Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2021Adaptive Instructional Systems. Design and Evaluation. Third International Conference, AIS 2021. Proceedings. Pt.I
: Sottilare, Robert (Editor); Schwarz, Jessica (Editor)
Conference Proceedings
2021Blockchain-based privacy preservation for supply chains supporting lightweight multi-hop information accountability
Bader, L.; Pennekamp, J.; Matzutt, R.; Hedderich, D.; Kowalski, M.; Lücken, V.; Wehrle, K.
Journal Article
2021Challenges and Opportunities in Securing the Industrial Internet of Things
Serror, M.; Hack, S.; Henze, M.; Schuba, M.; Wehrle, K.
Journal Article
2021Cognitive radar for waveform diversity utilization
Martone, Anthony F.; Charlish, Alexander
Conference Paper
2021CoinPrune: Shrinking Bitcoin’s Blockchain Retrospectively
Matzutt, R.; Kalde, B.; Pennekamp, J.; Drichel, A.; Henze, M.; Wehrle, K.
Journal Article
2021Combining virtual reality with camera data and a wearable sensor jacket to facilitate robot teleoperation
Illing, Boris; Gaspers, Bastian; Schulz, Dirk
Conference Paper
2021Communication and Interaction with Semiautonomous Ground Vehicles by Force Control Steering
Martínez-García, Miguel; Kalawsky, Roy S.; Gordon, Timothy; Smith, Tim; Meng, Qinggang; Flemisch, Frank
Journal Article
2021Do you Really Code? Designing and Evaluating Screening Questions for Online Surveys with Programmers
Danilova, Anastasia; Naiakshina, Alena; Horstmann, Stefan; Smith, Matthew
Conference Paper
2021Erkennung hybrider Bedrohungen für urbane Operationen
Stuch, H.P.; Schwarze, A.
Book Article
2021Evaluation Methods for an AI-Supported Learning Management System: Quantifying and Qualifying Added Values for Teaching and Learning
Rerhaye, Lisa; Altun, Daniela; Krauss, Christopher; Müller, Christoph
Conference Paper
2021Extended Object Tracking assisted Adaptive Multi-Hypothesis Clustering for Radar in Autonomous Driving Domain
Haag, Stefan; Duraisamy, Bharanidhar; Govaers, Felix; Fritzsche, Martin; Dickmann, Jürgen; Koch, Wolfgang
Conference Paper
2021Finding and analysing energy research funding data: The EnArgus system
Oppermann, Leif; Hirzel, Simon; Güldner, Alexander; Heiwolt, Karoline; Krassowski, Joachim; Schade, Ulrich; Lange, Christoph; Prinz, Wolfgang
Journal Article
2021From the Editors of the Special Issue on Artificial Intelligence for Data Fusion
Fränken, Dietrich; Koch, Wolfgang; Chong, Chee-Yee
Journal Article
2021IP-Wellenformen
Wörner, F.J.; Koch, R.; Adrat, M.
Book Article
2021Joint Communication and Radar Sensing: An Overview
Thomä, Reiner; Dallmann, Thomas; Jovanoska, Snezhana; Knott, Peter; Schmeink, Anke
Conference Paper
2021Machine Learning/Artificial Intelligence for Sensor Data Fusion - Opportunities and Challenges
Blasch, Erik; Pham, Tien; Chong, Chee-Yee; Koch, Wolfgang; Leung, Henry; Braines, Dave; Abdelzaher, Tarek
Journal Article
2021Maximizing the Probability of Message Delivery Over Ever-Changing Communication Scenarios in Tactical Networks
Loevenich, Johannes F.; Lopes, Roberto Rigolin F.; Rettore, Paulo H.; Eswarappa, Sharath M.; Sevenich, Peter
Journal Article
2021Modularer taktischer Router auf Basis offener Standards
Barz, C.
Book Article
2021Neue Techniken im Bereich Dekompilierung
Enders, S.; Hols, E.-M.
Book Article
2021On Digital Ethics for Artificial Intelligence and Information Fusion in the Defense Domain
Koch, Wolfgang
Journal Article
2021An overview and analysis of publications on locomotion taxonomies
Prinz, Lisa Marie; Mathew, Tintu; Klüber, Simon; Weyers, Benjamin
Conference Paper
2021Policy Rollout Action Selection in Continuous Domains for Sensor Path Planning
Hoffmann, Folker; Charlish, Alexander; Ritchie, Matthew; Griffiths, Hugh
Journal Article
2021Prebunking als Möglichkeit zur Resilienzsteigerung gegenüber Falschinformationen in Onlinemedien
Schade, U.; Meißner, F.; Pritzkau, A.; Verschitz, S.
Book Article
2021Tangible VR Multi-user Simulation Methodology for a Balanced Human System Integration
López-Hernández, D.; Bloch, M.; Bielecki, K.; Schmidt, R.; Baltzer, M.C.A.; Flemisch, F.
Conference Paper
2021The Value of Memory: Markov Chain versus Long Short-Term Memory for Electronic Intelligence
Apfeld, Sabine; Charlish, Alexander; Ascheid, Gerd
Conference Paper
2020"Get a Free Item Pack with Every Activation!". Do Incentives Increase the Adoption Rates of Two-Factor Authentication?
Busse, K.; Amft, S.; Hecker, D.; Zezschwitz, E. von
Journal Article
20203D lidar data segmentation using a sequential hybrid method
Tuncer, M.A.C.; Schulz, D.
Conference Paper
2020Accuracy study on shooter localization using incomplete acoustic measurements
Still, L.; Oispuu, M.; Koch, W.
Conference Paper
2020Adapting interaction to address critical user states of high workload and incorrect attentional focus - An evaluation of five adaptation strategies
Fuchs, S.; Hochgeschurz, S.; Schmitz-Hübsch, A.; Thiele, L.
Conference Paper
2020Advanced analysis of binary code
Bergmann, Niklas
Book Article
2020Airborne Beyond Line-of-Sight Communication Networks
Rupar, M.A.; Larsen, E.; Saglam, H.B.; Savin, J.A.; Gurdil, B.; Lampe, T.A.; Bruck, N.; Peltotalo, S.; Blasco, R.B.
Journal Article
2020Array-based Emitter Localization Using a VTOL UAV Carried Sensor
Steffes, C.; Allmann, C.; Oispuu, M.
Conference Paper
2020Assessing the Security of OPC UA Deployments
Roepert, Linus; Dahlmanns, Markus; Fink, Ina Berenice; Pennekamp, Jan; Henze, Martin
Conference Paper
2020Autonomous Robot Exploration and Measuring in Disaster Scenarios using Behavior Trees
Rosas, F.G.; Hoeller, F.; Schneider, F.E.
Conference Paper
2020BAAS: Bayesian Tracking and Fusion Assisted Object Annotation of Radar Sensor Data for Artificial Intelligence Application
Haag, S.; Duraisamy, B.; Govaers, F.; Koch, W.; Fritzsche, M.; Dickmann, J.
Conference Paper
2020Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks
Ohm, M.; Plate, H.; Sykosch, A.; Meier, M.
Conference Paper
2020Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries
Busse, K.; Tahaei, M.; Krombholz, K.; Zezschwitz, E. von; Smith, M.; Tian, J.; Xu, W.
Conference Paper
2020Challenges and Prospects of Emotional State Diagnosis in Command and Control Environments
Schmitz-Hübsch, A.; Fuchs, S.
Conference Paper
2020Challenges in automated HUMINT processing for situational assessment: Experiences from NATO CIMIC Joint Cooperation
Nimier, V.; Rein, K.; Snidaro, L.; Biermann, J.; Garcia, J.; Krenc, K.
Conference Paper
2020Classifying LPI signals with transfer learning on CNN architectures
Lay, B.; Charlish, A.
Conference Paper
2020Closing the Gap of Creating Design Concepts for DSS by Applying the Situation Awareness Oriented Design Principles
Dalinger, Elena; Feiser, Daniel
Conference Paper
2020Cognitive Radar Special Issue - Part 2
Brüggenwirth, Stefan; Huizing, Albert; Charlish, Alexander
Journal Article
2020Comparable Data Evaluation Method for a Radio-Nuclear Sensor When Used on an UAV
Rudolph, C.; Knoedler, B.; Heinskill, J.
Conference Paper
2020Complying with Data Handling Requirements in Cloud Storage Systems
Henze, Martin; Matzutt, Roman; Hiller, Jens; Möhmer, Erik; Ziegeldorf, Jan Henrik; Giet, Johannes van der; Wehrle, Klaus
Journal Article
2020Cybersecurity Research and Training for Power Distribution Grids - A Blueprint
Henze, M.; Bader, L.; Filter, J.; Lamberts, O.; Ofner, S.; Velde, D. Van Der
Conference Paper
2020Deployment Architecture for Accessing Smart City and Coalition Assets for Multi-Agency HADR Operations
Pradhan, M.; Fuchs, C.; Noll, J.
Conference Paper
2020Detecting and Tracking a Small UAV in GSM Passive Radar Using Track-before-Detect
Knoedler, B.; Steffes, C.; Koch, W.
Conference Paper
2020The Development From Adaptive to Cognitive Radar Resource Management
Charlish, A.; Hoffmann, F.; Degen, C.; Schlangen, I.
Journal Article
2020Dynamic Adaptation of the User Data Flow to the Changing Data Rates in VHF Networks: An Exploratory Study
Balaraju, P.H.; Rettore, P.H.L.; Lopes, R.R.F.; Eswarappa, S.M.; Loevenich, J.
Conference Paper
2020Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments
Dahlmanns, M.; Lohmöller, J.; Fink, I.B.; Pennekamp, J.; Wehrle, K.; Henze, M.
Conference Paper
2020Einsatzunterstützungssystem für Feuerwehren zur Gefahrenbekämpfung auf Seeschiffen
Feiser, Daniel
Journal Article
2020Enhancing reality: Adaptation strategies for AR in the field
Bielecki, K.; López Hernández, D.; Bloch, M.; Baltzer, M.; Schmidt, R.; Wasser, J.; Flemisch, F.
Conference Paper
2020Evaluation of Immersive Teleoperation Systems using Standardized Tasks and Measurements
Illing, B.; Westhoven, M.; Gaspers, B.; Smets, M.; Brüggemann, B.; Mathew, T.
Conference Paper
2020An Evaluation of Pie Menus for System Control in Virtual Reality
Mundt, M.; Mathew, T.
Conference Paper
2020Extending MUD to Smartphones
Fink, I.B.; Serror, M.; Wehrle, K.
Conference Paper
2020Facilitating Protocol-independent Industrial Intrusion Detection Systems
Wolsing, K.; Wagner, E.; Henze, M.
Conference Paper
2020FactDAG: Formalizing Data Interoperability in an Internet of Production
Gleim, L.; Pennekamp, J.; Liebenberg, M.; Buchsbaum, M.; Niemietz, P.; Knape, S.; Epple, A.; Storms, S.; Trauth, D.; Bergs, T.; Brecher, C.; Decker, S.; Lakemeyer, G.; Wehrle, K.
Journal Article
2020Federated Control of Distributed Multi-Partner Cloud Resources for Adaptive C2 in Disadvantaged Networks
Bastiaansen, H.; Geest, J.V.D.; Broek, C.V.D.; Kudla, T.; Isenor, A.; Webb, S.; Suri, N.; Fogli, M.; Canessa, B.; Masini, A.; Goniacz, R.; Sliwa, J.
Journal Article
2020Field Experiments on Shooter State Estimation Accuracy Based on Incomplete Acoustic Measurements
Still, L.; Oispuu, M.
Conference Paper
2020Finding a line between trusted and untrusted information on tweets through sequence classification
Pritzkau, Albert; Winandy, Steffen; Krumbiegel, Theresa
Presentation
2020Fortschrittliche Analyse von Binärcode
Bergmann, Niklas
Book Article
2020From "knowing what" to "knowing when": Exploring a concept of situation awareness synchrony for evaluating SA dynamics in teams
Prébot, B.; Schwarz, J.; Fuchs, S.; Claverie, B.
Conference Paper
2020A Gamma Filter for Positive Parameter Estimation
Govaers, F.; Alqaderi, H.
Conference Paper
2020Generalizing the phishing principle: Analyzing user behavior in response to controlled stimuli for IT security awareness assessment
Sykosch, A.; Doll, C.; Wübbeling, M.; Meier, M.
Conference Paper
2020Graph-based model of smart grid architectures
Klaer, B.; Sen, O.; Velde, D. van der; Hacker, I.; Andres, M.; Henze, M.
Conference Paper
2020Guest Editorial: Agent and System Transparency
Chen, J.Y.C.; Flemisch, F.O.; Lyons, J.B.; Neerincx, M.A.
Editorial
2020Heuristic Power Allocation in NOMA-based Overlay Cognitive Radio Network
Airee, N.; Saha, S.; Adrat, M.; Schrammen, M.; Jax, P.
Conference Paper
2020How to Securely Prune Bitcoin's Blockchain
Matzutt, R.; Kalde, B.; Pennekamp, J.; Drichel, A.; Henze, M.; Wehrle, K.
Conference Paper
2020Human-vehicle interaction with a metaphor based collision avoidance interaction pattern
Baltzer, Marcel C.A.; Bloch, Marten; Wasser, Joscha; Flemisch, Frank
Journal Article
2020Identification of Radar Emitter Type with Recurrent Neural Networks
Apfeld, S.; Charlish, A.; Ascheid, G.
Conference Paper
2020The IEC 63047 Standard for Data Transmission in Radiological and Nuclear Robotics Applications
Schneider, F.E.; Wildermuth, D.; Garcia Rosas, F.; Paepen, J.; Lutter, G.
Conference Paper
2020Implementing Perception-Action Cycles using Stochastic Optimization
Charlish, A.; Bell, K.; Kreucher, C.
Conference Paper
2020Improving MAC Protocols for Wireless Industrial Networks via Packet Prioritization and Cooperation
Kirchhof, J.C.; Serror, M.; Glebke, R.; Wehrle, K.
Conference Paper
2020Information security methodology, replication studies and information security education
Wendzel, S.; Caviglione, L.; Checco, A.; Mileva, A.; Lalande, J.-F.; Mazurczyk, W.
Journal Article
2020Information Space Dashboard
Krumbiegel, Theresa; Pritzkau, Albert; Schmitz, Hans-Christian
Conference Paper
2020Inter-network interoperability for heterogeneous networks at the tactical edge
Hauge, M; Mjelde, T.M.; Holtzer, A.; Drijver, F.; In't Velt, R.; Hegland, A.M.; Orbekk, E.; Barz, C.; Kirchhoff, J.; Rogge, H.
Conference Paper
2020An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique
Vogel, D.; Akhmedjanov, U.; Ohm, M.; Meier, M.
Conference Paper
2020Is hybrid AI suited for hybrid threats? Insights from social media analysis
Dragos, V.; Forrester, B.; Rein, K.
Conference Paper
2020Joint Multitarget Tracking and Dynamic Network Localization in the Underwater Domain
Mendrzik, R.; Brambilla, M.; Allmann, C.; Nicoli, M.; Koch, W.; Bauch, G.; LePage, K.; Braca, P.
Conference Paper
2020Joint Registration and Fusion of an Infra-Red Camera and Scanning Radar in a Maritime Context
Cormack, D.; Schlangen, I.; Hopgood, J.R.; Clark, D.E.
Journal Article
2020Kalman filters and batch filters for orbit determination with TIRA
Carloni, C.; Budoni, M.; Cerutti-Maori, D.; Koch, W.
Conference Paper
2020Learning to close the gap: Combining task frame formalism and reinforcement learning for compliant vegetable cutting
Padalkar, A.; Nieuwenhuisen, M.; Schneider, S.; Schulz, D.
Conference Paper
2020Let’s get in touch again: Tangible AI and tangible XR for a more tangible, balanced human systems integration
Flemisch, F.; Bielecki, K.; López Hernández, D.; Meyer, R.; Baier, R.; Herzberger, N.D.; Wasser, J.
Conference Paper
2020Linear time Fourier transforms of Sn-k-invariant functions on the symmetric group Sn
Clausen, M.
Journal Article
2020Methods for actors in the electric power system to prevent, detect and react to ICT attacks and failures
Velde, D. van der; Henze, M.; Kathmann, P.; Wassermann, Erik; Andres, Michael; Bracht, Detert; Ernst, Raphael; Hallak, George; Klaer, Benedikt; Linnartz, Philipp; Meyer, Benjamin; Ofner, Simon; Pletzer, T.; Sethmann, R.
Conference Paper
2020A Mnemonic Kalman Filter for Non-Linear Systems with Extensive Temporal Dependencies
Jung, S.; Schlangen, I.; Charlish, A.
Journal Article
2020Neural Information Bottleneck Decoding
Stark, M.; Lewandowsky, J.; Bauch, G.
Conference Paper
2020A neural network based on first principles
Baggenstoss, P.M.
Conference Paper
2020News Hawk - Beobachten und Analysieren im öffentlichen Informationsraum
Winkelholz, Carsten; Schade, Ulrich
Journal Article
2020A Non-Markovian Prediction for the GM-PHD Filter Based on Recurrent Neural Networks
Schlangen, I.; Jung, S.; Charlish, A.
Conference Paper
2020Not all areas are equal: Analysis of citations in information security research
Wendzel, Steffen; Lévy-Bencheton, Cedric; Caviglione, Luca
Journal Article
2020OAFuser: Online Adaptive Extended Object Tracking and Fusion using automotive Radar Detections
Haag, S.; Duraisamy, B.; Blessing, C.; Koch, W.; Marchthaler, R.; Fritzsche, M.; Dickmann, J.
Conference Paper
2020On Conducting Security Developer Studies with CS Students: Examining a Password-Storage Study with CS Students, Freelancers, and Company Developers
Naiakshina, A.; Danilova, A.; Gerlitz, E.; Smith, M.
Conference Paper
2020On ethically aligned information fusion for defence and security systems
Koch, W.
Conference Paper
2020On open-set classification with L3-net embeddings for machine listening applications
Wilkinghoff, K.
Conference Paper
2020On the importance of adaptive operator training in human-swarm interaction
Hasbach, J.D.; Witte, T.E.F.; Bennewitz, M.
Conference Paper
2020One size does not fit all: A grounded theory and online survey study of developer preferences for securitywarning types
Danilova, A.; Naiakshina, A.; Smith, M.
Conference Paper
2020An Open Source IoT Framework for a Distributed Modular Low-cost Laser-based Sensing Platform
Bauer, J.; Toschke, Y.; Tessmer, A.; Bourdon, B.; Aschenbruck, N.; Imlau, M.
Conference Paper
2020Optimizing Parametrized Information Bottleneck Compression Mappings with Genetic Algorithms
Lewandowsky, J.; Dongare, S.J.; Adrat, M.; Schrammen, M.; Jax, P.
Conference Paper
2020Privacy-Preserving Production Process Parameter Exchange
Pennekamp, J.; Buchholz, E.; Lockner, Y.; Dahlmanns, M.; Xi, T.; Fey, M.; Brecher, C.; Hopmann, C.; Wehrle, K.
Conference Paper
2020Privacy-Preserving Warning Management for an Identity Leakage Warning Network
Kasem-Madani, S.; Malderle, T.; Boes, F.; Meier, M.
Conference Paper
2020Private multi-hop accountability for supply chains
Pennekamp, J.; Bader, L.; Matzutt, R.; Niemietz, P.; Trauth, D.; Henze, M.; Bergs, T.; Wehrle, K.
Conference Paper
2020The projected belief network classifier: Both generative and discriminative
Baggenstoss, P.M.
Conference Paper
2020Quantizing Radio Link Data Rates to Create Ever-Changing Network Conditions in Tactical Networks
Lopes, Roberto Rigolin F.; Loevenich, Johannes; Rettore, Paulo H.L.; Eswarappa, Sharath Maligera; Sevenich, Peter
Journal Article
2020The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation
Henze, M.
Conference Paper
2020Queuing over Ever-changing Communication Scenarios in Tactical Networks
Lopes, Roberto Rigolin F.; Balaraju, Pooja Hanavadi; Rettore, Paulo H.L.; Sevenich, Peter
Journal Article
2020QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation
Serror, M.; Wagner, E.; Glebke, R.; Wehrle, K.
Conference Paper
2020Replication: On the ecological validity of online security developer studies: Exploring deception in a password-storage study with freelancers
Danilova, A.; Naiakshina, A.; Deuter, J.; Smith, M.
Conference Paper
2020Response to the Letter by Fred Daum
Huizing, A.; Charlish, A.; Brüggenwirth, S.
Journal Article
2020Rise of artificial intelligence in military weapons systems
: Beyerer, Jürgen (Editor); Martini, Peter (Editor); Gabel, O.
Report
2020Road Data Enrichment Framework Based on Heterogeneous Data Fusion for ITS
Rettore, P.H.L.; Santos, B.P.; Lopes, R.R.F.; Maia, G.; Villas, L.A.; Loureiro, A.A.F.
Journal Article
2020A Secure and Practical Decentralized Ecosystem for Shareable Education Material
Matzutt, R.; Pennekamp, J.; Wehrle, K.
Conference Paper
2020Secure End-to-End Sensing in Supply Chains
Pennekamp, J.; Alder, F.; Matzutt, R.; Mühlberg, J.T.; Piessens, F.; Wehrle, K.
Conference Paper
2020A Security Reference Model for Autonomous Vehicles in Military Operations
Mancini, F.; Bruvoll, S.; Melrose, J.; Leve, F.; Mailloux, L.; Ernst, R.; Rein, K.; Fioravanti, S.; Merani, D.; Been, R.
Conference Paper
2020Security, availability, and multiple information sources: Exploring update behavior of system administrators
Tiefenau, C.; Häring, M.; Krombholz, K.; Zezschwitz, E. von
Conference Paper
2020Security, Privacy, and Dependability Evaluation in Verification and Validation Life Cycles for Military IoT Systems
Pradhan, M.; Noll, J.
Journal Article
2020Sensor path planning using reinforcement learning
Hoffmann, F.; Charlish, A.; Ritchie, M.; Griffiths, H.
Conference Paper
2020Stamping Process Modelling in an Internet of Production
Niemietz, P.; Pennekamp, J.; Kunze, I.; Trauth, D.; Wehrle, K.; Bergs, T.
Journal Article
2020Study on weld seam geometry control for connected gas metal arc welding systems
Mann, S.; Glebke, R.; Kunze, I.; Scheurenberg, D.; Sharma, R.; Reisgen, U.; Wehrle, K.; Abel, D.
Conference Paper
2020Symbolic Partial-Order Execution for Testing Multi-Threaded Programs
Schemmel, D.; Büning, J.; Rodríguez, C.; Laprell, D.; Wehrle, K.
Conference Paper
2020Technik, die den Soldaten versteht: Das Diagnosewerkzeug "RASMUS" erfasst und bewertet Nutzerzustände in Echtzeit
Schwarz, Jessica; Witt, Oliver
Book Article
2020Technology that understands the soldier. The RASMUS diagnostic tool for recording and evaluating user states in real time
Schwarz, Jessica; Witt, Oliver
Book Article
2020Time-dependent state prediction for the kalman filter based on recurrent neural networks
Jung, S.; Schlangen, I.; Charlish, A.
Conference Paper
2020Towards a Truly Cooperative Guidance and Control: Generic Architecture for Intuitive Human-Machine Cooperation
Usai, M.; Meyer, R.; Nagahara, H.; Takeda, Y.; Flemisch, F.
Conference Paper
2020Towards iteration by design: An interaction design concept for safety critical systems
Witte, T.E.F.; Hasbach, J.; Schwarz, J.; Nitsch, V.
Conference Paper
2020Towards robust speech interfaces for the ISS
Schmitz, Hans-Christian; Kurth, Frank; Wilkinghoff, Kevin; Müllerschkowski, Uwe; Karrasch, Christian; Schmid, Volker
Conference Paper
2020Track down identity leaks using threat intelligence
Malderle, T.; Knauer, S.; Lang, M.; Wübbeling, M.; Meier, M.
Conference Paper
2020TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting
Cadena, W. De La; Mitseva, A.; Hiller, J.; Pennekamp, J.; Reuter, S.; Filter, J.; Engel, T.; Wehrle, K.; Panchenko, A.
Conference Paper
2020Unveiling and Dedication of IEEE Radar Historic Milestone
Griffiths, H.; Knott, P.; Koch, W.
Journal Article
2020Utility Requirement Description for Utility-Preserving and Privacy-Respecting Data Pseudonymization
Kasem-Madani, S.; Meier, M.
Conference Paper
2020Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services
Matzutt, R.; Pennekamp, J.; Buchholz, E.; Wehrle, K.
Conference Paper
2020Verfahren und Vorrichtung zur Raumfilterung zumindest eines autokorrelierten Nutzsignals aus einem Empfangssignal einer Gruppenantenne
Demissie, Bruno
Patent
2020Verfahren zum Ermitteln einer Empfangsrichtung eines akustischen Signals, Auswertungsvorrichtung und System
Wirth, Wulf-Dieter; Varela, Macarena; Oispuu, Marc
Patent
2020Versatile Polar Codes with different Kernel Sizes and Rate Matching approaches
Saha, S.; Adrat, M.
Conference Paper
2020VisDrone-DET2020: The Vision Meets Drone Object Detection in Image Challenge Results
Du, D.; Wen, L.; Zhu, P.; Fan, H.; Hu, Q.; Ling, H.; Shah, M.; Pan, J.; Axenopoulos, A.; Schumann, A.; Psaltis, A.; Jain, A.; Dong, B.; Li, C.; Chen, C.; Duan, C.; Zhang, C.; Stadler, D.; Pailla, D.R.; Yin, D.; Khan, F.; Meng, F.; Gao, G.; Zhang, G.; Chen, H.; Zhou, H.; Xie, H.; Qiu, H.; Li, H.; Athanasiadis, I.; Cui, J.; Zhou, J.; Ko, J.; Lee, J.; Yu, J.; Yoo, J.; Sommer, L.W.; Xiong, L.; Schleiss, M.; Yang, M.-H.; Liu, M.; Zhang, M.; Mandal, M.; Daras, P.; Narang, P.; Liu, Q.; Shi, Q.; Lin, Q.; Ramaprasad, R.; Wang, S.; Mehta, S.; Li, S.; Huang, S.; Moon, S.; Zhao, T.; Sun, T.; Guo, W.; Tian, W.; Qin, W.; Yu, W.; Lin, W.; Zhao, X.; Jia, X.; He, X.; Zhao, X.; Liu, X.; Ding, Y.; Luo, Y.; Xiao, Y.; Wang, Y.; Liu, Y.; Kim, Y.; Sun, Y.; Yao, Y.; Huang, Y.; Gong, Z.; Xu, Z.; Luo, Z.; Cao, Z.; Wei, Z.; Fan, Z.; Song, Z.; Liu, Z.
Conference Paper
2020Vision: I don't want to use my Phone! A Cognitive Walkthrough for YubiKeys
Bischoff, C.; Gerlitz, E.; Smith, M.
Conference Paper
2020Warning of Affected Users About an Identity Leak
Malderle, T.; Wübbeling, M.; Knauer, S.; Meier, M.
Conference Paper