Zapatka, Niklas; Fujita, Taisuke
AnonyPyx: A Python Library for Data Anonymization Sonstige
2025.
@misc{Zapatka2023anonypyx,
title = {AnonyPyx: A Python Library for Data Anonymization},
author = {Niklas Zapatka and Taisuke Fujita},
url = {https://github.com/questforwisdom/anonypyx},
year = {2025},
date = {2025-02-28},
urldate = {2025-02-28},
abstract = {AnonyPyx is a Python library that provides traditional anonymization methods, such as k-anonymity and l-diversity. It also includes attacks on these methods and provides appropriate privacy and utility metrics. The library is a fork of the open-source AnonyPy project, with significant modifications and additions.},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Zapatka, Niklas; Stock, Joshua; Federrath, Hannes; Lindemann, Jens
Short Summary of Syntactic Privacy Forschungsbericht
2025, (Working Paper).
@techreport{Zapatka2023syntactic,
title = {Short Summary of Syntactic Privacy},
author = {Niklas Zapatka and Joshua Stock and Hannes Federrath and Jens Lindemann},
url = {https://svs.informatik.uni-hamburg.de/publications/2023/working-paper-syntactic-privacy-literature-review.pdf},
year = {2025},
date = {2025-02-01},
urldate = {2025-02-01},
abstract = {Balancing the trade-off between personal data processing and the right to privacy
requires a measure for privacy. Such measures are provided by formal models, which
also enable proofs of privacy preservation. Syntactic privacy has been praised as
an intuitive family of such models. This report reviews the literature on syntactic
privacy models and their shortcomings. The results reveal their inherent complexity
and fragility. A short review of open-source implementations supporting syntactic
privacy is also included.},
note = {Working Paper},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
requires a measure for privacy. Such measures are provided by formal models, which
also enable proofs of privacy preservation. Syntactic privacy has been praised as
an intuitive family of such models. This report reviews the literature on syntactic
privacy models and their shortcomings. The results reveal their inherent complexity
and fragility. A short review of open-source implementations supporting syntactic
privacy is also included.
Luttermann, Malte; Möller, Ralf; Gehrke, Marcel
Lifting factor graphs with some unknown factors for new individuals Artikel
In: International Journal of Approximate Reasoning, Bd. 179, S. 109371, 2025, ISSN: 0888-613X.
@article{LUTTERMANN2025109371,
title = {Lifting factor graphs with some unknown factors for new individuals},
author = {Malte Luttermann and Ralf Möller and Marcel Gehrke},
url = {https://www.sciencedirect.com/science/article/pii/S0888613X2500012X},
doi = {https://doi.org/10.1016/j.ijar.2025.109371},
issn = {0888-613X},
year = {2025},
date = {2025-01-01},
journal = {International Journal of Approximate Reasoning},
volume = {179},
pages = {109371},
abstract = {Lifting exploits symmetries in probabilistic graphical models by using a representative for indistinguishable objects, allowing to carry out query answering more efficiently while maintaining exact answers. In this paper, we investigate how lifting enables us to perform probabilistic inference for factor graphs containing unknown factors, i.e., factors whose underlying function of potential mappings is unknown. We present the Lifting Factor Graphs with Some Unknown Factors (LIFAGU) algorithm to identify indistinguishable subgraphs in a factor graph containing unknown factors, thereby enabling the transfer of known potentials to unknown potentials to ensure a well-defined semantics of the model and allow for (lifted) probabilistic inference. We further extend LIFAGU to incorporate additional background knowledge about groups of factors belonging to the same individual object. By incorporating such background knowledge, LIFAGU is able to further reduce the ambiguity of possible transfers of known potentials to unknown potentials.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Luttermann, Malte; Braun, Tanya; Möller, Ralf; Gehrke, Marcel
Estimating Causal Effects in Partially Directed Parametric Causal Factor Graphs Proceedings Article
In: Destercke, Sébastien; Martinez, Maria Vanina; Sanfilippo, Giuseppe (Hrsg.): Scalable Uncertainty Management, S. 265–280, Springer Nature Switzerland, Cham, 2025, ISBN: 978-3-031-76235-2.
@inproceedings{10.1007/978-3-031-76235-2_20,
title = {Estimating Causal Effects in Partially Directed Parametric Causal Factor Graphs},
author = {Malte Luttermann and Tanya Braun and Ralf Möller and Marcel Gehrke},
editor = {Sébastien Destercke and Maria Vanina Martinez and Giuseppe Sanfilippo},
isbn = {978-3-031-76235-2},
year = {2025},
date = {2025-01-01},
booktitle = {Scalable Uncertainty Management},
pages = {265–280},
publisher = {Springer Nature Switzerland},
address = {Cham},
abstract = {Lifting uses a representative of indistinguishable individuals to exploit symmetries in probabilistic relational models, denoted as parametric factor graphs, to speed up inference while maintaining exact answers. In this paper, we show how lifting can be applied to causal inference in partially directed graphs, i.e., graphs that contain both directed and undirected edges to represent causal relationships between directed and undirected edges to represent causal relationships between random variables. We present partially directed parametric causal factor graphs (PPCFGs) as a generalisation of previously introduced parametric causal factor graphs, which require a fully directed graph. We further show how causal inference can be performed on a lifted level in PPCFGs, thereby extending the applicability of lifted causal inference to a broader range of models requiring less prior knowledge about causal relationships.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Sander, Jonas; Berndt, Sebastian; Bruhns, Ida; Eisenbarth, Thomas
In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Bd. 2025, Nr. 1, S. 420–449, 2025.
@article{sander2025dash,
title = {Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits},
author = {Jonas Sander and Sebastian Berndt and Ida Bruhns and Thomas Eisenbarth},
url = {https://tches.iacr.org/index.php/TCHES/article/view/11935},
doi = {10.46586/tches.v2025.i1.420-449},
year = {2025},
date = {2025-01-01},
journal = {IACR Transactions on Cryptographic Hardware and Embedded Systems},
volume = {2025},
number = {1},
pages = {420–449},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Breutigam, Dennis; Reischuk, Rüdiger
Statistical Privacy Sonstige Geplante Veröffentlichung
Geplante Veröffentlichung.
@misc{breutigam2025statisticalprivacy,
title = {Statistical Privacy},
author = {Dennis Breutigam and Rüdiger Reischuk},
url = {https://arxiv.org/abs/2501.12893},
year = {2025},
date = {2025-01-01},
urldate = {2025-01-01},
keywords = {},
pubstate = {forthcoming},
tppubtype = {misc}
}
Brügge, Nele Sophie; Korda, Alexandra; Borgwardt, Stefan; Andreou, Christina; Giannakakis, Giorgos; Handels, Heinz
Bag-Level Multiple Instance Learning for Acute Stress Detection from Video Data Proceedings Article
In: Proceedings of the 18th International Joint Conference on Biomedical Engineering Systems and Technologies – Volume 2: HEALTHINF, 2025, S. 285-296, 2025.
@inproceedings{Bruegge2025,
title = {Bag-Level Multiple Instance Learning for Acute Stress Detection from Video Data},
author = {Nele Sophie Brügge and Alexandra Korda and Stefan Borgwardt and Christina Andreou and Giorgos Giannakakis and Heinz Handels},
url = {https://www.scitepress.org/Link.aspx?doi=10.5220/0013364900003911},
year = {2025},
date = {2025-01-01},
booktitle = {Proceedings of the 18th International Joint Conference on Biomedical Engineering Systems and Technologies - Volume 2: HEALTHINF, 2025},
pages = {285-296},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Mulhem, Saleh; Schultz, Eike; Groth, Lukas; Berekovic, Mladen; Buchty, Rainer
Optimizing Systolic Array-based NTT Accelerators Artikel
In: Authorea Preprints, Accepted to IEEE Embedded Systems Letters, 2025.
@article{schultz2025optimizingb,
title = {Optimizing Systolic Array-based NTT Accelerators},
author = {Saleh Mulhem and Eike Schultz and Lukas Groth and Mladen Berekovic and Rainer Buchty},
url = {https://www.techrxiv.org/doi/full/10.36227/techrxiv.174137763.39532014},
year = {2025},
date = {2025-01-01},
journal = {Authorea Preprints, Accepted to IEEE Embedded Systems Letters},
publisher = {Authorea},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Kirschte, Moritz; Peinemann, Thorsten; Kostiainen, Kari; Wichelmann, Jan; Eisenbarth, Thomas; Mohammadi, Esfandiar
MammothDP: Differentially Private Boosted Decision Trees, Hyperparameter-Free and Ready for Trusted Hardware Unveröffentlicht
2025, (Under submission).
@unpublished{kirschte2025mammothdp,
title = {MammothDP: Differentially Private Boosted Decision Trees, Hyperparameter-Free and Ready for Trusted Hardware},
author = {Moritz Kirschte and Thorsten Peinemann and Kari Kostiainen and Jan Wichelmann and Thomas Eisenbarth and Esfandiar Mohammadi},
url = {https://anomed.de/wp-content/uploads/2025/03/MammothDP-18.pdf},
year = {2025},
date = {2025-01-01},
note = {Under submission},
keywords = {},
pubstate = {published},
tppubtype = {unpublished}
}
Schulze, Max; Zisgen, Yorck; Kirschte, Moritz; Mohammadi, Esfandiar; Koschmider, Agnes
Differentially Private Inductive Miner Proceedings Article
In: 2024 6th International Conference on Process Mining (ICPM), S. 89-96, 2024.
@inproceedings{10680684,
title = {Differentially Private Inductive Miner},
author = {Max Schulze and Yorck Zisgen and Moritz Kirschte and Esfandiar Mohammadi and Agnes Koschmider},
doi = {10.1109/ICPM63005.2024.10680684},
year = {2024},
date = {2024-10-01},
booktitle = {2024 6th International Conference on Process Mining (ICPM)},
pages = {89-96},
abstract = {Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task since an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event log sanitization struggled to protect against such leakage, in particular against adversaries with sufficient background knowledge. In this work, we provide a method that tackles the challenge of summarizing sensitive event traces by learning the underlying process tree in a privacy-preserving manner. We prove via the so-called Differential Privacy (DP) property that from the resulting summaries no useful inference can be drawn about any personal data in an event trace. On the technical side, we introduce a differentially private approximation (DPIM) of the Inductive Miner. Experimentally, we compare our DPIM with the Inductive Miner on 14 real-world event traces by evaluating well-known metrics: fitness, precision, simplicity, and generalization. The experiments show that our DPIM not only protects personal data but also generates faithful process trees that exhibit little utility loss above the Inductive Miner.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Luttermann, Malte; Machemer, Johann; Gehrke, Marcel
Efficient Detection of Commutative Factors in Factor Graphs Proceedings Article
In: Kwisthout, Johan; Renooij, Silja (Hrsg.): Proceedings of The 12th International Conference on Probabilistic Graphical Models, S. 38–56, PMLR, 2024.
@inproceedings{pmlr-v246-luttermann24a,
title = {Efficient Detection of Commutative Factors in Factor Graphs},
author = {Malte Luttermann and Johann Machemer and Marcel Gehrke},
editor = {Johan Kwisthout and Silja Renooij},
url = {https://proceedings.mlr.press/v246/luttermann24a.html},
year = {2024},
date = {2024-09-01},
booktitle = {Proceedings of The 12th International Conference on Probabilistic Graphical Models},
volume = {246},
pages = {38–56},
publisher = {PMLR},
series = {Proceedings of Machine Learning Research},
abstract = {Lifted probabilistic inference exploits symmetries in probabilistic graphical models to allow for tractable probabilistic inference with respect to domain sizes. To exploit symmetries in, e.g., factor graphs, it is crucial to identify commutative factors, i.e., factors having symmetries within themselves due to their arguments being exchangeable. The current state-of-the-art to check whether a factor is commutative with respect to a subset of its arguments iterates over all possible subsets of the factor’s arguments, i.e., O($2^n$) iterations for a factor with n arguments in the worst case. In this paper, we efficiently solve the problem of detecting commutative factors in a factor graph. In particular, we introduce the detection of commutative factors (DECOR) algorithm, which allows us to drastically reduce the computational effort for checking whether a factor is commutative in practice. We prove that DECOR efficiently identifies restrictions to drastically reduce the number of required iterations and validate the efficiency of DECOR in our empirical evaluation.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Gehrke, Marcel; Liebenow, Johannes; Mohammadi, Esfandiar; Braun, Tanya
Lifting in Support of Privacy-Preserving Probabilistic Inference Artikel
In: German Journal of Artificial Intelligence, 2024.
@article{Gehrke2024,
title = {Lifting in Support of Privacy-Preserving Probabilistic Inference},
author = {Marcel Gehrke and Johannes Liebenow and Esfandiar Mohammadi and Tanya Braun},
url = {https://link.springer.com/article/10.1007/s13218-024-00851-y},
year = {2024},
date = {2024-01-01},
journal = {German Journal of Artificial Intelligence},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Luttermann, Malte; Machemer, Johann; Gehrke, Marcel
Efficient Detection of Exchangeable Factors in Factor Graphs Proceedings Article
In: Proceedings of the Thirty-Seventh International FLAIRS Conference (FLAIRS-2024), Florida Online Journals, 2024.
@inproceedings{Luttermann2024a,
title = {Efficient Detection of Exchangeable Factors in Factor Graphs},
author = {Malte Luttermann and Johann Machemer and Marcel Gehrke},
url = {https://journals.flvc.org/FLAIRS/article/view/135518},
year = {2024},
date = {2024-01-01},
booktitle = {Proceedings of the Thirty-Seventh International FLAIRS Conference (FLAIRS-2024)},
publisher = {Florida Online Journals},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Luttermann, Malte; Hartwig, Mattis; Braun, Tanya; Möller, Ralf; Gehrke, Marcel
Lifted Causal Inference in Relational Domains Proceedings Article
In: Proceedings of the Third Conference on Causal Learning and Reasoning (CLeaR-2024), PMLR, 2024.
@inproceedings{Luttermann2024b,
title = {Lifted Causal Inference in Relational Domains},
author = {Malte Luttermann and Mattis Hartwig and Tanya Braun and Ralf Möller and Marcel Gehrke},
url = {https://proceedings.mlr.press/v236/luttermann24a.html},
year = {2024},
date = {2024-01-01},
booktitle = {Proceedings of the Third Conference on Causal Learning and Reasoning (CLeaR-2024)},
publisher = {PMLR},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Luttermann, Malte; Braun, Tanya; Möller, Ralf; Gehrke, Marcel
Colour Passing Revisited: Lifted Model Construction with Commutative Factors Proceedings Article
In: Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence (AAAI-2024), AAAI Press, 2024.
@inproceedings{Luttermann2024c,
title = {Colour Passing Revisited: Lifted Model Construction with Commutative Factors},
author = {Malte Luttermann and Tanya Braun and Ralf Möller and Marcel Gehrke},
url = {https://ojs.aaai.org/index.php/AAAI/article/view/30034},
year = {2024},
date = {2024-01-01},
booktitle = {Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence (AAAI-2024)},
publisher = {AAAI Press},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Anderson, Kathleen; Martinetz, Thomas
Revealing Unintentional Information Leakage in Low-Dimensional Facial Portrait Representations Proceedings Article
In: International Conference on Artificial Neural Networks (ICANN) 2024, 2024.
@inproceedings{Anderson2024,
title = {Revealing Unintentional Information Leakage in Low-Dimensional Facial Portrait Representations},
author = {Kathleen Anderson and Thomas Martinetz},
year = {2024},
date = {2024-01-01},
booktitle = {International Conference on Artificial Neural Networks (ICANN) 2024},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Kirschte, Moritz; Meiser, Sebastian; Ardalan, Saman; Mohammadi, Esfandiar
Distributed DP-Helmet: Scalable Differentially Private Non-interactive Averaging of Single Layers Sonstige
2024.
@misc{kirschte2024distributeddphelmetscalabledifferentially,
title = {Distributed DP-Helmet: Scalable Differentially Private Non-interactive Averaging of Single Layers},
author = {Moritz Kirschte and Sebastian Meiser and Saman Ardalan and Esfandiar Mohammadi},
url = {https://arxiv.org/abs/2211.02003},
year = {2024},
date = {2024-01-01},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Luttermann, Malte; Möller, Ralf; Hartwig, Mattis
Towards Privacy-Preserving Relational Data Synthesis via Probabilistic Relational Models Proceedings Article
In: Hotho, Andreas; Rudolph, Sebastian (Hrsg.): KI 2024: Advances in Artificial Intelligence, S. 175–189, Springer Nature Switzerland, Cham, 2024, ISBN: 978-3-031-70893-0.
@inproceedings{10.1007/978-3-031-70893-0_13,
title = {Towards Privacy-Preserving Relational Data Synthesis via Probabilistic Relational Models},
author = {Malte Luttermann and Ralf Möller and Mattis Hartwig},
editor = {Andreas Hotho and Sebastian Rudolph},
isbn = {978-3-031-70893-0},
year = {2024},
date = {2024-01-01},
booktitle = {KI 2024: Advances in Artificial Intelligence},
pages = {175–189},
publisher = {Springer Nature Switzerland},
address = {Cham},
abstract = {Probabilistic relational models provide a well-established formalism to combine first-order logic and probabilistic models, thereby allowing to represent relationships between objects in a relational domain. At the same time, the field of artificial intelligence requires increasingly large amounts of relational training data for various machine learning tasks. Collecting real-world data, however, is often challenging due to privacy concerns, data protection regulations, high costs, and so on. To mitigate these challenges, the generation of synthetic data is a promising approach. In this paper, we solve the problem of generating synthetic relational data via probabilistic relational models. In particular, we propose a fully-fledged pipeline to go from relational database to probabilistic relational model, which can then be used to sample new synthetic relational data points from its underlying probability distribution. As part of our proposed pipeline, we introduce a learning algorithm to construct a probabilistic relational model from a given relational database.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Liebenow, Johannes; Schütt, Yara; Braun, Tanya; Gehrke, Marcel; Thaeter, Florian; Mohammadi, Esfandiar
DPM: Clustering Sensitive Data through Separation Proceedings Article
In: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, S. 273–287, Association for Computing Machinery, Salt Lake City, UT, USA, 2024, ISBN: 9798400706363.
@inproceedings{10.1145/3658644.3690271,
title = {DPM: Clustering Sensitive Data through Separation},
author = {Johannes Liebenow and Yara Schütt and Tanya Braun and Marcel Gehrke and Florian Thaeter and Esfandiar Mohammadi},
url = {https://doi.org/10.1145/3658644.3690271},
doi = {10.1145/3658644.3690271},
isbn = {9798400706363},
year = {2024},
date = {2024-01-01},
booktitle = {Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security},
pages = {273–287},
publisher = {Association for Computing Machinery},
address = {Salt Lake City, UT, USA},
series = {CCS '24},
abstract = {Clustering is an important tool for data exploration where the goal is to subdivide a data set into disjoint clusters that fit well into the underlying data structure. When dealing with sensitive data, privacy-preserving algorithms aim to approximate the non-private baseline while minimising the leakage of sensitive information. State-of-the-art privacy-preserving clustering algorithms tend to output clusters that are good in terms of the standard metrics, inertia, silhouette score, and clustering accuracy, however, the clustering result strongly deviates from the non-private KMeans baseline. In this work, we present a privacy-preserving clustering algorithm called DPM that recursively separates a data set into clusters based on a geometrical clustering approach. In addition, DPM estimates most of the data-dependent hyper-parameters in a privacy-preserving way. We prove that DPM preserves Differential Privacy and analyse the utility guarantees of DPM. Finally, we conduct an extensive empirical evaluation for synthetic and real-life data sets. We show that DPM achieves state-of-the-art utility on the standard clustering metrics and yields a clustering result much closer to that of the popular non-private KMeans algorithm without requiring the number of classes.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Peinemann, Thorsten; Kirschte, Moritz; Stock, Joshua; Cotrini, Carlos; Mohammadi, Esfandiar
S-BDT: Distributed Differentially Private Boosted Decision Trees Proceedings Article
In: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, S. 288–302, Association for Computing Machinery, Salt Lake City, UT, USA, 2024, ISBN: 9798400706363.
@inproceedings{10.1145/3658644.3690301,
title = {S-BDT: Distributed Differentially Private Boosted Decision Trees},
author = {Thorsten Peinemann and Moritz Kirschte and Joshua Stock and Carlos Cotrini and Esfandiar Mohammadi},
url = {https://doi.org/10.1145/3658644.3690301},
doi = {10.1145/3658644.3690301},
isbn = {9798400706363},
year = {2024},
date = {2024-01-01},
booktitle = {Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security},
pages = {288–302},
publisher = {Association for Computing Machinery},
address = {Salt Lake City, UT, USA},
series = {CCS '24},
abstract = {We introduce S-BDT: a novel (ε,δ)-differentially private distributed gradient boosted decision tree (GBDT) learner that improves the protection of single training data points (privacy) while achieving meaningful learning goals, such as accuracy or regression error (utility). S-BDT uses less noise by relying on non-spherical multivariate Gaussian noise, for which we show tight subsampling bounds for privacy amplification and incorporate that into a Rényi filter for individual privacy accounting. We experimentally reach the same utility while saving 50% in terms of epsilon for ε ≤ 0.5 on the Abalone regression dataset (dataset size ≈ 4K), saving 30% in terms of epsilon for ε ≤ 0.08 for the Adult classification dataset (dataset size ≈ 50K), and saving 30% in terms of epsilon for ε ≤ 0.03 for the Spambase classification dataset (dataset size ≈ 5K). Moreover, we show that for situations where a GBDT is learning a stream of data that originates from different subpopulations (non-IID), S-BDT improves the saving of epsilon even further.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Luttermann, Malte; Möller, Ralf; Gehrke, Marcel
2024.
@misc{luttermann2024liftedmodelconstructionnormalisation,
title = {Lifted Model Construction without Normalisation: A Vectorised Approach to Exploit Symmetries in Factor Graphs},
author = {Malte Luttermann and Ralf Möller and Marcel Gehrke},
url = {https://arxiv.org/abs/2411.11730},
year = {2024},
date = {2024-01-01},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Bruhns, Ida; Berndt, Sebastian; Sander, Jonas; Eisenbarth, Thomas
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge Artikel
In: IACR Communications in Cryptology, Bd. 1, Nr. 3, S. 40, 2024.
@article{bruhns2024slalom,
title = {Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge},
author = {Ida Bruhns and Sebastian Berndt and Jonas Sander and Thomas Eisenbarth},
url = {https://cic.iacr.org/p/1/3/40},
doi = {10.62056/AKP-49QGXQ},
year = {2024},
date = {2024-01-01},
journal = {IACR Communications in Cryptology},
volume = {1},
number = {3},
pages = {40},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Stenger, Roland; others,
In: IEEE Access, 2024.
@article{stenger2024evaluating,
title = {Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility},
author = {Roland Stenger and others},
url = {https://www.techrxiv.org/articles/preprint/Evaluating_the_Impact_of_Face_Anonymization_Methods_on_Computer_Vision_Tasks_A_Trade-off_Between_Privacy_and_Utility/1222287},
doi = {10.1109/ACCESS.2024.1234567},
year = {2024},
date = {2024-01-01},
journal = {IEEE Access},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Wilke, Luca; Scopelliti, Gianluca
SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools Proceedings Article
In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), S. 193–198, 2024.
@inproceedings{wilke2024snpguard,
title = {SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools},
author = {Luca Wilke and Gianluca Scopelliti},
url = {https://ieeexplore.ieee.org/document/10628964/},
doi = {10.1109/EuroSPW61312.2024.00026},
year = {2024},
date = {2024-01-01},
booktitle = {2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)},
pages = {193–198},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Wilke, Luca; Sieck, Florian; Eisenbarth, Thomas
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX Proceedings Article
In: Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, 2024.
@inproceedings{wilke2024tdxdown,
title = {TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX},
author = {Luca Wilke and Florian Sieck and Thomas Eisenbarth},
url = {https://dl.acm.org/doi/10.1145/3658644.3690230},
doi = {10.1145/3658644.3690230},
year = {2024},
date = {2024-01-01},
booktitle = {Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Schappert, Ronja; Verrel, Julius; Brügge, Nele Sophie; Li, Frédéric; Paulus, Theresa; Becker, Leonie; Bäumer, Tobias; Beste, Christian; Roessner, Veit; Fudickar, Sebastian; Münchau, Alexander
Automated Video-Based Approach for the Diagnosis of Tourette Syndrome Artikel
In: Movement disorders clinical practice, 2024.
@article{Schappert2024,
title = {Automated Video-Based Approach for the Diagnosis of Tourette Syndrome},
author = {Ronja Schappert and Julius Verrel and Nele Sophie Brügge and Frédéric Li and Theresa Paulus and Leonie Becker and Tobias Bäumer and Christian Beste and Veit Roessner and Sebastian Fudickar and Alexander Münchau},
url = {https://movementdisorders.onlinelibrary.wiley.com/doi/10.1002/mdc3.14158},
doi = {https://doi.org/10.1002/mdc3.14158},
year = {2024},
date = {2024-01-01},
journal = {Movement disorders clinical practice},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Boy, Jeremy; Mähl, Jack; Sehm, Robin
I Want To Fault My BIKE: On the Feasibility of Electromagnetic Fault Injection Attacks Against The BIKE Cryptosystem Forschungsbericht
Institute for IT Security, University of Lübeck 2024.
@techreport{boy2024bike,
title = {I Want To Fault My BIKE: On the Feasibility of Electromagnetic Fault Injection Attacks Against The BIKE Cryptosystem},
author = {Jeremy Boy and Jack Mähl and Robin Sehm},
url = {https://www.its.uni-luebeck.de/fileadmin/files/theses/CS_JeremyBoy_JackMaehl_RobinSehm_I_Want_To_Fault_My_BIKE.pdf},
year = {2024},
date = {2024-01-01},
institution = {Institute for IT Security, University of Lübeck},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
Luttermann, Malte; Möller, Ralf; Gehrke, Marcel
Lifting Factor Graphs with Some Unknown Factors Proceedings Article
In: Proceedings of the Seventeenth European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU-2023), Springer, 2023.
@inproceedings{Luttermann2023,
title = {Lifting Factor Graphs with Some Unknown Factors},
author = {Malte Luttermann and Ralf Möller and Marcel Gehrke},
url = {https://link.springer.com/chapter/10.1007/978-3-031-45608-4_25},
year = {2023},
date = {2023-01-01},
booktitle = {Proceedings of the Seventeenth European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU-2023)},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Brügge, Nele Sophie; Mohammadi, Esfandiar; Münchau, Alexander; Bäumer, Tobias; Frings, Christian; Beste, Christian; Roessner, Veit; Handels, Heinz
Towards Privacy and Utility in Tourette Tic Detection Through Pretraining Based on Publicly Available Video Data of Healthy Subjects Proceedings Article
In: ICASSP 2023 – 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2023.
@inproceedings{10095309,
title = {Towards Privacy and Utility in Tourette Tic Detection Through Pretraining Based on Publicly Available Video Data of Healthy Subjects},
author = {Nele Sophie Brügge and Esfandiar Mohammadi and Alexander Münchau and Tobias Bäumer and Christian Frings and Christian Beste and Veit Roessner and Heinz Handels},
doi = {10.1109/ICASSP49357.2023.10095309},
year = {2023},
date = {2023-01-01},
booktitle = {ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}