Imran, Muhammad and Asghar, Muhammad Rizwan and Amer-Yahia, Sihem and Castillo, Carlos
(2013) Tweet4act: Using Incident-Specific Profiles for Classifying Crisis-Related Messages.
In: The 10th International Conference on Information Systems for Crisis Response and Management (ISCRAM).

Petrlic, Ronald and Sekula, Stephan
(2013) Unlinkable content playbacks in a multiparty DRM system.
In: Data and Applications Security and Privacy XXVII.

Catalano, Dario and Fiore, Dario
(2013) Vector Commitments and Their Applications.
In: Proc. of the 16th International Conference on Practice and Theory in Public Key Cryptography (PKC 2013).

Döttling, Nico and Nilges, Tobias and Mie, Thilo and Müller-Quade, Jörn
(2013) Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
In: TCC.
Conference: TCC Theory of Cryptography Conference

Malinowski, Mateusz and Fritz, Mario
(2013) Learning Smooth Pooling Regions for Visual Recognition.
In: British Machine Vision Conference, BMVC 2013, Bristol, UK, September 9-13, 2013.

Döttling, Nico and Müller-Quade, Jörn
(2013) Lossy Codes and a New Variant of the Learning-With-Errors Problem.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Wei-Chen, Walon and Fritz, Mario
(2013) Multi-class Video Co-segmentation with a Generative Multi-video Model.
In: 2013 IEEE Conference on Computer Vision and Pattern Recognition, Portland, OR, USA, June 23-28, 2013.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Levinkov, Evgeny and Fritz, Mario
(2013) Sequential Bayesian Model Update under Structured Scene Prior for Semantic Road Scenes Labeling.
In: IEEE International Conference on Computer Vision, ICCV 2013, Sydney, Australia, December 1-8, 2013.
Conference: ICCV IEEE International Conference on Computer Vision

Akkus, Istemi Ekin and Chen, Ruichuan and Hardt, Michaela and Francis, Paul and Gehrke, Johannes
(2012) Non-tracking Web Analytics.
In: Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Kate, Aniket and Mohammadi, Esfandiar
(2012) Ace: An Efficient Key-Exchange Protocol for Onion Routing.
In: Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES).

Backes, Michael and Bendun, Fabian and Kate, Aniket
(2012) Brief announcement: distributed cryptography using trinc.
In: ACM Symposium on Principles of Distributed Computing 2012.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2012) ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
In: Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012).
Conference: SP IEEE Symposium on Security and Privacy

Asghar, Muhammad Rizwan and Russello, Giovanni
(2012) ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems.
In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY).

Druschel, Peter
(2012) Accountability and Trust in Cooperative Information Systems.
In: Proc. of the 28th IEEE International Conference on Data Engineering (ICDE'12).
Conference: ICDE International Conference on Data Engineering

Backes, Michael and Goldberg, Ian and Kate, Aniket and Toft, Tomas
(2012) Adding query privacy to robust DHTs.
In: Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012).

Pishchulin, Leonid and Jain, Arjun and Andriluka, Mykhaylo and Thormählen, Thorsten and Schiele, Bernt
(2012) Articulated People Detection and Pose Estimation: Reshaping the Future.
In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2012) Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification.
In: Eight Workshop on Formal and Computational Cryptography (FCC 2012).
(Unpublished)

Mainberger, Markus and Backes, Michael and Berg, Matthias and Weickert, Joachim
(2012) Diffusion-Based Image Compression in Steganography.
In: Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012.

Fischlin, Marc and Lehmann, Anja and Schröder, Dominique
(2012) History-Free Sequential Aggregate Signatures.
In: Proc. 8th International Conference on Security and Cryptography for Networks (SCN 2012).

Basin, David and Klaedtke, Felix and Marinovic, Srdjan and Zălinescu, Eugen
(2012) Monitoring compliance policies over incomplete and disagreeing logs.
In: Proceedings of the 3rd International Conference on Runtime Verification (RV'2012).

Ciobotaru, Oana
(2012) On the (Non-)Equivalence of UC Security Notions.
In: Proc. 6th International Conference on Provable Security (ProvSec 2012).

Clement, Allen and Junqueira, Flavio and Kate, Aniket and Rodrigues, Rodrigo
(2012) On the (limited) power of non-equivocation.
In: Proc. of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2012).

Petrlic, Ronald
(2012) Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment.
In: Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12).

Backes, Michael and Kate, Aniket and Goldberg, Ian and Mohammadi, Esfandiar
(2012) Provably Secure and Practical Onion Routing.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Petrlic, Ronald
(2012) Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme.
In: Cyberspace Safety and Security.

Unruh, Dominique
(2012) Quantum Proofs of Knowledge.
In: Eurocrypt 2012.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Schröder, Dominique and Unruh, Dominique
(2012) Security of Blind Signatures Revisited.
In: PKC 2012.

Chen, Ruichuan and Reznichenko, Alexey and Francis, Paul and Gehrke, Johannes
(2012) Towards Statistical Queries over Distributed Private User Data.
In: Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012).

Schröder, Dominique and Schröder, Heike
(2012) Verifiable data streaming.
In: Proc. of the 19th ACM Conference on Computer and Communication Security (CCS 2012).
Conference: CCS ACM Conference on Computer and Communications Security

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012) Active Metric Learning for Object Recognition.
In: Pattern Recognition - Joint 34th DAGM and 36th OAGM Symposium, Graz, Austria, August 28-31, 2012. Proceedings.

Döttling, Nico and Nascimento, Anderson C. A. and Müller-Quade, Jörn
(2012) IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
In: ASIACRYPT.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Rematas, Konstantinos and Fritz, Mario and Tuytelaars, Tinne
(2012) The Pooled NBNN Kernel: Beyond Image-to-Class and Image-to-Image.
In: Computer Vision - ACCV 2012 - 11th Asian Conference on Computer Vision, Daejeon, Korea, November 5-9, 2012, Revised Selected Papers, Part I.

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012) RALF: A reinforced active learning formulation for object class recognition.
In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, June 16-21, 2012.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Li, Wenbin and Fritz, Mario
(2012) Recognizing Materials from Virtual Examples.
In: Computer Vision - ECCV 2012 - 12th European Conference on Computer Vision, Florence, Italy, October 7-13, 2012, Proceedings, Part IV.
Conference: ECCV European Conference on Computer Vision

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012) Semi-Supervised Learning on a Budget: Scaling Up to Large Datasets.
In: Computer Vision - ACCV 2012 - 11th Asian Conference on Computer Vision, Daejeon, Korea, November 5-9, 2012, Revised Selected Papers, Part I.

Song, Hyun Oh and Zickler, Stefan and Althoff, Tim and Girshick, Ross B. and Fritz, Mario and Geyer, Christopher and Felzenszwalb, Pedro F. and Darrell, Trevor
(2012) Sparselet Models for Efficient Multiclass Object Detection.
In: Computer Vision - ECCV 2012 - 12th European Conference on Computer Vision, Florence, Italy, October 7-13, 2012, Proceedings, Part II.
Conference: ECCV European Conference on Computer Vision

Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2012) Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation.
In: ICITS.

Karayev, Sergey and Baumgartner, Tobias and Fritz, Mario and Darrell, Trevor
(2012) Timely Object Recognition.
In: Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012. Proceedings of a meeting held December 3-6, 2012, Lake Tahoe, Nevada, United States..
Conference: NeurIPS Conference on Neural Information Processing Systems

Reznichenko, Alexey and Guha, Saikat and Francis, Paul
(2011) Auctions in do-not-track compliant internet advertising.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS ACM Conference on Computer and Communications Security

Cortier, Véronique and Smyth, Ben
(2011) Attacking and fixing Helios: An analysis of ballot secrecy.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Cerny, Pavol and Chatterjee, Krishnendu and Henzinger, Thomas A
(2011) The Complexity of Quantitative Information Flow Problems.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Kate, Aniket and Patra, Arpita
(2011) Computational Verifiable Secret Sharing Revisited.
In: Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011).
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Unruh, Dominique
(2011) Concurrent composition in the bounded quantum storage model.
In: Eurocrypt 2011.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Tsankov, Petar and Basin, David and Dashti, Mohammad Torabi
(2011) Constructing Mid-Points for Two-Party Asynchronous Protocols.
In: Proc. 15th International Conference On Principles Of Distributed Systems (OPODIS).

Acs, Gergely and Castelluccia, Claude
(2011) I have a DREAM! (DIffeRentially PrivatE smartMetering).
In: Proceedings of the 13th Information Hiding Conference, May 2011, Prague.

Barthe, Gilles and Köpf, Boris
(2011) Information-theoretic Bounds for Differentially Private Mechanisms.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Basin, David and Burri, Samuel J and Karjoth, Günter
(2011) Obstruction-free Authorization Enforcement: Aligning Security With Business Objectives.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Asghar, Muhammad Rizwan and Russello, Giovanni and Crispo, Bruno
(2011) Poster: ESPOON$_ERBAC$: Enforcing Security Policies in Outsourced Environments with Encrypted RBAC.
In: Proceedings of the 18th ACM conference on Computer and communications security.
Conference: CCS ACM Conference on Computer and Communications Security

Zmudzinski, Sascha and Steinebach, Martin
(2011) Re-synchronizing Audio Watermarking after Non-linear Time Stretching.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII.

Blocki, Jeremiah and Christin, Nicolas and Datta, Anupam and Sinha, Arunesh
(2011) Regret Minimizing Audits: A Learning-theoretic Basis for Privacy Protection.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Schröder, Dominique and Unruh, Dominique and Garg, Sanjam and Rao, Vanishree and Sahai, Amit
(2011) Round Optimal Blind Signatures.
In: Crypto 2011.
Conference: CRYPTO Advances in Cryptology

Metzger, Steffen and Elbassuoni, Shady and Hose, Katja and Schenkel, Ralf
(2011) S3K: seeking statement-supporting top-K witnesses.
In: Proc. of the 20th ACM International Conference on Information and Knowledge Management (CIKM'11).

Kremer, Steve and Steel, Graham and Warinschi, Bogdan
(2011) Security for Key Management Interfaces.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Varodayan, David and Khisti, Ashish
(2011) Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage.
In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011, Prague, Czech Republic, May 2011..

Chothia, Tom and Guha, Apratim
(2011) A Statistical Test for Information Leaks Using Continuous Mutual Information.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Unruh, Dominique
(2011) Termination-Insensitive Computational Indistinguishability (and applications to computational soundness).
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Groß, Thomas and Mödersheim, Sebastian
(2011) Vertical Protocol Composition.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Suchanek, Fabian M and Gross-Amblard, David and Abiteboul, Serge
(2011) Watermarking for Ontologies.
In: Proc. 10th International Semantic Web Conference (ISWC 2011).

Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2011) Efficient Reductions for Non-signaling Cryptographic Primitives.
In: ICITS.

Wei-Chen, Walon and Blanke, Ulf and Fritz, Mario
(2011) I spy with my little eye: Learning optimal filters for cross-modal stereo under projected patterns.
In: IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011.

Wei-Chen, Walon and Blanke, Ulf and Fritz, Mario
(2011) Improving the Kinect by Cross-Modal Stereo.
In: British Machine Vision Conference, BMVC 2011, Dundee, UK, August 29 - September 2, 2011. Proceedings.

Tuytelaars, Tinne and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2011) The NBNN kernel.
In: IEEE International Conference on Computer Vision, ICCV 2011, Barcelona, Spain, November 6-13, 2011.
Conference: ICCV IEEE International Conference on Computer Vision

Miller, Stephen and Fritz, Mario and Darrell, Trevor and Abbeel, Pieter
(2011) Parametrized shape models for clothing.
In: IEEE International Conference on Robotics and Automation, ICRA 2011, Shanghai, China, 9-13 May 2011.

Wang, Ping Chuan and Miller, Stephen and Fritz, Mario and Darrell, Trevor and Abbeel, Pieter
(2011) Perception for the manipulation of socks.
In: 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2011, San Francisco, CA, USA, September 25-30, 2011.
Conference: IROS IEEE/RSJ International Conference on Intelligent Robots and Systems

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2011) Pick Your Neighborhood - Improving Labels and Neighborhood Structure for Label Propagation.
In: Pattern Recognition - 33rd DAGM Symposium, Frankfurt/Main, Germany, August 31 - September 2, 2011. Proceedings.

Saenko, Kate and Karayev, Sergey and Jia, Yangqing and Shyr, Alex and Janoch, Allison and Long, Jonathan and Fritz, Mario and Darrell, Trevor
(2011) Practical 3-D object detection using category and instance-level appearance models.
In: 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2011, San Francisco, CA, USA, September 25-30, 2011.
Conference: IROS IEEE/RSJ International Conference on Intelligent Robots and Systems

Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2011) Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
In: TCC.
Conference: TCC Theory of Cryptography Conference

Song, Hyun Oh and Fritz, Mario and Gu, Chunhui and Darrell, Trevor
(2011) Visual grasp affordances from appearance-based cues.
In: IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011.

Janoch, Allison and Karayev, Sergey and Jia, Yangqing and Barron, Jonathan T. and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2011) A category-level 3-D object dataset: Putting the Kinect to work.
In: IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011.

Karayev, Sergey and Fritz, Mario and Fidler, Sanja and Darrell, Trevor
(2011) A probabilistic model for recursive factorized image features.
In: The 24th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2011, Colorado Springs, CO, USA, 20-25 June 2011.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Nürnberger, Stefan and Feller, Thomas and Huss, Sorin A
(2010) Ray - A Secure Microkernel Architecture.
In: Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010).

Döttling, Nico and de Almeida, Antonio Sobreira and Lazich, Dejan E. and Müller-Quade, Jörn
(2010) Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
In: WISA.

Backes, Michael and Hamerlik, Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009) Anonymity and Censorship Resistance in Unstructured Overlay Networks.
In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I.

Backes, Michael and Druschel, Peter and Haeberlen, Andreas and Unruh, Dominique
(2009) CSAR: A practical and provable technique to make randomized systems accountable.
In: NDSS 2009.
Conference: NDSS Network and Distributed System Security Symposium

Thiemert, Stefan and Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha
(2009) Security of Robust Audio Hashes.
In: First IEEE International Workshop on Information Forensics and Security (WIFS 2009).

Backes, Michael and Pfitzmann, Birgit and Schunter, Matthias
(2003) A Toolkit for Managing Enterprise Privacy Policies.
In: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS).

Article

EdalatNejad, Kasra and Raynal, Mathilde and Lueks, Wouter and Troncoso, Carmela
(2023) Private Collection Matching Protocols.
Proceedings on Privacy Enhancing Technologies (PoPETs).
(In Press)

Lenzen, Christoph and Medina, Moti and Saberi, Mehrdad and Schmid, Stefan
(2023) Robust Routing Made Easy: Reinforcing Networks Against Non-Benign Faults.
IEEE/ACM Transactions on Networking. pp. 1-15. ISSN 1063-6692

Fisman, Dana and Frenkel, Hadar and Zilles, Sandra
(2023) Inferring Symbolic Automata.
Logical Methods in Computer Science, 19 (2).

Ben Guebila, Marouen and Wang, Tian and Lopes-Ramos, Camila M. and Fanfani, Viola and Weighill, Des and Burkholz, Rebekka and Schlauch, Daniel and Paulson, Joseph N. and Altenbuchinger, Michael and Shutta, Katherine H and Sonawane, Abhijeet R. and Lim, James and Calderer, Genis and van IJzendoorn, David G. P. and Morgan, Daniel and Marin, Alessandro and Chen, Cho-Yi and Song, Qi and Saha, Enakshi and DeMeo, Dawn L. and Padi, Megha and Platig, John and Kuijjer, Marieke and Glass, Kimberly and Quackenbush, John
(2023) The Network Zoo: a multilingual package for the inference and analysis of gene regulatory networks.
Genome Biology, 24 (1). ISSN 1474-7596

Horváth, Samuel and Kovalev, Dmitry and Mishchenko, Konstantin and Richtárik, Peter and Stich, Sebastian U.
(2023) Stochastic distributed learning with gradient quantization and double-variance reduction.
Optimization Methods and Software, 38 (1). pp. 91-106.

Shutta, Katherine H and Weighill, Deborah and Burkholz, Rebekka and Ben Guebila, Marouen and DeMeo, Dawn L and Zacharias, Helena U and Quackenbush, John and Altenbuchinger, Michael
(2022) DRAGON: Determining Regulatory Associations using Graphical models on multi-Omic Networks.
Nucleic Acids Research. ISSN 0305-1048

Marx, Dániel and Sandeep, R.B.
(2022) Incompressibility of H-free edge modification problems: Towards a dichotomy.
Journal of Computer and System Sciences, 125. pp. 25-58. ISSN 00220000

Joux, Antoine and Pierrot, Cécile
(2022) Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms.
Advances in Mathematics of Communications. ISSN 1930-5346

Troncoso, Carmela and Bogdanov, Dan and Bugnion, Edouard and Chatel, Sylva and Cremers, Cas and Gürses, Seda and Hubaux, Jean-Pierre and Jackson, Dennis and Larus, James and Lueks, Wouter and Oliveira, Rui and Payer, Mathias and Preneel, Bart and Pyrgelis, Apostolos and Salathé, Marcel and Stadler, Theresa and Veale, Michael
(2022) Deploying decentralized, privacy-preserving proximity tracing.
Communications of the ACM, 65 (9). ISSN 0001-0782

Balliu, Alkida and Brandt, Sebastian and Chang, Yi-Jun and Olivetti, Dennis and Studený, Jan and Suomela, Jukka and Tereshchenko, Aleksandr
(2022) Locally Checkable Problems in Rooted Trees.
Distributed Computing. ISSN 0178-2770

Schönherr, Lea and Golla, Maximilian and Eisenhofer, Thorsten and Wiele, Jan and Kolossa, Dorothea and Holz, Thorsten
(2022) Exploring accidental triggers of smart speakers.
Computer Speech & Language. ISSN 0885-2308
(In Press)

Ben Guebila, Marouen and Weighill, Deborah and Lopes-Ramos, Camila M. and Burkholz, Rebekka and Pop, Romana T. and Palepu, Kalyan and Shapoval, Mia and Fagny, Maud and Schlauch, Daniel and Glass, Kimberly and Altenbuchinger, Michael and Kuijjer, Marieke and Platig, John and Quackenbush, John
(2022) An online notebook resource for reproducible inference, analysis and publication of gene regulatory networks.
Nature Methods. ISSN 1548-7091

Jha, Ashwin and Nandi, Mridul
(2022) A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF.
Entropy, 24 (4). pp. 462-496. ISSN 1099-4300

Cueppers, Joscha and Kalofolias, Janis and Vreeken, Jilles
(2022) Omen: discovering sequential patterns with reliable prediction delays.
Knowledge and Information Systems. ISSN 0219-1377

Cogliati, Benoît-Michel and Ethan, Jordan and Lallemand, Virginie and Lee, Byeonghak and Lee, Jooyoung and Minier, Marine
(2021) CTET+: A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom Permutation.
IACR Transactions on Symmetric Cryptology, 2021 (4). ISSN 2519-173X

Rottenstreich, Ori and Kulik, Ariel and Joshi, Ananya and Rexford, Jennifer and Rétvári, Gábor and Menache, Daniel S
(2021) Data Plane Cooperative Caching with Dependencies.
IEEE Transactions on Network and Service Management.

Losch, Max and Fritz, Mario and Schiele, Bernt
(2021) Semantic Bottlenecks: Quantifying and Improving Inspectability of Deep Representations.
International Journal of Computer Vision (IJCV). ISSN 1573-1405

Oestreich, Marie and Chen, Dingfan and Schultze, Joachim L. and Fritz, Mario and Becker, Matthias
(2021) Privacy considerations for sharing genomics data.
EXCLI Journal Eperimental and Clinical Sciences, 20. pp. 1243-1260. ISSN 1611-2156

Cohen-Addad, Vincent and De Verdière, Éric Colin and Marx, Dániel and De Mesmay, Arnaud
(2021) Almost Tight Lower Bounds for Hard Cutting Problems in Embedded Graphs.
Journal of the ACM, 68 (4). pp. 1-26. ISSN 0004-5411

Chakraborty, Bishwajit and Chattopadhyay, Soumya and Jha, Ashwin and Nandi, Mridul
(2021) On Length Independent Security Bounds for the PMAC Family.
IACR Transactions on Symmetric Cryptology, 2021 (2). pp. 423-445.

Döttling, Nico and Garg, Sanjam
(2021) Identity-based Encryption from the Diffie-Hellman Assumption.
Journal of the ACM. ISSN 0004-5411

Warnat-Herresthal, Stefanie and Schultze, Hartmut and Shastry, Krishnaprasad Lingadahalli and Manamohan, Sathyanarayanan and Mukherjee, Saikat and Garg, Vishesh and Sarveswara, Ravi and Händler, Kristian and Pickkers, Peter and Aziz, N. Ahmad and Ktena, Sofia and Tran, Florian and Bitzer, Michael and Ossowski, Stephan and Casadei, Nicolas and Herr, Christian and Petersheim, Daniel and Behrends, Uta and Kern, Fabian and Fehlmann, Tobias and Schommers, Philipp and Lehmann, Clara and Augustin, Max and Rybniker, Jan and Altmüller, Janine and Mishra, Neha and Bernardes, Joana P. and Krämer, Benjamin and Bonaguro, Lorenzo and Schulte-Schrepping, Jonas and De Domenico, Elena and Siever, Christian and Kraut, Michael and Desai, Milind and Monnet, Bruno and Saridaki, Maria and Siegel, Charles Martin and Drews, Anna and Nuesch-Germano, Melanie and Theis, Heidi and Heyckendorf, Jan and Schreiber, Stefan and Kim-Hellmuth, Sarah and Nattermann, Jacob and Skowasch, Dirk and Kurth, Ingo and Keller, Andreas and Bals, Robert and Nürnberg, Peter and Rieß, Olaf and Rosenstiel, Philip and Netea, Mihai G. and Theis, Fabian and Mukherjee, Sach and Backes, Michael and Aschenbrenner, Anna C. and Ulas, Thomas and Breteler, Monique M. B. and Giamarellos-Bourboulis, Evangelos J. and Kox, Matthijs and Becker, Matthias and Cheran, Sorin and Woodacre, Michael S. and Goh, Eng Lim and Schultze, Joachim L.
(2021) Swarm Learning for decentralized and confidential clinical machine learning.
Nature.

Bhattacharyya, Arnab and Bonnet, Édouard and Egri, László and Ghoshal, Suprovat and C. S., Karthik and Lin, Bingkai and Manurangsi, Pasin and Marx, Dániel
(2021) Parameterized Intractability of Even Set and Shortest Vector Problem.
Journal of the ACM, 68 (3). pp. 1-40. ISSN 0004-5411

de Berg, Mark and Bodlaender, Hans L. and Kisfaludi-Bak, Sándor and Marx, Dániel and van der Zanden, Tom C.
(2020) A Framework for Exponential-Time-Hypothesis--Tight Algorithms and Lower Bounds in Geometric Intersection Graphs.
SIAM Journal on Computing, 49 (6). pp. 1291-1331. ISSN 0097-5397

Sutton, Christopher and Boley, Mario and Ghiringhelli, Luca M. and Rupp, Matthias and Vreeken, Jilles and Scheffler, Matthias
(2020) Identifying Domains of Applicability of Machine Learning Models for Materials Science.
Nature Communications. ISSN 2041-1723

Sattara, Hosnieh and Fritz, Mario and Bulling, Andreas
(2020) Deep gaze pooling: Inferring and visually decoding search intents from human gaze fixations.
Neurocomputing, 387. pp. 369-382. ISSN 0925-2312

Joux, Antoine and Espitau, Thomas
(2020) Certified Lattice Reduction.
Advances in Mathematics of Communications, 14 (1). pp. 137-159. ISSN 1930-5346

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2020) Person Recognition in Personal Photo Collections.
IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 42 (1). pp. 203-220.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2019) MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Marnau, Ninja
(2019) Überwachung by Design.
Privacy in Germany (PinG) Journal, 2019/2. ISSN 2197-1862
(In Press)

Hanzlik, Lucjan and Kluczniak, Kamil and Kutylowski, Miroslaw
(2019) CTRL-PACE: Controlled Randomness for e-Passport Password Authentication.
Fundamenta Informaticae.

Kluczniak, Kamil and Wang, Jianfeng and Chen, Xiaofeng and Kutylowski, Miroslaw
(2019) Multi-device anonymous authentication.
International Journal of Information Security.

Grosse, Kathrin and Pfaff, David and Smith, Michael Thomas and Backes, Michael
(2018) The Limitations of Model Uncertainty in Adversarial Settings.
ArXiv e-prints.

Frenkel, Hadar and Grumberg, Orna and Sheinvald, Sarai
(2018) An Automata-Theoretic Approach to Model-Checking Systems and Specifications Over Infinite Data Domains.
Journal of Automated Reasoning, 63 (4). pp. 1077-1101.

Kawohl, Claudia and Krämer, Annika and Marnau, Ninja
(2018) Datenschutz durch Technikgestaltung für Genomdaten.
DSRI Herbstakademie Tagungsband 2018.

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2018) A Survey on Routing in Anonymous Communication Protocols.
ACM Computing Surveys, 51 (3). pp. 1-39. ISSN 0360-0300

Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2018) Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Information Security, 12 (3). pp. 166-183. ISSN 1751-8709

Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2018) Advanced Steel Microstructural Classification by Deep Learning Methods.
Scientific Reports, 8. ISSN 2045-2322

Marnau, Ninja and Berrang, Pascal and Humbert, Mathias
(2018) Anonymisierungsverfahren für genetische Daten.
Datenschutz und Datensicherheit (DuD), 2/2018. pp. 83-88.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2018) MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Gavves, Efstratios and Fritz, Mario and Gool, Luc Van and Tuytelaars, Tinne
(2018) Reflectance and Natural Illumination from Single-Material Specular Objects Using Deep Learning.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 40 (8). pp. 1932-1947. ISSN 0162-8828

Steinmetz, Marcel and Hoffmann, Jörg
(2017) State Space Search Nogood Learning: Online Refinement of Critical-Path Dead-End Detectors in Planning.
Artificial Intelligence (journal), ???. -.

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2017) A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
CoRR, abs/17.

Li, Wenbin and Bohg, Jeannette and Fritz, Mario
(2017) Acquiring Target Stacking Skills by Goal-Parameterized Deep Reinforcement Learning.
CoRR, abs/17.

Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2017) Advanced Steel Microstructure Classification by Deep Learning Methods.
CoRR, abs/17.

Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017) Adversarial Image Perturbation for Privacy Protection - A Game Theory Perspective.
CoRR, abs/17.

Sun, Qianru and Schiele, Bernt and Fritz, Mario
(2017) A Domain Based Approach to Social Relation Recognition.
CoRR, abs/17.

Oh, Seong Joon and Benenson, Rodrigo and Khoreva, Anna and Akata, Zeynep and Fritz, Mario and Schiele, Bernt
(2017) Exploiting saliency for object segmentation from image level labels.
CoRR, abs/17.

He, Yang and Keuper, Margret and Schiele, Bernt and Fritz, Mario
(2017) Learning Dilation Factors for Semantic Segmentation of Street Scenes.
CoRR, abs/17.

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2017) Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
CoRR, abs/17.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2017) MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
CoRR, abs/17.

Rematas, Konstantinos and Nguyen, Chuong H. and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2017) Novel Views of Objects from a Single Image.
IEEE Trans. Pattern Anal. Mach. Intell., 39 (8). pp. 1576-1590.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2017) Person Recognition in Social Media Photos.
CoRR, abs/17.

Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017) Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
CoRR, abs/17.

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017) Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
CoRR, abs/17.

Sattar, Hosnieh and Fritz, Mario and Bulling, Andreas
(2017) Visual Decoding of Targets During Visual Search From Human Eye Fixations.
CoRR, abs/17.

Backes, Michael and Manoharan, Praveen and Grosse, Kathrin and Papernot, Nicolas
(2016) Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
The Computing Research Repository (CoRR), abs/16.

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2016) A Survey on Routing in Anonymous Communication Protocols.
The Computing Research Repository (CoRR), abs/16.

Steinmetz, Marcel and Hoffmann, Jörg and Buffet, Olivier
(2016) Goal Probability Analysis in Probabilistic Planning: Exploring and Enhancing the State of the Art.
J. Artif. Intell. Res. (JAIR), 57. pp. 229-271.

Gomez-Rodriguez, Manuel and Song, Le and Du, Nan and Zha, Hongyuan and Schölkopf, Bernhard
(2016) Influence Estimation and Maximization in Continuous-Time Diffusion Networks.
ACM Transactions on Information Systems (TOIS).

Forero, Juan Pablo and Fernando, Piyum and Sridhar, Priyashri and Withana, Anusha Indrajith and Nanayakkara, Suranga and Steimle, Jürgen and Maes, Pattie
(2016) PostBits: using contextual locations for embedding cloud information in the home.
Personal and Ubiquitous Computing, 20 (6). pp. 1001-1014.

Rohrbach, Marcus and Rohrbach, Anna and Regneri, Michaela and Amin, Sikandar and Andriluka, Mykhaylo and Pinkal, Manfred and Schiele, Bernt
(2016) Recognizing Fine-Grained and Composite Activities Using Hand-Centric Features and Script Data.
International Journal of Computer Vision, 119 (3). pp. 346-373.

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2016) Ask Your Neurons: A Deep Learning Approach to Visual Question Answering.
CoRR, abs/16.

Chowdhury, Sreyasi Nag and Malinowski, Mateusz and Bulling, Andreas and Fritz, Mario
(2016) Contextual Media Retrieval Using Natural Language Queries.
CoRR, abs/16.

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gool, Luc J. Van and Tuytelaars, Tinne
(2016) DeLight-Net: Decomposing Reflectance Maps into Specular Materials and Natural Illumination.
CoRR, abs/16.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016) Faceless Person Recognition; Privacy Implications in Social Media.
CoRR, abs/16.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2016) It's Written All Over Your Face: Full-Face Appearance-Based Gaze Estimation.
CoRR, abs/16.

Song, Hyun Oh and Fritz, Mario and Göhring, Daniel and Darrell, Trevor
(2016) Learning to Detect Visual Grasp Affordance.
IEEE Trans. Automation Science and Engineering, 13 (2). pp. 798-809.

Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2016) Long-Term Image Boundary Extrapolation.
CoRR, abs/16.

Mokarian, Ashkan and Malinowski, Mateusz and Fritz, Mario
(2016) Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task.
CoRR, abs/16.

Akata, Zeynep and Malinowski, Mateusz and Fritz, Mario and Schiele, Bernt
(2016) Multi-Cue Zero-Shot Learning with Strong Supervision.
CoRR, abs/16.

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne and Gool, Luc Van
(2016) Natural Illumination from Multiple Materials Using Deep Learning.
CoRR, abs/16.

Rematas, Konstantinos and Nguyen, Chuong H. and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2016) Novel Views of Objects from a Single Image.
CoRR, abs/16.

Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2016) Predicting the Category and Attributes of Mental Pictures Using Deep Gaze Pooling.
CoRR, abs/16.

He, Yang and Chiu, Wei-Chen and Keuper, Margret and Fritz, Mario
(2016) RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling.
CoRR, abs/16.

Bhattacharyya, Apratim and Malinowski, Mateusz and Fritz, Mario
(2016) Spatio-Temporal Image Boundary Extrapolation.
CoRR, abs/16.

Li, Wenbin and Azimi, Seyedmajid and Leonardis, Ales and Fritz, Mario
(2016) To Fall Or Not To Fall: A Visual Approach to Physical Stability Prediction.
CoRR, abs/16.

Chiu, Wei-Chen and Galasso, Fabio and Fritz, Mario
(2016) Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles.
CoRR, abs/16.

Malinowski, Mateusz and Fritz, Mario
(2016) Tutorial on Answering Questions about Images with Deep Learning.
CoRR, abs/16.

Sharma, Abhishek and Grau, Oliver and Fritz, Mario
(2016) VConv-DAE: Deep Volumetric Shape Learning Without Object Labels.
CoRR, abs/16.

Li, Wenbin and Leonardis, Ales and Fritz, Mario
(2016) Visual Stability Prediction and Its Application to Manipulation.
CoRR, abs/16.

Choffnes, David and Druschel, Peter and Blond, Stevens Le and Caldwell, William and Merritt, Nicholas
(2015) Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
ACM Computer Communication Review, 45 (5). pp. 639-652.

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2015) How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, abs/15.

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015) Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2). 178 - 191. ISSN 1545-5971

Backes, Michael and Köpf, Boris
(2015) Quantifying Information Flow in Cryptographic Systems.
Mathematical Structures in Computer Science.

Domshlak, Carmel and Hoffmann, Jörg and Katz, Michael
(2015) Red-black planning: A new systematic approach to partial delete relaxation.
Artif. Intell., 221. pp. 73-114.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2015) Appearance-Based Gaze Estimation in the Wild.
CoRR, abs/15.

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2015) Ask Your Neurons: A Neural-based Approach to Answering Questions about Images.
CoRR, abs/15.

Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gavves, Efstratios and Tuytelaars, Tinne
(2015) Deep Reflectance Maps.
CoRR, abs/15.

Shcherbatyi, Iaroslav and Bulling, Andreas and Fritz, Mario
(2015) GazeDPM: Early Integration of Gaze Information in Deformable Part Models.
CoRR, abs/15.

Malinowski, Mateusz and Fritz, Mario
(2015) Hard to Cheat: A Turing Test based on Answering Questions about Images.
CoRR, abs/15.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2015) Person Recognition in Personal Photo Collections.
CoRR, abs/15.

Sattar, Hosnieh and Müller, Sabine and Fritz, Mario and Bulling, Andreas
(2015) Prediction of search targets from fixations in open-world settings.
CoRR, abs/15.

Wei-Chen, Walon and Fritz, Mario
(2015) See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG.
CoRR, abs/15.

Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014) Brave New World: Privacy Risks for Mobile Users.
Mobile Computing and Communications Review, 18 (3). pp. 49-54.

Tang, Siyu and Andriluka, Mykhaylo and Schiele, Bernt
(2014) Detection and Tracking of Occluded People.
International Journal of Computer Vision (IJCV), 110 (1). pp. 58-69.

Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2014) Learning using privileged information: SV M+ and weighted SVM.
Neural Networks, 53. pp. 95-108.

Bulling, Andreas and Blanke, Ulf and Schiele, Bernt
(2014) A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors.
ACM Computing Surveys, 46 (3). pp. 1-33.

Li, Wenbin and Fritz, Mario
(2014) Learning Multi-Scale Representations for Material Classification.
CoRR, abs/14.

Malinowski, Mateusz and Fritz, Mario
(2014) A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input.
CoRR, abs/14.

Malinowski, Mateusz and Fritz, Mario
(2014) A Pooling Approach to Modelling Spatial Relations for Image Retrieval and Annotation.
CoRR, abs/14.

Malinowski, Mateusz and Fritz, Mario
(2014) Towards a Visual Turing Challenge.
CoRR, abs/14.

Bresson, Emmanuel and Catalano, Dario and Raimondo, Mario and Fiore, Dario and Gennaro, Rosario
(2013) Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
International Journal of Information Security, 12 (6). pp. 439-465.

Young, Maxwell and Kate, Aniket and Goldberg, Ian and Karsten, Martin
(2013) Towards Practical Communication in Byzantine-Resistant DHTs.
Networking, IEEE/ACM Transactions on, 21 (1). pp. 190-203.

Brandenburg, Björn B.
(2013) An asymptotically optimal real-time locking protocol for clustered scheduling under suspension-aware analysis.
SIGBED Review, 10 (2). p. 19.

Malinowski, Mateusz and Fritz, Mario
(2013) Learnable Pooling Regions for Image Classification.
CoRR, abs/13.

Hofheinz, Dennis and Unruh, Dominique and Müller-Quade, Jörn
(2012) Polynomial Runtime and Composability.
Journal of Cryptology.

Döttling, Nico and Dowsley, Rafael and Müller-Quade, Jörn and Nascimento, Anderson C. A.
(2012) A CCA2 Secure Variant of the McEliece Cryptosystem.
IEEE Trans. Information Theory, 58 (10). pp. 6672-6680.

Miller, Stephen and van den Berg, Jur and Fritz, Mario and Darrell, Trevor and Goldberg, Kenneth Y. and Abbeel, Pieter
(2012) A geometric approach to robotic laundry folding.
I. J. Robotics Res., 31 (2). pp. 249-267.

Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2011) Cryptographically sound security proofs for basic and public-key Kerberos.
International Journal of Information Security, 10 (2). pp. 107-134.

Stikic, Maja and Larlus, Diane and Ebert, Sandra and Schiele, Bernt
(2011) Weakly Supervised Recognition of Daily Life Activities with Wearable Sensors.
IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 33 (12). pp. 2521-2537.

Thesis

Salem, Ahmed
(2016) CRRP: A Cryptographic Protocol for Coercion-Resistant Rating Platforms.
Masters thesis, UNSPECIFIED.

Awazid, Tahleen Rahman
(2016) Curious Volunteers: Anonymity Impact of adding Tor nodes.
Masters thesis, UNSPECIFIED.

Waxweiler, Daniel
(2016) Making Chromium´s Certificate Transparency integration more accessible.
Masters thesis, UNSPECIFIED.

Wedeking, Lukas
(2016) Anonymity Guarantees for Tor Hidden Services.
Bachelors thesis, Saarland University.

Tiwari, Abishek
(2015) Applying Privacy Case Law to The Right to be Forgotten.
Masters thesis, Saarland University.

Schneider, Jonas
(2015) Partially Oblivious Pseudorandom Functions: A Generic Approach and an Impossibility Result.
Masters thesis, UNSPECIFIED.

Patel, Vikash
(2015) Argumentation Mining for the Sake of Privacy.
Masters thesis, Saarland University.

Koch, Simon
(2015) Correlating BGP and Traceroute Data.
Bachelors thesis, Saarland University.

Bauer, Markus
(2015) The MATOR Addon: Accessible Quantification of Tor Anonymity for the Tor Browser.
Bachelors thesis, Saarland University.

Petrlic, Ronald
(2014) Privacy-Preserving Multiparty Digital Rights Management.
Doctoral thesis, University of Paderborn.

Schranz, Oliver
(2013) A Developer-Centric Approach to Dynamic Permission System.
Bachelors thesis, Saarland University.

Berg, Matthias
(2013) Formal Verification of Cryptographic Security Proofs.
Doctoral thesis, Saarland University.

Schröder, Florian
(2013) Generic Access Control for Extensible Web Applications within the SAFE Activation.
Masters thesis, Saarland University.

Grimm, Niklas
(2013) Lime: A Framework for Data Lineage in the Malicious Environment.
Bachelors thesis, Saarland University.

Asghar, Muhammad Rizwan
(2013) Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments.
Doctoral thesis, University of Trento.

Doychev, Goran
(2012) Analysis and Mitigation of Information Leaks in Web Browsing Traffic.
Masters thesis, Saarland University.

Möllers, Frederik
(2012) An Analysis of Traceability of Electronic Identification Documents.
Masters thesis, Universität Paderborn.

Ruffing, Tim
(2012) Computational Soundness of Interactive Primitives.
Bachelors thesis, Saarland University.

Reinert, Manuel
(2012) A Framework for Security-Oriented Distributed Programming.
Masters thesis, Saarland University.

Meyer, Sebastian
(2012) Privacy Preserving Surveillance and Face Recognition.
Bachelors thesis, Saarland University.

Ciobotaru, Oana
(2012) Rational Cryptography.
Doctoral thesis, Saarland University.

Knuth, Karsten
(2012) Security Analysis of Browser Extension Concepts.
Bachelors thesis, Saarland University.

Skoruppa, Malte
(2012) Verifiable Security of Prefix-free Merkle-Damgård.
Masters thesis, Saarland University.

Bornträger, Holger
(2011) Automatic Verification of Equivalences of Cryptographic Games.
Masters thesis, Saarland University.

Meiser, Sebastian
(2011) Computational Soundness of Passively Secure Encryption in Presence of Active Adversaries.
Masters thesis, Saarland University.

Künnemann, Robert
(2011) Game-Theoretic Notions of Incoercibility.
Masters thesis, UNSPECIFIED.

Busenius, Alex
(2011) Mechanized Formalization of a Transformation from an Extensible Spi Calculus to Java.
Masters thesis, Saarland University.

Balzer, Jan
(2011) Towards a Formal Sematics for G2C Summary.
Bachelors thesis, Saarland University.

Hriţcu, Cătălin
(2011) Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis.
Doctoral thesis, Saarland University.

Ciolacu, Ines Lucia
(2011) Universally Composable Relativistic Commitments.
Masters thesis, Saarland University.

Book Section

Fuegger, Matthias and Lenzen, Christoph and Schmid, Ulrich
(2022) On Specifications and Proofs of Timed Circuits.
In: Principles of Systems Design - Essays Dedicated to Thomas A. Henzinger on the Occasion of His 60th Birthday. Springer, pp. 1-24. ISBN 978-3-031-22337-2

Oh, Seong Joon and Schiele, Bernt and Fritz, Mario
(2019) Towards Reverse-Engineering Black-Box Neural Networks.
In: Explainable AI: Interpreting, Explaining and Visualizing Deep Learning. Springer, pp. 121-144. ISBN 978-3-030-28953-9

Marnau, Ninja
(2019) Datenschutzrecht und Brexit.
In: Brexit - Privat- und wirtschaftsrechtliche Folgen, 2. Aufl. (Hrsg. Kramme / Baldus / Schmidt-Kessel). Nomos. ISBN 978-3-8487-5438-0
(In Press)

Marnau, Ninja and Sorge, Christoph
(2019) From Law to Engineering: A Computer Science Perspective on Privacy & Data Protection.
In: González-Fuster, G., van Brakel, R. and P. De Hert (forthcoming) Research Handbook on Privacy and Data Protection Law. Values, Norms and Global Politics. Edward Elgar Publishing.
(In Press)

Marnau, Ninja
(2019) Kommentierung der §§64, 70, 71, 74 BDSG.
In: Gola/Heckman (Hrsg.) Bundesdatenschutzgesetz, Kommentar, 13. Aufl. C.H.Beck. ISBN 978-3-406-72878-5
(In Press)

Blaskiewicz, Przemyslaw and Hanzlik, Lucjan and Kluczniak, Kamil and Krzywiecki, Lukasz and Kutylowski, Miroslaw and Slowik, Marcin and Wszola, Marta
(2019) Pseudonymous Signature Schemes.
In: Advances in Cyber Security. Springer, Singapore, pp. 185-255. ISBN 78-981-13-1483-4

Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2016) Delegatable Functional Signatures.
In: UNSPECIFIED Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 357-386. ISBN 978-3-662-49384-7

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2016) From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
In: UNSPECIFIED Springer International Publishing, Cham, pp. 87-138. ISBN 978-3-319-43005-8

Ebert, Sandra and Schiele, Bernt
(2013) Where Next in Object Recognition and how much Supervision Do We Need?
In: Advances in Computer Vision and Pattern Recognition. Springer, pp. 35-64.

Janoch, Allison and Karayev, Sergey and Jia, Yangqing and Barron, Jonathan T. and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2013) A Category-Level 3D Object Dataset: Putting the Kinect to Work.
In: Consumer Depth Cameras for Computer Vision, Research Topics and Applications. UNSPECIFIED, pp. 141-165.

Asghar, Muhammad Rizwan and Russello, Giovanni
(2012) Flexible and Dynamic Consent-Capturing.
In: UNSPECIFIED Lecture Notes in Computer Science, 7039 . Springer Berlin Heidelberg, pp. 119-131. ISBN 978-3-642-27584-5

Book

Brox, Thomas and Bruhn, Andrés and Fritz, Mario
(2019) Pattern Recognition - 40th German Conference, GCPR 2018, Stuttgart, Germany, October 9-12, 2018, Proceedings.
Lecture Notes in Computer Science, 11269 . Springer. ISBN 978-3-030-12938-5

Monograph

Maximov, Maxim and Ritschel, Tobias and Fritz, Mario
(2018) Deep Appearance Maps.
Technical Report. UNSPECIFIED.

Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018) A Hybrid Model for Identity Obfuscation by Face Replacement.
Technical Report. UNSPECIFIED.

Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017) Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective.
Technical Report. UNSPECIFIED.

Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017) Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
Technical Report. UNSPECIFIED.

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017) Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
Technical Report. UNSPECIFIED.

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2017) A4NT : Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
Technical Report. arXiv.

Orekondy, Tribhuvanesh and Fritz, Mario and Schiele, Bernt
(2017) Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images.
Technical Report. arXiv.

Ma, Liqian and Sun, Qianru and Georgoulis, Stamatios and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2017) Disentangled Person Image Generation.
Technical Report. arXiv.

Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2017) Natural and Effective Obfuscation by Head Inpainting.
Technical Report. arXiv.

Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2016) Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling.
Technical Report. UNSPECIFIED.

Danezis, George and Kohlweiss, Markulf and Rial, Alfredo
(2011) Differentially Private Billing with Rebates.
Technical Report. UNSPECIFIED.

Backes, Julian and Backes, Michael and Dürmuth, Markus and Lorenz, Stefan and Gerling, Sebastian
(2011) X-pire! - A digital expiration date for images in social networks.
Technical Report. UNSPECIFIED.

Other

Patrignani, Marco and Guarnieri, Marco
(2020) Exorcising Spectres with Secure Compilers.
arxiv
.

Yu, Ning and Skripniuk, Vladislav and Abdelnabi, Sahar and Fritz, Mario
(2020) Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data.
UNSPECIFIED
.

Vassena, Marco and Patrignani, Marco
(2019) Memory Safety Preservation for WebAssembly.
arxiv
.

Gerling, Sebastian and Marnau, Ninja and Sorge, Christoph
(2018) Stellungnahme gegenüber dem Landtag des Saarlandes zum Thema „Stand und Entwicklungsperspektiven der Telemedizin im Saarland“.
CISPA
.

Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Max and Backes, Michael and Fritz, Mario
(2018) MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
arXiv
.

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version).
CISPA
.

Sorge, Christoph and Marnau, Ninja
(2017) Stellungnahme des CISPA zum Entwurf eines Gesetzes zur Förderung der elektronischen Verwaltung im Saarland sowie zur Änderung weiterer Vorschriften.
Landtag des Saarlandes
.

Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015) Type-Based Verification of Electronic Voting Protocols.
UNSPECIFIED
.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
UNSPECIFIED
.

Unruh, Dominique
(2012) Everlasting Quantum Security.
UNSPECIFIED
.

Unruh, Dominique
(2012) Programmable encryption and key-dependent messages.
UNSPECIFIED
.

Schröder, Dominique and Unruh, Dominique
(2011) Round Optimal Blind Signatures.
UNSPECIFIED
.

This list was generated on Thu Nov 21 09:44:30 2024 CET.