Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Florian Hahn"'
Publikováno v:
IET Biometrics, Vol 11, Iss 5, Pp 430-444 (2022)
Abstract Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to design biometric template protection (BTP) schemes that aim to protect sensitive biometric information during storage and biometric comparison. However, the
Externí odkaz:
https://doaj.org/article/2d7a7266494640278fa5430b9f0162cc
Publikováno v:
BMC Plant Biology, Vol 20, Iss 1, Pp 1-10 (2020)
Abstract Background CRISPR/Cas has recently become a widely used genome editing tool in various organisms, including plants. Applying CRISPR/Cas often requires delivering multiple expression units into plant and hence there is a need for a quick and
Externí odkaz:
https://doaj.org/article/6eb42ae4628b40be8cb6e8981b9c5e86
Publikováno v:
Plants, Vol 10, Iss 7, p 1481 (2021)
CRISPR/Cas technology has recently become the molecular tool of choice for gene function studies in plants as well as crop improvement. Wheat is a globally important staple crop with a well annotated genome and there is plenty of scope for improving
Externí odkaz:
https://doaj.org/article/7c31388118cb409ea1a45a23f49eddcc
Publikováno v:
Frontiers in Plant Science, Vol 9 (2018)
The CRISPR/Cas9 system has emerged as a powerful tool for targeted genome editing in plants and beyond. Double-strand breaks induced by the Cas9 enzyme are repaired by the cell’s own repair machinery either by the non-homologous end joining pathway
Externí odkaz:
https://doaj.org/article/375c9618c6db462799ea3838b72464c0
Publikováno v:
Bio-Protocol, Vol 7, Iss 13 (2017)
The CRISPR/Cas9 system has emerged as a powerful tool for gene editing in plants and beyond. We have developed a plant vector system for targeted Cas9-dependent mutagenesis of genes in up to two different target sites in Arabidopsis thaliana. This pr
Externí odkaz:
https://doaj.org/article/34d33fc86f484880ae7c1dc3ec60bc51
Publikováno v:
2022 IEEE International Joint Conference on Biometrics (IJCB)
The cutting-edge biometric recognition systems extract distinctive feature vectors of biometric samples using deep neural networks to measure the amount of (dis-)similarity between two biometric samples. Studies have shown that personal information (
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::756d880152724f568cfae1ba1a9907ec
https://research.utwente.nl/en/publications/e5113044-8d0e-47ec-bfc1-b9879a35b3e1
https://research.utwente.nl/en/publications/e5113044-8d0e-47ec-bfc1-b9879a35b3e1
Publikováno v:
Proceedings 2023 Network and Distributed System Security Symposium.
Publikováno v:
STARTPAGE=560;ENDPAGE=567;TITLE=None
The number of Internet-connected devices are expected to reach almost 30 billion by 2030, and already today the Internet of Things (IoT) technologies is a part of everyday life in sectors like public health, smart cars, smart grids, smart cities, sma
Autor:
Federico Mazzone, Leander van den Heuvel, Maximilian Huber, Cristian Verdecchia, Maarten Everts, Florian Hahn, Andreas Peter
Publikováno v:
AISec 2022-Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022, 13-24
STARTPAGE=13;ENDPAGE=24;TITLE=AISec 2022-Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022
STARTPAGE=13;ENDPAGE=24;TITLE=AISec 2022-Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022
Machine learning models are often trained on sensitive data, such as medical records or bank transactions, posing high privacy risks. In fact, membership inference attacks can use the model parameters or predictions to determine whether a given data
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::29b6cf02c349b77dd18b80c835645231
https://research.utwente.nl/en/publications/5e781644-1731-4856-97b3-9ef9ba6434d2
https://research.utwente.nl/en/publications/5e781644-1731-4856-97b3-9ef9ba6434d2
Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries
Autor:
Florian Hahn, Joep Peeters, Amina Bassit, Raymond N.J. Veldhuis, Tom A. M. Kevenaar, Andreas Peter
Publikováno v:
IEEE Transactions on Information Forensics and Security
IEEE transactions on information forensics and security, 16, 5045-5060. IEEE
IEEE transactions on information forensics and security, 16, 5045-5060. IEEE
Biometric verification has been widely deployed in current authentication solutions as it proves the physical presence of individuals. Several solutions have been developed to protect the sensitive biometric data in such systems that provide security