Browse by Research Area

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 437.

Conference or Workshop Item (A Paper)

Chen, Dingfan and Yu, Ning and Zhang, Yang and Fritz, Mario
(2020) GAN-Leaks: A Taxonomy of Membership Inference Attacks against GANs.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Wen, Rui and Yu, Yu and Xie, Xiang and Zhang, Yang
(2020) LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Abdelnabi, Sahar and Krombholz, Katharina and Fritz, Mario
(2020) VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity.
In: ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Deuber, Dominic and Döttling, Nico and Magri, Bernardo and Malavolta, Giulio and Thyagarajan, Sri Aravinda Krishnan
(2020) Minting Mechanisms for (PoS) Blockchains.
In: ACNS.

Hagestedt, Inken and Humbert, Mathias and Berrang, Pascal and Lehmann, Irina and Eils, Roland and Backes, Michael and Zhang, Yang
(2020) Membership Inference Against DNA Methylation Databases.
In: IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Yu, Ning and Li, Ke and Zhou, Peng and Malik, Jitendra and Davis, Larry S. and Fritz, Mario
(2020) Inclusive GAN: Improving Data and Minority Coverage in Generative Models.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

He, Yang and Rahimian, Shadi and Schiele, Bernt and Fritz, Mario
(2020) Segmentations-Leak: Membership Inference Attacks and Defenses in Semantic Image Segmentation.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

Shetty, Rakshith and Fritz, Mario and Schiele, Bernt
(2020) Towards Automated Testing and Robustification by Semantic Adversarial Data Generation.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

Salem, Ahmed and Bhattacharya, Apratim and Backes, Michael and Fritz, Mario and Zhang, Yang
(2020) Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Birtel, Benedikt and Rossow, Christian
(2020) Slitheen++: Stealth TLS-based Decoy Routing.
In: FOCI'20, August 2020.

Bhattacharyya, Apratim and Mahajan, Shweta and Fritz, Mario and Schiele, Bernt and Roth, Stefan
(2020) Normalizing Flows with Multi-scale Autoregressive Priors.
In: IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Agarwal, Vedika and Shetty, Rakshith and Fritz, Mario
(2020) Towards Causal VQA: Revealing and Reducing Spurious Correlations by Invariant and Covariant Semantic Editing.
In: IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Hasan, Rakibul and Crandall, David and Fritz, Mario and Kapadia, Apu
(2020) Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.
In: IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2020) Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks.
In: International Conference on Representation Learning (ICLR).

Esiyok, Ilkan and Hanzlik, Lucjan and Künnemann, Robert and Budde, Lena Marie and Backes, Michael
(2020) TrollThrottle — Raising the Cost of Astroturfing.
In: ACNS 2020, 19-22 October 2020, Rome, Italy.

Zhang, Yang and Humbert, Mathias and Surma, Bartlomiej and Manoharan, Praveen and Vreeken, Jilles and Backes, Michael
(2020) Towards Plausible Graph Anonymization.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Usenix Network and Distributed System Security Symposium

Dalleiger, Sebastian and Vreeken, Jilles
(2020) Explainable Data Decompositions.
In: Proceedings of the AAAI Conference on Artificial Intelligence (AAAI).
Conference: AAAI National Conference of the American Association for Artificial Intelligence
(In Press)

Brakerski, Zvika and Döttling, Nico
(2020) Hardness of LWE on General Entropic Distribution.
In: Eurocrypt 2020.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Döttling, Nico and Garg, Sanjam and Malavolta, Giulio and Vasudevan, Prashant Nalini
(2020) Tight Verifiable Delay Functions.
In: SCN 2020.

Thyagarajan, Sri Aravinda Krishnan and Bhat, Adithya and Malavolta, Giulio and Nico, Döttling and Kate, Aniket and Schröder, Dominique
(2020) Verifiable Timed Signatures Made Practical.
In: CCS 2020.
Conference: CCS ACM Conference on Computer and Communications Security

Li, Zheng and Hu, Chengyu and Guo, Shanqing and Zhang, Yang
(2019) How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN.
In: Annual Computer Security Applications Conference.
Conference: ACSAC Annual Computer Security Applications Conference

Jia, Jinyuan and Salem, Ahmed and Backes, Michael and Gong, Neil Zhenqiang and Zhang, Yang
(2019) MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Döttling, Nico and Garg, Sanjam and Goyal, Vipul and Malavolta, Giulio
(2019) Laconic Conditional Disclosure of Secrets and Applications.
In: FOCS 2019.
Conference: FOCS IEEE Symposium on Foundations of Computer Science
(In Press)

Yu, Ning and Davis, Larry and Fritz, Mario
(2019) Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints.
In: International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Maximov, Maxim and Leal-Taixe, Laura and Fritz, Mario and Ritschel, Tobias
(2019) Deep Appearance Maps.
In: International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Döttling, Nico and Garg, Sanjam and Ishai, Yuval and Malavolta, Giulio and Mour, Tamer and Ostrovsky, Rafail
(2019) Trapdoor Hash Functions and Their Applications.
In: CRYPTO 2019.
Conference: CRYPTO Advances in Cryptology

Rahman, Tahleen and Surma, Bartlomiej and Backes, Michael and Zhang, Yang
(2019) Fairwalk: Towards Fair Graph Embedding.
In: International Joint Conference on Artificial Intelligence.
Conference: IJCAI International Joint Conference on Artificial Intelligence

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2019) Knockoff Nets: Stealing Functionality of Black-Box Models.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2019) Not Using the Car to See the Sidewalk: Quantifying and Controlling the Effects of Context in Classification and Segmentation.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Ke, Qiuhong and Fritz, Mario and Schiele, Bernt
(2019) Time-Conditioned Action Anticipation in One Shot.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Zhang, Yang
(2019) Language in Our Time: An Empirical Analysis of Hashtags.
In: The Web Conference.
Conference: WWW International World Wide Web Conference

Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2019) ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code.
In: Proceedings of the Fourteenth EuroSys Conference 2019, March 25-28, 2019, Dresden, Germany.
Conference: EuroSys Eurosys Conference

Hagestedt, Inken and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Haixu, Tang and XiaoFeng, Wang and Backes, Michael
(2019) MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Usenix Network and Distributed System Security Symposium

Salem, Ahmed and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Fritz, Mario and Backes, Michael
(2019) ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Usenix Network and Distributed System Security Symposium

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2019) Bayesian Prediction of Future Street Scenes using Synthetic Likelihoods.
In: International Conference on Representation Learning (ICLR).

Aggarwal, Divesh and Döttling, Nico and Nielsen, Jesper Buus and Obremski, Maciej and Purwanto, Erick
(2019) Continuous Non-Malleable Codes in the 8-Split-State Model.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Reliable Correlations in Categorical Data.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Reliable Dependencies from Data: Hardness and Improved Algorithms (Extended Abstract).
In: Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI).
Conference: IJCAI International Joint Conference on Artificial Intelligence

Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Robustly Connected Subgraphs with Simple Descriptions.
In: Proceedings of the ACM SIGKDD Workshop on Mining and Learning from Graphs (MLG).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Robustly Connected Subgraphs with Simple Descriptions.
In: Proceedings of the ECMLPKDD Workshop on Graph Embedding and Mining (GEM).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Robustly Connected Subgraphs with Simple Descriptions.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Dowsley, Rafael and Giacomelli, Irene
(2019) Efficient UC Commitment Extension with Homomorphism for Free (and Applications).
In: ASIACRYPT 2019.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Sattar, Hosnieh and Pons-Moll, Gerard and Fritz, Mario
(2019) Fashion is Taking Shape: Understanding Clothing Preference Based on Body Shape From Online Sources.
In: IEEE Winter Conference on Applications of Computer Vision (WACV).
Conference: WACV IEEE Workshop on Applications of Computer Vision

Kutylowski, Miroslaw and Lemiesz, Jakub and Slowik, Marta and Slowik, Marcin and Kluczniak, Kamil and Gebala, Maciej
(2019) GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures.
In: Information Security Practice and Experience Conference (ISPEC).

Döttling, Nico and Lai, Russell and Malavolta, Giulio
(2019) Incremental Proofs of Sequential Work.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques
(Unpublished)

Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2019) Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
In: TCC 2019.
Conference: TCC Theory of Cryptography Conference
(In Press)

Steil, Julian and Hagestedt, Inken and Huang, Michael Xuelin and Bulling, Andreas
(2019) Privacy-aware eye tracking using differential privacy.
In: Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications, ETRA 2019, Denver , CO, USA, June 25-28, 2019.

Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Liu, Kevin and Malavolta, Giulio
(2019) Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
In: ASIACRYPT 2019.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Backes, Michael and Döttling, Nico and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2019) Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions.
In: IACR Eurocrypt 2019.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Shetty, Rakshith and Fritz, Mario and Schiele, Bernt
(2018) Adversarial Scene Editing: Automatic Object Removal from Weak Supervision.
In: Conference on Neural Information Processing Systems.
Conference: NIPS Advances in Neural Information Processing Systems

Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018) A Hybrid Model for Identity Obfuscation by Face Replacement.
In: European Conference on Computer Vision.
Conference: ECCV European Conference on Computer Vision

He, Yang and Fritz, Mario and Schiele, Bernt
(2018) Diverse Conditional Image Generation by Stochastic Regression with Latent Drop-Out Codes.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2018) A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security Usenix Security Symposium

Berrang, Pascal and Humbert, Mathias and Zhang, Yang and Lehmann, Irina and Eils, Roland and Backes, Michael
(2018) Dissecting Privacy Risks in Biomedical Data.
In: IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Zhang, Yang and Humbert, Mathias and Rahman, Tahleen and Li, Cheng-Te and Pang, Jun and Backes, Michael
(2018) Tagvisor: A Privacy Advisor for Sharing Hashtags.
In: The Web Conference.
Conference: WWW International World Wide Web Conference

Bhattacharyya, Apratim and Schiele, Bernt and Fritz, Mario
(2018) Accurate and Diverse Sampling of Sequences based on a “Best of Many” Sample Objective.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Wagner, Misha and Basevi, Hector and Shetty, Rakshith and Li, Wenbin and Malinowski, Mateusz and Fritz, Mario and Leonardis, Ales
(2018) Answering Visual What-If Questions: From Actions to Predicted Scene Descriptions.
In: Visual Learning and Embodied Agents in Simulation Environments Workshop at European Conference on Computer Vision.

Orekondy, Tribhuvanesh and Fritz, Mario and Schiele, Bernt
(2018) Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Ma, Liqian and Sun, Qianru and Georgoulis, Stamatios and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Disentangled Person Image Generation.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2018) Long-Term Image Boundary Prediction.
In: Association for the Advancement of Artificial Intelligence (AAAI).
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2018) Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Natural and Effective Obfuscation by Head Inpainting.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel
(2018) New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
In: PKC.

Döttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Mukherjee, Pratyay
(2018) Obfuscation from Low Noise Multilinear Maps.
In: INDOCRYPT.

Asghar, Muhammad Rizwan and Backes, Michael and Simeonovski, Milivoj
(2018) PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
In: 2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018.

Salem, Ahmed and Berrang, Pascal and Humbert, Mathias and Backes, Michael
(2018) Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
In: The 19th Privacy Enhancing Technologies Symposium (PETS).
(In Press)

Tretschk, Edgar and Oh, Seong Joon and Fritz, Mario
(2018) Sequential Attacks on Agents for Long-Term Adversarial Goals.
In: 2. ACM Computer Science in Cars Symposium -- Future Challenges in Artificial Intelligence & Security for Autonomous Vehicles.
(In Press)

Speicher, Patrick and Steinmetz, Marcel and Backes, Michael and Hoffmann, Jörg and Künnemann, Robert
(2018) Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
In: The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18), New Orleans, Louisiana, USA.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Oh, Seong Joon and Augustin, Max and Schiele, Bernt and Fritz, Mario
(2018) Whitening Black-Box Neural Networks.
In: International Conference on Learning Representations (ICLR).

Backes, Michael and Gomez-Rodriguez, Manuel and Manoharan, Praveen and Surma, Bartlomiej
(2017) Reconciling Privacy and Utility in Continuous-Time Diffusion Networks.
In: Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2017) Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling.
In: Mutual Benefits of Cognitive and Computer Vision Workshop at International Conference on Computer Vision (ICCV-W).

Backes, Michael and Berrang, Pascal and Bieg, Matthias and Elis, Roland and Herrmann, Carl and Humbert, Mathias and Lehmann, Irina
(2017) Identifying Personal DNA Methylation Profiles by Genotype Inference.
In: Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Pang, Jun and Zhang, Yang
(2017) DeepCity: A Feature Learning Framework for Mining Location Check-ins.
In: International Conference on Web and Social Media.

Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2017) P2P Mixing and Unlinkable Bitcoin Transactions.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS Usenix Network and Distributed System Security Symposium

Tabibian, Behzad and Valera, Isabel and Farajtabar, Mehrdad and Song, Le and Schölkopf, Bernhard and Gomez-Rodriguez, Manuel
(2017) Distilling Information Reliability and Source Trustworthiness from Digital Traces.
In: 26th International World Wide Web Conference (WWW'17).
Conference: WWW International World Wide Web Conference

Sun, Qianru and Schiele, Bernt and Fritz, Mario
(2017) A Domain Based Approach to Social Relation Recognition.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Oh, Seong Joon and Benenson, Rodrigo and Khoreva, Anna and Akata, Zeynep and Fritz, Mario and Schiele, Bernt
(2017) Exploiting saliency for object segmentation from image level labels.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Zafar, Bilal and Valera, Isabel and Gomez-Rodriguez, Manuel and Gummadi, Krishna P.
(2017) Fairness Beyond Disparate Treatment & Disparate Impact: Learning Classification without Disparate Mistreatment.
In: 26th International World Wide Web Conference (WWW'17).
Conference: WWW International World Wide Web Conference

He, Yang and Chiu, Wei-Chen and Keuper, Margret and Fritz, Mario
(2017) STD2P: RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017) Adversarial Image Perturbation for Privacy Protection — A Game Theory Perspective.
In: IEEE International Conference on Computer Vision (ICCV), 2017.
Conference: ICCV IEEE International Conference on Computer Vision

Broadnax, Brandon and Döttling, Nico and Hartung, Gunnar and Müller-Quade, Jörn and Nagel, Matthias
(2017) Concurrently Composable Security with Shielded Super-Polynomial Simulators.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Apon, Daniel and Döttling, Nico and Garg, Sanjam and Mukherjee, Pratyay
(2017) Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13.
In: ICALP.
Conference: ICALP International Colloquium on Automata Languages and Programming

Döttling, Nico and Garg, Sanjam
(2017) From Selective IBE to Full IBE and Selective HIBE.
In: TCC.
Conference: TCC Theory of Cryptography Conference

Döttling, Nico and Garg, Sanjam
(2017) Identity-Based Encryption from the Diffie-Hellman Assumption.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2017) It's Written All Over Your Face: Full-Face Appearance-Based Gaze Estimation.
In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops, Honolulu, HI, USA, July 21-26, 2017.

Cho, Chongwon and Döttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Polychroniadou, Antigoni
(2017) Laconic Oblivious Transfer and Its Applications.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

He, Yang and Keuper, Margret and Schiele, Bernt and Fritz, Mario
(2017) Learning Dilation Factors for Semantic Segmentation of Street Scenes.
In: Pattern Recognition - 39th German Conference, GCPR 2017, Basel, Switzerland, September 12-15, 2017, Proceedings.

Cramer, Ronald and and Nico Döttling, Ivan Damgård and Giacomelli, Irene and Xing, Chaoping
(2017) Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model.
In: ICITS.

Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017) Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Döttling, Nico and Ghosh, Satrajit and Nielsen, Jesper Buus and Nilges, Tobias and Trifiletti, Roberto
(2017) TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.
In: ACM Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017) Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Li, Wenbin and Leonardis, Ales and Fritz, Mario
(2017) Visual stability prediction for robotic manipulation.
In: 2017 IEEE International Conference on Robotics and Automation, ICRA 2017, Singapore, Singapore, May 29 - June 3, 2017.

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne and Gool, Luc Van
(2017) What is Around the Camera?
In: IEEE International Conference on Computer Vision, ICCV 2017, Venice, Italy, October 22-29, 2017.
Conference: ICCV IEEE International Conference on Computer Vision

Schneider, Jonas and Fleischhacker, Nils and Schröder, Dominique and Backes, Michael
(2016) Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Manoharan, Praveen
(2016) Membership Privacy in MicroRNA-based Studies.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS ACM Conference on Computer and Communications Security

Brakerski, Zvika and Brzuska, Christina and Fleischhacker, Nils
(2016) On Statistically Secure Obfuscation with Approximate Correctness.
In: Proceedings of the 36th International Cryptology Conference (CRYPTO '16).

Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016) Two Message Oblivious Evaluation of Cryptographic Functionalities.
In: Proceedings of the 36th International Cryptology Conference (CRYPTO '16).
Conference: CRYPTO Advances in Cryptology

Backes, Michael and Berrang, Pascal and Hecksteden, Anne and Humbert, Mathias and Keller, Andreas and Meyer, Tim
(2016) Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Ohrimenko, Olga and Costa, Manuel and Fournet, Cédric and Nowozin, Sebastian and Mehta, Aastha and Schuster, Felix and Vaswani, Kapil
(2016) SGX-Enabled Oblivious Machine Learning.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Biega, Joanna Asia and Gummadi, Krishna P. and Mele, Ida and Milchevski, Dragan and Tryfonopoulos, Christos and Weikum, Gerhard
(2016) R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities.
In: Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval (SIGIR '16).
Conference: SIGIR ACM International Conference on Research and Development in Information Retrieval

Schiele, Bernt and Bhattacharjee, Bobby and Fritz, Mario and Aditya, Paarijaat and Druschel, Peter and Sen, Rijurekha and Oh, Seong Joon and Benenson, Rodrigo and Wu, Tong Tong
(2016) Demo: I-Pic: A Platform for Privacy-Compliant Image Capture.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16).

Krupp, Johannes and Schröder, Dominique and Simkin, Mark and Fiore, Dario and Ateniese, Giuseppe and Nürnberger, Stefan
(2016) Nearly Optimal Verifiable Data Streaming.
In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.

Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016) Anonymous RAM.
In: 21st European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Lai, Russell W F and Zhang, Tao and Chow, Sherman S M and Schröder, Dominique
(2016) Efficient Sanitizable Signatures Without Random Oracles.
In: Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS'16).
Conference: ESORICS European Symposium On Research In Computer Security

Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2016) Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016) Faceless Person Recognition: Privacy Implications in Social Media.
In: Computer Vision - ECCV 2016 - 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part III.
Conference: ECCV European Conference on Computer Vision

Mondal, Mainack and Messias, Johnnatan and Ghosh, Saptarshi and Gummadi, Krishna P. and Kate, Aniket
(2016) Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
In: 12th Symposium on Usable Privacy and Security (SOUPS'16).

Aditya, Paarijaat and Sen, Rijurekha and Druschel, Peter and Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt and Bhattacharjee, Bobby and Wu, Tong Tong
(2016) I-Pic: A Platform for Privacy-Compliant Image Capture.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16).

Reed, Scott and Akata, Zeynep and Lee, Honglak and Schiele, Bernt
(2016) Learning Deep Representations of Fine-Grained Visual Descriptions.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2016) Loss Functions for Top-k Error: Analysis and Insights.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Gnad, Daniel and Steinmetz, Marcel and Jany, Mathäus and Hoffmann, Jörg and Serina, Ivan and Gerevini, Alfonso
(2016) Partial Delete Relaxation, Unchained: On Intractable Red-Black Planning and Its Applications.
In: Proceedings of the 9th Annual Symposium on Combinatorial Search (SOCS'16).

Daum, Jeanette and Torralba, Àlvaro and Hoffmann, Jörg and Haslum, Patrik and Weber, Ingo
(2016) Practical Undoability Checking via Contingent Planning.
In: Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Li, Wenbin and Fritz, Mario
(2016) Recognition of Ongoing Complex Activities by Sequence Prediction over a Hierarchical Label Space.
In: IEEE Winter Conference on Applications of Computer Vision (WACV).
Conference: WACV IEEE Workshop on Applications of Computer Vision

Steinmetz, Marcel and Hoffmann, Jörg and Buffet, Olivier
(2016) Revisiting Goal Probability Analysis in Probabilistic Planning.
In: Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Jiang, Ke and Eles, Petru and Peng, Zebo and Chattopadhyay, Sudipta and Batina, Lejla
(2016) SPARTA: A Scheduling Policy for Thwarting Differential Power Analysis Attacks.
In: 21st Asia and South Pacific Design Automation Conference (ASP-DAC).

Venkatadri, Giridhari and Goga, Oana and Zhong, Changtao and Viswanath, Bimal and Gummadi, Krishna P. and Sastry, Nishanth R
(2016) Strengthening Weak Identities Through Inter-Domain Trust Transfer.
In: Proceedings of the 25th International Conference on World Wide Web (WWW'16).
Conference: WWW International World Wide Web Conference

Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gavves, Efstratios and Tuytelaars, Tinne
(2016) Deep Reflectance Maps.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Scheer, Jonas and Fritz, Mario and Grau, Oliver
(2016) Learning to Select Long-Track Features for Structure-From-Motion and Visual SLAM.
In: Pattern Recognition - 38th German Conference, GCPR 2016, Hannover, Germany, September 12-15, 2016, Proceedings.

Malinowski, Mateusz and Mokarian, Ashkan and Fritz, Mario
(2016) Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task.
In: Proceedings of the British Machine Vision Conference 2016, BMVC 2016, York, UK, September 19-22, 2016.

Akata, Zeynep and Malinowski, Mateusz and Fritz, Mario and Schiele, Bernt
(2016) Multi-cue Zero-Shot Learning with Strong Supervision.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Nielsen, Jesper Buus
(2016) Rate-1, Linear Time and Additively Homomorphic UC Commitments.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

Chiu, Wei-Chen and Galasso, Fabio and Fritz, Mario
(2016) Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles.
In: Computer Vision - ACCV 2016 - 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part V.

Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016) Two-Message, Oblivious Evaluation of Cryptographic Functionalities.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

Sharma, Abhishek and Grau, Oliver and Fritz, Mario
(2016) VConv-DAE: Deep Volumetric Shape Learning Without Object Labels.
In: Computer Vision - ECCV 2016 Workshops - Amsterdam, The Netherlands, October 8-10 and 15-16, 2016, Proceedings, Part III.

Chowdhury, Sreyasi Nag and Malinowski, Mateusz and Bulling, Andreas and Fritz, Mario
(2016) Xplore-M-Ego: Contextual Media Retrieval Using Natural Language Queries.
In: Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval, ICMR 2016, New York, New York, USA, June 6-9, 2016.

Backes, Michael and Meiser, Sebastian and Slowik, Marcin
(2015) Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
In: Proceedings on Privacy Enhancing Technologies.

Ruffing, Tim and Kate, Aniket and Schröder, Dominique
(2015) Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins.
In: Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015) POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Schröder, Dominique and Döttling, Nico
(2015) Efficient Pseudorandom Functions via On-the-Fly Adaptation.
In: Proceedings of the 35th International Cryptology Conference (CRYPTO '15).
Conference: CRYPTO Advances in Cryptology

Mohammadi, Esfandiar and Bendun, Fabian and Pecina, Kim and Maffei, Matteo and Backes, Michael
(2015) Symbolic Malleable Zero-knowledge Proofs.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Schneider, Jonas and Schröder, Dominique
(2015) Foundations of Reconfigurable PUFs.
In: Proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, New York, NY, USA, June 2-5, 2015.

Backes, Michael and Barbosa, Manuel and Fiore, Dario and Reischuk, Raphael M.
(2015) ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2015) Privacy and Access Control for Outsourced Personal Records.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Bendun, Fabian and Hoffmann, Jörg and Marnau, Ninja
(2015) PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law.
In: Proceedings of the 4th Conference on Principles of Security and Trust (POST).

Backes, Michael and Gagné, Martin and Thyagarajan, Sri Aravinda Krishnan
(2015) Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext.
In: ACM ASIACCS Security in Cloud Computing Workshop 2015.

Farajtabar, Mehrdad and Gomez-Rodriguez, Manuel and Du, Nan and Zamani, Mohammad and Zha, Hongyuan and Song, Le
(2015) Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades.
In: Proceedings of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS).
Conference: AISTATS International Conference on Artificial Intelligence and Statistics

Khoreva, Anna and Galasso, Fabio and Hein, Matthias and Schiele, Bernt
(2015) Classifier based graph construction for video segmentation.
In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'15).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Jawanpuria, Pratik and Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2015) Efficient Output Kernel Learning for Multiple Tasks.
In: Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada.
Conference: NIPS Advances in Neural Information Processing Systems

Blond, Stevens Le and Choffnes, David R. and Caldwell, William and Druschel, Peter and Merritt, Nicholas
(2015) Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
In: Proc. of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15).
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Gnad, Daniel and Hoffmann, Jörg
(2015) Red-Black Planning: A New Tractability Analysis and Heuristic Function.
In: Proceedings of the 8th Annual Symposium on Combinatorial Search (SOCS'15).

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015) Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
In: Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15).

Hoffmann, Jörg
(2015) Simulated Penetration Testing: From "Dijkstra" to "Turing Test++".
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2015).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Viswanath, Bimal and Bashir, Muhammad Ahmad and Zafar, Muhammad Bilal and Bouget, Simon and Guha, Saikat and Gummadi, Krishna P. and Kate, Aniket and Mislove, Alan
(2015) Strength in Numbers: Robust Tamper Detection in Crowd Computations.
In: Proceedings of the 2015 ACM on Conference on Online Social Networks, COSN 2015, Palo Alto, California, USA, November 2-3, 2015.

Schröder, Dominique and Simkin, Mark
(2015) VeriStream - A Framework for Verifiable Data Streaming.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers.

Hanser, Christian and Rabkin, Max and Schröder, Dominique
(2015) Verifiably Encrypted Signatures: Security Revisited and a New Construction.
In: Proc. of the 20th European Symposium on Research in Computer Security (ESORICS 2015).
Conference: ESORICS European Symposium On Research In Computer Security

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2015) Appearance-based gaze estimation in the wild.
In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2015) Ask Your Neurons: A Neural-Based Approach to Answering Questions about Images.
In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015.
Conference: ICCV IEEE International Conference on Computer Vision

Döttling, Nico and Schröder, Dominique
(2015) Efficient Pseudorandom Functions via On-the-Fly Adaptation.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn and Nilges, Tobias
(2015) From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
In: ProvSec.

Kraschewski, Daniel and Nilges, Tobias and Döttling, Nico and Müller-Quade, Jörn
(2015) General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
In: TCC.
Conference: TCC Theory of Cryptography Conference

Seiter, Julia and Wei-Chen, Chiu and Fritz, Mario and Amft, Oliver and Tröster, Gerhard
(2015) Joint segmentation and activity discovery using semantic and temporal priors.
In: 2015 IEEE International Conference on Pervasive Computing and Communications, PerCom 2015, St. Louis, MO, USA, 23-27 March, 2015.
Conference: PERCOM IEEE International Conference on Pervasive Computing and Communications

Cramer, Ronald and Damgård, Ivan Bjerre and Döttling, Nico and Fehr, Serge and Spini, Gabriele
(2015) Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Döttling, Nico
(2015) Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.
In: PKC.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2015) Person Recognition in Personal Photo Collections.
In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015.
Conference: ICCV IEEE International Conference on Computer Vision

Sattar, Hosnieh and Müller, Sabine and Fritz, Mario and Bulling, Andreas
(2015) Prediction of search targets from fixations in open-world settings.
In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Wei-Chen, Walon and Fritz, Mario
(2015) See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG.
In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015.
Conference: ICCV IEEE International Conference on Computer Vision

Li, Wenbin and Fritz, Mario
(2015) Teaching robots the use of human tools from demonstration with non-dexterous end-effectors.
In: 15th IEEE-RAS International Conference on Humanoid Robots, Humanoids 2015, Seoul, South Korea, November 3-5, 2015.

Krupp, Johannes and Schröder, Dominique and Simkin, Mark
(2014) DEMO: Enhancing Security and Privacy with Google Glass.
In: Proceedings of the 21st ACM Conference on Computer and Communication Security (CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Mohammadi, Esfandiar
(2014) (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
In: Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2014) Lime: Data Lineage in the Malicious Environment.
In: Proceedings of 10th International Workshopon Security and Trust Management (STM).

Dachman-Soled, Dana and Fleischhacker, Nils and Katz, Jonathan and Lysyanskaya, Anna and Schröder, Dominique
(2014) Feasibility and Infeasibility of Secure Computation with Malicious PUFs.
In: Proceedings of the 34th International Cryptology Conference (Crypto '14).
Conference: CRYPTO Advances in Cryptology

Backes, Michael and Bendun, Fabian and Choudhury, Ashish and Kate, Aniket
(2014) Asynchronous MPC with a Strict Honest Majority Using Non-equivocation.
In: ACM Symposium on Principles of Distributed Computing 2014.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014) BackRef: Accountability in Anonymous Communication Networks.
In: Applied Cryptography and Network Security.

Backes, Michael and Gerling, Sebastian and Lorenz, Stefan and Lukas, Stephan
(2014) X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.
In: 29th ACM Symposium on Applied Computing (SAC 2014).

Mondal, Mainack and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan
(2014) Beyond Access Control: Managing Online Privacy via Exposure.
In: Proceedings of the Workshop on Useable Security (USEC'14).

Simkin, Mark and Schröder, Dominique and Bulling, Andreas and Fritz, Mario
(2014) Bridging the Gap Between Digital Cryptography and the Physical World.
In: European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2014) Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-party Setting.
In: Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2014) CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
In: Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014).

Choi, Seung Geol and Katz, Jonathan and Schröder, Dominique and Yerukhimovich, Arkady and Zhou, Hong-Sheng
(2014) (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings.
Conference: TCC Theory of Cryptography Conference

Fawcett, Chris and Vallati, Mauro and Hutter, Frank and Hoffmann, Jörg and Hoos, Holger H. and Leyton-Brown, Kevin
(2014) Improved Features for Runtime Prediction of Domain-Independent Planners.
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Krajnanský, Michal and Hoffmann, Jörg and Buffet, Olivier and Fern, Alan
(2014) Learning Pruning Rules for Heuristic Search Planning.
In: Proc. of the 21st European Conference on Artificial Intelligence (ECAI 2014).
Conference: ECAI European Conference on Artificial Intelligence

Platenius, Marie Christin and Arifulina, Svetlana and Petrlic, Ronald and Schäfer, Wilhelm
(2014) Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.
In: Proceedings of The 4th International Workshop on Adaptive Services for the Future Internet.

Fleischhacker, Nils and Manulis, Mark and Azodi, Amir
(2014) A Modular Framework for Multi-Factor Authentication and Key Exchange.
In: Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings.

Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique
(2014) On Tight Security Proofs for Schnorr Signatures.
In: Proc. of the 20th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014).
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Areces, Carlos and Bustos, Facundo and Dominguez, Martín Ariel and Hoffmann, Jörg
(2014) Optimizing Planning Domains by Automatic Action Schema Splitting.
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Asghar, Muhammad Rizwan and Gehani, Ashish and Crispo, Bruno and Russello, Giovanni
(2014) PIDGIN: Privacy-preserving Interest and Content Sharing in Opportunistic Networks.
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security.

Reznichenko, Alexey and Francis, Paul
(2014) Private-by-Design Advertising Meets the Real World.
In: Proc. of the 20th ACM Conference on Computer and Communication Security (CCS 2014).
Conference: CCS ACM Conference on Computer and Communications Security

Lapin, Maksim and Schiele, Bernt and Hein, Matthias
(2014) Scalable Multitask Representation Learning for Scene Classification.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Brangewitz, Sonja and Jungmann, Alexander and Petrlic, Ronald and Platenius, Marie Christin
(2014) Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services.
In: Proceedings of The Sixth International Conferences on Advanced Service Computing.

Karayev, Sergey and Fritz, Mario and Darrell, Trevor
(2014) Anytime Recognition of Objects and Scenes.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2014) Image-Based Synthesis and Re-synthesis of Viewpoints Guided by 3D Models.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Malinowski, Mateusz and Fritz, Mario
(2014) A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input.
In: Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada.
Conference: NIPS Advances in Neural Information Processing Systems

Wei-Chen, Walon and Johnson, Gregory and McCulley, Daniel and Grau, Oliver and Fritz, Mario
(2014) Object Disambiguation for Augmented Reality Applications.
In: British Machine Vision Conference, BMVC 2014, Nottingham, UK, September 1-5, 2014.

Backes, Michael and Fiore, Dario and Reischuk, Raphael M.
(2013) Verifiable Delegation of Computation on Outsourced Data.
In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Meiser, Sebastian
(2013) Differentially Private Smart Metering with Battery Recharging.
In: Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013).

Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013) AnoA: A Framework For Analyzing Anonymous Communication Protocols.
In: Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Fischlin, Marc and Fleischhacker, Nils
(2013) Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
In: Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT '13).
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Backes, Michael and Doychev, Goran and Köpf, Boris
(2013) Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
In: Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13).
Conference: NDSS Usenix Network and Distributed System Security Symposium

Catalano, Dario and Fiore, Dario and Gennaro, Rosario and Vamvourellis, Konstantinos
(2013) Algebraic (Trapdoor) One-Way Functions and Their Applications.
In: Proc. of the 10th Theory of Cryptography Conference (TCC 2013).

Backes, Michael and Datta, Amit and Kate, Aniket
(2013) Asynchronous Computational VSS with Reduced Communication Complexity.
In: Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013).

Gagné, Martin and Lafourcade, Pascal and Lakhnech, Yassine
(2013) Automated Security Proofs for Almost-Universal Hash for MAC Verification.
In: Proc. of the 18th European Symposium on Research in Computer Security (ESORICS 2013).

Bühler, Thomas and Rangapuram, Syama Sundar and Setzer, Simon and Hein, Matthias
(2013) Constrained fractional set programs and their application in local clustering and community detection.
In: Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 16-21 June 2013.
Conference: ICML International Conference on Machine Learning

Schmidt, Jens M
(2013) Contractions, Removals and How to Certify 3-Connectivity in Linear Time.
In: SIAM Journal on Computing.

Eigner, Fabienne and Maffei, Matteo
(2013) Differential Privacy by Typing in Security Protocols.
In: Proc. 1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013).

Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013) Identity-Based Steganography and Its Applications to Censorship Resistance.
In: 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013).

Tang, Siyu and Andriluka, Mykhaylo and Milan, Anton and Schindler, Konrad and Roth, Stefan and Schiele, Bernt
(2013) Learning People Detectors for Tracking in Crowded Scenes.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Fischlin, Marc and Fleischhacker, Nils
(2013) Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
In: Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT 2013).
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013) Poster: Identity-Based Steganography and Its Applications to Censorship Resistance.
In: Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS '13).
Conference: CCS ACM Conference on Computer and Communications Security

Catalano, Dario and Fiore, Dario
(2013) Practical Homomorphic MACs for Arithmetic Circuits.
In: Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT 2013).
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Backes, Michael and Fiore, Dario and Mohammadi, Esfandiar
(2013) Privacy-Preserving Accountable Computation.
In: Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Fleischhacker, Nils and Günther, Felix and Kiefer, Franziskus and Manulis, Mark and Poettering, Bertram
(2013) Pseudorandom signatures.
In: Proc. of the 8th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2013).

Yan, Junjie and Zhang, Xucong and Lei, Zhen and Li, Stan Z
(2013) Real-time High Performance Deformable Models for Face Detection in the Wild.
In: Proceedings of the IAPR International Conference on Biometrics (ICB).

Yan, Junjie and Zhang, Xucong and Lei, Zhen and Liao, ShengCai and Li, Stan Z
(2013) Robust Multi-resolution Pedestrian Detection in Traffic Scenes.
In: IEEE Conference Computer Vision and Pattern Recognition (CVPR).

Chen, Ruichuan and Akkus, Istemi Ekin and Francis, Paul
(2013) SplitX: high-performance private analytics.
In: Proc. of the ACM SIGCOMM 2013 Conference.
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Pishchulin, Leonid and Andriluka, Mykhaylo and Gehler, Peter and Schiele, Bernt
(2013) Strong Appearance and Expressive Spatial Models for Human Pose Estimation.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Asghar, Muhammad Rizwan and Russello, Giovanni and Crispo, Bruno and Ion, Mihaela
(2013) Supporting Complex Queries and Access Policies for Multi-user Encrypted Databases.
In: Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop.

Blond, Stevens Le and Choffnes, David and Zhou, Wenxuan and Druschel, Peter and Ballani, Hitesh and Francis, Paul
(2013) Towards Efficient Traffic-analysis Resistant Anonymity Networks.
In: Proc. of the ACM SIGCOMM 2013 Conference.
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Joshi, Nakul and Petrlic, Ronald
(2013) Towards practical privacy-preserving Digital Rights Management for Cloud Computing.
In: Proceedings of The 10th Annual IEEE Consumer Communications & Networking Conference (CCNC 2013).

Rangapuram, Syama Sundar and Bühler, Thomas and Hein, Matthias
(2013) Towards realistic team formation in social networks based on densest subgraphs.
In: 22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013.
Conference: WWW International World Wide Web Conference

Chowdhury, Soudip Roy and Imran, Muhammad and Asghar, Muhammad Rizwan and Amer-Yahia, Sihem and Castillo, Carlos
(2013) Tweet4act: Using Incident-Specific Profiles for Classifying Crisis-Related Messages.
In: The 10th International Conference on Information Systems for Crisis Response and Management (ISCRAM).

Petrlic, Ronald and Sekula, Stephan
(2013) Unlinkable content playbacks in a multiparty DRM system.
In: Data and Applications Security and Privacy XXVII.

Catalano, Dario and Fiore, Dario
(2013) Vector Commitments and Their Applications.
In: Proc. of the 16th International Conference on Practice and Theory in Public Key Cryptography (PKC 2013).

Döttling, Nico and Nilges, Tobias and Mie, Thilo and Müller-Quade, Jörn
(2013) Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
In: TCC.
Conference: TCC Theory of Cryptography Conference

Malinowski, Mateusz and Fritz, Mario
(2013) Learning Smooth Pooling Regions for Visual Recognition.
In: British Machine Vision Conference, BMVC 2013, Bristol, UK, September 9-13, 2013.

Döttling, Nico and Müller-Quade, Jörn
(2013) Lossy Codes and a New Variant of the Learning-With-Errors Problem.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Wei-Chen, Walon and Fritz, Mario
(2013) Multi-class Video Co-segmentation with a Generative Multi-video Model.
In: 2013 IEEE Conference on Computer Vision and Pattern Recognition, Portland, OR, USA, June 23-28, 2013.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Levinkov, Evgeny and Fritz, Mario
(2013) Sequential Bayesian Model Update under Structured Scene Prior for Semantic Road Scenes Labeling.
In: IEEE International Conference on Computer Vision, ICCV 2013, Sydney, Australia, December 1-8, 2013.
Conference: ICCV IEEE International Conference on Computer Vision

Akkus, Istemi Ekin and Chen, Ruichuan and Hardt, Michaela and Francis, Paul and Gehrke, Johannes
(2012) Non-tracking Web Analytics.
In: Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Kate, Aniket and Mohammadi, Esfandiar
(2012) Ace: An Efficient Key-Exchange Protocol for Onion Routing.
In: Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES).

Backes, Michael and Bendun, Fabian and Kate, Aniket
(2012) Brief announcement: distributed cryptography using trinc.
In: ACM Symposium on Principles of Distributed Computing 2012.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2012) ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
In: Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012).
Conference: SP IEEE Symposium on Security and Privacy

Asghar, Muhammad Rizwan and Russello, Giovanni
(2012) ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems.
In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY).

Druschel, Peter
(2012) Accountability and Trust in Cooperative Information Systems.
In: Proc. of the 28th IEEE International Conference on Data Engineering (ICDE'12).
Conference: ICDE International Conference on Data Engineering

Backes, Michael and Goldberg, Ian and Kate, Aniket and Toft, Tomas
(2012) Adding query privacy to robust DHTs.
In: Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012).

Pishchulin, Leonid and Jain, Arjun and Andriluka, Mykhaylo and Thormählen, Thorsten and Schiele, Bernt
(2012) Articulated People Detection and Pose Estimation: Reshaping the Future.
In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2012) Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification.
In: Eight Workshop on Formal and Computational Cryptography (FCC 2012).
(Unpublished)

Mainberger, Markus and Backes, Michael and Berg, Matthias and Weickert, Joachim
(2012) Diffusion-Based Image Compression in Steganography.
In: Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012.

Fischlin, Marc and Lehmann, Anja and Schröder, Dominique
(2012) History-Free Sequential Aggregate Signatures.
In: Proc. 8th International Conference on Security and Cryptography for Networks (SCN 2012).

Basin, David and Klaedtke, Felix and Marinovic, Srdjan and Zălinescu, Eugen
(2012) Monitoring compliance policies over incomplete and disagreeing logs.
In: Proceedings of the 3rd International Conference on Runtime Verification (RV'2012).

Ciobotaru, Oana
(2012) On the (Non-)Equivalence of UC Security Notions.
In: Proc. 6th International Conference on Provable Security (ProvSec 2012).

Clement, Allen and Junqueira, Flavio and Kate, Aniket and Rodrigues, Rodrigo
(2012) On the (limited) power of non-equivocation.
In: Proc. of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2012).

Petrlic, Ronald
(2012) Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment.
In: Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12).

Backes, Michael and Kate, Aniket and Goldberg, Ian and Mohammadi, Esfandiar
(2012) Provably Secure and Practical Onion Routing.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Petrlic, Ronald
(2012) Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme.
In: Cyberspace Safety and Security.

Unruh, Dominique
(2012) Quantum Proofs of Knowledge.
In: Eurocrypt 2012.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Schröder, Dominique and Unruh, Dominique
(2012) Security of Blind Signatures Revisited.
In: PKC 2012.

Chen, Ruichuan and Reznichenko, Alexey and Francis, Paul and Gehrke, Johannes
(2012) Towards Statistical Queries over Distributed Private User Data.
In: Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012).

Schröder, Dominique and Schröder, Heike
(2012) Verifiable data streaming.
In: Proc. of the 19th ACM Conference on Computer and Communication Security (CCS 2012).
Conference: CCS ACM Conference on Computer and Communications Security

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012) Active Metric Learning for Object Recognition.
In: Pattern Recognition - Joint 34th DAGM and 36th OAGM Symposium, Graz, Austria, August 28-31, 2012. Proceedings.

Döttling, Nico and Nascimento, Anderson C. A. and Müller-Quade, Jörn
(2012) IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
In: ASIACRYPT.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Rematas, Konstantinos and Fritz, Mario and Tuytelaars, Tinne
(2012) The Pooled NBNN Kernel: Beyond Image-to-Class and Image-to-Image.
In: Computer Vision - ACCV 2012 - 11th Asian Conference on Computer Vision, Daejeon, Korea, November 5-9, 2012, Revised Selected Papers, Part I.

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012) RALF: A reinforced active learning formulation for object class recognition.
In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, June 16-21, 2012.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Li, Wenbin and Fritz, Mario
(2012) Recognizing Materials from Virtual Examples.
In: Computer Vision - ECCV 2012 - 12th European Conference on Computer Vision, Florence, Italy, October 7-13, 2012, Proceedings, Part IV.
Conference: ECCV European Conference on Computer Vision

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012) Semi-Supervised Learning on a Budget: Scaling Up to Large Datasets.
In: Computer Vision - ACCV 2012 - 11th Asian Conference on Computer Vision, Daejeon, Korea, November 5-9, 2012, Revised Selected Papers, Part I.

Song, Hyun Oh and Zickler, Stefan and Althoff, Tim and Girshick, Ross B. and Fritz, Mario and Geyer, Christopher and Felzenszwalb, Pedro F. and Darrell, Trevor
(2012) Sparselet Models for Efficient Multiclass Object Detection.
In: Computer Vision - ECCV 2012 - 12th European Conference on Computer Vision, Florence, Italy, October 7-13, 2012, Proceedings, Part II.
Conference: ECCV European Conference on Computer Vision

Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2012) Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation.
In: ICITS.

Karayev, Sergey and Baumgartner, Tobias and Fritz, Mario and Darrell, Trevor
(2012) Timely Object Recognition.
In: Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012. Proceedings of a meeting held December 3-6, 2012, Lake Tahoe, Nevada, United States..
Conference: NIPS Advances in Neural Information Processing Systems

Reznichenko, Alexey and Guha, Saikat and Francis, Paul
(2011) Auctions in do-not-track compliant internet advertising.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS ACM Conference on Computer and Communications Security

Cortier, Véronique and Smyth, Ben
(2011) Attacking and fixing Helios: An analysis of ballot secrecy.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Cerny, Pavol and Chatterjee, Krishnendu and Henzinger, Thomas A
(2011) The Complexity of Quantitative Information Flow Problems.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Kate, Aniket and Patra, Arpita
(2011) Computational Verifiable Secret Sharing Revisited.
In: Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011).
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Unruh, Dominique
(2011) Concurrent composition in the bounded quantum storage model.
In: Eurocrypt 2011.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Tsankov, Petar and Basin, David and Dashti, Mohammad Torabi
(2011) Constructing Mid-Points for Two-Party Asynchronous Protocols.
In: Proc. 15th International Conference On Principles Of Distributed Systems (OPODIS).

Acs, Gergely and Castelluccia, Claude
(2011) I have a DREAM! (DIffeRentially PrivatE smartMetering).
In: Proceedings of the 13th Information Hiding Conference, May 2011, Prague.

Barthe, Gilles and Köpf, Boris
(2011) Information-theoretic Bounds for Differentially Private Mechanisms.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Basin, David and Burri, Samuel J and Karjoth, Günter
(2011) Obstruction-free Authorization Enforcement: Aligning Security With Business Objectives.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Asghar, Muhammad Rizwan and Russello, Giovanni and Crispo, Bruno
(2011) Poster: ESPOON$_ERBAC$: Enforcing Security Policies in Outsourced Environments with Encrypted RBAC.
In: Proceedings of the 18th ACM conference on Computer and communications security.
Conference: CCS ACM Conference on Computer and Communications Security

Zmudzinski, Sascha and Steinebach, Martin
(2011) Re-synchronizing Audio Watermarking after Non-linear Time Stretching.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII.

Blocki, Jeremiah and Christin, Nicolas and Datta, Anupam and Sinha, Arunesh
(2011) Regret Minimizing Audits: A Learning-theoretic Basis for Privacy Protection.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Schröder, Dominique and Unruh, Dominique and Garg, Sanjam and Rao, Vanishree and Sahai, Amit
(2011) Round Optimal Blind Signatures.
In: Crypto 2011.
Conference: CRYPTO Advances in Cryptology

Metzger, Steffen and Elbassuoni, Shady and Hose, Katja and Schenkel, Ralf
(2011) S3K: seeking statement-supporting top-K witnesses.
In: Proc. of the 20th ACM International Conference on Information and Knowledge Management (CIKM'11).

Kremer, Steve and Steel, Graham and Warinschi, Bogdan
(2011) Security for Key Management Interfaces.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Varodayan, David and Khisti, Ashish
(2011) Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage.
In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011, Prague, Czech Republic, May 2011..

Chothia, Tom and Guha, Apratim
(2011) A Statistical Test for Information Leaks Using Continuous Mutual Information.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Unruh, Dominique
(2011) Termination-Insensitive Computational Indistinguishability (and applications to computational soundness).
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Groß, Thomas and Mödersheim, Sebastian
(2011) Vertical Protocol Composition.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Suchanek, Fabian M and Gross-Amblard, David and Abiteboul, Serge
(2011) Watermarking for Ontologies.
In: Proc. 10th International Semantic Web Conference (ISWC 2011).

Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2011) Efficient Reductions for Non-signaling Cryptographic Primitives.
In: ICITS.

Wei-Chen, Walon and Blanke, Ulf and Fritz, Mario
(2011) I spy with my little eye: Learning optimal filters for cross-modal stereo under projected patterns.
In: IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011.

Wei-Chen, Walon and Blanke, Ulf and Fritz, Mario
(2011) Improving the Kinect by Cross-Modal Stereo.
In: British Machine Vision Conference, BMVC 2011, Dundee, UK, August 29 - September 2, 2011. Proceedings.

Tuytelaars, Tinne and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2011) The NBNN kernel.
In: IEEE International Conference on Computer Vision, ICCV 2011, Barcelona, Spain, November 6-13, 2011.
Conference: ICCV IEEE International Conference on Computer Vision

Miller, Stephen and Fritz, Mario and Darrell, Trevor and Abbeel, Pieter
(2011) Parametrized shape models for clothing.
In: IEEE International Conference on Robotics and Automation, ICRA 2011, Shanghai, China, 9-13 May 2011.

Wang, Ping Chuan and Miller, Stephen and Fritz, Mario and Darrell, Trevor and Abbeel, Pieter
(2011) Perception for the manipulation of socks.
In: 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2011, San Francisco, CA, USA, September 25-30, 2011.
Conference: IROS IEEE/RSJ International Conference on Intelligent Robots and Systems

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2011) Pick Your Neighborhood - Improving Labels and Neighborhood Structure for Label Propagation.
In: Pattern Recognition - 33rd DAGM Symposium, Frankfurt/Main, Germany, August 31 - September 2, 2011. Proceedings.

Saenko, Kate and Karayev, Sergey and Jia, Yangqing and Shyr, Alex and Janoch, Allison and Long, Jonathan and Fritz, Mario and Darrell, Trevor
(2011) Practical 3-D object detection using category and instance-level appearance models.
In: 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2011, San Francisco, CA, USA, September 25-30, 2011.
Conference: IROS IEEE/RSJ International Conference on Intelligent Robots and Systems

Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2011) Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
In: TCC.
Conference: TCC Theory of Cryptography Conference

Song, Hyun Oh and Fritz, Mario and Gu, Chunhui and Darrell, Trevor
(2011) Visual grasp affordances from appearance-based cues.
In: IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011.

Janoch, Allison and Karayev, Sergey and Jia, Yangqing and Barron, Jonathan T. and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2011) A category-level 3-D object dataset: Putting the Kinect to work.
In: IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011.

Karayev, Sergey and Fritz, Mario and Fidler, Sanja and Darrell, Trevor
(2011) A probabilistic model for recursive factorized image features.
In: The 24th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2011, Colorado Springs, CO, USA, 20-25 June 2011.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Nürnberger, Stefan and Feller, Thomas and Huss, Sorin A
(2010) Ray - A Secure Microkernel Architecture.
In: Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010).

Döttling, Nico and de Almeida, Antonio Sobreira and Lazich, Dejan E. and Müller-Quade, Jörn
(2010) Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
In: WISA.

Backes, Michael and Hamerlik, Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009) Anonymity and Censorship Resistance in Unstructured Overlay Networks.
In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I.

Backes, Michael and Druschel, Peter and Haeberlen, Andreas and Unruh, Dominique
(2009) CSAR: A practical and provable technique to make randomized systems accountable.
In: NDSS 2009.
Conference: NDSS Usenix Network and Distributed System Security Symposium

Thiemert, Stefan and Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha
(2009) Security of Robust Audio Hashes.
In: First IEEE International Workshop on Information Forensics and Security (WIFS 2009).

Backes, Michael and Pfitzmann, Birgit and Schunter, Matthias
(2003) A Toolkit for Managing Enterprise Privacy Policies.
In: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS).

Article

Skripniuk, Vladislav and Yu, Ning and Abdelnabi, Sahar and Fritz, Mario
(2020) Black-Box Watermarking for Generative Adversarial Networks.
ArXiv.

Hajipour, Hossein and Malinowski, Mateusz and Fritz, Mario
(2020) IReEn: Iterative Reverse-Engineering of Black-Box Functions via Neural Program Synthesis.
ArXiv.

Chen, Dingfan and Orekondy, Tribhuvanesh and Fritz, Mario
(2020) GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators.
ArXiv.

Wang, Hui-Po and Orekondy, Tribhuvanesh and Fritz, Mario
(2020) InfoScrub: Towards Attribute Privacy by Targeted Obfuscation.
ArXiv.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2020) Person Recognition in Personal Photo Collections.
IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2019) MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Marnau, Ninja
(2019) Überwachung by Design.
Privacy in Germany (PinG) Journal, 2019/2. ISSN 2197-1862
(In Press)

Hanzlik, Lucjan and Kluczniak, Kamil and Kutylowski, Miroslaw
(2019) CTRL-PACE: Controlled Randomness for e-Passport Password Authentication.
Fundamenta Informaticae.

Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019) Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
Proceedings of the 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography (PKC 2019).
(In Press)

Kluczniak, Kamil and Wang, Jianfeng and Chen, Xiaofeng and Kutylowski, Miroslaw
(2019) Multi-device anonymous authentication.
International Journal of Information Security.

Grosse, Kathrin and Pfaff, David and Smith, Michael Thomas and Backes, Michael
(2018) The Limitations of Model Uncertainty in Adversarial Settings.
ArXiv e-prints.

Kawohl, Claudia and Krämer, Annika and Marnau, Ninja
(2018) Datenschutz durch Technikgestaltung für Genomdaten.
DSRI Herbstakademie Tagungsband 2018.

Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Max and Backes, Michael and Fritz, Mario
(2018) MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
ArXiv.

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2018) A Survey on Routing in Anonymous Communication Protocols.
ACM Computing Surveys, 51 (3). pp. 1-39. ISSN 0360-0300

Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2018) Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Information Security, 12 (3). pp. 166-183. ISSN 1751-8709

Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2018) Advanced Steel Microstructural Classification by Deep Learning Methods.
Scientific Reports.

Marnau, Ninja and Berrang, Pascal and Humbert, Mathias
(2018) Anonymisierungsverfahren für genetische Daten.
Datenschutz und Datensicherheit (DuD), 2/2018. pp. 83-88.

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version).
Extended Version of EuroS&P 2018 Paper.

Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Max and Backes, Michael and Fritz, Mario
(2018) MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2018) MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Gavves, Efstratios and Fritz, Mario and Gool, Luc Van and Tuytelaars, Tinne
(2018) Reflectance and Natural Illumination from Single-Material Specular Objects Using Deep Learning.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Steinmetz, Marcel and Hoffmann, Jörg
(2017) State Space Search Nogood Learning: Online Refinement of Critical-Path Dead-End Detectors in Planning.
Artificial Intelligence (journal), ???. -.

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2017) A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
CoRR, abs/17.

Li, Wenbin and Bohg, Jeannette and Fritz, Mario
(2017) Acquiring Target Stacking Skills by Goal-Parameterized Deep Reinforcement Learning.
CoRR, abs/17.

Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2017) Advanced Steel Microstructure Classification by Deep Learning Methods.
CoRR, abs/17.

Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017) Adversarial Image Perturbation for Privacy Protection - A Game Theory Perspective.
CoRR, abs/17.

Sun, Qianru and Schiele, Bernt and Fritz, Mario
(2017) A Domain Based Approach to Social Relation Recognition.
CoRR, abs/17.

Oh, Seong Joon and Benenson, Rodrigo and Khoreva, Anna and Akata, Zeynep and Fritz, Mario and Schiele, Bernt
(2017) Exploiting saliency for object segmentation from image level labels.
CoRR, abs/17.

He, Yang and Keuper, Margret and Schiele, Bernt and Fritz, Mario
(2017) Learning Dilation Factors for Semantic Segmentation of Street Scenes.
CoRR, abs/17.

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2017) Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
CoRR, abs/17.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2017) MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
CoRR, abs/17.

Rematas, Konstantinos and Nguyen, Chuong H. and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2017) Novel Views of Objects from a Single Image.
IEEE Trans. Pattern Anal. Mach. Intell., 39 (8). pp. 1576-1590.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2017) Person Recognition in Social Media Photos.
CoRR, abs/17.

Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017) Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
CoRR, abs/17.

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017) Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
CoRR, abs/17.

Sattar, Hosnieh and Fritz, Mario and Bulling, Andreas
(2017) Visual Decoding of Targets During Visual Search From Human Eye Fixations.
CoRR, abs/17.

Backes, Michael and Manoharan, Praveen and Grosse, Kathrin and Papernot, Nicolas
(2016) Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
The Computing Research Repository (CoRR), abs/16.

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2016) A Survey on Routing in Anonymous Communication Protocols.
The Computing Research Repository (CoRR), abs/16.

Steinmetz, Marcel and Hoffmann, Jörg and Buffet, Olivier
(2016) Goal Probability Analysis in Probabilistic Planning: Exploring and Enhancing the State of the Art.
J. Artif. Intell. Res. (JAIR), 57. pp. 229-271.

Gomez-Rodriguez, Manuel and Song, Le and Du, Nan and Zha, Hongyuan and Schölkopf, Bernhard
(2016) Influence Estimation and Maximization in Continuous-Time Diffusion Networks.
ACM Transactions on Information Systems (TOIS).

Forero, Juan Pablo and Fernando, Piyum and Sridhar, Priyashri and Withana, Anusha Indrajith and Nanayakkara, Suranga and Steimle, Jürgen and Maes, Pattie
(2016) PostBits: using contextual locations for embedding cloud information in the home.
Personal and Ubiquitous Computing, 20 (6). pp. 1001-1014.

Rohrbach, Marcus and Rohrbach, Anna and Regneri, Michaela and Amin, Sikandar and Andriluka, Mykhaylo and Pinkal, Manfred and Schiele, Bernt
(2016) Recognizing Fine-Grained and Composite Activities Using Hand-Centric Features and Script Data.
International Journal of Computer Vision, 119 (3). pp. 346-373.

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2016) Ask Your Neurons: A Deep Learning Approach to Visual Question Answering.
CoRR, abs/16.

Chowdhury, Sreyasi Nag and Malinowski, Mateusz and Bulling, Andreas and Fritz, Mario
(2016) Contextual Media Retrieval Using Natural Language Queries.
CoRR, abs/16.

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gool, Luc J. Van and Tuytelaars, Tinne
(2016) DeLight-Net: Decomposing Reflectance Maps into Specular Materials and Natural Illumination.
CoRR, abs/16.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016) Faceless Person Recognition; Privacy Implications in Social Media.
CoRR, abs/16.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2016) It's Written All Over Your Face: Full-Face Appearance-Based Gaze Estimation.
CoRR, abs/16.

Song, Hyun Oh and Fritz, Mario and Göhring, Daniel and Darrell, Trevor
(2016) Learning to Detect Visual Grasp Affordance.
IEEE Trans. Automation Science and Engineering, 13 (2). pp. 798-809.

Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2016) Long-Term Image Boundary Extrapolation.
CoRR, abs/16.

Mokarian, Ashkan and Malinowski, Mateusz and Fritz, Mario
(2016) Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task.
CoRR, abs/16.

Akata, Zeynep and Malinowski, Mateusz and Fritz, Mario and Schiele, Bernt
(2016) Multi-Cue Zero-Shot Learning with Strong Supervision.
CoRR, abs/16.

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne and Gool, Luc Van
(2016) Natural Illumination from Multiple Materials Using Deep Learning.
CoRR, abs/16.

Rematas, Konstantinos and Nguyen, Chuong H. and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2016) Novel Views of Objects from a Single Image.
CoRR, abs/16.

Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2016) Predicting the Category and Attributes of Mental Pictures Using Deep Gaze Pooling.
CoRR, abs/16.

He, Yang and Chiu, Wei-Chen and Keuper, Margret and Fritz, Mario
(2016) RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling.
CoRR, abs/16.

Bhattacharyya, Apratim and Malinowski, Mateusz and Fritz, Mario
(2016) Spatio-Temporal Image Boundary Extrapolation.
CoRR, abs/16.

Li, Wenbin and Azimi, Seyedmajid and Leonardis, Ales and Fritz, Mario
(2016) To Fall Or Not To Fall: A Visual Approach to Physical Stability Prediction.
CoRR, abs/16.

Chiu, Wei-Chen and Galasso, Fabio and Fritz, Mario
(2016) Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles.
CoRR, abs/16.

Malinowski, Mateusz and Fritz, Mario
(2016) Tutorial on Answering Questions about Images with Deep Learning.
CoRR, abs/16.

Sharma, Abhishek and Grau, Oliver and Fritz, Mario
(2016) VConv-DAE: Deep Volumetric Shape Learning Without Object Labels.
CoRR, abs/16.

Li, Wenbin and Leonardis, Ales and Fritz, Mario
(2016) Visual Stability Prediction and Its Application to Manipulation.
CoRR, abs/16.

Choffnes, David and Druschel, Peter and Blond, Stevens Le and Caldwell, William and Merritt, Nicholas
(2015) Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
ACM Computer Communication Review, 45 (5). pp. 639-652.

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2015) How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, abs/15.

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015) Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2). 178 - 191. ISSN 1545-5971

Backes, Michael and Köpf, Boris
(2015) Quantifying Information Flow in Cryptographic Systems.
Mathematical Structures in Computer Science.

Domshlak, Carmel and Hoffmann, Jörg and Katz, Michael
(2015) Red-black planning: A new systematic approach to partial delete relaxation.
Artif. Intell., 221. pp. 73-114.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2015) Appearance-Based Gaze Estimation in the Wild.
CoRR, abs/15.

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2015) Ask Your Neurons: A Neural-based Approach to Answering Questions about Images.
CoRR, abs/15.

Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gavves, Efstratios and Tuytelaars, Tinne
(2015) Deep Reflectance Maps.
CoRR, abs/15.

Shcherbatyi, Iaroslav and Bulling, Andreas and Fritz, Mario
(2015) GazeDPM: Early Integration of Gaze Information in Deformable Part Models.
CoRR, abs/15.

Malinowski, Mateusz and Fritz, Mario
(2015) Hard to Cheat: A Turing Test based on Answering Questions about Images.
CoRR, abs/15.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2015) Person Recognition in Personal Photo Collections.
CoRR, abs/15.

Sattar, Hosnieh and Müller, Sabine and Fritz, Mario and Bulling, Andreas
(2015) Prediction of search targets from fixations in open-world settings.
CoRR, abs/15.

Wei-Chen, Walon and Fritz, Mario
(2015) See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG.
CoRR, abs/15.

Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014) Brave New World: Privacy Risks for Mobile Users.
Mobile Computing and Communications Review, 18 (3). pp. 49-54.

Tang, Siyu and Andriluka, Mykhaylo and Schiele, Bernt
(2014) Detection and Tracking of Occluded People.
International Journal of Computer Vision (IJCV), 110 (1). pp. 58-69.

Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2014) Learning using privileged information: SV M+ and weighted SVM.
Neural Networks, 53. pp. 95-108.

Bulling, Andreas and Blanke, Ulf and Schiele, Bernt
(2014) A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors.
ACM Computing Surveys, 46 (3). pp. 1-33.

Li, Wenbin and Fritz, Mario
(2014) Learning Multi-Scale Representations for Material Classification.
CoRR, abs/14.

Malinowski, Mateusz and Fritz, Mario
(2014) A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input.
CoRR, abs/14.

Malinowski, Mateusz and Fritz, Mario
(2014) A Pooling Approach to Modelling Spatial Relations for Image Retrieval and Annotation.
CoRR, abs/14.

Malinowski, Mateusz and Fritz, Mario
(2014) Towards a Visual Turing Challenge.
CoRR, abs/14.

Bresson, Emmanuel and Catalano, Dario and Raimondo, Mario and Fiore, Dario and Gennaro, Rosario
(2013) Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
International Journal of Information Security, 12 (6). pp. 439-465.

Young, Maxwell and Kate, Aniket and Goldberg, Ian and Karsten, Martin
(2013) Towards Practical Communication in Byzantine-Resistant DHTs.
Networking, IEEE/ACM Transactions on, 21 (1). pp. 190-203.

Brandenburg, Björn B.
(2013) An asymptotically optimal real-time locking protocol for clustered scheduling under suspension-aware analysis.
SIGBED Review, 10 (2). p. 19.

Malinowski, Mateusz and Fritz, Mario
(2013) Learnable Pooling Regions for Image Classification.
CoRR, abs/13.

Hofheinz, Dennis and Unruh, Dominique and Müller-Quade, Jörn
(2012) Polynomial Runtime and Composability.
Journal of Cryptology.

Döttling, Nico and Dowsley, Rafael and Müller-Quade, Jörn and Nascimento, Anderson C. A.
(2012) A CCA2 Secure Variant of the McEliece Cryptosystem.
IEEE Trans. Information Theory, 58 (10). pp. 6672-6680.

Miller, Stephen and van den Berg, Jur and Fritz, Mario and Darrell, Trevor and Goldberg, Kenneth Y. and Abbeel, Pieter
(2012) A geometric approach to robotic laundry folding.
I. J. Robotics Res., 31 (2). pp. 249-267.

Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2011) Cryptographically sound security proofs for basic and public-key Kerberos.
International Journal of Information Security, 10 (2). pp. 107-134.

Stikic, Maja and Larlus, Diane and Ebert, Sandra and Schiele, Bernt
(2011) Weakly Supervised Recognition of Daily Life Activities with Wearable Sensors.
IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 33 (12). pp. 2521-2537.

Thesis

Salem, Ahmed
(2016) CRRP: A Cryptographic Protocol for Coercion-Resistant Rating Platforms.
Masters thesis, UNSPECIFIED.

Awazid, Tahleen Rahman
(2016) Curious Volunteers: Anonymity Impact of adding Tor nodes.
Masters thesis, UNSPECIFIED.

Waxweiler, Daniel
(2016) Making Chromium´s Certificate Transparency integration more accessible.
Masters thesis, UNSPECIFIED.

Wedeking, Lukas
(2016) Anonymity Guarantees for Tor Hidden Services.
Bachelors thesis, Saarland University.

Tiwari, Abishek
(2015) Applying Privacy Case Law to The Right to be Forgotten.
Masters thesis, Saarland University.

Schneider, Jonas
(2015) Partially Oblivious Pseudorandom Functions: A Generic Approach and an Impossibility Result.
Masters thesis, UNSPECIFIED.

Patel, Vikash
(2015) Argumentation Mining for the Sake of Privacy.
Masters thesis, Saarland University.

Koch, Simon
(2015) Correlating BGP and Traceroute Data.
Bachelors thesis, Saarland University.

Bauer, Markus
(2015) The MATOR Addon: Accessible Quantification of Tor Anonymity for the Tor Browser.
Bachelors thesis, Saarland University.

Petrlic, Ronald
(2014) Privacy-Preserving Multiparty Digital Rights Management.
Doctoral thesis, University of Paderborn.

Schranz, Oliver
(2013) A Developer-Centric Approach to Dynamic Permission System.
Bachelors thesis, Saarland University.

Berg, Matthias
(2013) Formal Verification of Cryptographic Security Proofs.
Doctoral thesis, Saarland University.

Schröder, Florian
(2013) Generic Access Control for Extensible Web Applications within the SAFE Activation.
Masters thesis, Saarland University.

Grimm, Niklas
(2013) Lime: A Framework for Data Lineage in the Malicious Environment.
Bachelors thesis, Saarland University.

Asghar, Muhammad Rizwan
(2013) Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments.
Doctoral thesis, University of Trento.

Doychev, Goran
(2012) Analysis and Mitigation of Information Leaks in Web Browsing Traffic.
Masters thesis, Saarland University.

Möllers, Frederik
(2012) An Analysis of Traceability of Electronic Identification Documents.
Masters thesis, Universität Paderborn.

Ruffing, Tim
(2012) Computational Soundness of Interactive Primitives.
Bachelors thesis, Saarland University.

Reinert, Manuel
(2012) A Framework for Security-Oriented Distributed Programming.
Masters thesis, Saarland University.

Meyer, Sebastian
(2012) Privacy Presserving Surveillance and Face Recognition.
Bachelors thesis, Saarland University.

Ciobotaru, Oana
(2012) Rational Cryptography.
Doctoral thesis, Saarland University.

Knuth, Karsten
(2012) Security Analysis of Browser Extension Concepts.
Bachelors thesis, Saarland University.

Skoruppa, Malte
(2012) Verifiable Security of Prefix-free Merkle-Damgård.
Masters thesis, Saarland University.

Bornträger, Holger
(2011) Automatic Verification of Equivalences of Cryptographic Games.
Masters thesis, Saarland University.

Meiser, Sebastian
(2011) Computational Soundness of Passively Secure Encryption in Presence of Active Adversaries.
Masters thesis, Saarland University.

Künnemann, Robert
(2011) Game-Theoretic Notions of Incoercibility.
Masters thesis, UNSPECIFIED.

Busenius, Alex
(2011) Mechanized Formalization of a Transformation from an Extensible Spi Calculus to Java.
Masters thesis, Saarland University.

Balzer, Jan
(2011) Towards a Formal Sematics for G2C Summary.
Bachelors thesis, Saarland University.

Hriţcu, Cătălin
(2011) Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis.
Doctoral thesis, Saarland University.

Ciolacu, Ines Lucia
(2011) Universally Composable Relativistic Commitments.
Masters thesis, Saarland University.

Book Section

Oh, Seong Joon and Schiele, Bernt and Fritz, Mario
(2019) Towards reverse-engineering black-box neural networks.
In: Explainable AI: Interpreting, Explaining and Visualizing Deep Learning. Springer. ISBN 978-3-030-28953-9

Marnau, Ninja
(2019) Datenschutzrecht und Brexit.
In: Brexit - Privat- und wirtschaftsrechtliche Folgen, 2. Aufl. (Hrsg. Kramme / Baldus / Schmidt-Kessel). Nomos. ISBN 978-3-8487-5438-0
(In Press)

Marnau, Ninja and Sorge, Christoph
(2019) From Law to Engineering: A Computer Science Perspective on Privacy & Data Protection.
In: González-Fuster, G., van Brakel, R. and P. De Hert (forthcoming) Research Handbook on Privacy and Data Protection Law. Values, Norms and Global Politics. Edward Elgar Publishing.
(In Press)

Marnau, Ninja
(2019) Kommentierung der §§64, 70, 71, 74 BDSG.
In: Gola/Heckman (Hrsg.) Bundesdatenschutzgesetz, Kommentar, 13. Aufl. C.H.Beck. ISBN 978-3-406-72878-5
(In Press)

Blaskiewicz, Przemyslaw and Hanzlik, Lucjan and Kluczniak, Kamil and Krzywiecki, Lukasz and Kutylowski, Miroslaw and Slowik, Marcin and Wszola, Marta
(2019) Pseudonymous Signature Schemes.
In: Advances in Cyber Security. UNSPECIFIED, pp. 185-255.

Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2016) Delegatable Functional Signatures.
In: UNSPECIFIED Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 357-386. ISBN 978-3-662-49384-7

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2016) From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
In: UNSPECIFIED Springer International Publishing, Cham, pp. 87-138. ISBN 978-3-319-43005-8

Ebert, Sandra and Schiele, Bernt
(2013) Where Next in Object Recognition and how much Supervision Do We Need?
In: Advances in Computer Vision and Pattern Recognition. Springer, pp. 35-64.

Janoch, Allison and Karayev, Sergey and Jia, Yangqing and Barron, Jonathan T. and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2013) A Category-Level 3D Object Dataset: Putting the Kinect to Work.
In: Consumer Depth Cameras for Computer Vision, Research Topics and Applications. UNSPECIFIED, pp. 141-165.

Asghar, Muhammad Rizwan and Russello, Giovanni
(2012) Flexible and Dynamic Consent-Capturing.
In: UNSPECIFIED Lecture Notes in Computer Science, 7039 . Springer Berlin Heidelberg, pp. 119-131. ISBN 978-3-642-27584-5

Book

Brox, Thomas and Bruhn, Andr{\'{e}}s and Fritz, Mario
(2019) Pattern Recognition - 40th German Conference, GCPR 2018, Stuttgart, Germany, October 9-12, 2018, Proceedings.
Lecture Notes in Computer Science, 11269 . Springer. ISBN 978-3-030-12938-5

Monograph

Maximov, Maxim and Ritschel, Tobias and Fritz, Mario
(2018) Deep Appearance Maps.
Technical Report. UNSPECIFIED.

Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018) A Hybrid Model for Identity Obfuscation by Face Replacement.
Technical Report. UNSPECIFIED.

Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017) Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective.
Technical Report. UNSPECIFIED.

Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017) Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
Technical Report. UNSPECIFIED.

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017) Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
Technical Report. UNSPECIFIED.

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2017) A4NT : Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
Technical Report. arXiv.

Orekondy, Tribhuvanesh and Fritz, Mario and Schiele, Bernt
(2017) Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images.
Technical Report. arXiv.

Ma, Liqian and Sun, Qianru and Georgoulis, Stamatios and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2017) Disentangled Person Image Generation.
Technical Report. arXiv.

Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2017) Natural and Effective Obfuscation by Head Inpainting.
Technical Report. arXiv.

Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2016) Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling.
Technical Report. UNSPECIFIED.

Danezis, George and Kohlweiss, Markulf and Rial, Alfredo
(2011) Differentially Private Billing with Rebates.
Technical Report. UNSPECIFIED.

Backes, Julian and Backes, Michael and Dürmuth, Markus and Lorenz, Stefan and Gerling, Sebastian
(2011) X-pire! - A digital expiration date for images in social networks.
Technical Report. UNSPECIFIED.

Other

Gerling, Sebastian and Marnau, Ninja and Sorge, Christoph
(2018) Stellungnahme gegenüber dem Landtag des Saarlandes zum Thema „Stand und Entwicklungsperspektiven der Telemedizin im Saarland“.
CISPA
.

Sorge, Christoph and Marnau, Ninja
(2017) Stellungnahme des CISPA zum Entwurf eines Gesetzes zur Förderung der elektronischen Verwaltung im Saarland sowie zur Änderung weiterer Vorschriften.
Landtag des Saarlandes
.

Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015) Type-Based Verification of Electronic Voting Protocols.
UNSPECIFIED
.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
UNSPECIFIED
.

Unruh, Dominique
(2012) Everlasting Quantum Security.
UNSPECIFIED
.

Unruh, Dominique
(2012) Programmable encryption and key-dependent messages.
UNSPECIFIED
.

Schröder, Dominique and Unruh, Dominique
(2011) Round Optimal Blind Signatures.
UNSPECIFIED
.

This list was generated on Wed Sep 23 00:02:33 2020 CEST.