Items where Subject is "Research Areas > NRA1 Security & Privacy-friendly Information Processing"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z
Number of items at this level: 356.

A

Acs, Gergely and Castelluccia, Claude
(2011) I have a DREAM! (DIffeRentially PrivatE smartMetering).
In: Proceedings of the 13th Information Hiding Conference, May 2011, Prague.

Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014) Brave New World: Privacy Risks for Mobile Users.
Mobile Computing and Communications Review, 18 (3). pp. 49-54.

Aditya, Paarijaat and Sen, Rijurekha and Druschel, Peter and Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt and Bhattacharjee, Bobby and Wu, Tong Tong
(2016) I-Pic: A Platform for Privacy-Compliant Image Capture.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16).
Conference: None | Not Set

Akata, Zeynep and Malinowski, Mateusz and Fritz, Mario and Schiele, Bernt
(2016) Multi-Cue Zero-Shot Learning with Strong Supervision.
CoRR, abs/16.

Akata, Zeynep and Malinowski, Mateusz and Fritz, Mario and Schiele, Bernt
(2016) Multi-cue Zero-Shot Learning with Strong Supervision.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016.
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Akkus, Istemi Ekin and Chen, Ruichuan and Hardt, Michaela and Francis, Paul and Gehrke, Johannes
(2012) Non-tracking Web Analytics.
In: Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12).
Conference: CCS - ACM Conference on Computer and Communications Security

Areces, Carlos and Bustos, Facundo and Dominguez, Martín Ariel and Hoffmann, Jörg
(2014) Optimizing Planning Domains by Automatic Action Schema Splitting.
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014).
Conference: ICAPS - International Conference on Automated Planning and Scheduling

Asghar, Muhammad Rizwan
(2013) Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments.
Doctoral thesis, University of Trento.

Asghar, Muhammad Rizwan and Backes, Michael and Simeonovski, Milivoj
(2018) PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
In: 2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018.
Conference: None | Not Set

Asghar, Muhammad Rizwan and Gehani, Ashish and Crispo, Bruno and Russello, Giovanni
(2014) PIDGIN: Privacy-preserving Interest and Content Sharing in Opportunistic Networks.
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security.

Asghar, Muhammad Rizwan and Russello, Giovanni
(2012) ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems.
In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY).

Asghar, Muhammad Rizwan and Russello, Giovanni
(2012) Flexible and Dynamic Consent-Capturing.
In: UNSPECIFIED Lecture Notes in Computer Science, 7039 . Springer Berlin Heidelberg, pp. 119-131. ISBN 978-3-642-27584-5

Asghar, Muhammad Rizwan and Russello, Giovanni and Crispo, Bruno
(2011) Poster: ESPOON$_ERBAC$: Enforcing Security Policies in Outsourced Environments with Encrypted RBAC.
In: Proceedings of the 18th ACM conference on Computer and communications security.
Conference: CCS - ACM Conference on Computer and Communications Security

Asghar, Muhammad Rizwan and Russello, Giovanni and Crispo, Bruno and Ion, Mihaela
(2013) Supporting Complex Queries and Access Policies for Multi-user Encrypted Databases.
In: Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop.

Awazid, Tahleen Rahman
(2016) Curious Volunteers: Anonymity Impact of adding Tor nodes.
Masters thesis, UNSPECIFIED.

Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2018) Advanced Steel Microstructural Classification by Deep Learning Methods.
Scientific Reports.

Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2017) Advanced Steel Microstructure Classification by Deep Learning Methods.
CoRR, abs/17.

B

Backes, Julian and Backes, Michael and Dürmuth, Markus and Lorenz, Stefan and Gerling, Sebastian
(2011) X-pire! - A digital expiration date for images in social networks.
Technical Report. UNSPECIFIED.

Backes, Michael and Barbosa, Manuel and Fiore, Dario and Reischuk, Raphael M.
(2015) ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: S&P - IEEE Symposium on Security and Privacy

Backes, Michael and Bendun, Fabian and Choudhury, Ashish and Kate, Aniket
(2014) Asynchronous MPC with a Strict Honest Majority Using Non-equivocation.
In: ACM Symposium on Principles of Distributed Computing 2014.
Conference: PODC - ACM Symposium on Principles of Distributed Computing

Backes, Michael and Bendun, Fabian and Hoffmann, Jörg and Marnau, Ninja
(2015) PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law.
In: Proceedings of the 4th Conference on Principles of Security and Trust (POST).
Conference: None | Not Set

Backes, Michael and Bendun, Fabian and Kate, Aniket
(2012) Brief announcement: distributed cryptography using trinc.
In: ACM Symposium on Principles of Distributed Computing 2012.
Conference: PODC - ACM Symposium on Principles of Distributed Computing

Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2012) Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification.
In: Eight Workshop on Formal and Computational Cryptography (FCC 2012).
Conference: None | Not Set
(Unpublished)

Backes, Michael and Berrang, Pascal and Bieg, Matthias and Elis, Roland and Herrmann, Carl and Humbert, Mathias and Lehmann, Irina
(2017) Identifying Personal DNA Methylation Profiles by Genotype Inference.
In: Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P).
Conference: S&P - IEEE Symposium on Security and Privacy

Backes, Michael and Berrang, Pascal and Hecksteden, Anne and Humbert, Mathias and Keller, Andreas and Meyer, Tim
(2016) Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Manoharan, Praveen
(2016) Membership Privacy in MicroRNA-based Studies.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2016) From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
In: UNSPECIFIED Springer International Publishing, Cham, pp. 87-138. ISBN 978-3-319-43005-8

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2015) How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, abs/15.

Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2011) Cryptographically sound security proofs for basic and public-key Kerberos.
International Journal of Information Security, 10 (2). pp. 107-134.

Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014) BackRef: Accountability in Anonymous Communication Networks.
In: Applied Cryptography and Network Security.
Conference: None | Not Set

Backes, Michael and Datta, Amit and Kate, Aniket
(2013) Asynchronous Computational VSS with Reduced Communication Complexity.
In: Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013).
Conference: None | Not Set

Backes, Michael and Doychev, Goran and Köpf, Boris
(2013) Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
In: Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13).
Conference: NDSS - Network and Distributed System Security Symposium

Backes, Michael and Druschel, Peter and Haeberlen, Andreas and Unruh, Dominique
(2009) CSAR: A practical and provable technique to make randomized systems accountable.
In: NDSS 2009.
Conference: NDSS - Network and Distributed System Security Symposium

Backes, Michael and Dürmuth, Markus and Gerling, Sebastian and Pinkal, Manfred and Sporleder, Caroline
(2010) Acoustic Side-Channel Attacks of Printers.
In: Proceedings of 19th USENIX Security Symposium.
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Fiore, Dario and Mohammadi, Esfandiar
(2013) Privacy-Preserving Accountable Computation.
In: Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS - European Symposium On Research In Computer Security

Backes, Michael and Fiore, Dario and Reischuk, Raphael M.
(2013) Verifiable Delegation of Computation on Outsourced Data.
In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Gagné, Martin and Thyagarajan, Sri Aravinda Krishnan
(2015) Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext.
In: ACM ASIACCS Security in Cloud Computing Workshop 2015.
Conference: None | Not Set

Backes, Michael and Gerling, Sebastian and Lorenz, Stefan and Lukas, Stephan
(2014) X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.
In: 29th ACM Symposium on Applied Computing (SAC 2014).
Conference: None | Not Set

Backes, Michael and Goldberg, Ian and Kate, Aniket and Toft, Tomas
(2012) Adding query privacy to robust DHTs.
In: Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012).
Conference: None | Not Set

Backes, Michael and Gomez-Rodriguez, Manuel and Manoharan, Praveen and Surma, Bartlomiej
(2017) Reconciling Privacy and Utility in Continuous-Time Diffusion Networks.
In: Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015) Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2). 178 - 191. ISSN 1545-5971

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2014) Lime: Data Lineage in the Malicious Environment.
In: Proceedings of 10th International Workshopon Security and Trust Management (STM).
Conference: None | Not Set

Backes, Michael and Grochulla, Martin and Hriţcu, Cătălin and Maffei, Matteo
(2009) Achieving Security Despite Compromise Using Zero-knowledge.
In: Proceedings of 22nd IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Hamerlik, Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009) Anonymity and Censorship Resistance in Unstructured Overlay Networks.
In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I.
Conference: None | Not Set

Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016) Anonymous RAM.
In: 21st European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS - European Symposium On Research In Computer Security

Backes, Michael and Kate, Aniket and Goldberg, Ian and Mohammadi, Esfandiar
(2012) Provably Secure and Practical Onion Routing.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2012) ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
In: Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012).
Conference: S&P - IEEE Symposium on Security and Privacy

Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013) AnoA: A Framework For Analyzing Anonymous Communication Protocols.
In: Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Mohammadi, Esfandiar
(2014) (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
In: Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015) Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
In: Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15).
Conference: None | Not Set

Backes, Michael and Kate, Aniket and Mohammadi, Esfandiar
(2012) Ace: An Efficient Key-Exchange Protocol for Onion Routing.
In: Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES).
Conference: None | Not Set

Backes, Michael and Kate, Aniket and Patra, Arpita
(2011) Computational Verifiable Secret Sharing Revisited.
In: Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011).
Conference: ASIACRYPT - International Conference on the Theory and Application of Cryptology and Information Security

Backes, Michael and Köpf, Boris
(2015) Quantifying Information Flow in Cryptographic Systems.
Mathematical Structures in Computer Science.

Backes, Michael and Manoharan, Praveen and Grosse, Kathrin and Papernot, Nicolas
(2016) Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
The Computing Research Repository (CoRR), abs/16.

Backes, Michael and Meiser, Sebastian
(2013) Differentially Private Smart Metering with Battery Recharging.
In: Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013).
Conference: None | Not Set

Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2016) Delegatable Functional Signatures.
In: UNSPECIFIED Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 357-386. ISBN 978-3-662-49384-7

Backes, Michael and Meiser, Sebastian and Slowik, Marcin
(2015) Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
In: Proceedings on Privacy Enhancing Technologies.
Conference: None | Not Set

Backes, Michael and Pfitzmann, Birgit and Schunter, Matthias
(2003) A Toolkit for Managing Enterprise Privacy Policies.
In: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS).

Balzer, Jan
(2011) Towards a Formal Sematics for G2C Summary.
Bachelors thesis, Saarland University.

Barthe, Gilles and Köpf, Boris
(2011) Information-theoretic Bounds for Differentially Private Mechanisms.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Basin, David and Burri, Samuel J and Karjoth, Günter
(2011) Obstruction-free Authorization Enforcement: Aligning Security With Business Objectives.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Basin, David and Klaedtke, Felix and Marinovic, Srdjan and Zălinescu, Eugen
(2012) Monitoring compliance policies over incomplete and disagreeing logs.
In: Proceedings of the 3rd International Conference on Runtime Verification (RV'2012).

Bauer, Markus
(2015) The MATOR Addon: Accessible Quantification of Tor Anonymity for the Tor Browser.
Bachelors thesis, Saarland University.

Berg, Matthias
(2013) Formal Verification of Cryptographic Security Proofs.
Doctoral thesis, Saarland University.

Berrang, Pascal and Humbert, Mathias and Zhang, Yang and Lehmann, Irina and Eils, Roland and Backes, Michael
(2018) Dissecting Privacy Risks in Biomedical Data.
In: Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P).
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2018) Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2017) Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
CoRR, abs/17.

Bhattacharyya, Apratim and Malinowski, Mateusz and Fritz, Mario
(2016) Spatio-Temporal Image Boundary Extrapolation.
CoRR, abs/16.

Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2016) Long-Term Image Boundary Extrapolation.
CoRR, abs/16.

Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2018) Long-Term Image Boundary Prediction.
In: Association for the Advancement of Artificial Intelligence (AAAI).
Conference: AAAI - National Conference of the American Association for Artificial Intelligence

Bhattacharyya, Apratim and Schiele, Bernt and Fritz, Mario
(2018) Accurate and Diverse Sampling of Sequences based on a “Best of Many” Sample Objective.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Biega, Joanna Asia and Gummadi, Krishna P. and Mele, Ida and Milchevski, Dragan and Tryfonopoulos, Christos and Weikum, Gerhard
(2016) R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities.
In: Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval (SIGIR '16).
Conference: SIGIR - ACM International Conference on Research and Development in Information Retrieval

Blocki, Jeremiah and Christin, Nicolas and Datta, Anupam and Sinha, Arunesh
(2011) Regret Minimizing Audits: A Learning-theoretic Basis for Privacy Protection.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Blond, Stevens Le and Choffnes, David and Zhou, Wenxuan and Druschel, Peter and Ballani, Hitesh and Francis, Paul
(2013) Towards Efficient Traffic-analysis Resistant Anonymity Networks.
In: Proc. of the ACM SIGCOMM 2013 Conference.
Conference: SIGCOMM - ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Blond, Stevens Le and Choffnes, David R. and Caldwell, William and Druschel, Peter and Merritt, Nicholas
(2015) Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
In: Proc. of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15).
Conference: SIGCOMM - ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Bornträger, Holger
(2011) Automatic Verification of Equivalences of Cryptographic Games.
Masters thesis, Saarland University.

Brakerski, Zvika and Brzuska, Christina and Fleischhacker, Nils
(2016) On Statistically Secure Obfuscation with Approximate Correctness.
In: Proceedings of the 36th International Cryptology Conference (CRYPTO '16).

Brandenburg, Björn B.
(2013) An asymptotically optimal real-time locking protocol for clustered scheduling under suspension-aware analysis.
SIGBED Review, 10 (2). p. 19.

Brangewitz, Sonja and Jungmann, Alexander and Petrlic, Ronald and Platenius, Marie Christin
(2014) Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services.
In: Proceedings of The Sixth International Conferences on Advanced Service Computing.

Bresson, Emmanuel and Catalano, Dario and Raimondo, Mario and Fiore, Dario and Gennaro, Rosario
(2013) Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
International Journal of Information Security, 12 (6). pp. 439-465.

Bulling, Andreas and Blanke, Ulf and Schiele, Bernt
(2014) A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors.
ACM Computing Surveys, 46 (3). pp. 1-33.

Busenius, Alex
(2011) Mechanized Formalization of a Transformation from an Extensible Spi Calculus to Java.
Masters thesis, Saarland University.

Bühler, Thomas and Rangapuram, Syama Sundar and Setzer, Simon and Hein, Matthias
(2013) Constrained fractional set programs and their application in local clustering and community detection.
In: Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 16-21 June 2013.
Conference: ICML - International Conference on Machine Learning

C

Catalano, Dario and Fiore, Dario
(2013) Practical Homomorphic MACs for Arithmetic Circuits.
In: Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT 2013).
Conference: EuroCrypt - International Conference on the Theory and Application of Cryptographic Techniques

Catalano, Dario and Fiore, Dario
(2013) Vector Commitments and Their Applications.
In: Proc. of the 16th International Conference on Practice and Theory in Public Key Cryptography (PKC 2013).

Catalano, Dario and Fiore, Dario and Gennaro, Rosario and Vamvourellis, Konstantinos
(2013) Algebraic (Trapdoor) One-Way Functions and Their Applications.
In: Proc. of the 10th Theory of Cryptography Conference (TCC 2013).

Cerny, Pavol and Chatterjee, Krishnendu and Henzinger, Thomas A
(2011) The Complexity of Quantitative Information Flow Problems.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Chen, Ruichuan and Akkus, Istemi Ekin and Francis, Paul
(2013) SplitX: high-performance private analytics.
In: Proc. of the ACM SIGCOMM 2013 Conference.
Conference: SIGCOMM - ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Chen, Ruichuan and Reznichenko, Alexey and Francis, Paul and Gehrke, Johannes
(2012) Towards Statistical Queries over Distributed Private User Data.
In: Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012).
Conference: None | Not Set

Chiu, Wei-Chen and Galasso, Fabio and Fritz, Mario
(2016) Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles.
In: Computer Vision - ACCV 2016 - 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part V.
Conference: None | Not Set

Chiu, Wei-Chen and Galasso, Fabio and Fritz, Mario
(2016) Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles.
CoRR, abs/16.

Choffnes, David and Druschel, Peter and Blond, Stevens Le and Caldwell, William and Merritt, Nicholas
(2015) Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
ACM Computer Communication Review, 45 (5). pp. 639-652.

Choi, Seung Geol and Katz, Jonathan and Schröder, Dominique and Yerukhimovich, Arkady and Zhou, Hong-Sheng
(2014) (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings.
Conference: TCC - Theory of Cryptography Conference

Chothia, Tom and Guha, Apratim
(2011) A Statistical Test for Information Leaks Using Continuous Mutual Information.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Chowdhury, Soudip Roy and Imran, Muhammad and Asghar, Muhammad Rizwan and Amer-Yahia, Sihem and Castillo, Carlos
(2013) Tweet4act: Using Incident-Specific Profiles for Classifying Crisis-Related Messages.
In: The 10th International Conference on Information Systems for Crisis Response and Management (ISCRAM).

Chowdhury, Sreyasi Nag and Malinowski, Mateusz and Bulling, Andreas and Fritz, Mario
(2016) Contextual Media Retrieval Using Natural Language Queries.
CoRR, abs/16.

Chowdhury, Sreyasi Nag and Malinowski, Mateusz and Bulling, Andreas and Fritz, Mario
(2016) Xplore-M-Ego: Contextual Media Retrieval Using Natural Language Queries.
In: Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval, ICMR 2016, New York, New York, USA, June 6-9, 2016.
Conference: None | Not Set

Ciobotaru, Oana
(2012) On the (Non-)Equivalence of UC Security Notions.
In: Proc. 6th International Conference on Provable Security (ProvSec 2012).

Ciobotaru, Oana
(2012) Rational Cryptography.
Doctoral thesis, Saarland University.

Ciolacu, Ines Lucia
(2011) Universally Composable Relativistic Commitments.
Masters thesis, Saarland University.

Clement, Allen and Junqueira, Flavio and Kate, Aniket and Rodrigues, Rodrigo
(2012) On the (limited) power of non-equivocation.
In: Proc. of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2012).

Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015) Type-Based Verification of Electronic Voting Protocols.
UNSPECIFIED
.

Cortier, Véronique and Smyth, Ben
(2011) Attacking and fixing Helios: An analysis of ballot secrecy.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

D

Dachman-Soled, Dana and Fleischhacker, Nils and Katz, Jonathan and Lysyanskaya, Anna and Schröder, Dominique
(2014) Feasibility and Infeasibility of Secure Computation with Malicious PUFs.
In: Proceedings of the 34th International Cryptology Conference (Crypto '14).
Conference: CRYPTO - Advances in Cryptology

Danezis, George and Kohlweiss, Markulf and Rial, Alfredo
(2011) Differentially Private Billing with Rebates.
Technical Report. UNSPECIFIED.

Daum, Jeanette and Torralba, Àlvaro and Hoffmann, Jörg and Haslum, Patrik and Weber, Ingo
(2016) Practical Undoability Checking via Contingent Planning.
In: Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16).
Conference: ICAPS - International Conference on Automated Planning and Scheduling

Domshlak, Carmel and Hoffmann, Jörg and Katz, Michael
(2015) Red-black planning: A new systematic approach to partial delete relaxation.
Artif. Intell., 221. pp. 73-114.

Doychev, Goran
(2012) Analysis and Mitigation of Information Leaks in Web Browsing Traffic.
Masters thesis, Saarland University.

Druschel, Peter
(2012) Accountability and Trust in Cooperative Information Systems.
In: Proc. of the 28th IEEE International Conference on Data Engineering (ICDE'12).
Conference: ICDE - International Conference on Data Engineering

Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016) Two Message Oblivious Evaluation of Cryptographic Functionalities.
In: Proceedings of the 36th International Cryptology Conference (CRYPTO '16).
Conference: CRYPTO - Advances in Cryptology

E

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012) Active Metric Learning for Object Recognition.
In: Pattern Recognition - Joint 34th DAGM and 36th OAGM Symposium, Graz, Austria, August 28-31, 2012. Proceedings.
Conference: None | Not Set

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2011) Pick Your Neighborhood - Improving Labels and Neighborhood Structure for Label Propagation.
In: Pattern Recognition - 33rd DAGM Symposium, Frankfurt/Main, Germany, August 31 - September 2, 2011. Proceedings.
Conference: None | Not Set

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012) RALF: A reinforced active learning formulation for object class recognition.
In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, June 16-21, 2012.
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012) Semi-Supervised Learning on a Budget: Scaling Up to Large Datasets.
In: Computer Vision - ACCV 2012 - 11th Asian Conference on Computer Vision, Daejeon, Korea, November 5-9, 2012, Revised Selected Papers, Part I.
Conference: None | Not Set

Ebert, Sandra and Schiele, Bernt
(2013) Where Next in Object Recognition and how much Supervision Do We Need?
In: Advances in Computer Vision and Pattern Recognition. Springer, pp. 35-64.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
UNSPECIFIED
.

Eigner, Fabienne and Maffei, Matteo
(2013) Differential Privacy by Typing in Security Protocols.
In: Proc. 1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013).
Conference: None | Not Set

F

Farajtabar, Mehrdad and Gomez-Rodriguez, Manuel and Du, Nan and Zamani, Mohammad and Zha, Hongyuan and Song, Le
(2015) Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades.
In: Proceedings of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS).
Conference: AISTATS - International Conference on Artificial Intelligence and Statistics

Fawcett, Chris and Vallati, Mauro and Hutter, Frank and Hoffmann, Jörg and Hoos, Holger H. and Leyton-Brown, Kevin
(2014) Improved Features for Runtime Prediction of Domain-Independent Planners.
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014).
Conference: ICAPS - International Conference on Automated Planning and Scheduling

Fischlin, Marc and Fleischhacker, Nils
(2013) Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
In: Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT 2013).
Conference: EuroCrypt - International Conference on the Theory and Application of Cryptographic Techniques

Fischlin, Marc and Fleischhacker, Nils
(2013) Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
In: Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT '13).
Conference: EuroCrypt - International Conference on the Theory and Application of Cryptographic Techniques

Fischlin, Marc and Lehmann, Anja and Schröder, Dominique
(2012) History-Free Sequential Aggregate Signatures.
In: Proc. 8th International Conference on Security and Cryptography for Networks (SCN 2012).
Conference: None | Not Set

Fleischhacker, Nils and Günther, Felix and Kiefer, Franziskus and Manulis, Mark and Poettering, Bertram
(2013) Pseudorandom signatures.
In: Proc. of the 8th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2013).

Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique
(2014) On Tight Security Proofs for Schnorr Signatures.
In: Proc. of the 20th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014).
Conference: ASIACRYPT - International Conference on the Theory and Application of Cryptology and Information Security

Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2016) Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.
Conference: None | Not Set

Fleischhacker, Nils and Manulis, Mark and Azodi, Amir
(2014) A Modular Framework for Multi-Factor Authentication and Key Exchange.
In: Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings.

Forero, Juan Pablo and Fernando, Piyum and Sridhar, Priyashri and Withana, Anusha Indrajith and Nanayakkara, Suranga and Steimle, Jürgen and Maes, Pattie
(2016) PostBits: using contextual locations for embedding cloud information in the home.
Personal and Ubiquitous Computing, 20 (6). pp. 1001-1014.

G

Gagné, Martin and Lafourcade, Pascal and Lakhnech, Yassine
(2013) Automated Security Proofs for Almost-Universal Hash for MAC Verification.
In: Proc. of the 18th European Symposium on Research in Computer Security (ESORICS 2013).

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gool, Luc J. Van and Tuytelaars, Tinne
(2016) DeLight-Net: Decomposing Reflectance Maps into Specular Materials and Natural Illumination.
CoRR, abs/16.

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne and Gool, Luc Van
(2016) Natural Illumination from Multiple Materials Using Deep Learning.
CoRR, abs/16.

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne and Gool, Luc Van
(2017) What is Around the Camera?
In: IEEE International Conference on Computer Vision, ICCV 2017, Venice, Italy, October 22-29, 2017.
Conference: ICCV - IEEE International Conference on Computer Vision

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Gavves, Efstratios and Fritz, Mario and Gool, Luc Van and Tuytelaars, Tinne
(2018) Reflectance and Natural Illumination from Single-Material Specular Objects Using Deep Learning.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Gerling, Sebastian
(2009) Acoustic Side-Channel Attacks on Printers.
Masters thesis, Saarland University.

Gerling, Sebastian and Marnau, Ninja and Sorge, Christoph
(2018) Stellungnahme gegenüber dem Landtag des Saarlandes zum Thema „Stand und Entwicklungsperspektiven der Telemedizin im Saarland“.
CISPA
.

Gnad, Daniel and Hoffmann, Jörg
(2015) Red-Black Planning: A New Tractability Analysis and Heuristic Function.
In: Proceedings of the 8th Annual Symposium on Combinatorial Search (SOCS'15).
Conference: None | Not Set

Gnad, Daniel and Steinmetz, Marcel and Jany, Mathäus and Hoffmann, Jörg and Serina, Ivan and Gerevini, Alfonso
(2016) Partial Delete Relaxation, Unchained: On Intractable Red-Black Planning and Its Applications.
In: Proceedings of the 9th Annual Symposium on Combinatorial Search (SOCS'16).
Conference: None | Not Set

Gomez-Rodriguez, Manuel and Song, Le and Du, Nan and Zha, Hongyuan and Schölkopf, Bernhard
(2016) Influence Estimation and Maximization in Continuous-Time Diffusion Networks.
ACM Transactions on Information Systems (TOIS).

Grimm, Niklas
(2013) Lime: A Framework for Data Lineage in the Malicious Environment.
Bachelors thesis, Saarland University.

Grosse, Kathrin and Pfaff, David and Smith, Michael Thomas and Backes, Michael
(2017) How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models.
ArXiv e-prints.

Grosse, Kathrin and Smith, Michael Thomas and Backes, Michael
(2018) Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification.
ArXiv e-prints.
(Submitted)

Groß, Thomas and Mödersheim, Sebastian
(2011) Vertical Protocol Composition.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

H

Hanser, Christian and Rabkin, Max and Schröder, Dominique
(2015) Verifiably Encrypted Signatures: Security Revisited and a New Construction.
In: Proc. of the 20th European Symposium on Research in Computer Security (ESORICS 2015).
Conference: ESORICS - European Symposium On Research In Computer Security

He, Yang and Chiu, Wei-Chen and Keuper, Margret and Fritz, Mario
(2016) RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling.
CoRR, abs/16.

He, Yang and Chiu, Wei-Chen and Keuper, Margret and Fritz, Mario
(2017) STD2P: RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

He, Yang and Fritz, Mario and Schiele, Bernt
(2018) Diverse Conditional Image Generation by Stochastic Regression with Latent Drop-Out Codes.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV - European Conference on Computer Vision

He, Yang and Keuper, Margret and Schiele, Bernt and Fritz, Mario
(2017) Learning Dilation Factors for Semantic Segmentation of Street Scenes.
In: Pattern Recognition - 39th German Conference, GCPR 2017, Basel, Switzerland, September 12-15, 2017, Proceedings.
Conference: None | Not Set

He, Yang and Keuper, Margret and Schiele, Bernt and Fritz, Mario
(2017) Learning Dilation Factors for Semantic Segmentation of Street Scenes.
CoRR, abs/17.

Hoffmann, Jörg
(2015) Simulated Penetration Testing: From "Dijkstra" to "Turing Test++".
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2015).
Conference: ICAPS - International Conference on Automated Planning and Scheduling

Hofheinz, Dennis and Unruh, Dominique and Müller-Quade, Jörn
(2012) Polynomial Runtime and Composability.
Journal of Cryptology.

Hriţcu, Cătălin
(2011) Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis.
Doctoral thesis, Saarland University.

J

Janoch, Allison and Karayev, Sergey and Jia, Yangqing and Barron, Jonathan T. and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2013) A Category-Level 3D Object Dataset: Putting the Kinect to Work.
In: Consumer Depth Cameras for Computer Vision, Research Topics and Applications. UNSPECIFIED, pp. 141-165.

Janoch, Allison and Karayev, Sergey and Jia, Yangqing and Barron, Jonathan T. and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2011) A category-level 3-D object dataset: Putting the Kinect to work.
In: IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011.
Conference: None | Not Set

Jawanpuria, Pratik and Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2015) Efficient Output Kernel Learning for Multiple Tasks.
In: Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada.
Conference: NIPS - Advances in Neural Information Processing Systems

Jiang, Ke and Eles, Petru and Peng, Zebo and Chattopadhyay, Sudipta and Batina, Lejla
(2016) SPARTA: A Scheduling Policy for Thwarting Differential Power Analysis Attacks.
In: 21st Asia and South Pacific Design Automation Conference (ASP-DAC).

Joshi, Nakul and Petrlic, Ronald
(2013) Towards practical privacy-preserving Digital Rights Management for Cloud Computing.
In: Proceedings of The 10th Annual IEEE Consumer Communications & Networking Conference (CCNC 2013).

K

Karayev, Sergey and Baumgartner, Tobias and Fritz, Mario and Darrell, Trevor
(2012) Timely Object Recognition.
In: Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012. Proceedings of a meeting held December 3-6, 2012, Lake Tahoe, Nevada, United States..
Conference: NIPS - Advances in Neural Information Processing Systems

Karayev, Sergey and Fritz, Mario and Darrell, Trevor
(2014) Anytime Recognition of Objects and Scenes.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Karayev, Sergey and Fritz, Mario and Fidler, Sanja and Darrell, Trevor
(2011) A probabilistic model for recursive factorized image features.
In: The 24th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2011, Colorado Springs, CO, USA, 20-25 June 2011.
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Kawohl, Claudia and Krämer, Annika and Marnau, Ninja
(2018) Datenschutz durch Technikgestaltung für Genomdaten.
DSRI Herbstakademie Tagungsband 2018.

Khoreva, Anna and Galasso, Fabio and Hein, Matthias and Schiele, Bernt
(2015) Classifier based graph construction for video segmentation.
In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'15).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Knuth, Karsten
(2012) Security Analysis of Browser Extension Concepts.
Bachelors thesis, Saarland University.

Koch, Simon
(2015) Correlating BGP and Traceroute Data.
Bachelors thesis, Saarland University.

Krajnanský, Michal and Hoffmann, Jörg and Buffet, Olivier and Fern, Alan
(2014) Learning Pruning Rules for Heuristic Search Planning.
In: Proc. of the 21st European Conference on Artificial Intelligence (ECAI 2014).
Conference: ECAI - European Conference on Artificial Intelligence

Kremer, Steve and Steel, Graham and Warinschi, Bogdan
(2011) Security for Key Management Interfaces.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Krupp, Johannes and Schröder, Dominique and Simkin, Mark
(2014) DEMO: Enhancing Security and Privacy with Google Glass.
In: Proceedings of the 21st ACM Conference on Computer and Communication Security (CCS '14).
Conference: CCS - ACM Conference on Computer and Communications Security

Krupp, Johannes and Schröder, Dominique and Simkin, Mark and Fiore, Dario and Ateniese, Giuseppe and Nürnberger, Stefan
(2016) Nearly Optimal Verifiable Data Streaming.
IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC).

Krupp, Johannes and Schröder, Dominique and Simkin, Mark and Fiore, Dario and Ateniese, Giuseppe and Nürnberger, Stefan
(2016) Nearly Optimal Verifiable Data Streaming.
In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.
Conference: None | Not Set

Künnemann, Robert
(2011) Game-Theoretic Notions of Incoercibility.
Masters thesis, UNSPECIFIED.

L

Lai, Russell W F and Zhang, Tao and Chow, Sherman S M and Schröder, Dominique
(2016) Efficient Sanitizable Signatures Without Random Oracles.
In: Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS'16).
Conference: ESORICS - European Symposium On Research In Computer Security

Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2014) Learning using privileged information: SV M+ and weighted SVM.
Neural Networks, 53. pp. 95-108.

Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2016) Loss Functions for Top-k Error: Analysis and Insights.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Lapin, Maksim and Schiele, Bernt and Hein, Matthias
(2014) Scalable Multitask Representation Learning for Scene Classification.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Levinkov, Evgeny and Fritz, Mario
(2013) Sequential Bayesian Model Update under Structured Scene Prior for Semantic Road Scenes Labeling.
In: IEEE International Conference on Computer Vision, ICCV 2013, Sydney, Australia, December 1-8, 2013.
Conference: ICCV - IEEE International Conference on Computer Vision

Li, Wenbin and Azimi, Seyedmajid and Leonardis, Ales and Fritz, Mario
(2016) To Fall Or Not To Fall: A Visual Approach to Physical Stability Prediction.
CoRR, abs/16.

Li, Wenbin and Bohg, Jeannette and Fritz, Mario
(2017) Acquiring Target Stacking Skills by Goal-Parameterized Deep Reinforcement Learning.
CoRR, abs/17.

Li, Wenbin and Fritz, Mario
(2014) Learning Multi-Scale Representations for Material Classification.
CoRR, abs/14.

Li, Wenbin and Fritz, Mario
(2016) Recognition of Ongoing Complex Activities by Sequence Prediction over a Hierarchical Label Space.
In: IEEE Winter Conference on Applications of Computer Vision (WACV).
Conference: WACV - IEEE Workshop on Applications of Computer Vision

Li, Wenbin and Fritz, Mario
(2012) Recognizing Materials from Virtual Examples.
In: Computer Vision - ECCV 2012 - 12th European Conference on Computer Vision, Florence, Italy, October 7-13, 2012, Proceedings, Part IV.
Conference: ECCV - European Conference on Computer Vision

Li, Wenbin and Fritz, Mario
(2015) Teaching robots the use of human tools from demonstration with non-dexterous end-effectors.
In: 15th IEEE-RAS International Conference on Humanoid Robots, Humanoids 2015, Seoul, South Korea, November 3-5, 2015.
Conference: None | Not Set

Li, Wenbin and Leonardis, Ales and Fritz, Mario
(2016) Visual Stability Prediction and Its Application to Manipulation.
CoRR, abs/16.

Li, Wenbin and Leonardis, Ales and Fritz, Mario
(2017) Visual stability prediction for robotic manipulation.
In: 2017 IEEE International Conference on Robotics and Automation, ICRA 2017, Singapore, Singapore, May 29 - June 3, 2017.
Conference: None | Not Set

M

Ma, Liqian and Sun, Qianru and Georgoulis, Stamatios and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Disentangled Person Image Generation.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Ma, Liqian and Sun, Qianru and Georgoulis, Stamatios and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2017) Disentangled Person Image Generation.
Technical Report. arXiv.

Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2014) Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-party Setting.
In: Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing.
Conference: PODC - ACM Symposium on Principles of Distributed Computing

Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2015) Privacy and Access Control for Outsourced Personal Records.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: S&P - IEEE Symposium on Security and Privacy

Mainberger, Markus and Backes, Michael and Berg, Matthias and Weickert, Joachim
(2012) Diffusion-Based Image Compression in Steganography.
In: Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012.
Conference: None | Not Set

Malinowski, Mateusz and Fritz, Mario
(2015) Hard to Cheat: A Turing Test based on Answering Questions about Images.
CoRR, abs/15.

Malinowski, Mateusz and Fritz, Mario
(2013) Learnable Pooling Regions for Image Classification.
CoRR, abs/13.

Malinowski, Mateusz and Fritz, Mario
(2013) Learning Smooth Pooling Regions for Visual Recognition.
In: British Machine Vision Conference, BMVC 2013, Bristol, UK, September 9-13, 2013.
Conference: None | Not Set

Malinowski, Mateusz and Fritz, Mario
(2014) A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input.
In: Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada.
Conference: NIPS - Advances in Neural Information Processing Systems

Malinowski, Mateusz and Fritz, Mario
(2014) A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input.
CoRR, abs/14.

Malinowski, Mateusz and Fritz, Mario
(2014) A Pooling Approach to Modelling Spatial Relations for Image Retrieval and Annotation.
CoRR, abs/14.

Malinowski, Mateusz and Fritz, Mario
(2014) Towards a Visual Turing Challenge.
CoRR, abs/14.

Malinowski, Mateusz and Fritz, Mario
(2016) Tutorial on Answering Questions about Images with Deep Learning.
CoRR, abs/16.

Malinowski, Mateusz and Mokarian, Ashkan and Fritz, Mario
(2016) Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task.
In: Proceedings of the British Machine Vision Conference 2016, BMVC 2016, York, UK, September 19-22, 2016.
Conference: None | Not Set

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2017) Ask Your Neurons: A Deep Learning Approach to Visual Question Answering.
International Journal of Computer Vision, 125 (1-3). pp. 110-135.

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2016) Ask Your Neurons: A Deep Learning Approach to Visual Question Answering.
CoRR, abs/16.

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2015) Ask Your Neurons: A Neural-Based Approach to Answering Questions about Images.
In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015.
Conference: ICCV - IEEE International Conference on Computer Vision

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2015) Ask Your Neurons: A Neural-based Approach to Answering Questions about Images.
CoRR, abs/15.

Marnau, Ninja
(2019) Kommentierung der §§64, 70, 71, 74 BDSG.
In: Gola/Heckman (Hrsg.) Bundesdatenschutzgesetz, Kommentar, 13. Aufl. C.H.Beck. ISBN 978-3-406-72878-5
(In Press)

Marnau, Ninja and Berrang, Pascal and Humbert, Mathias
(2018) Anonymisierungsverfahren für genetische Daten.
Datenschutz und Datensicherheit (DuD), 2/2018. pp. 83-88.

Marnau, Ninja and Sorge, Christoph
(2018) From Law to Engineering: A Computer Science Perspective on Privacy & Data Protection.
In: González-Fuster, G., van Brakel, R. and P. De Hert (forthcoming) Research Handbook on Privacy and Data Protection Law. Values, Norms and Global Politics. Edward Elgar Publishing.
(In Press)

Maximov, Maxim and Ritschel, Tobias and Fritz, Mario
(2018) Deep Appearance Maps.
["eprint_fieldopt_monograph_type_technicalreport" not defined]. UNSPECIFIED.

Meiser, Sebastian
(2011) Computational Soundness of Passively Secure Encryption in Presence of Active Adversaries.
Masters thesis, Saarland University.

Metzger, Steffen and Elbassuoni, Shady and Hose, Katja and Schenkel, Ralf
(2011) S3K: seeking statement-supporting top-K witnesses.
In: Proc. of the 20th ACM International Conference on Information and Knowledge Management (CIKM'11).

Meyer, Sebastian
(2012) Privacy Presserving Surveillance and Face Recognition.
Bachelors thesis, Saarland University.

Miller, Stephen and Fritz, Mario and Darrell, Trevor and Abbeel, Pieter
(2011) Parametrized shape models for clothing.
In: IEEE International Conference on Robotics and Automation, ICRA 2011, Shanghai, China, 9-13 May 2011.
Conference: None | Not Set

Miller, Stephen and van den Berg, Jur and Fritz, Mario and Darrell, Trevor and Goldberg, Kenneth Y. and Abbeel, Pieter
(2012) A geometric approach to robotic laundry folding.
I. J. Robotics Res., 31 (2). pp. 249-267.

Mohammadi, Esfandiar and Bendun, Fabian and Pecina, Kim and Maffei, Matteo and Backes, Michael
(2015) Symbolic Malleable Zero-knowledge Proofs.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Mokarian, Ashkan and Malinowski, Mateusz and Fritz, Mario
(2016) Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task.
CoRR, abs/16.

Mondal, Mainack and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan
(2014) Beyond Access Control: Managing Online Privacy via Exposure.
In: Proceedings of the Workshop on Useable Security (USEC'14).
Conference: None | Not Set

Mondal, Mainack and Messias, Johnnatan and Ghosh, Saptarshi and Gummadi, Krishna P. and Kate, Aniket
(2016) Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
In: 12th Symposium on Usable Privacy and Security (SOUPS'16).
Conference: None | Not Set

Möllers, Frederik
(2012) An Analysis of Traceability of Electronic Identification Documents.
Masters thesis, Universität Paderborn.

N

Nürnberger, Stefan and Feller, Thomas and Huss, Sorin A
(2010) Ray - A Secure Microkernel Architecture.
In: Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010).
Conference: None | Not Set

O

Oh, Seong Joon and Augustin, Max and Schiele, Bernt and Fritz, Mario
(2017) Whitening Black-Box Neural Networks.
Technical Report. arXiv.

Oh, Seong Joon and Augustin, Max and Schiele, Bernt and Fritz, Mario
(2018) Whitening Black-Box Neural Networks.
In: International Conference on Learning Representations (ICLR).
Conference: None | Not Set

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016) Faceless Person Recognition: Privacy Implications in Social Media.
In: Computer Vision - ECCV 2016 - 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part III.
Conference: ECCV - European Conference on Computer Vision

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016) Faceless Person Recognition; Privacy Implications in Social Media.
CoRR, abs/16.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2015) Person Recognition in Personal Photo Collections.
In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015.
Conference: ICCV - IEEE International Conference on Computer Vision

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2015) Person Recognition in Personal Photo Collections.
CoRR, abs/15.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2017) Person Recognition in Social Media Photos.
CoRR, abs/17.

Oh, Seong Joon and Benenson, Rodrigo and Khoreva, Anna and Akata, Zeynep and Fritz, Mario and Schiele, Bernt
(2017) Exploiting saliency for object segmentation from image level labels.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Oh, Seong Joon and Benenson, Rodrigo and Khoreva, Anna and Akata, Zeynep and Fritz, Mario and Schiele, Bernt
(2017) Exploiting saliency for object segmentation from image level labels.
CoRR, abs/17.

Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017) Adversarial Image Perturbation for Privacy Protection - A Game Theory Perspective.
CoRR, abs/17.

Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017) Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective.
Technical Report. UNSPECIFIED.

Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017) Adversarial Image Perturbation for Privacy Protection — A Game Theory Perspective.
In: IEEE International Conference on Computer Vision (ICCV), 2017.
Conference: ICCV - IEEE International Conference on Computer Vision

Ohrimenko, Olga and Costa, Manuel and Fournet, Cédric and Nowozin, Sebastian and Mehta, Aastha and Schuster, Felix and Vaswani, Kapil
(2016) SGX-Enabled Oblivious Machine Learning.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Orekondy, Tribhuvanesh and Fritz, Mario and Schiele, Bernt
(2018) Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Orekondy, Tribhuvanesh and Fritz, Mario and Schiele, Bernt
(2017) Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images.
Technical Report. arXiv.

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017) Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
Technical Report. UNSPECIFIED.

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017) Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV - IEEE International Conference on Computer Vision

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017) Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
CoRR, abs/17.

P

Pang, Jun and Zhang, Yang
(2017) DeepCity: A Feature Learning Framework for Mining Location Check-ins.
In: Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17).

Patel, Vikash
(2015) Argumentation Mining for the Sake of Privacy.
Masters thesis, Saarland University.

Petrlic, Ronald
(2012) Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment.
In: Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12).

Petrlic, Ronald
(2014) Privacy-Preserving Multiparty Digital Rights Management.
Doctoral thesis, University of Paderborn.

Petrlic, Ronald
(2012) Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme.
In: Cyberspace Safety and Security.

Petrlic, Ronald and Sekula, Stephan
(2013) Unlinkable content playbacks in a multiparty DRM system.
In: Data and Applications Security and Privacy XXVII.

Pishchulin, Leonid and Andriluka, Mykhaylo and Gehler, Peter and Schiele, Bernt
(2013) Strong Appearance and Expressive Spatial Models for Human Pose Estimation.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV - IEEE International Conference on Computer Vision

Pishchulin, Leonid and Jain, Arjun and Andriluka, Mykhaylo and Thormählen, Thorsten and Schiele, Bernt
(2012) Articulated People Detection and Pose Estimation: Reshaping the Future.
In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Platenius, Marie Christin and Arifulina, Svetlana and Petrlic, Ronald and Schäfer, Wilhelm
(2014) Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.
In: Proceedings of The 4th International Workshop on Adaptive Services for the Future Internet.

R

Rangapuram, Syama Sundar and Bühler, Thomas and Hein, Matthias
(2013) Towards realistic team formation in social networks based on densest subgraphs.
In: 22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013.
Conference: WWW - International World Wide Web Conference

Reed, Scott and Akata, Zeynep and Lee, Honglak and Schiele, Bernt
(2016) Learning Deep Representations of Fine-Grained Visual Descriptions.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Reinert, Manuel
(2012) A Framework for Security-Oriented Distributed Programming.
Masters thesis, Saarland University.

Reischuk, Raphael M.
(2014) Declarative Design and Enforcement for Secure Cloud Applications.
Doctoral thesis, Saarland University.

Rematas, Konstantinos and Fritz, Mario and Tuytelaars, Tinne
(2012) The Pooled NBNN Kernel: Beyond Image-to-Class and Image-to-Image.
In: Computer Vision - ACCV 2012 - 11th Asian Conference on Computer Vision, Daejeon, Korea, November 5-9, 2012, Revised Selected Papers, Part I.
Conference: None | Not Set

Rematas, Konstantinos and Nguyen, Chuong H. and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2017) Novel Views of Objects from a Single Image.
IEEE Trans. Pattern Anal. Mach. Intell., 39 (8). pp. 1576-1590.

Rematas, Konstantinos and Nguyen, Chuong H. and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2016) Novel Views of Objects from a Single Image.
CoRR, abs/16.

Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gavves, Efstratios and Tuytelaars, Tinne
(2016) Deep Reflectance Maps.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016.
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gavves, Efstratios and Tuytelaars, Tinne
(2015) Deep Reflectance Maps.
CoRR, abs/15.

Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2014) Image-Based Synthesis and Re-synthesis of Viewpoints Guided by 3D Models.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Reznichenko, Alexey and Francis, Paul
(2014) Private-by-Design Advertising Meets the Real World.
In: Proc. of the 20th ACM Conference on Computer and Communication Security (CCS 2014).
Conference: CCS - ACM Conference on Computer and Communications Security

Reznichenko, Alexey and Guha, Saikat and Francis, Paul
(2011) Auctions in do-not-track compliant internet advertising.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS - ACM Conference on Computer and Communications Security

Rohrbach, Marcus and Rohrbach, Anna and Regneri, Michaela and Amin, Sikandar and Andriluka, Mykhaylo and Pinkal, Manfred and Schiele, Bernt
(2016) Recognizing Fine-Grained and Composite Activities Using Hand-Centric Features and Script Data.
International Journal of Computer Vision, 119 (3). pp. 346-373.

Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015) POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS - ACM Conference on Computer and Communications Security

Ruffing, Tim
(2012) Computational Soundness of Interactive Primitives.
Bachelors thesis, Saarland University.

Ruffing, Tim and Kate, Aniket and Schröder, Dominique
(2015) Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins.
In: Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS '15).
Conference: CCS - ACM Conference on Computer and Communications Security

Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2014) CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
In: Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014).

Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2017) P2P Mixing and Unlinkable Bitcoin Transactions.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS - Network and Distributed System Security Symposium

Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013) Identity-Based Steganography and Its Applications to Censorship Resistance.
In: 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013).
Conference: None | Not Set

Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013) Poster: Identity-Based Steganography and Its Applications to Censorship Resistance.
In: Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS '13).
Conference: CCS - ACM Conference on Computer and Communications Security

S

Saenko, Kate and Karayev, Sergey and Jia, Yangqing and Shyr, Alex and Janoch, Allison and Long, Jonathan and Fritz, Mario and Darrell, Trevor
(2011) Practical 3-D object detection using category and instance-level appearance models.
In: 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2011, San Francisco, CA, USA, September 25-30, 2011.
Conference: IROS - IEEE/RSJ International Conference on Intelligent Robots and Systems

Salem, Ahmed
(2016) CRRP: A Cryptographic Protocol for Coercion-Resistant Rating Platforms.
Masters thesis, UNSPECIFIED.

Salem, Ahmed and Berrang, Pascal and Humbert, Mathias and Backes, Michael
(2018) Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
In: The 19th Privacy Enhancing Technologies Symposium (PETS).
Conference: None | Not Set
(In Press)

Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2016) Predicting the Category and Attributes of Mental Pictures Using Deep Gaze Pooling.
CoRR, abs/16.

Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2017) Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling.
In: Mutual Benefits of Cognitive and Computer Vision Workshop at International Conference on Computer Vision (ICCV-W).
Conference: None | Not Set

Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2016) Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling.
Technical Report. UNSPECIFIED.

Sattar, Hosnieh and Fritz, Mario and Bulling, Andreas
(2017) Visual Decoding of Targets During Visual Search From Human Eye Fixations.
CoRR, abs/17.

Sattar, Hosnieh and Müller, Sabine and Fritz, Mario and Bulling, Andreas
(2015) Prediction of search targets from fixations in open-world settings.
In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015.
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Sattar, Hosnieh and Müller, Sabine and Fritz, Mario and Bulling, Andreas
(2015) Prediction of search targets from fixations in open-world settings.
CoRR, abs/15.

Scheer, Jonas and Fritz, Mario and Grau, Oliver
(2016) Learning to Select Long-Track Features for Structure-From-Motion and Visual SLAM.
In: Pattern Recognition - 38th German Conference, GCPR 2016, Hannover, Germany, September 12-15, 2016, Proceedings.
Conference: None | Not Set

Schiele, Bernt and Bhattacharjee, Bobby and Fritz, Mario and Aditya, Paarijaat and Druschel, Peter and Sen, Rijurekha and Oh, Seong Joon and Benenson, Rodrigo and Wu, Tong Tong
(2016) Demo: I-Pic: A Platform for Privacy-Compliant Image Capture.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16).
Conference: None | Not Set

Schmidt, Jens M
(2013) Contractions, Removals and How to Certify 3-Connectivity in Linear Time.
In: SIAM Journal on Computing.

Schneider, Jonas
(2015) Partially Oblivious Pseudorandom Functions: A Generic Approach and an Impossibility Result.
Masters thesis, UNSPECIFIED.

Schneider, Jonas and Fleischhacker, Nils and Schröder, Dominique and Backes, Michael
(2016) Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS - ACM Conference on Computer and Communications Security

Schneider, Jonas and Schröder, Dominique
(2015) Foundations of Reconfigurable PUFs.
In: Proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, New York, NY, USA, June 2-5, 2015.
Conference: None | Not Set

Schranz, Oliver
(2013) A Developer-Centric Approach to Dynamic Permission System.
Bachelors thesis, Saarland University.

Schröder, Dominique and Döttling, Nico
(2015) Efficient Pseudorandom Functions via On-the-Fly Adaptation.
In: Proceedings of the 35th International Cryptology Conference (CRYPTO '15).
Conference: CRYPTO - Advances in Cryptology

Schröder, Dominique and Schröder, Heike
(2012) Verifiable data streaming.
In: Proc. of the 19th ACM Conference on Computer and Communication Security (CCS 2012).
Conference: CCS - ACM Conference on Computer and Communications Security

Schröder, Dominique and Simkin, Mark
(2015) VeriStream - A Framework for Verifiable Data Streaming.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers.
Conference: None | Not Set

Schröder, Dominique and Unruh, Dominique
(2011) Round Optimal Blind Signatures.
UNSPECIFIED
.

Schröder, Dominique and Unruh, Dominique
(2012) Security of Blind Signatures Revisited.
In: PKC 2012.
Conference: None | Not Set

Schröder, Dominique and Unruh, Dominique and Garg, Sanjam and Rao, Vanishree and Sahai, Amit
(2011) Round Optimal Blind Signatures.
In: Crypto 2011.
Conference: CRYPTO - Advances in Cryptology

Schröder, Florian
(2013) Generic Access Control for Extensible Web Applications within the SAFE Activation.
Masters thesis, Saarland University.

Schwarz, Fabian Frank
(2015) Security Analysis of Mobile Banking Apps.
Bachelors thesis, Saarland University.

Schweig, Marc
(2014) Developing a RiskScore for Android Applications.
Bachelors thesis, Saarland University.

Seiter, Julia and Wei-Chen, Chiu and Fritz, Mario and Amft, Oliver and Tröster, Gerhard
(2015) Joint segmentation and activity discovery using semantic and temporal priors.
In: 2015 IEEE International Conference on Pervasive Computing and Communications, PerCom 2015, St. Louis, MO, USA, 23-27 March, 2015.
Conference: PERCOM - IEEE International Conference on Pervasive Computing and Communications

Sharma, Abhishek and Grau, Oliver and Fritz, Mario
(2016) VConv-DAE: Deep Volumetric Shape Learning Without Object Labels.
In: Computer Vision - ECCV 2016 Workshops - Amsterdam, The Netherlands, October 8-10 and 15-16, 2016, Proceedings, Part III.
Conference: None | Not Set

Sharma, Abhishek and Grau, Oliver and Fritz, Mario
(2016) VConv-DAE: Deep Volumetric Shape Learning Without Object Labels.
CoRR, abs/16.

Shcherbatyi, Iaroslav and Bulling, Andreas and Fritz, Mario
(2015) GazeDPM: Early Integration of Gaze Information in Deformable Part Models.
CoRR, abs/15.

Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017) Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
Technical Report. UNSPECIFIED.

Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017) Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV - IEEE International Conference on Computer Vision

Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017) Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
CoRR, abs/17.

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2017) A4NT : Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
Technical Report. arXiv.

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2018) A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security - Usenix Security Symposium

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2017) A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
CoRR, abs/17.

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2018) A Survey on Routing in Anonymous Communication Protocols.
ACM Computing Surveys (CSUR), 51 (3). pp. 1-39. ISSN 0360-0300

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2016) A Survey on Routing in Anonymous Communication Protocols.
The Computing Research Repository (CoRR), abs/16.

Simkin, Mark and Schröder, Dominique and Bulling, Andreas and Fritz, Mario
(2014) Bridging the Gap Between Digital Cryptography and the Physical World.
In: European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS - European Symposium On Research In Computer Security

Simkin, Mark and Schröder, Dominique and Bulling, Andreas and Fritz, Mario
(2014) Ubic: Bridging the Gap between Digital Cryptography and the Physical World.
In: Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I.
Conference: ESORICS - European Symposium On Research In Computer Security

Skoruppa, Malte
(2012) Verifiable Security of Prefix-free Merkle-Damgård.
Masters thesis, Saarland University.

Song, Hyun Oh and Fritz, Mario and Gu, Chunhui and Darrell, Trevor
(2011) Visual grasp affordances from appearance-based cues.
In: IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011.

Song, Hyun Oh and Fritz, Mario and Göhring, Daniel and Darrell, Trevor
(2016) Learning to Detect Visual Grasp Affordance.
IEEE Trans. Automation Science and Engineering, 13 (2). pp. 798-809.

Song, Hyun Oh and Zickler, Stefan and Althoff, Tim and Girshick, Ross B. and Fritz, Mario and Geyer, Christopher and Felzenszwalb, Pedro F. and Darrell, Trevor
(2012) Sparselet Models for Efficient Multiclass Object Detection.
In: Computer Vision - ECCV 2012 - 12th European Conference on Computer Vision, Florence, Italy, October 7-13, 2012, Proceedings, Part II.
Conference: ECCV - European Conference on Computer Vision

Sorge, Christoph and Marnau, Ninja
(2017) Stellungnahme des CISPA zum Entwurf eines Gesetzes zur Förderung der elektronischen Verwaltung im Saarland sowie zur Änderung weiterer Vorschriften.
Landtag des Saarlandes
.

Speicher, Patrick and Steinmetz, Marcel and Backes, Michael and Hoffmann, Jörg and Künnemann, Robert
(2018) Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
In: The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18), New Orleans, Louisiana, USA.
Conference: AAAI - National Conference of the American Association for Artificial Intelligence

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018.
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version).
Extended Version of EuroS&P 2018 Paper.

Steinmetz, Marcel and Hoffmann, Jörg
(2017) State Space Search Nogood Learning: Online Refinement of Critical-Path Dead-End Detectors in Planning.
Artificial Intelligence (journal), ???. -.

Steinmetz, Marcel and Hoffmann, Jörg and Buffet, Olivier
(2016) Goal Probability Analysis in Probabilistic Planning: Exploring and Enhancing the State of the Art.
J. Artif. Intell. Res. (JAIR), 57. pp. 229-271.

Steinmetz, Marcel and Hoffmann, Jörg and Buffet, Olivier
(2016) Revisiting Goal Probability Analysis in Probabilistic Planning.
In: Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16).
Conference: ICAPS - International Conference on Automated Planning and Scheduling

Stikic, Maja and Larlus, Diane and Ebert, Sandra and Schiele, Bernt
(2011) Weakly Supervised Recognition of Daily Life Activities with Wearable Sensors.
IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 33 (12). pp. 2521-2537.

Suchanek, Fabian M and Gross-Amblard, David and Abiteboul, Serge
(2011) Watermarking for Ontologies.
In: Proc. 10th International Semantic Web Conference (ISWC 2011).

Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Natural and Effective Obfuscation by Head Inpainting.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2017) Natural and Effective Obfuscation by Head Inpainting.
Technical Report. arXiv.

Sun, Qianru and Schiele, Bernt and Fritz, Mario
(2017) A Domain Based Approach to Social Relation Recognition.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Sun, Qianru and Schiele, Bernt and Fritz, Mario
(2017) A Domain Based Approach to Social Relation Recognition.
CoRR, abs/17.

Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018) A Hybrid Model for Identity Obfuscation by Face Replacement.
In: European Conference on Computer Vision.
Conference: ECCV - European Conference on Computer Vision

Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018) A Hybrid Model for Identity Obfuscation by Face Replacement.
Technical Report. UNSPECIFIED.

T

Tabibian, Behzad and Valera, Isabel and Farajtabar, Mehrdad and Song, Le and Schölkopf, Bernhard and Gomez-Rodriguez, Manuel
(2017) Distilling Information Reliability and Source Trustworthiness from Digital Traces.
In: 26th International World Wide Web Conference (WWW'17).
Conference: WWW - International World Wide Web Conference

Tang, Siyu and Andriluka, Mykhaylo and Milan, Anton and Schindler, Konrad and Roth, Stefan and Schiele, Bernt
(2013) Learning People Detectors for Tracking in Crowded Scenes.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV - IEEE International Conference on Computer Vision

Tang, Siyu and Andriluka, Mykhaylo and Schiele, Bernt
(2014) Detection and Tracking of Occluded People.
International Journal of Computer Vision (IJCV), 110 (1). pp. 58-69.

Thiemert, Stefan and Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha
(2009) Security of Robust Audio Hashes.
In: First IEEE International Workshop on Information Forensics and Security (WIFS 2009).
Conference: None | Not Set

Tiwari, Abishek
(2015) Applying Privacy Case Law to The Right to be Forgotten.
Masters thesis, Saarland University.

Tsankov, Petar and Basin, David and Dashti, Mohammad Torabi
(2011) Constructing Mid-Points for Two-Party Asynchronous Protocols.
In: Proc. 15th International Conference On Principles Of Distributed Systems (OPODIS).

Tuytelaars, Tinne and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2011) The NBNN kernel.
In: IEEE International Conference on Computer Vision, ICCV 2011, Barcelona, Spain, November 6-13, 2011.
Conference: ICCV - IEEE International Conference on Computer Vision

U

Unruh, Dominique
(2011) Concurrent composition in the bounded quantum storage model.
In: Eurocrypt 2011.
Conference: EuroCrypt - International Conference on the Theory and Application of Cryptographic Techniques

Unruh, Dominique
(2012) Everlasting Quantum Security.
UNSPECIFIED
.

Unruh, Dominique
(2012) Programmable encryption and key-dependent messages.
UNSPECIFIED
.

Unruh, Dominique
(2012) Quantum Proofs of Knowledge.
In: Eurocrypt 2012.
Conference: EuroCrypt - International Conference on the Theory and Application of Cryptographic Techniques

Unruh, Dominique
(2011) Termination-Insensitive Computational Indistinguishability (and applications to computational soundness).
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

V

Varodayan, David and Khisti, Ashish
(2011) Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage.
In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011, Prague, Czech Republic, May 2011..

Venkatadri, Giridhari and Goga, Oana and Zhong, Changtao and Viswanath, Bimal and Gummadi, Krishna P. and Sastry, Nishanth R
(2016) Strengthening Weak Identities Through Inter-Domain Trust Transfer.
In: Proceedings of the 25th International Conference on World Wide Web (WWW'16).
Conference: WWW - International World Wide Web Conference

Viswanath, Bimal and Bashir, Muhammad Ahmad and Zafar, Muhammad Bilal and Bouget, Simon and Guha, Saikat and Gummadi, Krishna P. and Kate, Aniket and Mislove, Alan
(2015) Strength in Numbers: Robust Tamper Detection in Crowd Computations.
In: Proceedings of the 2015 ACM on Conference on Online Social Networks, COSN 2015, Palo Alto, California, USA, November 2-3, 2015.
Conference: None | Not Set

W

Wang, Ping Chuan and Miller, Stephen and Fritz, Mario and Darrell, Trevor and Abbeel, Pieter
(2011) Perception for the manipulation of socks.
In: 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2011, San Francisco, CA, USA, September 25-30, 2011.
Conference: IROS - IEEE/RSJ International Conference on Intelligent Robots and Systems

Waxweiler, Daniel
(2016) Making Chromium´s Certificate Transparency integration more accessible.
Masters thesis, UNSPECIFIED.

Wedeking, Lukas
(2016) Anonymity Guarantees for Tor Hidden Services.
Bachelors thesis, Saarland University.

Wei-Chen, Walon and Blanke, Ulf and Fritz, Mario
(2011) I spy with my little eye: Learning optimal filters for cross-modal stereo under projected patterns.
In: IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011.
Conference: None | Not Set

Wei-Chen, Walon and Blanke, Ulf and Fritz, Mario
(2011) Improving the Kinect by Cross-Modal Stereo.
In: British Machine Vision Conference, BMVC 2011, Dundee, UK, August 29 - September 2, 2011. Proceedings.
Conference: None | Not Set

Wei-Chen, Walon and Fritz, Mario
(2013) Multi-class Video Co-segmentation with a Generative Multi-video Model.
In: 2013 IEEE Conference on Computer Vision and Pattern Recognition, Portland, OR, USA, June 23-28, 2013.
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Wei-Chen, Walon and Fritz, Mario
(2015) See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG.
In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015.
Conference: ICCV - IEEE International Conference on Computer Vision

Wei-Chen, Walon and Fritz, Mario
(2015) See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG.
CoRR, abs/15.

Wei-Chen, Walon and Johnson, Gregory and McCulley, Daniel and Grau, Oliver and Fritz, Mario
(2014) Object Disambiguation for Augmented Reality Applications.
In: British Machine Vision Conference, BMVC 2014, Nottingham, UK, September 1-5, 2014.
Conference: None | Not Set

Y

Yan, Junjie and Zhang, Xucong and Lei, Zhen and Li, Stan Z
(2013) Real-time High Performance Deformable Models for Face Detection in the Wild.
In: Proceedings of the IAPR International Conference on Biometrics (ICB).
Conference: None | Not Set

Yan, Junjie and Zhang, Xucong and Lei, Zhen and Liao, ShengCai and Li, Stan Z
(2013) Robust Multi-resolution Pedestrian Detection in Traffic Scenes.
In: IEEE Conference Computer Vision and Pattern Recognition (CVPR).

Young, Maxwell and Kate, Aniket and Goldberg, Ian and Karsten, Martin
(2013) Towards Practical Communication in Byzantine-Resistant DHTs.
Networking, IEEE/ACM Transactions on, 21 (1). pp. 190-203.

Z

Zafar, Bilal and Valera, Isabel and Gomez-Rodriguez, Manuel and Gummadi, Krishna P.
(2017) Fairness Beyond Disparate Treatment & Disparate Impact: Learning Classification without Disparate Mistreatment.
In: 26th International World Wide Web Conference (WWW'17).
Conference: WWW - International World Wide Web Conference

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2015) Appearance-Based Gaze Estimation in the Wild.
CoRR, abs/15.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2015) Appearance-based gaze estimation in the wild.
In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015.
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2017) It's Written All Over Your Face: Full-Face Appearance-Based Gaze Estimation.
In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops, Honolulu, HI, USA, July 21-26, 2017.
Conference: None | Not Set

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2016) It's Written All Over Your Face: Full-Face Appearance-Based Gaze Estimation.
CoRR, abs/16.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2018) MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2017) MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
CoRR, abs/17.

Zhang, Yang and Humbert, Mathias and Rahman, Tahleen and Li, Cheng-Te and Pang, Jun and Backes, Michael
(2018) Tagvisor: A Privacy Advisor for Sharing Hashtags.
In: Proceedings of the Web Conference 2018 (WWW).
Conference: WWW - International World Wide Web Conference

Zhao, Fanghua and Gao, Linan and Zhang, Yang and Wang, Zeyu and Wang, Bo and Guo, Shanqing
(2018) You Are Where You APP: An Assessment on Location Privacy of Social APPs.
In: The 29th IEEE International Symposium on Software Reliability Engineering, 15.10.2018-18.10.2018.
Conference: ISSRE - International Symposium on Software Reliability Engineering

Zmudzinski, Sascha and Steinebach, Martin
(2011) Re-synchronizing Audio Watermarking after Non-linear Time Stretching.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII.

This list was generated on Tue Oct 16 00:02:23 2018 CEST.