Publications

(2023). No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning. Proc. of USENIX Security Symposium.

Cite URL

(2023). On the Detection of Image-Scaling Attacks in Machine Learning. Proc. of Annual Computer Security Applications Conference (ACSAC).

Cite URL

(2022). Misleading Deep-Fake Detection with GAN Fingerprints. Deep Learning and Security Workshop (DLS).

Cite DOI

(2022). Dos and Don'ts of Machine Learning in Computer Security. Proc. of USENIX Security Symposium.

Cite URL

(2020). Backdooring and Poisoning Neural Networks with Image-Scaling Attacks. Deep Learning and Security Workshop (DLS).

Cite DOI

(2020). Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification.

Cite arXiv

(2020). Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning. Proc. of USENIX Security Symposium.

Cite URL

(2019). On the Security and Applicability of Fragile Camera Fingerprints. Proc. of European Symposium on Research in Computer Security (ESORICS).

Cite DOI

(2019). Misleading Authorship Attribution of Source Code using Adversarial Learning. Proc. of USENIX Security Symposium.

Cite URL

(2018). Privacy-Enhanced Fraud Detection with Bloom Filters. Proc. of Int. Conference on Security and Privacy in Communication Networks (SECURECOMM).

Cite DOI

(2018). Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking. Proc. of IEEE European Symposium on Security and Privacy (EuroS&P).

Cite DOI

(2018). Adversarial Machine Learning Against Digital Watermarking. European Signal Processing Conference (EUSIPCO).

Cite DOI

(2017). Privacy Threats through Ultrasonic Side Channels on Mobile Devices. Proc. of IEEE European Symposium on Security and Privacy (EuroS&P).

Cite DOI

(2016). Bat in the Mobile: A Study on Ultrasonic Device Tracking.

PDF Cite

(2015). Fragile Sensor Fingerprint Camera Identification. IEEE International Workshop on Information Forensics and Security (WIFS).

Cite DOI

(2014). On the Combination of Randomized Thresholds and Non-Parametric Boundaries to Protect Digital Watermarks against Sensitivity Attacks. Proc. of the ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec).

Cite DOI

(2014). Laiengerechte Erzeugung von 3D-Animationen am Beispiel von textuellen Unfallbeschreibungen. Proc. of the International Legal Informatics Symposium (IRIS).

Cite