Number of items: 657.
Conference or Workshop Item (A Paper)
Zhang, Boyang and Zheng, Li and Yang, Ziqing and He, Xinlei and Backes, Michael and Fritz, Mario and Zhang, Yang
(2024)
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models.
(In Press)
Hanzlik, Lucjan and Loss, Julian and Thyagarajan, Sri AravindaKrishnan and Wagner, Benedikt
(2024)
Sweep-UC: Swapping Coins Privately.
Jiang, Xiaowen and Stich, Sebastian U.
(2023)
Adaptive SGD with Polyak stepsize and Line-search: Robust Convergence and Variance Reduction.
Nasrabadi, Faezeh and Künnemann, Robert and Nemati, Hamed
(2023)
CryptoBap: A Binary Analysis Platform for Cryptographic Protocols.
Qu, Yiting and Shen, Xinyue and He, Xinlei and Backes, Michael and Zannettou, Savvas and Zhang, Yang
(2023)
Unsafe Diffusion: On the Generation of Unsafe Images and
Hateful Memes From Text-To-Image Models.
(Submitted)
Beutner, Raven and Finkbeiner, Bernd and Frenkel, Hadar and Siber, Julian
(2023)
Checking and Sketching Causes on Temporal Sequences.
(Submitted)
Balliu, Alkida and Brandt, Sebastian and Kuhn, Fabian and Olivetti, Dennis and Schmid, Gustav
(2023)
On the Node-Averaged Complexity of Locally Checkable Problems on Trees.
(Submitted)
Pan, Jiaxin and Wagner, Benedikt and Zeng, Runzhi
(2023)
Lattice-based Authenticated Key Exchange with Tight Security.
Gunsing, Aldo and Bhaumik, Ritam and Jha, Ashwin and Mennink, Bart and Shen, Yaobin
(2023)
Revisiting the Indifferentiability of the Sum of Permutations.
(Submitted)
Abdelnabi, Sahar and Fritz, Mario
(2023)
Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems.
(In Press)
Wang, Haiming and Zhang, Zhikun and Wang, Tianhao and He, Shibo and Backes, Michael and Chen, Jiming and Zhang, Yang
(2023)
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model.
Li, Zheng and Yu, Ning and Salem, Ahmed and Backes, Michael and Fritz, Mario and Zhang, Yang
(2023)
UnGANable: Defending Against GAN-based Face Manipulation.
Gadhikar, Advait and Mukherjee, Sohom and Burkholz, Rebekka
(2023)
Why Random Pruning Is All We Need to Start Sparse.
Koloskova, Anastasia and Hendrikx, Hadrien and Stich, Sebastian U.
(2023)
Revisiting Gradient Clipping: Stochastic bias and tight convergence guarantees.
Mohtashami, Amirkeivan and Jaggi, Martin and Stich, Sebastian U.
(2023)
Special Properties of Gradient Descent with Large Learning Rates.
Bo, Li and Schmidt, Mikkel N. and Alstrøm, Tommy S. and Stich, Sebastian U.
(2023)
On the effectiveness of partial variance reduction in federated learning with heterogeneous data.
Wang, Boya and Lueks, Wouter and Sukaitis, Justinas and Graf Narbel, Vincent and Troncoso, Carmela
(2023)
Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution.
(In Press)
Hanzlik, Lucjan and Loss, Julian and Wagner, Benedikt
(2023)
Token meets Wallet: Formalizing Privacy and Revocation for FIDO2.
Doron-Arad, Ilan and Kulik, Ariel and Shachnai, Hadas
(2023)
An EPTAS for Budgeted Matching and Budgeted Matroid Intersection via Representative Sets.
(In Press)
Pan, Jiaxin and Wagner, Benedikt
(2023)
Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions.
Hanzlik, Lucjan and Loss, Julian and Wagner, Benedikt
(2023)
Rai-Choo! Evolving Blind Signatures to the Next Level.
Aghakhani, Hojjat and Schönherr, Lea and Eisenhofer, Thorsten and Kolossa, Dorothea and Holz, Thorsten and Kruegel, Christopher and Vigna, Giovanni
(2023)
VENOMAVE: Targeted Poisoning Against Speech Recognition.
Yuan, Xiaojian and Chen, Kejiang and Zhang, Jie and Zhang, Weiming and Yu, Nenghai and Zhang, Yang
(2023)
Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network.
Esiyok, Ilkan and Berrang, Pascal and Cohn-Gordon, Katriel and Künnemann, Robert
(2023)
Accountable Javascript Code Delivery.
Qu, Yiting and He, Xinlei and Pierson, Shannon and Backes, Michael and Zhang, Yang and Zannettou, Savvas
(2023)
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.
Agrawal, Akanksha and Marx, Dániel and Neuen, Daniel and Slusallek, Jasper
(2023)
Computing Square Colorings on Bounded-Treewidth and Planar Graphs.
(In Press)
Focke, Jacob and Marx, Dániel and Mc Inerney, Fionn and Neuen, Daniel and Sankar, Govind and Schepper, Philipp and Wellnitz, Philip
(2023)
Tight Complexity Bounds for Counting Generalized Dominating Sets in Bounded-Treewidth Graphs.
(In Press)
Balliu, Alkida and Brandt, Sebastian and Kuhn, Fabian and Olivetti, Dennis
(2023)
Distributed Maximal Matching and Maximal Independent Set on Hypergraphs.
(Submitted)
Doron-Arad, Ilan and Kulik, Ariel and Shachnai, Hadas
(2023)
An EPTAS for Budgeted Matroid Independent Set.
(In Press)
Chattopadhyay, Soumya and Jha, Ashwin and Nandi, Mridul
(2022)
Towards Tight Security Bounds for OMAC, XCBC and TMAC.
(Submitted)
Burkholz, Rebekka
(2022)
Most Activation Functions Can Win the Lottery Without Excessive Depth.
Marx, Dániel and Sankar, Govind and Schepper, Philipp
(2022)
Anti-Factor is FPT Parameterized by Treewidth and List Size (but Counting is Hard).
(In Press)
Esmer, Baris Can and Kulik, Ariel and Marx, Dániel and Schepper, Philipp and Węgrzycki, Karol
(2022)
Computing Generalized Convolutions Faster Than Brute Force.
(In Press)
Galby, Esther and Marx, Dániel and Schepper, Philipp and Sharma, Roohani and Tale, Prafullkumar
(2022)
Domination and Cut Problems on Chordal Graphs with Bounded Leafage.
(In Press)
Döttling, Nico and Garg, Sanjam and Wang, Mingyuan
(2022)
IBE with Incompressible Master Secret and Small Identity Secrets.
Dodwadmath, Akshay and Stich, Sebastian U.
(2022)
Preserving privacy with PATE for heterogeneous data.
Branco, Pedro and Döttling, Nico and Dujmovic, Jesko
(2022)
Rate-1 Incompressible Encryption from Standard Assumptions.
Branco, Pedro and Döttling, Nico and Wohnig, Stella
(2022)
Universal Ring Signatures in the Standard Model.
Chen, Yufei and Shen, Chao and Shen, Yun and Wang, Cong and Zhang, Yang
(2022)
Amplifying Membership Exposure via Data Poisoning.
Beznosikov, Aleksandr and Dvurechensky, Pavel and Koloskova, Anastasia and Samokhin, Valentin and Stich, Sebastian U. and Gasnikov, Alexander
(2022)
Decentralized Local Stochastic Extra-Gradient for Variational Inequalities.
Koloskova, Anastasia and Stich, Sebastian U. and Jaggi, Martin
(2022)
Sharper Convergence Guarantees for Asynchronous SGD for Distributed and Federated Learning.
Dalleiger, Sebastian and Vreeken, Jilles
(2022)
Efficiently Factorizing Boolean Matrices using Proximal Gradient Descent.
Li, Zheng and Liu, Yiyong and He, Xinlei and Yu, Ning and Backes, Michael and Zhang, Yang
(2022)
Auditing Membership Leakages of Multi-Exit Networks.
Shen, Yun and Han, Yufei and Zhang, Zhikun and Chen, Min and Yu, Ting and Backes, Michael and Zhang, Yang and Stringhini, Gianluca
(2022)
Finding MNEMON: Reviving Memories of Node Embeddings.
(In Press)
Chen, Min and Zhang, Zhikun and Wang, Tianhao and Backes, Michael and Humbert, Mathias and Zhang, Yang
(2022)
Graph Unlearning.
(In Press)
Liu, Yiyong and Zhao, Zhengyu and Backes, Michael and Zhang, Yang
(2022)
Membership Inference Attacks by Exploiting Loss Trajectory.
Huang, Hai and Zhang, Zhikun and Shen, Yun and Backes, Michael and Li, Qi and Zhang, Yang
(2022)
On the Privacy Risks of Cell-Based NAS Architectures.
Si, Wai Man and Backes, Michael and Blackburn, Jeremy and De Cristofaro, Emiliano and Stringhini, Gianluca and Zannettou, Savvas and Zhang, Yang
(2022)
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.
Ruffing, Tim and Ronge, Viktoria and Jin, Elliott and Schneider-Bensch, Jonas and Schröder, Dominique
(2022)
ROAST: Robust Asynchronous Schnorr Threshold Signatures.
Cong, Tianshuo and He, Xinlei and Zhang, Yang
(2022)
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders.
Chen, Dingfan and Kerkouche, Raouf and Fritz, Mario
(2022)
Private Set Generation with Discriminative Information.
Galby, Esther and Marx, Dániel and Schepper, Philipp and Sharma, Roohani and Tale, Prafullkumar
(2022)
Parameterized Complexity of Weighted Multicut in Trees.
Kastner, Julia and Loss, Julian and Xu, Jiayu
(2022)
The Abe-Okamoto Partially Blind Signature Scheme Revisited.
(In Press)
Anagnostides, Ioannis and Lenzen, Christoph and Haeupler, Bernhard and Zuzic, Goran and Gouleakis, Themis
(2022)
Almost Universally Optimal Distributed Laplacian Solvers via Low-Congestion Shortcuts.
(In Press)
Mujkanovic, Felix and Geisler, Simon and Günnemann, Stephan and Bojchevski, Aleksandar
(2022)
Are Defenses for Graph Neural Networks Robust?
Balliu, Alkida and Brandt, Sebastian and Chang, Yi-Jun and Olivetti, Dennis and Studený, Jan and Suomela, Jukka
(2022)
Efficient Classification of Locally Checkable Problems in Regular Trees.
(Submitted)
Balliu, Alkida and Brandt, Sebastian and Fischer, Manuela and Latypov, Rustam and Maus, Yannic and Olivetti, Dennis and Uitto, Jara
(2022)
Exponential Speedup Over Locality in MPC with Optimal Memory.
(Submitted)
Bhangale, Amey and Liu-Zhang, Chen-Da and Loss, Julian and Nayak, Kartik
(2022)
Efficient Adaptively-Secure Byzantine Agreement for Long Messages.
(In Press)
Kluczniak, Kamil
(2022)
NTRU-$\nu$-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus.
(In Press)
Scholten, Yan and Schuchardt, Jan and Geisler, Simon and Bojchevski, Aleksandar and Günnemann, Stephan
(2022)
Randomized Message-Interception Smoothing: Gray-box Certificates for Graph Neural Networks.
Alexandru, Andreea B. and Blum, Erica and Katz, Jonathan and Loss, Julian
(2022)
State Machine Replication under Changing Network Conditions.
(In Press)
Frenkel, Hadar and Sheinvald, Sarai
(2022)
Realizable and Context-Free Hyperlanguages.
Can Esmer, Baris and Kulik, Ariel and Marx, Dániel and Neuen, Daniel and Sharma, Roohani
(2022)
Faster Exponential-Time Approximation Algorithms Using Approximate Monotone Local Search.
Allcock, Jonathan and Hamoudi, Yassine and Joux, Antoine and Klingelhöfer, Felix and Santha, Miklos
(2022)
Classical and Quantum Algorithms for Variants of
Subset-Sum via Dynamic Programming.
Backes, Michael and Berrang, Pascal and Hanzlik, Lucjan and Pryvalov, Ivan
(2022)
A framework for constructing Single Secret Leader Election from MPC.
(In Press)
Liu, Yugeng and Wen, Rui and He, Xinlei and Salem, Ahmed and Zhang, Zhikun and Backes, Michael and De Cristofaro, Emiliano and Fritz, Mario and Zhang, Yang
(2022)
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
Mameche, Sara and Kaltenpoth, David and Vreeken, Jilles
(2022)
Discovering Invariant and Changing Mechanisms from Data.
Dalleiger, Sebastian and Vreeken, Jilles
(2022)
Discovering Significant Patterns under Sequential False Discovery Control.
Zhang, Zhikun and Chen, Min and Backes, Michael and Shen, Yun and Zhang, Yang
(2022)
Inference Attacks Against Graph Neural Networks.
Chen, Yufei and Shen, Chao and Wang, Cong and Zhang, Yang
(2022)
Teacher Model Fingerprinting Attacks Against Transfer Learning.
Beutner, Raven and Finkbeiner, Bernd
(2022)
Prophecy Variables for Hyperproperty Verification.
(In Press)
Beutner, Raven and Finkbeiner, Bernd
(2022)
Software Verification of Hyperproperties Beyond k-Safety.
(In Press)
Feneuil, Thibauld and Joux, Antoine and Rivain, Matthieu
(2022)
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs.
Wang, Hui-Po and Stich, Sebastian U. and He, Yang and Fritz, Mario
(2022)
ProgFed: Effective, Communication, and Computation Efficient Federated Learning by Progressive Training.
Burkholz, Rebekka
(2022)
Convolutional and Residual Networks Provably Contain Lottery Tickets.
Xu, Sascha and Mian, Osman and Vreeken, Jilles
(2022)
Inferring Cause and Effect in the Presence of Heteroscedastic Noise.
Hedderich, M and Fischer, Jonas and Klakow, Dietrich and Vreeken, Jilles
(2022)
Label-Descriptive Patterns and their Application to Characterizing Classification Errors.
Döttling, Nico and Dujmovic, Jesko
(2022)
Maliciously Circuit-Private FHE from Information-Theoretic Principles.
Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2022)
Factoring and Pairings Are Not Necessary for IO:
Circular-Secure LWE Suffices.
Kepkowski, Michal and Hanzlik, Lucjan and Wood, Ian D. and Kaafar, Mohamed Ali
(2022)
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy.
(In Press)
Esmer, Baris Can and Nakos, Vasileios
(2022)
On (1+ϵ)-Approximate Block Sparse Recovery.
(Submitted)
Focke, Jacob and Roth, Marc
(2022)
Counting Small Induced Subgraphs with Hereditary Properties.
Focke, Jacob and Goldberg, Leslie Ann and Roth, Marc and Živný, Stanislav
(2022)
Approximately Counting Answers to Conjunctive Queries with Disequalities and Negations.
Salem, Ahmed and Wen, Rui and Backes, Michael and Ma, Shiqing and Zhang, Yang
(2022)
Dynamic Backdoor Attacks Against Machine Learning Models.
Shen, Xinyue and He, Xinlei and Backes, Michael and Blackburn, Jeremy and Zannettou, Savvas and Zhang, Yang
(2022)
On Xing Tian and the Perseverance of Anti-China Sentiment Online.
Bringmann, Karl and Kisfaludi-Bak, Sándor and Künnemann, Marvin and Marx, Dániel and Nusser, André
(2022)
Dynamic Time Warping Under Translation: Approximation Guided by Space-Filling Curves.
Böhle, Moritz and Fritz, Mario and Schiele, Bernt
(2022)
B-Cos Networks: Alignment Is All We Need for Interpretability.
Brakerski, Zvika and Branco, Pedro and Döttling, Nico and Pu, Sihang
(2022)
Batch-OT with Optimal Rate.
Beutner, Raven and Ong, C.H. Luke and Zaiser, Fabian
(2022)
Guaranteed Bounds for Posterior Inference in Universal Probabilistic Programming.
(In Press)
Eldefrawy, Karim and Loss, Julian and Terner, Ben
(2022)
How Byzantine is a Send Corruption?
Abdelnabi, Sahar and Hasan, Rakibul and Fritz, Mario
(2022)
Open-Domain, Content-Based, Multi-Modal Fact-Checking of Out-of-Context Images via Online Resources.
Shen, Yun and He, Xinlei and Han, Yufei and Zhang, Yang
(2022)
Model Stealing Attacks Against Inductive Graph Neural Networks.
Hanzlik, Lucjan and Kluczniak, Kamil
(2022)
Explainable Arguments.
(In Press)
Chairattana-Apirom, Rutchathon and Wagner, Benedikt and Hanzlik, Lucjan and Loss, Julian and Lysyanskaya, Anna
(2022)
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.
(In Press)
Tang, Dang and Duong, Dung Hoang and Joux, Antoine and Plantard, Thomas and Qiao, Youming and Susilo, Willy
(2022)
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.
Burkholz, Rebekka and Laha, Nilanjana and Mukherjee, Rajarshi and Gotovos, Alkis
(2022)
On the Existence of Universal Lottery Tickets.
Fischer, Jonas and Burkholz, Rebekka
(2022)
Plant 'n' Seek: Can You Find the Winning Ticket?
Chen, Dingfan and Yu, Ning and Fritz, Mario
(2022)
RelaxLoss: Defending Membership Inference Attacks without Losing Utility.
Yu, Ning and Skripniuk, Vladislav and Chen, Dingfan and Davis, Larry S. and Fritz, Mario
(2022)
Responsible Disclosure of Generative Models Using Scalable Fingerprinting.
Salem, Ahmed and Backes, Michael and Zhang, Yang
(2022)
Get a Model! Model Hijacking Attack Against Machine Learning Models.
Zhou, Junhao and Chen, Yufei and Shen, Chao and Zhang, Yang
(2022)
Property Inference Attacks Against GANs.
Rahimian, Shadi and Kerkouche, Raouf and Kurth, Ina and Fritz, Mario
(2022)
Practical Challenges in Differentially-Private Federated Survival Analysis of Medical Data.
Pan, Jiaxin and Wagner, Benedikt
(2022)
Lattice-based Signatures with Tight Adaptive Corruptions and More.
Hasan, Rakibul and Fritz, Mario
(2022)
Understanding Utility and Privacy of Demographic Data in Education Technology by Causal Analysis and Adversarial-Censoring.
Marx, Alexander and Vreeken, Jilles
(2022)
Formally Justifying MDL-based Inference of Cause and Effect.
Kluczniak, Kamil
(2022)
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.
Coupette, Corinna and Dalleiger, Sebastian and Vreeken, Jilles
(2022)
Differentially Describing Groups of Graphs.
Wiegand, Boris and Klakow, Dietrich and Vreeken, Jilles
(2022)
Discovering Interpretable Data-to-Sequence Generators.
Kalofolias, Janis and Vreeken, Jilles
(2022)
Naming the most Anomalous Cluster in Hilbert Space for Structures with Attribute Information.
Kastner, Julia and Loss, Julian and Xu, Jiayu
(2022)
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.
Branco, Pedro and Döttling, Nico and Mateus, Paulo
(2022)
Two-Round Oblivious Linear Evaluation from Learning with Errors.
Aggarwal, Divesh and Döttling, Nico and Dujmovic, Jesko and Hajiabadi, Mohammad and Malavolta, Giulio and Obremski, Maciej
(2022)
Algebraic Restriction Codes and their Applications.
Brandt, Sebastian and Chang, Yi-Jun and Grebı́k, Jan and Grunau, Christoph and Rozhoň, Václav and Vidnyánszky, Zoltán
(2022)
Local Problems on Trees from the Perspectives of Distributed Algorithms, Finitary Factors, and Descriptive Combinatorics.
(In Press)
Bund, Johannes and Lenzen, Christoph and Medina, Moti
(2022)
Small Hazard-Free Transducers.
(In Press)
Chistikov, Dmitry and Majumdar, Rupak and Schepper, Philipp
(2022)
Subcubic certificates for CFL reachability.
Focke, Jacob and Marx, Dániel and Rzążewski, Paweł
(2022)
Counting list homomorphisms from graphs of bounded treewidth: tight complexity bounds.
Marx, Dániel and Misra, Pranabendu and Neuen, Daniel and Tale, Prafullkumar
(2022)
A Framework for Parameterized Subexponential Algorithms for Generalized Cycle Hitting Problems on Planar Graphs.
(Submitted)
Geisler, Simon and Sommer, Johanna and Schuchardt, Jan and Bojchevski, Aleksandar and Günnemann, Stephan
(2022)
Generalization of Neural Combinatorial Solvers Through the Lens of Adversarial Robustness.
Döttling, Nico and Goyal, Vipul and Malavolta, Giulio and Raizes, Justin
(2022)
Interaction-Preserving Compilers for Secure Computation.
Neuen, Daniel
(2022)
Isomorphism Testing for Graphs Excluding Small Topological Subgraphs.
(Submitted)
Liu, Yehao and Pagliardini, Matteo and Chavdarova, Tatjana and Stich, Sebastian U.
(2021)
The Peril of Popular Deep Learning Uncertainty Estimation Methods.
Chakraborti, Avik and Datta, Nilanjan and Jha, Ashwin and Mancillas-Lopez, Cuauhtemoc and Nandi, Mridul and Sasaki, Yu
(2021)
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.
Gueron, Shay and Jha, Ashwin and Nandi, Mridul
(2021)
Revisiting the Security of COMET Authenticated Encryption Scheme.
Chakraborti, Avik and Datta, Nilanjan and Jha, Ashwin and Mancillas-Lopez, Cuauhtemoc and Nandi, Mridul
(2021)
tHyENA: Making HyENA Even Smaller.
Chakraborti, Avik and Datta, Nilanjan and Jha, Ashwin and Mancillas-Lopez, Cuauhtemoc and Nandi, Mridul
(2021)
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security.
Chattopadhyay, Soumya and Jha, Ashwin and Nandi, Mridul
(2021)
Fine-tuning the ISO/IEC Standard Lightmac.
(Submitted)
Du, Linkang and Zhang, Zhikun and Bai, Shaojie and Liu, Changchang and Ji, Shouling and Cheng, Peng and Chen, Jiming
(2021)
AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy.
Wang, Tianhao and Chen, Joann Qiongna and Zhang, Zhikun and Su, Dong and Cheng, Yueqiang and Li, Zhou and Li, Ninghui and Jha, Somesh
(2021)
Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
Rahimian, Shadi and Orekondy, Tribhuvanesh and Fritz, Mario
(2021)
Differential Privacy Defenses and Sampling Attacks for Membership Inference.
Zhang, Minxing and Ren, Zhaochun and Wang, Zihan and Ren, Pengjie and Chen, Zhumin and Hu, Pengfei and Zhang, Yang
(2021)
Membership Inference Attacks Against Recommender Systems.
Li, Zheng and Zhang, Yang
(2021)
Membership Leakage in Label-Only Exposures.
He, Xinlei and Zhang, Yang
(2021)
Quantifying and Mitigating Privacy Risks of Contrastive Learning.
Abdelnabi, Sahar and Fritz, Mario
(2021)
"What's in the box?!": Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models.
Chen, Min and Zhang, Zhikun and Wang, Tianhao and Backes, Michael and Humbert, Mathias and Zhang, Yang
(2021)
When Machine Unlearning Jeopardizes Privacy.
Alamati, Navid and Branco, Pedro and Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Pu, Sihang
(2021)
Laconic Private Set Intersection and Applications.
Döttling, Nico and Hartmann, Dominik and Hofheinz, Dennis and Kiltz, Eike and Schäge, Sven and Ursu, Bogdan
(2021)
On the Impossibility of Purely Algebraic Signatures.
Chardouvelis, Orestis and Döttling, Nico and Malavolta, Giulio
(2021)
Rate-1 Quantum Fully Homomorphic Encryption.
Buiras, Pablo and Nemati, Hamed and Lindner, Andreas and Guanciale, Roberto
(2021)
Validation of Side-Channel Models via Observation Refinement.
Yu, Ning and Skripniuk, Vladislav and Abdelnabi, Sahar and Fritz, Mario
(2021)
Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data.
Yu, Ning and Liu, Guilin and Dundar, Aysegul and Tao, Andrew and Catanzaro, Bryan and Davis, Larry and Fritz, Mario
(2021)
Dual Contrastive Loss and Attention for GANs.
Hanzlik, Lucjan and Slamanig, Daniel
(2021)
With a Little Help from My Friends: Constructing Practical Anonymous Credentials.
(In Press)
Hajipour, Hossein and Malinowski, Mateusz and Fritz, Mario
(2021)
IReEn: Iterative Reverse-Engineering of Black-Box Functions via Neural Program Synthesis.
Hajipour, Hossein and Bhattacharyya, Apratim and Staicu, Cristian-Alexandru and Fritz, Mario
(2021)
SampleFix: Learning to Generate Functionally Diverse Fixes.
Hajipour, Hossein and Bhattacharyya, Apratim and Staicu, Cristian-Alexandru and Fritz, Mario
(2021)
SampleFix: Learning to Generate Functionally Diverse Fixes.
(Submitted)
Neuen, Daniel
(2021)
Isomorphism Testing Parameterized by Genus and Beyond.
Zhang, Zhikun and Wang, Tianhao and Honorio, Jean and Li, Ninghui and Backes, Michael and He, Shibo and Chen, Jiming and Zhang, Yang
(2021)
PrivSyn: Differentially Private Data Synthesis.
He, Xinlei and Jia, Jinyuan and Gong, Neil Zhenqiang and Backes, Michael and Zhang, Yang
(2021)
Stealing Links from Graph Neural Networks.
He, Yang and Yu, Ning and Keuper, Margret and Fritz, Mario
(2021)
Beyond the Spectrum: Detecting Deepfakes via Re-Synthesis.
Marx, Dániel and Sankar, Govind S. and Schepper, Philipp
(2021)
Degrees and Gaps: Tight Complexity Results of General Factor Problems Parameterized by Treewidth and Cutwidth.
Wang, Hui-Po and Orekondy, Tribhuvanesh and Fritz, Mario
(2021)
InfoScrub: Towards Attribute Privacy by Targeted Obfuscation.
Marx, Dániel
(2021)
Modern Lower Bound Techniques in Database Theory and Constraint Satisfaction.
Böhle, Moritz and Fritz, Mario and Schiele, Bernt
(2021)
Convolutional Dynamic Alignment Networks for Interpretable Classifications.
Wang, Hui-Po and Yu, Ning and Fritz, Mario
(2021)
Hijack-GAN: Unintended-Use of Pretrained, Black-Box GANs.
Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Maximilian and Backes, Michael and Fritz, Mario
(2021)
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
Baumann, Christoph and Dam, Mads and Guanciale, Roberto and Nemati, Hamed
(2021)
On Compositional Information Flow Aware Refinement.
Cohen-Addad, Vincent and Klein, Philip N. and Marx, Dániel and Wheeler, Archer and Wolfram, Christopher
(2021)
On the Computational Tractability of a Geographic Clustering Problem Arising in Redistricting.
Branco, Pedro and Döttling, Nico and Pu, Sihang
(2021)
Multiparty Cardinality Testing for Threshold Private Intersection.
Döttling, Nico and Nishimaki, Ryo
(2021)
Universal Proxy Re-Encryption.
Abdelnabi, Sahar and Fritz, Mario
(2021)
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding.
Tahmasbi, Fatemeh and Schild, Leonard and Ling, Chen and Blackburn, Jeremy and Stringhini, Gianluca and Zhang, Yang and Zannettou, Savvas
(2021)
“Go eat a bat, Chang!”: On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19.
Grosse, Kathrin and Backes, Michael
(2021)
Do winning tickets exist before DNN training?
Torralba, Àlvaro and Speicher, Patrick and Künnemann, Robert and Hoffmann, Jörg and Steinmetz, Marcel
(2021)
Faster Stackelberg Planning via Symbolic Search and Information Sharing.
Ke, Qiuhong and Fritz, Mario and Schiele, Bernt
(2021)
Future Moment Assessment for Action Query.
Patrignani, Marco and Martin, Eric Mark and Devriese, Dominique
(2021)
On the Semantic Expressiveness of Recursive Types.
Chen, Xiaoyi and Salem, Ahmed and Chen, Dingfan and Backes, Michael and Ma, Shiqing and Shen, Qingni and Wu, Zhonghai and Zhang, Yang
(2021)
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
Brakerski, Zvika and Branco, Pedro and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2020)
Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions.
Brakerski, Zvika and Döttling, Nico
(2020)
Lossiness and Entropic Hardness for Ring-LWE.
Saurabh, Saket and Tale, Prafullkumar
(2020)
On the Parameterized Complexity of Maximum Degree Contraction Problem.
Hajipour, Hossein and Bhattacharyya, Apratim and Fritz, Mario
(2020)
SampleFix: Learning to Correct Programs by Sampling Diverse Fixes.
Döttling, Nico and Malavolta, Giulio and Pu, Sihang
(2020)
A Combinatorial Approach to Quantum Random Functions.
Chen, Dingfan and Orekondy, Tribhuvanesh and Fritz, Mario
(2020)
GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators.
Espitau, Thomas and Joux, Antoine and Kharchenko, Natalia
(2020)
On a dual/hybrid approach to small secret LWE.
Grohe, Martin and Neuen, Daniel and Wiebking, Daniel
(2020)
Isomorphism Testing for Graphs Excluding Small Minors.
Chen, Dingfan and Yu, Ning and Zhang, Yang and Fritz, Mario
(2020)
GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models.
Wen, Rui and Yu, Yu and Xie, Xiang and Zhang, Yang
(2020)
LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction.
Abdelnabi, Sahar and Krombholz, Katharina and Fritz, Mario
(2020)
VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity.
Deuber, Dominic and Döttling, Nico and Magri, Bernardo and Malavolta, Giulio and Thyagarajan, Sri Aravinda Krishnan
(2020)
Minting Mechanisms for (PoS) Blockchains.
Bhattacharyya, Apratim and Straehle, Christoph-Nikolas and Fritz, Mario and Schiele, Bernt
(2020)
Haar Wavelet based Block Autoregressive Flows for Trajectories.
Sharma, Saurabh and Yu, Ning and Fritz, Mario and Schiele, Bernt
(2020)
Long-Tailed Recognition Using Class-Balanced Experts.
Losch, Max and Fritz, Mario and Schiele, Bernt
(2020)
Semantic Bottlenecks: Quantifying and Improving Inspectability of Deep Representations.
Hagestedt, Inken and Humbert, Mathias and Berrang, Pascal and Lehmann, Irina and Eils, Roland and Backes, Michael and Zhang, Yang
(2020)
Membership Inference Against DNA Methylation Databases.
Durst, David and Feldman, Matthew and Huff, Dillon and Akeley, David and Daly, Ross and Bernstein, Gilbert Louis and Patrignani, Marco and Fatahalian, Kayvon and Hanrahan, Pat
(2020)
Type-Directed Scheduling of Streaming Accelerators.
Sattar, Hosnieh and Krombholz, Katharina and Pons-Moll, Gerard and Fritz, Mario
(2020)
Body Shape Privacy in Images: Understanding Privacy and Preventing Automatic Shape Extraction.
Marx, Dániel and Sandeep, R.B.
(2020)
Incompressibility of H-Free Edge Modification Problems: Towards a Dichotomy.
He, Yang and Schiele, Bernt and Fritz, Mario
(2020)
Synthetic Convolutional Features for Improved Semantic Segmentation.
Marx, Dániel
(2020)
Chordless Cycle Packing Is Fixed-Parameter Tractable.
Schepper, Philipp
(2020)
Fine-Grained Complexity of Regular Expression Pattern Matching and Membership.
Yu, Ning and Li, Ke and Zhou, Peng and Malik, Jitendra and Davis, Larry S. and Fritz, Mario
(2020)
Inclusive GAN: Improving Data and Minority Coverage in Generative Models.
He, Yang and Rahimian, Shadi and Schiele, Bernt and Fritz, Mario
(2020)
Segmentations-Leak: Membership Inference Attacks and Defenses in Semantic Image Segmentation.
Shetty, Rakshith and Fritz, Mario and Schiele, Bernt
(2020)
Towards Automated Testing and Robustification by Semantic Adversarial Data Generation.
Cogliati, Benoît-Michel and Jha, Ashwin and Nandi, Mridul
(2020)
How to Build Optimally Secure PRFs Using Block Ciphers.
(In Press)
Salem, Ahmed and Bhattacharya, Apratim and Backes, Michael and Fritz, Mario and Zhang, Yang
(2020)
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
Gunda, Spoorthy and Jain, Pallavi and Lokshtanov, Daniel and Saurabh, Saket and Tale, Prafullkumar
(2020)
On the Parameterized Approximability of Contraction to Classes of Chordal Graphs.
Birtel, Benedikt and Rossow, Christian
(2020)
Slitheen++: Stealth TLS-based Decoy Routing.
Khosrowjerdi, Hojat and Nemati, Hamed and Meinke, Karl
(2020)
Spatio-Temporal Model-Checking of Cyber-Physical Systems Using Graph Queries.
Hajipour, Hossein and Malinowski, Mateusz and Fritz, Mario
(2020)
IReEn: Iterative Reverse-Engineering of Black-Box Functions via Neural Program Synthesis.
Bhattacharyya, Apratim and Mahajan, Shweta and Fritz, Mario and Schiele, Bernt and Roth, Stefan
(2020)
Normalizing Flows with Multi-scale Autoregressive Priors.
Agarwal, Vedika and Shetty, Rakshith and Fritz, Mario
(2020)
Towards Causal VQA: Revealing and Reducing Spurious Correlations by Invariant and Covariant Semantic Editing.
Chou, Edward and Tramer, Florian and Pellegrino, Giancarlo
(2020)
SentiNet: Detecting Localized Universal Attack Against Deep Learning Systems.
Hasan, Rakibul and Crandall, David and Fritz, Mario and Kapadia, Apu
(2020)
Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.
Abate, Carmine and Blanco, Roberto and Ciobaca, Stefan and Durier, Adrien and Garg, Deepak and Hritcu, Catalin and Patrignani, Marco and Tanter, Éric and Thibault, Jérémy
(2020)
Trace-Relating Compiler Correctness and Secure Compilation.
Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2020)
Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks.
Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2020)
Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks.
Esiyok, Ilkan and Hanzlik, Lucjan and Künnemann, Robert and Budde, Lena Marie and Backes, Michael
(2020)
TrollThrottle — Raising the Cost of Astroturfing.
Zhang, Yang and Humbert, Mathias and Surma, Bartlomiej and Manoharan, Praveen and Vreeken, Jilles and Backes, Michael
(2020)
Towards Plausible Graph Anonymization.
Dalleiger, Sebastian and Vreeken, Jilles
(2020)
Explainable Data Decompositions.
(In Press)
Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2020)
Candidate iO from Homomorphic Encryption Schemes.
(In Press)
Brakerski, Zvika and Döttling, Nico
(2020)
Hardness of LWE on General Entropic Distribution.
Döttling, Nico and Garg, Sanjam and Malavolta, Giulio and Vasudevan, Prashant Nalini
(2020)
Tight Verifiable Delay Functions.
Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel and Wichs, Daniel
(2020)
Two-Round Oblivious Transfer from CDH or LPN.
(In Press)
Thyagarajan, Sri Aravinda Krishnan and Bhat, Adithya and Malavolta, Giulio and Nico, Döttling and Kate, Aniket and Schröder, Dominique
(2020)
Verifiable Timed Signatures Made Practical.
Li, Zheng and Hu, Chengyu and Guo, Shanqing and Zhang, Yang
(2019)
How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN.
Jia, Jinyuan and Salem, Ahmed and Backes, Michael and Gong, Neil Zhenqiang and Zhang, Yang
(2019)
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
Döttling, Nico and Garg, Sanjam and Goyal, Vipul and Malavolta, Giulio
(2019)
Laconic Conditional Disclosure of Secrets and Applications.
(In Press)
Yu, Ning and Davis, Larry and Fritz, Mario
(2019)
Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints.
Maximov, Maxim and Leal-Taixe, Laura and Fritz, Mario and Ritschel, Tobias
(2019)
Deep Appearance Maps.
Döttling, Nico and Garg, Sanjam and Ishai, Yuval and Malavolta, Giulio and Mour, Tamer and Ostrovsky, Rafail
(2019)
Trapdoor Hash Functions and Their Applications.
Rahman, Tahleen and Surma, Bartlomiej and Backes, Michael and Zhang, Yang
(2019)
Fairwalk: Towards Fair Graph Embedding.
Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2019)
Knockoff Nets: Stealing Functionality of Black-Box Models.
Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2019)
Not Using the Car to See the Sidewalk: Quantifying and Controlling the Effects of Context in Classification and Segmentation.
Ke, Qiuhong and Fritz, Mario and Schiele, Bernt
(2019)
Time-Conditioned Action Anticipation in One Shot.
Zhang, Yang
(2019)
Language in Our Time: An Empirical Analysis of Hashtags.
Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2019)
ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code.
Hagestedt, Inken and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Haixu, Tang and XiaoFeng, Wang and Backes, Michael
(2019)
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
Salem, Ahmed and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Fritz, Mario and Backes, Michael
(2019)
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2019)
Bayesian Prediction of Future Street Scenes using Synthetic Likelihoods.
Aggarwal, Divesh and Döttling, Nico and Nielsen, Jesper Buus and Obremski, Maciej and Purwanto, Erick
(2019)
Continuous Non-Malleable Codes in the 8-Split-State Model.
Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2019)
Discovering Reliable Correlations in Categorical Data.
Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2019)
Discovering Reliable Dependencies from Data: Hardness and Improved Algorithms (Extended Abstract).
Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019)
Discovering Robustly Connected Subgraphs with Simple Descriptions.
Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019)
Discovering Robustly Connected Subgraphs with Simple Descriptions.
Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019)
Discovering Robustly Connected Subgraphs with Simple Descriptions.
Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019)
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
(In Press)
Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Dowsley, Rafael and Giacomelli, Irene
(2019)
Efficient UC Commitment Extension with Homomorphism for Free (and Applications).
(In Press)
Sattar, Hosnieh and Pons-Moll, Gerard and Fritz, Mario
(2019)
Fashion is Taking Shape: Understanding Clothing Preference Based on Body Shape From Online Sources.
Kutylowski, Miroslaw and Lemiesz, Jakub and Slowik, Marta and Slowik, Marcin and Kluczniak, Kamil and Gebala, Maciej
(2019)
GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures.
Döttling, Nico and Lai, Russell and Malavolta, Giulio
(2019)
Incremental Proofs of Sequential Work.
(Unpublished)
Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2019)
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
(In Press)
Steil, Julian and Hagestedt, Inken and Huang, Michael Xuelin and Bulling, Andreas
(2019)
Privacy-aware eye tracking using differential privacy.
Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Liu, Kevin and Malavolta, Giulio
(2019)
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
(In Press)
Backes, Michael and Döttling, Nico and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2019)
Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions.
Shetty, Rakshith and Fritz, Mario and Schiele, Bernt
(2018)
Adversarial Scene Editing: Automatic Object Removal from Weak Supervision.
Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018)
A Hybrid Model for Identity Obfuscation by Face Replacement.
He, Yang and Fritz, Mario and Schiele, Bernt
(2018)
Diverse Conditional Image Generation by Stochastic Regression with Latent Drop-Out Codes.
Tretschk, Edgar and Oh, Seong Joon and Fritz, Mario
(2018)
Sequential Attacks on Agents for Long-Term Adversarial Goals.
(In Press)
Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2018)
A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2018)
Long-Term Image Boundary Prediction.
Berrang, Pascal and Humbert, Mathias and Zhang, Yang and Lehmann, Irina and Eils, Roland and Backes, Michael
(2018)
Dissecting Privacy Risks in Biomedical Data.
Zhang, Yang and Humbert, Mathias and Rahman, Tahleen and Li, Cheng-Te and Pang, Jun and Backes, Michael
(2018)
Tagvisor: A Privacy Advisor for Sharing Hashtags.
Bhattacharyya, Apratim and Schiele, Bernt and Fritz, Mario
(2018)
Accurate and Diverse Sampling of Sequences Based on a “Best of Many” Sample Objective.
Wagner, Misha and Basevi, Hector and Shetty, Rakshith and Li, Wenbin and Malinowski, Mateusz and Fritz, Mario and Leonardis, Ales
(2018)
Answering Visual What-If Questions: From Actions to Predicted Scene Descriptions.
Orekondy, Tribhuvanesh and Fritz, Mario and Schiele, Bernt
(2018)
Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images.
Ma, Liqian and Sun, Qianru and Georgoulis, Stamatios and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018)
Disentangled Person Image Generation.
Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018)
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2018)
Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018)
Natural and Effective Obfuscation by Head Inpainting.
Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel
(2018)
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
Döttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Mukherjee, Pratyay
(2018)
Obfuscation from Low Noise Multilinear Maps.
Asghar, Muhammad Rizwan and Backes, Michael and Simeonovski, Milivoj
(2018)
PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
Salem, Ahmed and Berrang, Pascal and Humbert, Mathias and Backes, Michael
(2018)
Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
(In Press)
Speicher, Patrick and Steinmetz, Marcel and Backes, Michael and Hoffmann, Jörg and Künnemann, Robert
(2018)
Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
Oh, Seong Joon and Augustin, Max and Schiele, Bernt and Fritz, Mario
(2018)
Towards Reverse-Engineering Black-Box Neural Networks.
Brakerski, Zvika and Döttling, Nico
(2018)
Two-Message Statistically Sender-Private OT from LWE.
Backes, Michael and Gomez-Rodriguez, Manuel and Manoharan, Praveen and Surma, Bartlomiej
(2017)
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks.
Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2017)
Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling.
Backes, Michael and Berrang, Pascal and Bieg, Matthias and Elis, Roland and Herrmann, Carl and Humbert, Mathias and Lehmann, Irina
(2017)
Identifying Personal DNA Methylation Profiles by Genotype Inference.
Pang, Jun and Zhang, Yang
(2017)
DeepCity: A Feature Learning Framework for Mining Location Check-ins.
Frenkel, Hadar and Grumberg, Orna and Sheinvald, Sarai
(2017)
An Automata-Theoretic Approach to Modeling Systems and Specifications over Infinite Data.
Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2017)
P2P Mixing and Unlinkable Bitcoin Transactions.
Tabibian, Behzad and Valera, Isabel and Farajtabar, Mehrdad and Song, Le and Schölkopf, Bernhard and Gomez-Rodriguez, Manuel
(2017)
Distilling Information Reliability and Source Trustworthiness from Digital Traces.
Sun, Qianru and Schiele, Bernt and Fritz, Mario
(2017)
A Domain Based Approach to Social Relation Recognition.
Oh, Seong Joon and Benenson, Rodrigo and Khoreva, Anna and Akata, Zeynep and Fritz, Mario and Schiele, Bernt
(2017)
Exploiting saliency for object segmentation from image level labels.
Zafar, Bilal and Valera, Isabel and Gomez-Rodriguez, Manuel and Gummadi, Krishna P.
(2017)
Fairness Beyond Disparate Treatment & Disparate Impact: Learning Classification without Disparate Mistreatment.
He, Yang and Chiu, Wei-Chen and Keuper, Margret and Fritz, Mario
(2017)
STD2P: RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling.
Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017)
Adversarial Image Perturbation for Privacy Protection — A Game Theory Perspective.
Broadnax, Brandon and Döttling, Nico and Hartung, Gunnar and Müller-Quade, Jörn and Nagel, Matthias
(2017)
Concurrently Composable Security with Shielded Super-Polynomial Simulators.
Apon, Daniel and Döttling, Nico and Garg, Sanjam and Mukherjee, Pratyay
(2017)
Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13.
Döttling, Nico and Garg, Sanjam
(2017)
From Selective IBE to Full IBE and Selective HIBE.
Döttling, Nico and Garg, Sanjam
(2017)
Identity-Based Encryption from the Diffie-Hellman Assumption.
Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2017)
It's Written All Over Your Face: Full-Face Appearance-Based Gaze Estimation.
Cho, Chongwon and Döttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Polychroniadou, Antigoni
(2017)
Laconic Oblivious Transfer and Its Applications.
He, Yang and Keuper, Margret and Schiele, Bernt and Fritz, Mario
(2017)
Learning Dilation Factors for Semantic Segmentation of Street Scenes.
Cramer, Ronald and and Nico Döttling, Ivan Damgård and Giacomelli, Irene and Xing, Chaoping
(2017)
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model.
Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017)
Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
Döttling, Nico and Ghosh, Satrajit and Nielsen, Jesper Buus and Nilges, Tobias and Trifiletti, Roberto
(2017)
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.
Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017)
Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
Li, Wenbin and Leonardis, Ales and Fritz, Mario
(2017)
Visual stability prediction for robotic manipulation.
Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne and Gool, Luc Van
(2017)
What is Around the Camera?
Schneider, Jonas and Fleischhacker, Nils and Schröder, Dominique and Backes, Michael
(2016)
Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments.
Backes, Michael and Berrang, Pascal and Humbert, Mathias and Manoharan, Praveen
(2016)
Membership Privacy in MicroRNA-based Studies.
Brakerski, Zvika and Brzuska, Christina and Fleischhacker, Nils
(2016)
On Statistically Secure Obfuscation with Approximate Correctness.
Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016)
Two Message Oblivious Evaluation of Cryptographic Functionalities.
Backes, Michael and Berrang, Pascal and Hecksteden, Anne and Humbert, Mathias and Keller, Andreas and Meyer, Tim
(2016)
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
Ohrimenko, Olga and Costa, Manuel and Fournet, Cédric and Nowozin, Sebastian and Mehta, Aastha and Schuster, Felix and Vaswani, Kapil
(2016)
SGX-Enabled Oblivious Machine Learning.
Biega, Joanna Asia and Gummadi, Krishna P. and Mele, Ida and Milchevski, Dragan and Tryfonopoulos, Christos and Weikum, Gerhard
(2016)
R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities.
Schiele, Bernt and Bhattacharjee, Bobby and Fritz, Mario and Aditya, Paarijaat and Druschel, Peter and Sen, Rijurekha and Oh, Seong Joon and Benenson, Rodrigo and Wu, Tong Tong
(2016)
Demo: I-Pic: A Platform for Privacy-Compliant Image Capture.
Krupp, Johannes and Schröder, Dominique and Simkin, Mark and Fiore, Dario and Ateniese, Giuseppe and Nürnberger, Stefan
(2016)
Nearly Optimal Verifiable Data Streaming.
Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016)
Anonymous RAM.
Lai, Russell W F and Zhang, Tao and Chow, Sherman S M and Schröder, Dominique
(2016)
Efficient Sanitizable Signatures Without Random Oracles.
Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2016)
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016)
Faceless Person Recognition: Privacy Implications in Social Media.
Mondal, Mainack and Messias, Johnnatan and Ghosh, Saptarshi and Gummadi, Krishna P. and Kate, Aniket
(2016)
Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
Aditya, Paarijaat and Sen, Rijurekha and Druschel, Peter and Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt and Bhattacharjee, Bobby and Wu, Tong Tong
(2016)
I-Pic: A Platform for Privacy-Compliant Image Capture.
Reed, Scott and Akata, Zeynep and Lee, Honglak and Schiele, Bernt
(2016)
Learning Deep Representations of Fine-Grained Visual Descriptions.
Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2016)
Loss Functions for Top-k Error: Analysis and Insights.
Gnad, Daniel and Steinmetz, Marcel and Jany, Mathäus and Hoffmann, Jörg and Serina, Ivan and Gerevini, Alfonso
(2016)
Partial Delete Relaxation, Unchained: On Intractable Red-Black Planning and Its Applications.
Daum, Jeanette and Torralba, Àlvaro and Hoffmann, Jörg and Haslum, Patrik and Weber, Ingo
(2016)
Practical Undoability Checking via Contingent Planning.
Li, Wenbin and Fritz, Mario
(2016)
Recognition of Ongoing Complex Activities by Sequence Prediction over a Hierarchical Label Space.
Steinmetz, Marcel and Hoffmann, Jörg and Buffet, Olivier
(2016)
Revisiting Goal Probability Analysis in Probabilistic Planning.
Jiang, Ke and Eles, Petru and Peng, Zebo and Chattopadhyay, Sudipta and Batina, Lejla
(2016)
SPARTA: A Scheduling Policy for Thwarting Differential Power Analysis Attacks.
Venkatadri, Giridhari and Goga, Oana and Zhong, Changtao and Viswanath, Bimal and Gummadi, Krishna P. and Sastry, Nishanth R
(2016)
Strengthening Weak Identities Through Inter-Domain Trust Transfer.
Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gavves, Efstratios and Tuytelaars, Tinne
(2016)
Deep Reflectance Maps.
Scheer, Jonas and Fritz, Mario and Grau, Oliver
(2016)
Learning to Select Long-Track Features for Structure-From-Motion and Visual SLAM.
Malinowski, Mateusz and Mokarian, Ashkan and Fritz, Mario
(2016)
Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task.
Akata, Zeynep and Malinowski, Mateusz and Fritz, Mario and Schiele, Bernt
(2016)
Multi-cue Zero-Shot Learning with Strong Supervision.
Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Nielsen, Jesper Buus
(2016)
Rate-1, Linear Time and Additively Homomorphic UC Commitments.
Chiu, Wei-Chen and Galasso, Fabio and Fritz, Mario
(2016)
Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles.
Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016)
Two-Message, Oblivious Evaluation of Cryptographic Functionalities.
Sharma, Abhishek and Grau, Oliver and Fritz, Mario
(2016)
VConv-DAE: Deep Volumetric Shape Learning Without Object Labels.
Chowdhury, Sreyasi Nag and Malinowski, Mateusz and Bulling, Andreas and Fritz, Mario
(2016)
Xplore-M-Ego: Contextual Media Retrieval Using Natural Language Queries.
Backes, Michael and Meiser, Sebastian and Slowik, Marcin
(2015)
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
Ruffing, Tim and Kate, Aniket and Schröder, Dominique
(2015)
Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins.
Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015)
POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Schröder, Dominique and Döttling, Nico
(2015)
Efficient Pseudorandom Functions via On-the-Fly Adaptation.
Mohammadi, Esfandiar and Bendun, Fabian and Pecina, Kim and Maffei, Matteo and Backes, Michael
(2015)
Symbolic Malleable Zero-knowledge Proofs.
Schneider, Jonas and Schröder, Dominique
(2015)
Foundations of Reconfigurable PUFs.
Backes, Michael and Barbosa, Manuel and Fiore, Dario and Reischuk, Raphael M.
(2015)
ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data.
Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2015)
Privacy and Access Control for Outsourced Personal Records.
Backes, Michael and Bendun, Fabian and Hoffmann, Jörg and Marnau, Ninja
(2015)
PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law.
Backes, Michael and Gagné, Martin and Thyagarajan, Sri Aravinda Krishnan
(2015)
Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext.
Farajtabar, Mehrdad and Gomez-Rodriguez, Manuel and Du, Nan and Zamani, Mohammad and Zha, Hongyuan and Song, Le
(2015)
Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades.
Khoreva, Anna and Galasso, Fabio and Hein, Matthias and Schiele, Bernt
(2015)
Classifier based graph construction for video segmentation.
Jawanpuria, Pratik and Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2015)
Efficient Output Kernel Learning for Multiple Tasks.
Blond, Stevens Le and Choffnes, David R. and Caldwell, William and Druschel, Peter and Merritt, Nicholas
(2015)
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
Gnad, Daniel and Hoffmann, Jörg
(2015)
Red-Black Planning: A New Tractability Analysis and Heuristic Function.
Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015)
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Hoffmann, Jörg
(2015)
Simulated Penetration Testing: From "Dijkstra" to "Turing Test++".
Viswanath, Bimal and Bashir, Muhammad Ahmad and Zafar, Muhammad Bilal and Bouget, Simon and Guha, Saikat and Gummadi, Krishna P. and Kate, Aniket and Mislove, Alan
(2015)
Strength in Numbers: Robust Tamper Detection in Crowd Computations.
Schröder, Dominique and Simkin, Mark
(2015)
VeriStream - A Framework for Verifiable Data Streaming.
Hanser, Christian and Rabkin, Max and Schröder, Dominique
(2015)
Verifiably Encrypted Signatures: Security Revisited and a New Construction.
Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2015)
Appearance-based gaze estimation in the wild.
Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2015)
Ask Your Neurons: A Neural-Based Approach to Answering Questions about Images.
Döttling, Nico and Schröder, Dominique
(2015)
Efficient Pseudorandom Functions via On-the-Fly Adaptation.
Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn and Nilges, Tobias
(2015)
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
Kraschewski, Daniel and Nilges, Tobias and Döttling, Nico and Müller-Quade, Jörn
(2015)
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
Seiter, Julia and Wei-Chen, Chiu and Fritz, Mario and Amft, Oliver and Tröster, Gerhard
(2015)
Joint segmentation and activity discovery using semantic and temporal priors.
Cramer, Ronald and Damgård, Ivan Bjerre and Döttling, Nico and Fehr, Serge and Spini, Gabriele
(2015)
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
Döttling, Nico
(2015)
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.
Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2015)
Person Recognition in Personal Photo Collections.
Sattar, Hosnieh and Müller, Sabine and Fritz, Mario and Bulling, Andreas
(2015)
Prediction of search targets from fixations in open-world settings.
Wei-Chen, Walon and Fritz, Mario
(2015)
See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG.
Li, Wenbin and Fritz, Mario
(2015)
Teaching robots the use of human tools from demonstration with non-dexterous end-effectors.
Krupp, Johannes and Schröder, Dominique and Simkin, Mark
(2014)
DEMO: Enhancing Security and Privacy with Google Glass.
Backes, Michael and Kate, Aniket and Meiser, Sebastian and Mohammadi, Esfandiar
(2014)
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
Backes, Michael and Grimm, Niklas and Kate, Aniket
(2014)
Lime: Data Lineage in the Malicious Environment.
Dachman-Soled, Dana and Fleischhacker, Nils and Katz, Jonathan and Lysyanskaya, Anna and Schröder, Dominique
(2014)
Feasibility and Infeasibility of Secure Computation with Malicious PUFs.
Backes, Michael and Bendun, Fabian and Choudhury, Ashish and Kate, Aniket
(2014)
Asynchronous MPC with a Strict Honest Majority Using Non-equivocation.
Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014)
BackRef: Accountability in Anonymous Communication Networks.
Backes, Michael and Gerling, Sebastian and Lorenz, Stefan and Lukas, Stephan
(2014)
X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.
Mondal, Mainack and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan
(2014)
Beyond Access Control: Managing Online Privacy via Exposure.
Simkin, Mark and Schröder, Dominique and Bulling, Andreas and Fritz, Mario
(2014)
Bridging the Gap Between Digital Cryptography and the Physical World.
Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2014)
Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-party Setting.
Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2014)
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
Choi, Seung Geol and Katz, Jonathan and Schröder, Dominique and Yerukhimovich, Arkady and Zhou, Hong-Sheng
(2014)
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Fawcett, Chris and Vallati, Mauro and Hutter, Frank and Hoffmann, Jörg and Hoos, Holger H. and Leyton-Brown, Kevin
(2014)
Improved Features for Runtime Prediction of Domain-Independent Planners.
Krajnanský, Michal and Hoffmann, Jörg and Buffet, Olivier and Fern, Alan
(2014)
Learning Pruning Rules for Heuristic Search Planning.
Platenius, Marie Christin and Arifulina, Svetlana and Petrlic, Ronald and Schäfer, Wilhelm
(2014)
Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.
Fleischhacker, Nils and Manulis, Mark and Azodi, Amir
(2014)
A Modular Framework for Multi-Factor Authentication and Key Exchange.
Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique
(2014)
On Tight Security Proofs for Schnorr Signatures.
Areces, Carlos and Bustos, Facundo and Dominguez, Martín Ariel and Hoffmann, Jörg
(2014)
Optimizing Planning Domains by Automatic Action Schema Splitting.
Asghar, Muhammad Rizwan and Gehani, Ashish and Crispo, Bruno and Russello, Giovanni
(2014)
PIDGIN: Privacy-preserving Interest and Content Sharing in Opportunistic Networks.
Reznichenko, Alexey and Francis, Paul
(2014)
Private-by-Design Advertising Meets the Real World.
Lapin, Maksim and Schiele, Bernt and Hein, Matthias
(2014)
Scalable Multitask Representation Learning for Scene Classification.
Brangewitz, Sonja and Jungmann, Alexander and Petrlic, Ronald and Platenius, Marie Christin
(2014)
Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services.
Karayev, Sergey and Fritz, Mario and Darrell, Trevor
(2014)
Anytime Recognition of Objects and Scenes.
Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2014)
Image-Based Synthesis and Re-synthesis of Viewpoints Guided by 3D Models.
Malinowski, Mateusz and Fritz, Mario
(2014)
A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input.
Wei-Chen, Walon and Johnson, Gregory and McCulley, Daniel and Grau, Oliver and Fritz, Mario
(2014)
Object Disambiguation for Augmented Reality Applications.
Backes, Michael and Fiore, Dario and Reischuk, Raphael M.
(2013)
Verifiable Delegation of Computation on Outsourced Data.
Backes, Michael and Meiser, Sebastian
(2013)
Differentially Private Smart Metering with Battery Recharging.
Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013)
AnoA: A Framework For Analyzing Anonymous Communication Protocols.
Fischlin, Marc and Fleischhacker, Nils
(2013)
Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
Backes, Michael and Doychev, Goran and Köpf, Boris
(2013)
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
Catalano, Dario and Fiore, Dario and Gennaro, Rosario and Vamvourellis, Konstantinos
(2013)
Algebraic (Trapdoor) One-Way Functions and Their Applications.
Backes, Michael and Datta, Amit and Kate, Aniket
(2013)
Asynchronous Computational VSS with Reduced Communication Complexity.
Gagné, Martin and Lafourcade, Pascal and Lakhnech, Yassine
(2013)
Automated Security Proofs for Almost-Universal Hash for MAC Verification.
Bühler, Thomas and Rangapuram, Syama Sundar and Setzer, Simon and Hein, Matthias
(2013)
Constrained fractional set programs and their application in local clustering and community detection.
Schmidt, Jens M
(2013)
Contractions, Removals and How to Certify 3-Connectivity in Linear Time.
Eigner, Fabienne and Maffei, Matteo
(2013)
Differential Privacy by Typing in Security Protocols.
Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013)
Identity-Based Steganography and Its Applications to Censorship Resistance.
Tang, Siyu and Andriluka, Mykhaylo and Milan, Anton and Schindler, Konrad and Roth, Stefan and Schiele, Bernt
(2013)
Learning People Detectors for Tracking in Crowded Scenes.
Fischlin, Marc and Fleischhacker, Nils
(2013)
Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013)
Poster: Identity-Based Steganography and Its Applications to Censorship Resistance.
Catalano, Dario and Fiore, Dario
(2013)
Practical Homomorphic MACs for Arithmetic Circuits.
Backes, Michael and Fiore, Dario and Mohammadi, Esfandiar
(2013)
Privacy-Preserving Accountable Computation.
Fleischhacker, Nils and Günther, Felix and Kiefer, Franziskus and Manulis, Mark and Poettering, Bertram
(2013)
Pseudorandom signatures.
Yan, Junjie and Zhang, Xucong and Lei, Zhen and Li, Stan Z
(2013)
Real-time High Performance Deformable Models for Face Detection in the Wild.
Yan, Junjie and Zhang, Xucong and Lei, Zhen and Liao, ShengCai and Li, Stan Z
(2013)
Robust Multi-resolution Pedestrian Detection in Traffic Scenes.
Chen, Ruichuan and Akkus, Istemi Ekin and Francis, Paul
(2013)
SplitX: high-performance private analytics.
Pishchulin, Leonid and Andriluka, Mykhaylo and Gehler, Peter and Schiele, Bernt
(2013)
Strong Appearance and Expressive Spatial Models for Human Pose Estimation.
Asghar, Muhammad Rizwan and Russello, Giovanni and Crispo, Bruno and Ion, Mihaela
(2013)
Supporting Complex Queries and Access Policies for Multi-user Encrypted Databases.
Blond, Stevens Le and Choffnes, David and Zhou, Wenxuan and Druschel, Peter and Ballani, Hitesh and Francis, Paul
(2013)
Towards Efficient Traffic-analysis Resistant Anonymity Networks.
Joshi, Nakul and Petrlic, Ronald
(2013)
Towards practical privacy-preserving Digital Rights Management for Cloud Computing.
Rangapuram, Syama Sundar and Bühler, Thomas and Hein, Matthias
(2013)
Towards realistic team formation in social networks based on densest subgraphs.
Chowdhury, Soudip Roy and Imran, Muhammad and Asghar, Muhammad Rizwan and Amer-Yahia, Sihem and Castillo, Carlos
(2013)
Tweet4act: Using Incident-Specific Profiles for Classifying Crisis-Related Messages.
Petrlic, Ronald and Sekula, Stephan
(2013)
Unlinkable content playbacks in a multiparty DRM system.
Catalano, Dario and Fiore, Dario
(2013)
Vector Commitments and Their Applications.
Döttling, Nico and Nilges, Tobias and Mie, Thilo and Müller-Quade, Jörn
(2013)
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
Malinowski, Mateusz and Fritz, Mario
(2013)
Learning Smooth Pooling Regions for Visual Recognition.
Döttling, Nico and Müller-Quade, Jörn
(2013)
Lossy Codes and a New Variant of the Learning-With-Errors Problem.
Wei-Chen, Walon and Fritz, Mario
(2013)
Multi-class Video Co-segmentation with a Generative Multi-video Model.
Levinkov, Evgeny and Fritz, Mario
(2013)
Sequential Bayesian Model Update under Structured Scene Prior for Semantic Road Scenes Labeling.
Akkus, Istemi Ekin and Chen, Ruichuan and Hardt, Michaela and Francis, Paul and Gehrke, Johannes
(2012)
Non-tracking Web Analytics.
Backes, Michael and Kate, Aniket and Mohammadi, Esfandiar
(2012)
Ace: An Efficient Key-Exchange Protocol for Onion Routing.
Backes, Michael and Bendun, Fabian and Kate, Aniket
(2012)
Brief announcement: distributed cryptography using trinc.
Backes, Michael and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2012)
ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
Asghar, Muhammad Rizwan and Russello, Giovanni
(2012)
ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems.
Druschel, Peter
(2012)
Accountability and Trust in Cooperative Information Systems.
Backes, Michael and Goldberg, Ian and Kate, Aniket and Toft, Tomas
(2012)
Adding query privacy to robust DHTs.
Pishchulin, Leonid and Jain, Arjun and Andriluka, Mykhaylo and Thormählen, Thorsten and Schiele, Bernt
(2012)
Articulated People Detection and Pose Estimation: Reshaping the Future.
Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2012)
Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification.
(Unpublished)
Mainberger, Markus and Backes, Michael and Berg, Matthias and Weickert, Joachim
(2012)
Diffusion-Based Image Compression in Steganography.
Fischlin, Marc and Lehmann, Anja and Schröder, Dominique
(2012)
History-Free Sequential Aggregate Signatures.
Basin, David and Klaedtke, Felix and Marinovic, Srdjan and Zălinescu, Eugen
(2012)
Monitoring compliance policies over incomplete and disagreeing logs.
Ciobotaru, Oana
(2012)
On the (Non-)Equivalence of UC Security Notions.
Clement, Allen and Junqueira, Flavio and Kate, Aniket and Rodrigues, Rodrigo
(2012)
On the (limited) power of non-equivocation.
Petrlic, Ronald
(2012)
Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment.
Backes, Michael and Kate, Aniket and Goldberg, Ian and Mohammadi, Esfandiar
(2012)
Provably Secure and Practical Onion Routing.
Petrlic, Ronald
(2012)
Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme.
Unruh, Dominique
(2012)
Quantum Proofs of Knowledge.
Schröder, Dominique and Unruh, Dominique
(2012)
Security of Blind Signatures Revisited.
Chen, Ruichuan and Reznichenko, Alexey and Francis, Paul and Gehrke, Johannes
(2012)
Towards Statistical Queries over Distributed Private User Data.
Schröder, Dominique and Schröder, Heike
(2012)
Verifiable data streaming.
Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012)
Active Metric Learning for Object Recognition.
Döttling, Nico and Nascimento, Anderson C. A. and Müller-Quade, Jörn
(2012)
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
Rematas, Konstantinos and Fritz, Mario and Tuytelaars, Tinne
(2012)
The Pooled NBNN Kernel: Beyond Image-to-Class and Image-to-Image.
Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012)
RALF: A reinforced active learning formulation for object class recognition.
Li, Wenbin and Fritz, Mario
(2012)
Recognizing Materials from Virtual Examples.
Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012)
Semi-Supervised Learning on a Budget: Scaling Up to Large Datasets.
Song, Hyun Oh and Zickler, Stefan and Althoff, Tim and Girshick, Ross B. and Fritz, Mario and Geyer, Christopher and Felzenszwalb, Pedro F. and Darrell, Trevor
(2012)
Sparselet Models for Efficient Multiclass Object Detection.
Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2012)
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation.
Karayev, Sergey and Baumgartner, Tobias and Fritz, Mario and Darrell, Trevor
(2012)
Timely Object Recognition.
Reznichenko, Alexey and Guha, Saikat and Francis, Paul
(2011)
Auctions in do-not-track compliant internet advertising.
Cortier, Véronique and Smyth, Ben
(2011)
Attacking and fixing Helios: An analysis of ballot secrecy.
Cerny, Pavol and Chatterjee, Krishnendu and Henzinger, Thomas A
(2011)
The Complexity of Quantitative Information Flow Problems.
Backes, Michael and Kate, Aniket and Patra, Arpita
(2011)
Computational Verifiable Secret Sharing Revisited.
Unruh, Dominique
(2011)
Concurrent composition in the bounded quantum storage model.
Tsankov, Petar and Basin, David and Dashti, Mohammad Torabi
(2011)
Constructing Mid-Points for Two-Party Asynchronous Protocols.
Acs, Gergely and Castelluccia, Claude
(2011)
I have a DREAM! (DIffeRentially PrivatE smartMetering).
Barthe, Gilles and Köpf, Boris
(2011)
Information-theoretic Bounds for Differentially Private Mechanisms.
Basin, David and Burri, Samuel J and Karjoth, Günter
(2011)
Obstruction-free Authorization Enforcement: Aligning Security With Business Objectives.
Asghar, Muhammad Rizwan and Russello, Giovanni and Crispo, Bruno
(2011)
Poster: ESPOON$_ERBAC$: Enforcing Security Policies in Outsourced Environments with Encrypted RBAC.
Zmudzinski, Sascha and Steinebach, Martin
(2011)
Re-synchronizing Audio Watermarking after Non-linear Time Stretching.
Blocki, Jeremiah and Christin, Nicolas and Datta, Anupam and Sinha, Arunesh
(2011)
Regret Minimizing Audits: A Learning-theoretic Basis for Privacy Protection.
Schröder, Dominique and Unruh, Dominique and Garg, Sanjam and Rao, Vanishree and Sahai, Amit
(2011)
Round Optimal Blind Signatures.
Metzger, Steffen and Elbassuoni, Shady and Hose, Katja and Schenkel, Ralf
(2011)
S3K: seeking statement-supporting top-K witnesses.
Kremer, Steve and Steel, Graham and Warinschi, Bogdan
(2011)
Security for Key Management Interfaces.
Varodayan, David and Khisti, Ashish
(2011)
Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage.
Chothia, Tom and Guha, Apratim
(2011)
A Statistical Test for Information Leaks Using Continuous Mutual Information.
Unruh, Dominique
(2011)
Termination-Insensitive Computational Indistinguishability (and applications to computational soundness).
Groß, Thomas and Mödersheim, Sebastian
(2011)
Vertical Protocol Composition.
Suchanek, Fabian M and Gross-Amblard, David and Abiteboul, Serge
(2011)
Watermarking for Ontologies.
Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2011)
Efficient Reductions for Non-signaling Cryptographic Primitives.
Wei-Chen, Walon and Blanke, Ulf and Fritz, Mario
(2011)
I spy with my little eye: Learning optimal filters for cross-modal stereo under projected patterns.
Wei-Chen, Walon and Blanke, Ulf and Fritz, Mario
(2011)
Improving the Kinect by Cross-Modal Stereo.
Tuytelaars, Tinne and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2011)
The NBNN kernel.
Miller, Stephen and Fritz, Mario and Darrell, Trevor and Abbeel, Pieter
(2011)
Parametrized shape models for clothing.
Wang, Ping Chuan and Miller, Stephen and Fritz, Mario and Darrell, Trevor and Abbeel, Pieter
(2011)
Perception for the manipulation of socks.
Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2011)
Pick Your Neighborhood - Improving Labels and Neighborhood Structure for Label Propagation.
Saenko, Kate and Karayev, Sergey and Jia, Yangqing and Shyr, Alex and Janoch, Allison and Long, Jonathan and Fritz, Mario and Darrell, Trevor
(2011)
Practical 3-D object detection using category and instance-level appearance models.
Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2011)
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
Song, Hyun Oh and Fritz, Mario and Gu, Chunhui and Darrell, Trevor
(2011)
Visual grasp affordances from appearance-based cues.
Janoch, Allison and Karayev, Sergey and Jia, Yangqing and Barron, Jonathan T. and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2011)
A category-level 3-D object dataset: Putting the Kinect to work.
Karayev, Sergey and Fritz, Mario and Fidler, Sanja and Darrell, Trevor
(2011)
A probabilistic model for recursive factorized image features.
Nürnberger, Stefan and Feller, Thomas and Huss, Sorin A
(2010)
Ray - A Secure Microkernel Architecture.
Döttling, Nico and de Almeida, Antonio Sobreira and Lazich, Dejan E. and Müller-Quade, Jörn
(2010)
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
Backes, Michael and Hamerlik, Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009)
Anonymity and Censorship Resistance in Unstructured Overlay Networks.
Backes, Michael and Druschel, Peter and Haeberlen, Andreas and Unruh, Dominique
(2009)
CSAR: A practical and provable technique to make randomized systems accountable.
Thiemert, Stefan and Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha
(2009)
Security of Robust Audio Hashes.
Backes, Michael and Pfitzmann, Birgit and Schunter, Matthias
(2003)
A Toolkit for Managing Enterprise Privacy Policies.
Article
EdalatNejad, Kasra and Raynal, Mathilde and Lueks, Wouter and Troncoso, Carmela
(2023)
Private Collection Matching Protocols.
Proceedings on Privacy Enhancing Technologies (PoPETs).
(In Press)
Lenzen, Christoph and Medina, Moti and Saberi, Mehrdad and Schmid, Stefan
(2023)
Robust Routing Made Easy: Reinforcing Networks Against Non-Benign Faults.
IEEE/ACM Transactions on Networking.
pp. 1-15.
ISSN 1063-6692
Fisman, Dana and Frenkel, Hadar and Zilles, Sandra
(2023)
Inferring Symbolic Automata.
Logical Methods in Computer Science, 19 (2).
Ben Guebila, Marouen and Wang, Tian and Lopes-Ramos, Camila M. and Fanfani, Viola and Weighill, Des and Burkholz, Rebekka and Schlauch, Daniel and Paulson, Joseph N. and Altenbuchinger, Michael and Shutta, Katherine H and Sonawane, Abhijeet R. and Lim, James and Calderer, Genis and van IJzendoorn, David G. P. and Morgan, Daniel and Marin, Alessandro and Chen, Cho-Yi and Song, Qi and Saha, Enakshi and DeMeo, Dawn L. and Padi, Megha and Platig, John and Kuijjer, Marieke and Glass, Kimberly and Quackenbush, John
(2023)
The Network Zoo: a multilingual package for the inference and analysis of gene regulatory networks.
Genome Biology, 24 (1).
ISSN 1474-7596
Horváth, Samuel and Kovalev, Dmitry and Mishchenko, Konstantin and Richtárik, Peter and Stich, Sebastian U.
(2023)
Stochastic distributed learning with gradient quantization and double-variance reduction.
Optimization Methods and Software, 38 (1).
pp. 91-106.
Shutta, Katherine H and Weighill, Deborah and Burkholz, Rebekka and Ben Guebila, Marouen and DeMeo, Dawn L and Zacharias, Helena U and Quackenbush, John and Altenbuchinger, Michael
(2022)
DRAGON: Determining Regulatory Associations using Graphical models on multi-Omic Networks.
Nucleic Acids Research.
ISSN 0305-1048
Marx, Dániel and Sandeep, R.B.
(2022)
Incompressibility of H-free edge modification problems: Towards a dichotomy.
Journal of Computer and System Sciences, 125.
pp. 25-58.
ISSN 00220000
Joux, Antoine and Pierrot, Cécile
(2022)
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms.
Advances in Mathematics of Communications.
ISSN 1930-5346
Troncoso, Carmela and Bogdanov, Dan and Bugnion, Edouard and Chatel, Sylva and Cremers, Cas and Gürses, Seda and Hubaux, Jean-Pierre and Jackson, Dennis and Larus, James and Lueks, Wouter and Oliveira, Rui and Payer, Mathias and Preneel, Bart and Pyrgelis, Apostolos and Salathé, Marcel and Stadler, Theresa and Veale, Michael
(2022)
Deploying decentralized, privacy-preserving proximity tracing.
Communications of the ACM, 65 (9).
ISSN 0001-0782
Balliu, Alkida and Brandt, Sebastian and Chang, Yi-Jun and Olivetti, Dennis and Studený, Jan and Suomela, Jukka and Tereshchenko, Aleksandr
(2022)
Locally Checkable Problems in Rooted Trees.
Distributed Computing.
ISSN 0178-2770
Schönherr, Lea and Golla, Maximilian and Eisenhofer, Thorsten and Wiele, Jan and Kolossa, Dorothea and Holz, Thorsten
(2022)
Exploring accidental triggers of smart speakers.
Computer Speech & Language.
ISSN 0885-2308
(In Press)
Ben Guebila, Marouen and Weighill, Deborah and Lopes-Ramos, Camila M. and Burkholz, Rebekka and Pop, Romana T. and Palepu, Kalyan and Shapoval, Mia and Fagny, Maud and Schlauch, Daniel and Glass, Kimberly and Altenbuchinger, Michael and Kuijjer, Marieke and Platig, John and Quackenbush, John
(2022)
An online notebook resource for reproducible inference, analysis and publication of gene regulatory networks.
Nature Methods.
ISSN 1548-7091
Jha, Ashwin and Nandi, Mridul
(2022)
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF.
Entropy, 24 (4).
pp. 462-496.
ISSN 1099-4300
Cueppers, Joscha and Kalofolias, Janis and Vreeken, Jilles
(2022)
Omen: discovering sequential patterns with reliable prediction delays.
Knowledge and Information Systems.
ISSN 0219-1377
Cogliati, Benoît-Michel and Ethan, Jordan and Lallemand, Virginie and Lee, Byeonghak and Lee, Jooyoung and Minier, Marine
(2021)
CTET+: A Beyond-Birthday-Bound Secure
Tweakable Enciphering Scheme Using a Single
Pseudorandom Permutation.
IACR Transactions on Symmetric Cryptology, 2021 (4).
ISSN 2519-173X
Rottenstreich, Ori and Kulik, Ariel and Joshi, Ananya and Rexford, Jennifer and Rétvári, Gábor and Menache, Daniel S
(2021)
Data Plane Cooperative Caching with Dependencies.
IEEE Transactions on Network and Service Management.
Losch, Max and Fritz, Mario and Schiele, Bernt
(2021)
Semantic Bottlenecks: Quantifying and Improving Inspectability of Deep Representations.
International Journal of Computer Vision (IJCV).
ISSN 1573-1405
Oestreich, Marie and Chen, Dingfan and Schultze, Joachim L. and Fritz, Mario and Becker, Matthias
(2021)
Privacy considerations for sharing genomics data.
EXCLI Journal Eperimental and Clinical Sciences, 20.
pp. 1243-1260.
ISSN 1611-2156
Cohen-Addad, Vincent and De Verdière, Éric Colin and Marx, Dániel and De Mesmay, Arnaud
(2021)
Almost Tight Lower Bounds for Hard Cutting Problems in Embedded Graphs.
Journal of the ACM, 68 (4).
pp. 1-26.
ISSN 0004-5411
Chakraborty, Bishwajit and Chattopadhyay, Soumya and Jha, Ashwin and Nandi, Mridul
(2021)
On Length Independent Security Bounds for the PMAC Family.
IACR Transactions on Symmetric Cryptology, 2021 (2).
pp. 423-445.
Döttling, Nico and Garg, Sanjam
(2021)
Identity-based Encryption from the Diffie-Hellman Assumption.
Journal of the ACM.
ISSN 0004-5411
Warnat-Herresthal, Stefanie and Schultze, Hartmut and Shastry, Krishnaprasad Lingadahalli and Manamohan, Sathyanarayanan and Mukherjee, Saikat and Garg, Vishesh and Sarveswara, Ravi and Händler, Kristian and Pickkers, Peter and Aziz, N. Ahmad and Ktena, Sofia and Tran, Florian and Bitzer, Michael and Ossowski, Stephan and Casadei, Nicolas and Herr, Christian and Petersheim, Daniel and Behrends, Uta and Kern, Fabian and Fehlmann, Tobias and Schommers, Philipp and Lehmann, Clara and Augustin, Max and Rybniker, Jan and Altmüller, Janine and Mishra, Neha and Bernardes, Joana P. and Krämer, Benjamin and Bonaguro, Lorenzo and Schulte-Schrepping, Jonas and De Domenico, Elena and Siever, Christian and Kraut, Michael and Desai, Milind and Monnet, Bruno and Saridaki, Maria and Siegel, Charles Martin and Drews, Anna and Nuesch-Germano, Melanie and Theis, Heidi and Heyckendorf, Jan and Schreiber, Stefan and Kim-Hellmuth, Sarah and Nattermann, Jacob and Skowasch, Dirk and Kurth, Ingo and Keller, Andreas and Bals, Robert and Nürnberg, Peter and Rieß, Olaf and Rosenstiel, Philip and Netea, Mihai G. and Theis, Fabian and Mukherjee, Sach and Backes, Michael and Aschenbrenner, Anna C. and Ulas, Thomas and Breteler, Monique M. B. and Giamarellos-Bourboulis, Evangelos J. and Kox, Matthijs and Becker, Matthias and Cheran, Sorin and Woodacre, Michael S. and Goh, Eng Lim and Schultze, Joachim L.
(2021)
Swarm Learning for decentralized and confidential clinical machine learning.
Nature.
Bhattacharyya, Arnab and Bonnet, Édouard and Egri, László and Ghoshal, Suprovat and C. S., Karthik and Lin, Bingkai and Manurangsi, Pasin and Marx, Dániel
(2021)
Parameterized Intractability of Even Set and Shortest Vector Problem.
Journal of the ACM, 68 (3).
pp. 1-40.
ISSN 0004-5411
de Berg, Mark and Bodlaender, Hans L. and Kisfaludi-Bak, Sándor and Marx, Dániel and van der Zanden, Tom C.
(2020)
A Framework for Exponential-Time-Hypothesis--Tight Algorithms and Lower Bounds in Geometric Intersection Graphs.
SIAM Journal on Computing, 49 (6).
pp. 1291-1331.
ISSN 0097-5397
Sutton, Christopher and Boley, Mario and Ghiringhelli, Luca M. and Rupp, Matthias and Vreeken, Jilles and Scheffler, Matthias
(2020)
Identifying Domains of Applicability of Machine Learning Models for Materials Science.
Nature Communications.
ISSN 2041-1723
Sattara, Hosnieh and Fritz, Mario and Bulling, Andreas
(2020)
Deep gaze pooling: Inferring and visually decoding search intents from human gaze fixations.
Neurocomputing, 387.
pp. 369-382.
ISSN 0925-2312
Joux, Antoine and Espitau, Thomas
(2020)
Certified Lattice Reduction.
Advances in Mathematics of Communications, 14 (1).
pp. 137-159.
ISSN 1930-5346
Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2020)
Person Recognition in Personal Photo Collections.
IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 42 (1).
pp. 203-220.
Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2019)
MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).
Marnau, Ninja
(2019)
Überwachung by Design.
Privacy in Germany (PinG) Journal, 2019/2.
ISSN 2197-1862
(In Press)
Hanzlik, Lucjan and Kluczniak, Kamil and Kutylowski, Miroslaw
(2019)
CTRL-PACE: Controlled Randomness for e-Passport Password Authentication.
Fundamenta Informaticae.
Kluczniak, Kamil and Wang, Jianfeng and Chen, Xiaofeng and Kutylowski, Miroslaw
(2019)
Multi-device anonymous authentication.
International Journal of Information Security.
Grosse, Kathrin and Pfaff, David and Smith, Michael Thomas and Backes, Michael
(2018)
The Limitations of Model Uncertainty in Adversarial Settings.
ArXiv e-prints.
Frenkel, Hadar and Grumberg, Orna and Sheinvald, Sarai
(2018)
An Automata-Theoretic Approach to Model-Checking Systems and Specifications Over Infinite Data Domains.
Journal of Automated Reasoning, 63 (4).
pp. 1077-1101.
Kawohl, Claudia and Krämer, Annika and Marnau, Ninja
(2018)
Datenschutz durch Technikgestaltung für Genomdaten.
DSRI Herbstakademie Tagungsband 2018.
Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2018)
A Survey on Routing in Anonymous Communication Protocols.
ACM Computing Surveys, 51 (3).
pp. 1-39.
ISSN 0360-0300
Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2018)
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Information Security, 12 (3).
pp. 166-183.
ISSN 1751-8709
Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2018)
Advanced Steel Microstructural Classification by Deep Learning Methods.
Scientific Reports, 8.
ISSN 2045-2322
Marnau, Ninja and Berrang, Pascal and Humbert, Mathias
(2018)
Anonymisierungsverfahren für genetische Daten.
Datenschutz und Datensicherheit (DuD), 2/2018.
pp. 83-88.
Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2018)
MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).
Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Gavves, Efstratios and Fritz, Mario and Gool, Luc Van and Tuytelaars, Tinne
(2018)
Reflectance and Natural Illumination from Single-Material Specular Objects Using Deep Learning.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 40 (8).
pp. 1932-1947.
ISSN 0162-8828
Steinmetz, Marcel and Hoffmann, Jörg
(2017)
State Space Search Nogood Learning: Online Refinement of Critical-Path Dead-End Detectors in Planning.
Artificial Intelligence (journal), ???.
-.
Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2017)
A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
CoRR, abs/17.
Li, Wenbin and Bohg, Jeannette and Fritz, Mario
(2017)
Acquiring Target Stacking Skills by Goal-Parameterized Deep Reinforcement Learning.
CoRR, abs/17.
Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2017)
Advanced Steel Microstructure Classification by Deep Learning Methods.
CoRR, abs/17.
Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017)
Adversarial Image Perturbation for Privacy Protection - A Game Theory Perspective.
CoRR, abs/17.
Sun, Qianru and Schiele, Bernt and Fritz, Mario
(2017)
A Domain Based Approach to Social Relation Recognition.
CoRR, abs/17.
Oh, Seong Joon and Benenson, Rodrigo and Khoreva, Anna and Akata, Zeynep and Fritz, Mario and Schiele, Bernt
(2017)
Exploiting saliency for object segmentation from image level labels.
CoRR, abs/17.
He, Yang and Keuper, Margret and Schiele, Bernt and Fritz, Mario
(2017)
Learning Dilation Factors for Semantic Segmentation of Street Scenes.
CoRR, abs/17.
Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2017)
Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
CoRR, abs/17.
Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2017)
MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
CoRR, abs/17.
Rematas, Konstantinos and Nguyen, Chuong H. and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2017)
Novel Views of Objects from a Single Image.
IEEE Trans. Pattern Anal. Mach. Intell., 39 (8).
pp. 1576-1590.
Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2017)
Person Recognition in Social Media Photos.
CoRR, abs/17.
Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017)
Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
CoRR, abs/17.
Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017)
Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
CoRR, abs/17.
Sattar, Hosnieh and Fritz, Mario and Bulling, Andreas
(2017)
Visual Decoding of Targets During Visual Search From Human Eye Fixations.
CoRR, abs/17.
Backes, Michael and Manoharan, Praveen and Grosse, Kathrin and Papernot, Nicolas
(2016)
Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
The Computing Research Repository (CoRR), abs/16.
Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2016)
A Survey on Routing in Anonymous Communication Protocols.
The Computing Research Repository (CoRR), abs/16.
Steinmetz, Marcel and Hoffmann, Jörg and Buffet, Olivier
(2016)
Goal Probability Analysis in Probabilistic Planning: Exploring and Enhancing the State of the Art.
J. Artif. Intell. Res. (JAIR), 57.
pp. 229-271.
Gomez-Rodriguez, Manuel and Song, Le and Du, Nan and Zha, Hongyuan and Schölkopf, Bernhard
(2016)
Influence Estimation and Maximization in Continuous-Time Diffusion Networks.
ACM Transactions on Information Systems (TOIS).
Forero, Juan Pablo and Fernando, Piyum and Sridhar, Priyashri and Withana, Anusha Indrajith and Nanayakkara, Suranga and Steimle, Jürgen and Maes, Pattie
(2016)
PostBits: using contextual locations for embedding cloud information in the home.
Personal and Ubiquitous Computing, 20 (6).
pp. 1001-1014.
Rohrbach, Marcus and Rohrbach, Anna and Regneri, Michaela and Amin, Sikandar and Andriluka, Mykhaylo and Pinkal, Manfred and Schiele, Bernt
(2016)
Recognizing Fine-Grained and Composite Activities Using Hand-Centric Features and Script Data.
International Journal of Computer Vision, 119 (3).
pp. 346-373.
Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2016)
Ask Your Neurons: A Deep Learning Approach to Visual Question Answering.
CoRR, abs/16.
Chowdhury, Sreyasi Nag and Malinowski, Mateusz and Bulling, Andreas and Fritz, Mario
(2016)
Contextual Media Retrieval Using Natural Language Queries.
CoRR, abs/16.
Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gool, Luc J. Van and Tuytelaars, Tinne
(2016)
DeLight-Net: Decomposing Reflectance Maps into Specular Materials and Natural Illumination.
CoRR, abs/16.
Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016)
Faceless Person Recognition; Privacy Implications in Social Media.
CoRR, abs/16.
Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2016)
It's Written All Over Your Face: Full-Face Appearance-Based Gaze Estimation.
CoRR, abs/16.
Song, Hyun Oh and Fritz, Mario and Göhring, Daniel and Darrell, Trevor
(2016)
Learning to Detect Visual Grasp Affordance.
IEEE Trans. Automation Science and Engineering, 13 (2).
pp. 798-809.
Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2016)
Long-Term Image Boundary Extrapolation.
CoRR, abs/16.
Mokarian, Ashkan and Malinowski, Mateusz and Fritz, Mario
(2016)
Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task.
CoRR, abs/16.
Akata, Zeynep and Malinowski, Mateusz and Fritz, Mario and Schiele, Bernt
(2016)
Multi-Cue Zero-Shot Learning with Strong Supervision.
CoRR, abs/16.
Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne and Gool, Luc Van
(2016)
Natural Illumination from Multiple Materials Using Deep Learning.
CoRR, abs/16.
Rematas, Konstantinos and Nguyen, Chuong H. and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2016)
Novel Views of Objects from a Single Image.
CoRR, abs/16.
Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2016)
Predicting the Category and Attributes of Mental Pictures Using Deep Gaze Pooling.
CoRR, abs/16.
He, Yang and Chiu, Wei-Chen and Keuper, Margret and Fritz, Mario
(2016)
RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling.
CoRR, abs/16.
Bhattacharyya, Apratim and Malinowski, Mateusz and Fritz, Mario
(2016)
Spatio-Temporal Image Boundary Extrapolation.
CoRR, abs/16.
Li, Wenbin and Azimi, Seyedmajid and Leonardis, Ales and Fritz, Mario
(2016)
To Fall Or Not To Fall: A Visual Approach to Physical Stability Prediction.
CoRR, abs/16.
Chiu, Wei-Chen and Galasso, Fabio and Fritz, Mario
(2016)
Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles.
CoRR, abs/16.
Malinowski, Mateusz and Fritz, Mario
(2016)
Tutorial on Answering Questions about Images with Deep Learning.
CoRR, abs/16.
Sharma, Abhishek and Grau, Oliver and Fritz, Mario
(2016)
VConv-DAE: Deep Volumetric Shape Learning Without Object Labels.
CoRR, abs/16.
Li, Wenbin and Leonardis, Ales and Fritz, Mario
(2016)
Visual Stability Prediction and Its Application to Manipulation.
CoRR, abs/16.
Choffnes, David and Druschel, Peter and Blond, Stevens Le and Caldwell, William and Merritt, Nicholas
(2015)
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
ACM Computer Communication Review, 45 (5).
pp. 639-652.
Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2015)
How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, abs/15.
Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015)
Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2).
178 - 191.
ISSN 1545-5971
Backes, Michael and Köpf, Boris
(2015)
Quantifying Information Flow in Cryptographic Systems.
Mathematical Structures in Computer Science.
Domshlak, Carmel and Hoffmann, Jörg and Katz, Michael
(2015)
Red-black planning: A new systematic approach to partial delete relaxation.
Artif. Intell., 221.
pp. 73-114.
Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2015)
Appearance-Based Gaze Estimation in the Wild.
CoRR, abs/15.
Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2015)
Ask Your Neurons: A Neural-based Approach to Answering Questions about Images.
CoRR, abs/15.
Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gavves, Efstratios and Tuytelaars, Tinne
(2015)
Deep Reflectance Maps.
CoRR, abs/15.
Shcherbatyi, Iaroslav and Bulling, Andreas and Fritz, Mario
(2015)
GazeDPM: Early Integration of Gaze Information in Deformable Part Models.
CoRR, abs/15.
Malinowski, Mateusz and Fritz, Mario
(2015)
Hard to Cheat: A Turing Test based on Answering Questions about Images.
CoRR, abs/15.
Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2015)
Person Recognition in Personal Photo Collections.
CoRR, abs/15.
Sattar, Hosnieh and Müller, Sabine and Fritz, Mario and Bulling, Andreas
(2015)
Prediction of search targets from fixations in open-world settings.
CoRR, abs/15.
Wei-Chen, Walon and Fritz, Mario
(2015)
See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG.
CoRR, abs/15.
Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014)
Brave New World: Privacy Risks for Mobile Users.
Mobile Computing and Communications Review, 18 (3).
pp. 49-54.
Tang, Siyu and Andriluka, Mykhaylo and Schiele, Bernt
(2014)
Detection and Tracking of Occluded People.
International Journal of Computer Vision (IJCV), 110 (1).
pp. 58-69.
Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2014)
Learning using privileged information: SV M+ and weighted SVM.
Neural Networks, 53.
pp. 95-108.
Bulling, Andreas and Blanke, Ulf and Schiele, Bernt
(2014)
A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors.
ACM Computing Surveys, 46 (3).
pp. 1-33.
Li, Wenbin and Fritz, Mario
(2014)
Learning Multi-Scale Representations for Material Classification.
CoRR, abs/14.
Malinowski, Mateusz and Fritz, Mario
(2014)
A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input.
CoRR, abs/14.
Malinowski, Mateusz and Fritz, Mario
(2014)
A Pooling Approach to Modelling Spatial Relations for Image Retrieval and Annotation.
CoRR, abs/14.
Malinowski, Mateusz and Fritz, Mario
(2014)
Towards a Visual Turing Challenge.
CoRR, abs/14.
Bresson, Emmanuel and Catalano, Dario and Raimondo, Mario and Fiore, Dario and Gennaro, Rosario
(2013)
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
International Journal of Information Security, 12 (6).
pp. 439-465.
Young, Maxwell and Kate, Aniket and Goldberg, Ian and Karsten, Martin
(2013)
Towards Practical Communication in Byzantine-Resistant DHTs.
Networking, IEEE/ACM Transactions on, 21 (1).
pp. 190-203.
Brandenburg, Björn B.
(2013)
An asymptotically optimal real-time locking protocol for clustered scheduling under suspension-aware analysis.
SIGBED Review, 10 (2).
p. 19.
Malinowski, Mateusz and Fritz, Mario
(2013)
Learnable Pooling Regions for Image Classification.
CoRR, abs/13.
Hofheinz, Dennis and Unruh, Dominique and Müller-Quade, Jörn
(2012)
Polynomial Runtime and Composability.
Journal of Cryptology.
Döttling, Nico and Dowsley, Rafael and Müller-Quade, Jörn and Nascimento, Anderson C. A.
(2012)
A CCA2 Secure Variant of the McEliece Cryptosystem.
IEEE Trans. Information Theory, 58 (10).
pp. 6672-6680.
Miller, Stephen and van den Berg, Jur and Fritz, Mario and Darrell, Trevor and Goldberg, Kenneth Y. and Abbeel, Pieter
(2012)
A geometric approach to robotic laundry folding.
I. J. Robotics Res., 31 (2).
pp. 249-267.
Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2011)
Cryptographically sound security proofs for basic and public-key Kerberos.
International Journal of Information Security, 10 (2).
pp. 107-134.
Stikic, Maja and Larlus, Diane and Ebert, Sandra and Schiele, Bernt
(2011)
Weakly Supervised Recognition of Daily Life Activities with Wearable Sensors.
IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 33 (12).
pp. 2521-2537.
Thesis
Salem, Ahmed
(2016)
CRRP: A Cryptographic Protocol for Coercion-Resistant Rating Platforms.
Masters thesis, UNSPECIFIED.
Awazid, Tahleen Rahman
(2016)
Curious Volunteers: Anonymity Impact of adding Tor nodes.
Masters thesis, UNSPECIFIED.
Waxweiler, Daniel
(2016)
Making Chromium´s Certificate Transparency integration more accessible.
Masters thesis, UNSPECIFIED.
Wedeking, Lukas
(2016)
Anonymity Guarantees for Tor Hidden Services.
Bachelors thesis, Saarland University.
Tiwari, Abishek
(2015)
Applying Privacy Case Law to The Right to be Forgotten.
Masters thesis, Saarland University.
Schneider, Jonas
(2015)
Partially Oblivious Pseudorandom Functions: A Generic Approach and an Impossibility Result.
Masters thesis, UNSPECIFIED.
Patel, Vikash
(2015)
Argumentation Mining for the Sake of Privacy.
Masters thesis, Saarland University.
Koch, Simon
(2015)
Correlating BGP and Traceroute Data.
Bachelors thesis, Saarland University.
Bauer, Markus
(2015)
The MATOR Addon: Accessible Quantification of Tor Anonymity for the Tor Browser.
Bachelors thesis, Saarland University.
Petrlic, Ronald
(2014)
Privacy-Preserving Multiparty Digital Rights Management.
Doctoral thesis, University of Paderborn.
Schranz, Oliver
(2013)
A Developer-Centric Approach to Dynamic Permission System.
Bachelors thesis, Saarland University.
Berg, Matthias
(2013)
Formal Verification of Cryptographic Security Proofs.
Doctoral thesis, Saarland University.
Schröder, Florian
(2013)
Generic Access Control for Extensible Web Applications within the SAFE Activation.
Masters thesis, Saarland University.
Grimm, Niklas
(2013)
Lime: A Framework for Data Lineage in the Malicious Environment.
Bachelors thesis, Saarland University.
Asghar, Muhammad Rizwan
(2013)
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments.
Doctoral thesis, University of Trento.
Doychev, Goran
(2012)
Analysis and Mitigation of Information Leaks in Web Browsing Traffic.
Masters thesis, Saarland University.
Möllers, Frederik
(2012)
An Analysis of Traceability of Electronic Identification Documents.
Masters thesis, Universität Paderborn.
Ruffing, Tim
(2012)
Computational Soundness of Interactive Primitives.
Bachelors thesis, Saarland University.
Reinert, Manuel
(2012)
A Framework for Security-Oriented Distributed Programming.
Masters thesis, Saarland University.
Meyer, Sebastian
(2012)
Privacy Preserving Surveillance and Face Recognition.
Bachelors thesis, Saarland University.
Ciobotaru, Oana
(2012)
Rational Cryptography.
Doctoral thesis, Saarland University.
Knuth, Karsten
(2012)
Security Analysis of Browser Extension Concepts.
Bachelors thesis, Saarland University.
Skoruppa, Malte
(2012)
Verifiable Security of Prefix-free Merkle-Damgård.
Masters thesis, Saarland University.
Bornträger, Holger
(2011)
Automatic Verification of Equivalences of Cryptographic Games.
Masters thesis, Saarland University.
Meiser, Sebastian
(2011)
Computational Soundness of Passively Secure Encryption in Presence of Active Adversaries.
Masters thesis, Saarland University.
Künnemann, Robert
(2011)
Game-Theoretic Notions of Incoercibility.
Masters thesis, UNSPECIFIED.
Busenius, Alex
(2011)
Mechanized Formalization of a Transformation from an Extensible Spi Calculus to Java.
Masters thesis, Saarland University.
Balzer, Jan
(2011)
Towards a Formal Sematics for G2C Summary.
Bachelors thesis, Saarland University.
Hriţcu, Cătălin
(2011)
Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis.
Doctoral thesis, Saarland University.
Ciolacu, Ines Lucia
(2011)
Universally Composable Relativistic Commitments.
Masters thesis, Saarland University.
Book Section
Fuegger, Matthias and Lenzen, Christoph and Schmid, Ulrich
(2022)
On Specifications and Proofs of Timed Circuits.
In:
Principles of Systems Design - Essays Dedicated to Thomas A. Henzinger on the Occasion of His 60th Birthday.
Springer, pp. 1-24.
ISBN 978-3-031-22337-2
Oh, Seong Joon and Schiele, Bernt and Fritz, Mario
(2019)
Towards Reverse-Engineering Black-Box Neural Networks.
In:
Explainable AI: Interpreting, Explaining and Visualizing Deep Learning.
Springer, pp. 121-144.
ISBN 978-3-030-28953-9
Marnau, Ninja
(2019)
Datenschutzrecht und Brexit.
In:
Brexit - Privat- und wirtschaftsrechtliche Folgen, 2. Aufl. (Hrsg. Kramme / Baldus / Schmidt-Kessel).
Nomos.
ISBN 978-3-8487-5438-0
(In Press)
Marnau, Ninja and Sorge, Christoph
(2019)
From Law to Engineering: A Computer Science Perspective on Privacy & Data Protection.
In:
González-Fuster, G., van Brakel, R. and P. De Hert (forthcoming) Research Handbook on Privacy and Data Protection Law. Values, Norms and Global Politics.
Edward Elgar Publishing.
(In Press)
Marnau, Ninja
(2019)
Kommentierung der §§64, 70, 71, 74 BDSG.
In:
Gola/Heckman (Hrsg.) Bundesdatenschutzgesetz, Kommentar, 13. Aufl.
C.H.Beck.
ISBN 978-3-406-72878-5
(In Press)
Blaskiewicz, Przemyslaw and Hanzlik, Lucjan and Kluczniak, Kamil and Krzywiecki, Lukasz and Kutylowski, Miroslaw and Slowik, Marcin and Wszola, Marta
(2019)
Pseudonymous Signature Schemes.
In:
Advances in Cyber Security.
Springer, Singapore, pp. 185-255.
ISBN 78-981-13-1483-4
Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2016)
Delegatable Functional Signatures.
In:
UNSPECIFIED
Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 357-386.
ISBN 978-3-662-49384-7
Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2016)
From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
In:
UNSPECIFIED
Springer International Publishing, Cham, pp. 87-138.
ISBN 978-3-319-43005-8
Ebert, Sandra and Schiele, Bernt
(2013)
Where Next in Object Recognition and how much Supervision Do We Need?
In:
Advances in Computer Vision and Pattern Recognition.
Springer, pp. 35-64.
Janoch, Allison and Karayev, Sergey and Jia, Yangqing and Barron, Jonathan T. and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2013)
A Category-Level 3D Object Dataset: Putting the Kinect to Work.
In:
Consumer Depth Cameras for Computer Vision, Research Topics and Applications.
UNSPECIFIED, pp. 141-165.
Asghar, Muhammad Rizwan and Russello, Giovanni
(2012)
Flexible and Dynamic Consent-Capturing.
In:
UNSPECIFIED
Lecture Notes in Computer Science, 7039
.
Springer Berlin Heidelberg, pp. 119-131.
ISBN 978-3-642-27584-5
Book
Brox, Thomas and Bruhn, Andrés and Fritz, Mario
(2019)
Pattern Recognition - 40th German Conference, GCPR 2018, Stuttgart, Germany, October 9-12, 2018, Proceedings.
Lecture Notes in Computer Science, 11269
.
Springer.
ISBN 978-3-030-12938-5
Monograph
Maximov, Maxim and Ritschel, Tobias and Fritz, Mario
(2018)
Deep Appearance Maps.
Technical Report.
UNSPECIFIED.
Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018)
A Hybrid Model for Identity Obfuscation by Face Replacement.
Technical Report.
UNSPECIFIED.
Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017)
Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective.
Technical Report.
UNSPECIFIED.
Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017)
Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
Technical Report.
UNSPECIFIED.
Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017)
Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
Technical Report.
UNSPECIFIED.
Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2017)
A4NT : Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
Technical Report.
arXiv.
Orekondy, Tribhuvanesh and Fritz, Mario and Schiele, Bernt
(2017)
Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images.
Technical Report.
arXiv.
Ma, Liqian and Sun, Qianru and Georgoulis, Stamatios and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2017)
Disentangled Person Image Generation.
Technical Report.
arXiv.
Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2017)
Natural and Effective Obfuscation by Head Inpainting.
Technical Report.
arXiv.
Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2016)
Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling.
Technical Report.
UNSPECIFIED.
Danezis, George and Kohlweiss, Markulf and Rial, Alfredo
(2011)
Differentially Private Billing with Rebates.
Technical Report.
UNSPECIFIED.
Backes, Julian and Backes, Michael and Dürmuth, Markus and Lorenz, Stefan and Gerling, Sebastian
(2011)
X-pire! - A digital expiration date for images in social networks.
Technical Report.
UNSPECIFIED.
Other
Patrignani, Marco and Guarnieri, Marco
(2020)
Exorcising Spectres with Secure Compilers.
Yu, Ning and Skripniuk, Vladislav and Abdelnabi, Sahar and Fritz, Mario
(2020)
Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data.
Vassena, Marco and Patrignani, Marco
(2019)
Memory Safety Preservation for WebAssembly.
Gerling, Sebastian and Marnau, Ninja and Sorge, Christoph
(2018)
Stellungnahme gegenüber dem Landtag des Saarlandes zum Thema „Stand und Entwicklungsperspektiven der Telemedizin im Saarland“.
Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Max and Backes, Michael and Fritz, Mario
(2018)
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018)
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version).
Sorge, Christoph and Marnau, Ninja
(2017)
Stellungnahme des CISPA zum Entwurf eines Gesetzes zur Förderung der elektronischen Verwaltung im Saarland sowie zur Änderung weiterer Vorschriften.
Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015)
Type-Based Verification of Electronic Voting Protocols.
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Differentially Private Data Aggregation with Optimal Utility.
Unruh, Dominique
(2012)
Everlasting Quantum Security.
Unruh, Dominique
(2012)
Programmable encryption and key-dependent messages.
Schröder, Dominique and Unruh, Dominique
(2011)
Round Optimal Blind Signatures.
This list was generated on Thu Nov 21 09:44:30 2024 CET.