Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Christian Wressnegger"'
Publikováno v:
2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV).
Publikováno v:
2022 IEEE International Conference on Big Data (Big Data).
Autor:
Nurullah Demir, Matteo Große-Kampmann, Tobias Urban, Christian Wressnegger, Thorsten Holz, Norbert Pohlmann
Publikováno v:
Proceedings of the ACM Web Conference 2022.
Autor:
Christian Wressnegger
Publikováno v:
it - Information Technology. 62:279-286
Detecting and fending off attacks on computer systems is an enduring problem in computer security. In light of a plethora of different threats and the growing automation used by attackers, we are in urgent need of more advanced methods for attack det
Autor:
Niclas Kühnapfel, Stefan Preußler, Maximilian Noppel, Thomas Schneider, Konrad Rieck, Christian Wressnegger
Publikováno v:
Annual Computer Security Applications Conference.
Publikováno v:
WPES@CCS
The rigorous analysis of anonymous communication protocols and formal privacy goals have proven to be difficult to get right. Formal privacy notions as in the current state of the art based on indistinguishability games simplify analysis. Achieving t
Removing information from a machine learning model is a non-trivial task that requires to partially revert the training process. This task is unavoidable when sensitive data, such as credit card numbers or passwords, accidentally enter the model and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a79000377c9c4faa390cdfb1f4d64872
http://arxiv.org/abs/2108.11577
http://arxiv.org/abs/2108.11577
Autor:
Alexander Frickenstein, Walter Stechele, Christian Wressnegger, Sabine Kuhn, Anmol Singh, Nael Fasfous, Lukas Frickenstein, Naveen Shankar Nagaraja, Sreetama Sarkar, Qi Zhao, Christian Unger, Manoj Rohit Vemparala
Publikováno v:
CVPR Workshops
Efficiently deploying learning-based systems on embedded hardware is challenging for various reasons, two of which are considered in this paper: The model’s size and its robustness against attacks. Both need to be addressed even-handedly. We combin
Publikováno v:
EuroSec@EuroSys
When managing large malware collections, it is common practice to use short tags for grouping and organizing samples. For example, collected malware is often tagged according to its origin, family, functionality, or clustering. While these simple tag
Publikováno v:
EuroSec@EuroSys
For many, social networks have become the primary source of news, although the correctness of the provided information and its trustworthiness are often unclear. The investigations of the 2016 US presidential elections have brought the existence of e