---
_id: '47286'
author:
- first_name: Marco
  full_name: Gutfleisch, Marco
  last_name: Gutfleisch
- first_name: Jan H.
  full_name: Klemmer, Jan H.
  last_name: Klemmer
- first_name: Niklas
  full_name: Busch, Niklas
  last_name: Busch
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: M. Angela
  full_name: Sasse, M. Angela
  last_name: Sasse
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Gutfleisch M, Klemmer JH, Busch N, Acar Y, Sasse MA, Fahl S. How Does Usable
    Security (Not) End Up in Software Products? Results From a Qualitative Interview
    Study. In: <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022</i>. IEEE; 2022:893–910. doi:<a href="https://doi.org/10.1109/SP46214.2022.9833756">10.1109/SP46214.2022.9833756</a>'
  apa: Gutfleisch, M., Klemmer, J. H., Busch, N., Acar, Y., Sasse, M. A., &#38; Fahl,
    S. (2022). How Does Usable Security (Not) End Up in Software Products? Results
    From a Qualitative Interview Study. <i>43rd IEEE Symposium on Security and Privacy,
    SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 893–910. <a href="https://doi.org/10.1109/SP46214.2022.9833756">https://doi.org/10.1109/SP46214.2022.9833756</a>
  bibtex: '@inproceedings{Gutfleisch_Klemmer_Busch_Acar_Sasse_Fahl_2022, title={How
    Does Usable Security (Not) End Up in Software Products? Results From a Qualitative
    Interview Study}, DOI={<a href="https://doi.org/10.1109/SP46214.2022.9833756">10.1109/SP46214.2022.9833756</a>},
    booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Gutfleisch, Marco and Klemmer,
    Jan H. and Busch, Niklas and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha},
    year={2022}, pages={893–910} }'
  chicago: Gutfleisch, Marco, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela
    Sasse, and Sascha Fahl. “How Does Usable Security (Not) End Up in Software Products?
    Results From a Qualitative Interview Study.” In <i>43rd IEEE Symposium on Security
    and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 893–910. IEEE,
    2022. <a href="https://doi.org/10.1109/SP46214.2022.9833756">https://doi.org/10.1109/SP46214.2022.9833756</a>.
  ieee: 'M. Gutfleisch, J. H. Klemmer, N. Busch, Y. Acar, M. A. Sasse, and S. Fahl,
    “How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative
    Interview Study,” in <i>43rd IEEE Symposium on Security and Privacy, SP 2022,
    San Francisco, CA, USA, May 22-26, 2022</i>, 2022, pp. 893–910, doi: <a href="https://doi.org/10.1109/SP46214.2022.9833756">10.1109/SP46214.2022.9833756</a>.'
  mla: Gutfleisch, Marco, et al. “How Does Usable Security (Not) End Up in Software
    Products? Results From a Qualitative Interview Study.” <i>43rd IEEE Symposium
    on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>,
    IEEE, 2022, pp. 893–910, doi:<a href="https://doi.org/10.1109/SP46214.2022.9833756">10.1109/SP46214.2022.9833756</a>.
  short: 'M. Gutfleisch, J.H. Klemmer, N. Busch, Y. Acar, M.A. Sasse, S. Fahl, in:
    43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA,
    May 22-26, 2022, IEEE, 2022, pp. 893–910.'
date_created: 2023-09-22T13:18:54Z
date_updated: 2024-06-05T12:53:00Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46214.2022.9833756
extern: '1'
language:
- iso: eng
page: 893–910
publication: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
  CA, USA, May 22-26, 2022
publisher: IEEE
status: public
title: How Does Usable Security (Not) End Up in Software Products? Results From a
  Qualitative Interview Study
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47287'
author:
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Oliver
  full_name: Wiese, Oliver
  last_name: Wiese
- first_name: Volker
  full_name: Roth, Volker
  last_name: Roth
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Stransky C, Wiese O, Roth V, Acar Y, Fahl S. 27 Years and 81 Million Opportunities
    Later: Investigating the Use of Email Encryption for an Entire University. In:
    <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA,
    May 22-26, 2022</i>. IEEE; 2022:860–875. doi:<a href="https://doi.org/10.1109/SP46214.2022.9833755">10.1109/SP46214.2022.9833755</a>'
  apa: 'Stransky, C., Wiese, O., Roth, V., Acar, Y., &#38; Fahl, S. (2022). 27 Years
    and 81 Million Opportunities Later: Investigating the Use of Email Encryption
    for an Entire University. <i>43rd IEEE Symposium on Security and Privacy, SP 2022,
    San Francisco, CA, USA, May 22-26, 2022</i>, 860–875. <a href="https://doi.org/10.1109/SP46214.2022.9833755">https://doi.org/10.1109/SP46214.2022.9833755</a>'
  bibtex: '@inproceedings{Stransky_Wiese_Roth_Acar_Fahl_2022, title={27 Years and
    81 Million Opportunities Later: Investigating the Use of Email Encryption for
    an Entire University}, DOI={<a href="https://doi.org/10.1109/SP46214.2022.9833755">10.1109/SP46214.2022.9833755</a>},
    booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Stransky, Christian and Wiese,
    Oliver and Roth, Volker and Acar, Yasemin and Fahl, Sascha}, year={2022}, pages={860–875}
    }'
  chicago: 'Stransky, Christian, Oliver Wiese, Volker Roth, Yasemin Acar, and Sascha
    Fahl. “27 Years and 81 Million Opportunities Later: Investigating the Use of Email
    Encryption for an Entire University.” In <i>43rd IEEE Symposium on Security and
    Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 860–875. IEEE,
    2022. <a href="https://doi.org/10.1109/SP46214.2022.9833755">https://doi.org/10.1109/SP46214.2022.9833755</a>.'
  ieee: 'C. Stransky, O. Wiese, V. Roth, Y. Acar, and S. Fahl, “27 Years and 81 Million
    Opportunities Later: Investigating the Use of Email Encryption for an Entire University,”
    in <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA,
    USA, May 22-26, 2022</i>, 2022, pp. 860–875, doi: <a href="https://doi.org/10.1109/SP46214.2022.9833755">10.1109/SP46214.2022.9833755</a>.'
  mla: 'Stransky, Christian, et al. “27 Years and 81 Million Opportunities Later:
    Investigating the Use of Email Encryption for an Entire University.” <i>43rd IEEE
    Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26,
    2022</i>, IEEE, 2022, pp. 860–875, doi:<a href="https://doi.org/10.1109/SP46214.2022.9833755">10.1109/SP46214.2022.9833755</a>.'
  short: 'C. Stransky, O. Wiese, V. Roth, Y. Acar, S. Fahl, in: 43rd IEEE Symposium
    on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, IEEE,
    2022, pp. 860–875.'
date_created: 2023-09-22T13:19:56Z
date_updated: 2024-06-05T12:53:20Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46214.2022.9833755
extern: '1'
language:
- iso: eng
page: 860–875
publication: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
  CA, USA, May 22-26, 2022
publisher: IEEE
status: public
title: '27 Years and 81 Million Opportunities Later: Investigating the Use of Email
  Encryption for an Entire University'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47283'
author:
- first_name: Harjot
  full_name: Kaur, Harjot
  last_name: Kaur
- first_name: Sabrina
  full_name: Amft, Sabrina
  last_name: Amft
- first_name: Daniel
  full_name: Votipka, Daniel
  last_name: Votipka
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Kaur H, Amft S, Votipka D, Acar Y, Fahl S. Where to Recruit for Security Development
    Studies: Comparing Six Software Developer Samples. In: Butler KRB, Thomas K, eds.
    <i>31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August
    10-12, 2022</i>. USENIX Association; 2022:4041–4058.'
  apa: 'Kaur, H., Amft, S., Votipka, D., Acar, Y., &#38; Fahl, S. (2022). Where to
    Recruit for Security Development Studies: Comparing Six Software Developer Samples.
    In K. R. B. Butler &#38; K. Thomas (Eds.), <i>31st USENIX Security Symposium,
    USENIX Security 2022, Boston, MA, USA, August 10-12, 2022</i> (pp. 4041–4058).
    USENIX Association.'
  bibtex: '@inproceedings{Kaur_Amft_Votipka_Acar_Fahl_2022, title={Where to Recruit
    for Security Development Studies: Comparing Six Software Developer Samples}, booktitle={31st
    USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12,
    2022}, publisher={USENIX Association}, author={Kaur, Harjot and Amft, Sabrina
    and Votipka, Daniel and Acar, Yasemin and Fahl, Sascha}, editor={Butler, Kevin
    R. B. and Thomas, Kurt}, year={2022}, pages={4041–4058} }'
  chicago: 'Kaur, Harjot, Sabrina Amft, Daniel Votipka, Yasemin Acar, and Sascha Fahl.
    “Where to Recruit for Security Development Studies: Comparing Six Software Developer
    Samples.” In <i>31st USENIX Security Symposium, USENIX Security 2022, Boston,
    MA, USA, August 10-12, 2022</i>, edited by Kevin R. B. Butler and Kurt Thomas,
    4041–4058. USENIX Association, 2022.'
  ieee: 'H. Kaur, S. Amft, D. Votipka, Y. Acar, and S. Fahl, “Where to Recruit for
    Security Development Studies: Comparing Six Software Developer Samples,” in <i>31st
    USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12,
    2022</i>, 2022, pp. 4041–4058.'
  mla: 'Kaur, Harjot, et al. “Where to Recruit for Security Development Studies: Comparing
    Six Software Developer Samples.” <i>31st USENIX Security Symposium, USENIX Security
    2022, Boston, MA, USA, August 10-12, 2022</i>, edited by Kevin R. B. Butler and
    Kurt Thomas, USENIX Association, 2022, pp. 4041–4058.'
  short: 'H. Kaur, S. Amft, D. Votipka, Y. Acar, S. Fahl, in: K.R.B. Butler, K. Thomas
    (Eds.), 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA,
    August 10-12, 2022, USENIX Association, 2022, pp. 4041–4058.'
date_created: 2023-09-22T13:17:23Z
date_updated: 2024-06-05T12:53:43Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Kevin R. B.
  full_name: Butler, Kevin R. B.
  last_name: Butler
- first_name: Kurt
  full_name: Thomas, Kurt
  last_name: Thomas
extern: '1'
language:
- iso: eng
page: 4041–4058
publication: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA,
  August 10-12, 2022
publisher: USENIX Association
status: public
title: 'Where to Recruit for Security Development Studies: Comparing Six Software
  Developer Samples'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47290'
author:
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Sabrina
  full_name: Amft, Sabrina
  last_name: Amft
- first_name: Marten
  full_name: Oltrogge, Marten
  last_name: Oltrogge
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Huaman N, Amft S, Oltrogge M, Acar Y, Fahl S. They Would Do Better If They
    Worked Together: Interaction Problems Between Password Managers and the Web. <i>IEEE
    Secur Priv</i>. 2022;20(2):49–60. doi:<a href="https://doi.org/10.1109/MSEC.2021.3123795">10.1109/MSEC.2021.3123795</a>'
  apa: 'Huaman, N., Amft, S., Oltrogge, M., Acar, Y., &#38; Fahl, S. (2022). They
    Would Do Better If They Worked Together: Interaction Problems Between Password
    Managers and the Web. <i>IEEE Secur. Priv.</i>, <i>20</i>(2), 49–60. <a href="https://doi.org/10.1109/MSEC.2021.3123795">https://doi.org/10.1109/MSEC.2021.3123795</a>'
  bibtex: '@article{Huaman_Amft_Oltrogge_Acar_Fahl_2022, title={They Would Do Better
    If They Worked Together: Interaction Problems Between Password Managers and the
    Web}, volume={20}, DOI={<a href="https://doi.org/10.1109/MSEC.2021.3123795">10.1109/MSEC.2021.3123795</a>},
    number={2}, journal={IEEE Secur. Priv.}, author={Huaman, Nicolas and Amft, Sabrina
    and Oltrogge, Marten and Acar, Yasemin and Fahl, Sascha}, year={2022}, pages={49–60}
    }'
  chicago: 'Huaman, Nicolas, Sabrina Amft, Marten Oltrogge, Yasemin Acar, and Sascha
    Fahl. “They Would Do Better If They Worked Together: Interaction Problems Between
    Password Managers and the Web.” <i>IEEE Secur. Priv.</i> 20, no. 2 (2022): 49–60.
    <a href="https://doi.org/10.1109/MSEC.2021.3123795">https://doi.org/10.1109/MSEC.2021.3123795</a>.'
  ieee: 'N. Huaman, S. Amft, M. Oltrogge, Y. Acar, and S. Fahl, “They Would Do Better
    If They Worked Together: Interaction Problems Between Password Managers and the
    Web,” <i>IEEE Secur. Priv.</i>, vol. 20, no. 2, pp. 49–60, 2022, doi: <a href="https://doi.org/10.1109/MSEC.2021.3123795">10.1109/MSEC.2021.3123795</a>.'
  mla: 'Huaman, Nicolas, et al. “They Would Do Better If They Worked Together: Interaction
    Problems Between Password Managers and the Web.” <i>IEEE Secur. Priv.</i>, vol.
    20, no. 2, 2022, pp. 49–60, doi:<a href="https://doi.org/10.1109/MSEC.2021.3123795">10.1109/MSEC.2021.3123795</a>.'
  short: N. Huaman, S. Amft, M. Oltrogge, Y. Acar, S. Fahl, IEEE Secur. Priv. 20 (2022)
    49–60.
date_created: 2023-09-22T13:22:05Z
date_updated: 2024-06-05T12:54:05Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/MSEC.2021.3123795
extern: '1'
intvolume: '        20'
issue: '2'
language:
- iso: eng
page: 49–60
publication: IEEE Secur. Priv.
status: public
title: 'They Would Do Better If They Worked Together: Interaction Problems Between
  Password Managers and the Web'
type: journal_article
user_id: '14931'
volume: 20
year: '2022'
...
---
_id: '47843'
author:
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Noah
  full_name: Wohler, Noah
  last_name: Wohler
- first_name: Jan H.
  full_name: Klemmer, Jan H.
  last_name: Klemmer
- first_name: Marcel
  full_name: Fourné, Marcel
  id: '99291'
  last_name: Fourné
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Wermke D, Wohler N, Klemmer JH, Fourné M, Acar Y, Fahl S. Committed to Trust:
    A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects.
    In: <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a
    href="https://doi.org/10.1109/sp46214.2022.9833686">10.1109/sp46214.2022.9833686</a>'
  apa: 'Wermke, D., Wohler, N., Klemmer, J. H., Fourné, M., Acar, Y., &#38; Fahl,
    S. (2022). Committed to Trust: A Qualitative Study on Security &#38;amp; Trust
    in Open Source Software Projects. <i>2022 IEEE Symposium on Security and Privacy
    (SP)</i>. <a href="https://doi.org/10.1109/sp46214.2022.9833686">https://doi.org/10.1109/sp46214.2022.9833686</a>'
  bibtex: '@inproceedings{Wermke_Wohler_Klemmer_Fourné_Acar_Fahl_2022, title={Committed
    to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software
    Projects}, DOI={<a href="https://doi.org/10.1109/sp46214.2022.9833686">10.1109/sp46214.2022.9833686</a>},
    booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Wermke, Dominik and Wohler, Noah and Klemmer, Jan H. and Fourné, Marcel
    and Acar, Yasemin and Fahl, Sascha}, year={2022} }'
  chicago: 'Wermke, Dominik, Noah Wohler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar,
    and Sascha Fahl. “Committed to Trust: A Qualitative Study on Security &#38;amp;
    Trust in Open Source Software Projects.” In <i>2022 IEEE Symposium on Security
    and Privacy (SP)</i>. IEEE, 2022. <a href="https://doi.org/10.1109/sp46214.2022.9833686">https://doi.org/10.1109/sp46214.2022.9833686</a>.'
  ieee: 'D. Wermke, N. Wohler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed
    to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software
    Projects,” 2022, doi: <a href="https://doi.org/10.1109/sp46214.2022.9833686">10.1109/sp46214.2022.9833686</a>.'
  mla: 'Wermke, Dominik, et al. “Committed to Trust: A Qualitative Study on Security
    &#38;amp; Trust in Open Source Software Projects.” <i>2022 IEEE Symposium on Security
    and Privacy (SP)</i>, IEEE, 2022, doi:<a href="https://doi.org/10.1109/sp46214.2022.9833686">10.1109/sp46214.2022.9833686</a>.'
  short: 'D. Wermke, N. Wohler, J.H. Klemmer, M. Fourné, Y. Acar, S. Fahl, in: 2022
    IEEE Symposium on Security and Privacy (SP), IEEE, 2022.'
date_created: 2023-10-06T16:12:18Z
date_updated: 2024-06-05T12:55:32Z
department:
- _id: '858'
doi: 10.1109/sp46214.2022.9833686
extern: '1'
language:
- iso: eng
publication: 2022 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: 'Committed to Trust: A Qualitative Study on Security &amp; Trust in Open Source
  Software Projects'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47288'
author:
- first_name: Jan
  full_name: Jancar, Jan
  last_name: Jancar
- first_name: Marcel
  full_name: Fourné, Marcel
  last_name: Fourné
- first_name: Daniel De Almeida
  full_name: Braga, Daniel De Almeida
  last_name: Braga
- first_name: Mohamed
  full_name: Sabt, Mohamed
  last_name: Sabt
- first_name: Peter
  full_name: Schwabe, Peter
  last_name: Schwabe
- first_name: Gilles
  full_name: Barthe, Gilles
  last_name: Barthe
- first_name: Pierre-Alain
  full_name: Fouque, Pierre-Alain
  last_name: Fouque
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Jancar J, Fourné M, Braga DDA, et al. “They’re not that hard to mitigate”:
    What Cryptographic Library Developers Think About Timing Attacks. In: <i>43rd
    IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26,
    2022</i>. IEEE; 2022:632–649. doi:<a href="https://doi.org/10.1109/SP46214.2022.9833713">10.1109/SP46214.2022.9833713</a>'
  apa: 'Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G.,
    Fouque, P.-A., &#38; Acar, Y. (2022). “They’re not that hard to mitigate”: What
    Cryptographic Library Developers Think About Timing Attacks. <i>43rd IEEE Symposium
    on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>,
    632–649. <a href="https://doi.org/10.1109/SP46214.2022.9833713">https://doi.org/10.1109/SP46214.2022.9833713</a>'
  bibtex: '@inproceedings{Jancar_Fourné_Braga_Sabt_Schwabe_Barthe_Fouque_Acar_2022,
    title={“They’re not that hard to mitigate”: What Cryptographic Library Developers
    Think About Timing Attacks}, DOI={<a href="https://doi.org/10.1109/SP46214.2022.9833713">10.1109/SP46214.2022.9833713</a>},
    booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Jancar, Jan and Fourné, Marcel
    and Braga, Daniel De Almeida and Sabt, Mohamed and Schwabe, Peter and Barthe,
    Gilles and Fouque, Pierre-Alain and Acar, Yasemin}, year={2022}, pages={632–649}
    }'
  chicago: 'Jancar, Jan, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter
    Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘They’re Not That
    Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.”
    In <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA,
    USA, May 22-26, 2022</i>, 632–649. IEEE, 2022. <a href="https://doi.org/10.1109/SP46214.2022.9833713">https://doi.org/10.1109/SP46214.2022.9833713</a>.'
  ieee: 'J. Jancar <i>et al.</i>, “‘They’re not that hard to mitigate’: What Cryptographic
    Library Developers Think About Timing Attacks,” in <i>43rd IEEE Symposium on Security
    and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 2022, pp. 632–649,
    doi: <a href="https://doi.org/10.1109/SP46214.2022.9833713">10.1109/SP46214.2022.9833713</a>.'
  mla: 'Jancar, Jan, et al. “‘They’re Not That Hard to Mitigate’: What Cryptographic
    Library Developers Think About Timing Attacks.” <i>43rd IEEE Symposium on Security
    and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022,
    pp. 632–649, doi:<a href="https://doi.org/10.1109/SP46214.2022.9833713">10.1109/SP46214.2022.9833713</a>.'
  short: 'J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A.
    Fouque, Y. Acar, in: 43rd IEEE Symposium on Security and Privacy, SP 2022, San
    Francisco, CA, USA, May 22-26, 2022, IEEE, 2022, pp. 632–649.'
date_created: 2023-09-22T13:20:28Z
date_updated: 2024-06-05T13:20:54Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46214.2022.9833713
extern: '1'
language:
- iso: eng
page: 632–649
publication: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
  CA, USA, May 22-26, 2022
publisher: IEEE
status: public
title: '"They’re not that hard to mitigate": What Cryptographic Library Developers
  Think About Timing Attacks'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47285'
author:
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Noah
  full_name: Wöhler, Noah
  last_name: Wöhler
- first_name: Jan H.
  full_name: Klemmer, Jan H.
  last_name: Klemmer
- first_name: Marcel
  full_name: Fourné, Marcel
  last_name: Fourné
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Wermke D, Wöhler N, Klemmer JH, Fourné M, Acar Y, Fahl S. Committed to Trust:
    A Qualitative Study on Security &#38; Trust in Open Source Software Projects.
    In: <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA,
    USA, May 22-26, 2022</i>. IEEE; 2022:1880–1896. doi:<a href="https://doi.org/10.1109/SP46214.2022.9833686">10.1109/SP46214.2022.9833686</a>'
  apa: 'Wermke, D., Wöhler, N., Klemmer, J. H., Fourné, M., Acar, Y., &#38; Fahl,
    S. (2022). Committed to Trust: A Qualitative Study on Security &#38; Trust in
    Open Source Software Projects. <i>43rd IEEE Symposium on Security and Privacy,
    SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 1880–1896. <a href="https://doi.org/10.1109/SP46214.2022.9833686">https://doi.org/10.1109/SP46214.2022.9833686</a>'
  bibtex: '@inproceedings{Wermke_Wöhler_Klemmer_Fourné_Acar_Fahl_2022, title={Committed
    to Trust: A Qualitative Study on Security &#38; Trust in Open Source Software
    Projects}, DOI={<a href="https://doi.org/10.1109/SP46214.2022.9833686">10.1109/SP46214.2022.9833686</a>},
    booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Wermke, Dominik and Wöhler,
    Noah and Klemmer, Jan H. and Fourné, Marcel and Acar, Yasemin and Fahl, Sascha},
    year={2022}, pages={1880–1896} }'
  chicago: 'Wermke, Dominik, Noah Wöhler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar,
    and Sascha Fahl. “Committed to Trust: A Qualitative Study on Security &#38; Trust
    in Open Source Software Projects.” In <i>43rd IEEE Symposium on Security and Privacy,
    SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 1880–1896. IEEE, 2022. <a
    href="https://doi.org/10.1109/SP46214.2022.9833686">https://doi.org/10.1109/SP46214.2022.9833686</a>.'
  ieee: 'D. Wermke, N. Wöhler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed
    to Trust: A Qualitative Study on Security &#38; Trust in Open Source Software
    Projects,” in <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022</i>, 2022, pp. 1880–1896, doi: <a href="https://doi.org/10.1109/SP46214.2022.9833686">10.1109/SP46214.2022.9833686</a>.'
  mla: 'Wermke, Dominik, et al. “Committed to Trust: A Qualitative Study on Security
    &#38; Trust in Open Source Software Projects.” <i>43rd IEEE Symposium on Security
    and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022,
    pp. 1880–1896, doi:<a href="https://doi.org/10.1109/SP46214.2022.9833686">10.1109/SP46214.2022.9833686</a>.'
  short: 'D. Wermke, N. Wöhler, J.H. Klemmer, M. Fourné, Y. Acar, S. Fahl, in: 43rd
    IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26,
    2022, IEEE, 2022, pp. 1880–1896.'
date_created: 2023-09-22T13:18:27Z
date_updated: 2024-06-05T13:34:37Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46214.2022.9833686
extern: '1'
language:
- iso: eng
page: 1880–1896
publication: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
  CA, USA, May 22-26, 2022
publisher: IEEE
status: public
title: 'Committed to Trust: A Qualitative Study on Security & Trust in Open Source
  Software Projects'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47284'
author:
- first_name: Collins W.
  full_name: Munyendo, Collins W.
  last_name: Munyendo
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Adam J.
  full_name: Aviv, Adam J.
  last_name: Aviv
citation:
  ama: 'Munyendo CW, Acar Y, Aviv AJ. “Desperate Times Call for Desperate Measures”:
    User Concerns with Mobile Loan Apps in Kenya. In: <i>43rd IEEE Symposium on Security
    and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>. IEEE; 2022:2304–2319.
    doi:<a href="https://doi.org/10.1109/SP46214.2022.9833779">10.1109/SP46214.2022.9833779</a>'
  apa: 'Munyendo, C. W., Acar, Y., &#38; Aviv, A. J. (2022). “Desperate Times Call
    for Desperate Measures”: User Concerns with Mobile Loan Apps in Kenya. <i>43rd
    IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26,
    2022</i>, 2304–2319. <a href="https://doi.org/10.1109/SP46214.2022.9833779">https://doi.org/10.1109/SP46214.2022.9833779</a>'
  bibtex: '@inproceedings{Munyendo_Acar_Aviv_2022, title={“Desperate Times Call for
    Desperate Measures”: User Concerns with Mobile Loan Apps in Kenya}, DOI={<a href="https://doi.org/10.1109/SP46214.2022.9833779">10.1109/SP46214.2022.9833779</a>},
    booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Munyendo, Collins W. and
    Acar, Yasemin and Aviv, Adam J.}, year={2022}, pages={2304–2319} }'
  chicago: 'Munyendo, Collins W., Yasemin Acar, and Adam J. Aviv. “‘Desperate Times
    Call for Desperate Measures’: User Concerns with Mobile Loan Apps in Kenya.” In
    <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA,
    May 22-26, 2022</i>, 2304–2319. IEEE, 2022. <a href="https://doi.org/10.1109/SP46214.2022.9833779">https://doi.org/10.1109/SP46214.2022.9833779</a>.'
  ieee: 'C. W. Munyendo, Y. Acar, and A. J. Aviv, “‘Desperate Times Call for Desperate
    Measures’: User Concerns with Mobile Loan Apps in Kenya,” in <i>43rd IEEE Symposium
    on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>,
    2022, pp. 2304–2319, doi: <a href="https://doi.org/10.1109/SP46214.2022.9833779">10.1109/SP46214.2022.9833779</a>.'
  mla: 'Munyendo, Collins W., et al. “‘Desperate Times Call for Desperate Measures’:
    User Concerns with Mobile Loan Apps in Kenya.” <i>43rd IEEE Symposium on Security
    and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022,
    pp. 2304–2319, doi:<a href="https://doi.org/10.1109/SP46214.2022.9833779">10.1109/SP46214.2022.9833779</a>.'
  short: 'C.W. Munyendo, Y. Acar, A.J. Aviv, in: 43rd IEEE Symposium on Security and
    Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, IEEE, 2022, pp. 2304–2319.'
date_created: 2023-09-22T13:18:01Z
date_updated: 2024-06-05T13:34:58Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46214.2022.9833779
extern: '1'
language:
- iso: eng
page: 2304–2319
publication: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
  CA, USA, May 22-26, 2022
publisher: IEEE
status: public
title: '"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan
  Apps in Kenya'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47281'
author:
- first_name: Alexander
  full_name: Krause, Alexander
  last_name: Krause
- first_name: Jan H.
  full_name: Klemmer, Jan H.
  last_name: Klemmer
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Krause A, Klemmer JH, Huaman N, Wermke D, Acar Y, Fahl S. Committed by Accident:
    Studying Prevention and Remediation Strategies Against Secret Leakage in Source
    Code Repositories. <i>CoRR</i>. 2022;abs/2211.06213. doi:<a href="https://doi.org/10.48550/arXiv.2211.06213">10.48550/arXiv.2211.06213</a>'
  apa: 'Krause, A., Klemmer, J. H., Huaman, N., Wermke, D., Acar, Y., &#38; Fahl,
    S. (2022). Committed by Accident: Studying Prevention and Remediation Strategies
    Against Secret Leakage in Source Code Repositories. <i>CoRR</i>, <i>abs/2211.06213</i>.
    <a href="https://doi.org/10.48550/arXiv.2211.06213">https://doi.org/10.48550/arXiv.2211.06213</a>'
  bibtex: '@article{Krause_Klemmer_Huaman_Wermke_Acar_Fahl_2022, title={Committed
    by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage
    in Source Code Repositories}, volume={abs/2211.06213}, DOI={<a href="https://doi.org/10.48550/arXiv.2211.06213">10.48550/arXiv.2211.06213</a>},
    journal={CoRR}, author={Krause, Alexander and Klemmer, Jan H. and Huaman, Nicolas
    and Wermke, Dominik and Acar, Yasemin and Fahl, Sascha}, year={2022} }'
  chicago: 'Krause, Alexander, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin
    Acar, and Sascha Fahl. “Committed by Accident: Studying Prevention and Remediation
    Strategies Against Secret Leakage in Source Code Repositories.” <i>CoRR</i> abs/2211.06213
    (2022). <a href="https://doi.org/10.48550/arXiv.2211.06213">https://doi.org/10.48550/arXiv.2211.06213</a>.'
  ieee: 'A. Krause, J. H. Klemmer, N. Huaman, D. Wermke, Y. Acar, and S. Fahl, “Committed
    by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage
    in Source Code Repositories,” <i>CoRR</i>, vol. abs/2211.06213, 2022, doi: <a
    href="https://doi.org/10.48550/arXiv.2211.06213">10.48550/arXiv.2211.06213</a>.'
  mla: 'Krause, Alexander, et al. “Committed by Accident: Studying Prevention and
    Remediation Strategies Against Secret Leakage in Source Code Repositories.” <i>CoRR</i>,
    vol. abs/2211.06213, 2022, doi:<a href="https://doi.org/10.48550/arXiv.2211.06213">10.48550/arXiv.2211.06213</a>.'
  short: A. Krause, J.H. Klemmer, N. Huaman, D. Wermke, Y. Acar, S. Fahl, CoRR abs/2211.06213
    (2022).
date_created: 2023-09-22T13:16:33Z
date_updated: 2024-06-05T13:36:09Z
department:
- _id: '34'
- _id: '858'
doi: 10.48550/arXiv.2211.06213
extern: '1'
language:
- iso: eng
publication: CoRR
status: public
title: 'Committed by Accident: Studying Prevention and Remediation Strategies Against
  Secret Leakage in Source Code Repositories'
type: journal_article
user_id: '14931'
volume: abs/2211.06213
year: '2022'
...
---
_id: '46307'
abstract:
- lang: eng
  text: Exploratory Landscape Analysis is a powerful technique for numerically characterizing
    landscapes of single-objective continuous optimization problems. Landscape insights
    are crucial both for problem understanding as well as for assessing benchmark
    set diversity and composition. Despite the irrefutable usefulness of these features,
    they suffer from their own ailments and downsides. Hence, in this work we provide
    a collection of different approaches to characterize optimization landscapes.
    Similar to conventional landscape features, we require a small initial sample.
    However, instead of computing features based on that sample, we develop alternative
    representations of the original sample. These range from point clouds to 2D images
    and, therefore, are entirely feature-free. We demonstrate and validate our devised
    methods on the BBOB testbed and predict, with the help of Deep Learning, the high-level,
    expert-based landscape properties such as the degree of multimodality and the
    existence of funnel structures. The quality of our approaches is on par with methods
    relying on the traditional landscape features. Thereby, we provide an exciting
    new perspective on every research area which utilizes problem information such
    as problem understanding and algorithm design as well as automated algorithm configuration
    and selection.
author:
- first_name: Moritz
  full_name: Seiler, Moritz
  id: '105520'
  last_name: Seiler
- first_name: Raphael Patrick
  full_name: Prager, Raphael Patrick
  last_name: Prager
- first_name: Pascal
  full_name: Kerschke, Pascal
  last_name: Kerschke
- first_name: Heike
  full_name: Trautmann, Heike
  id: '100740'
  last_name: Trautmann
  orcid: 0000-0002-9788-8282
citation:
  ama: 'Seiler M, Prager RP, Kerschke P, Trautmann H. A Collection of Deep Learning-based
    Feature-Free Approaches for Characterizing Single-Objective Continuous Fitness
    Landscapes. In: <i>Proceedings of the Genetic and Evolutionary Computation Conference</i>.
    Association for Computing Machinery; 2022:657–665. doi:<a href="https://doi.org/10.1145/3512290.3528834">10.1145/3512290.3528834</a>'
  apa: Seiler, M., Prager, R. P., Kerschke, P., &#38; Trautmann, H. (2022). A Collection
    of Deep Learning-based Feature-Free Approaches for Characterizing Single-Objective
    Continuous Fitness Landscapes. <i>Proceedings of the Genetic and Evolutionary
    Computation Conference</i>, 657–665. <a href="https://doi.org/10.1145/3512290.3528834">https://doi.org/10.1145/3512290.3528834</a>
  bibtex: '@inproceedings{Seiler_Prager_Kerschke_Trautmann_2022, place={New York,
    NY, USA}, title={A Collection of Deep Learning-based Feature-Free Approaches for
    Characterizing Single-Objective Continuous Fitness Landscapes}, DOI={<a href="https://doi.org/10.1145/3512290.3528834">10.1145/3512290.3528834</a>},
    booktitle={Proceedings of the Genetic and Evolutionary Computation Conference},
    publisher={Association for Computing Machinery}, author={Seiler, Moritz and Prager,
    Raphael Patrick and Kerschke, Pascal and Trautmann, Heike}, year={2022}, pages={657–665}
    }'
  chicago: 'Seiler, Moritz, Raphael Patrick Prager, Pascal Kerschke, and Heike Trautmann.
    “A Collection of Deep Learning-Based Feature-Free Approaches for Characterizing
    Single-Objective Continuous Fitness Landscapes.” In <i>Proceedings of the Genetic
    and Evolutionary Computation Conference</i>, 657–665. New York, NY, USA: Association
    for Computing Machinery, 2022. <a href="https://doi.org/10.1145/3512290.3528834">https://doi.org/10.1145/3512290.3528834</a>.'
  ieee: 'M. Seiler, R. P. Prager, P. Kerschke, and H. Trautmann, “A Collection of
    Deep Learning-based Feature-Free Approaches for Characterizing Single-Objective
    Continuous Fitness Landscapes,” in <i>Proceedings of the Genetic and Evolutionary
    Computation Conference</i>, 2022, pp. 657–665, doi: <a href="https://doi.org/10.1145/3512290.3528834">10.1145/3512290.3528834</a>.'
  mla: Seiler, Moritz, et al. “A Collection of Deep Learning-Based Feature-Free Approaches
    for Characterizing Single-Objective Continuous Fitness Landscapes.” <i>Proceedings
    of the Genetic and Evolutionary Computation Conference</i>, Association for Computing
    Machinery, 2022, pp. 657–665, doi:<a href="https://doi.org/10.1145/3512290.3528834">10.1145/3512290.3528834</a>.
  short: 'M. Seiler, R.P. Prager, P. Kerschke, H. Trautmann, in: Proceedings of the
    Genetic and Evolutionary Computation Conference, Association for Computing Machinery,
    New York, NY, USA, 2022, pp. 657–665.'
date_created: 2023-08-04T07:15:59Z
date_updated: 2024-06-07T07:13:23Z
department:
- _id: '34'
- _id: '819'
doi: 10.1145/3512290.3528834
language:
- iso: eng
page: 657–665
place: New York, NY, USA
publication: Proceedings of the Genetic and Evolutionary Computation Conference
publication_identifier:
  isbn:
  - '9781450392372'
publisher: Association for Computing Machinery
status: public
title: A Collection of Deep Learning-based Feature-Free Approaches for Characterizing
  Single-Objective Continuous Fitness Landscapes
type: conference
user_id: '15504'
year: '2022'
...
---
_id: '46304'
abstract:
- lang: eng
  text: In recent years, feature-based automated algorithm selection using exploratory
    landscape analysis has demonstrated its great potential in single-objective continuous
    black-box optimization. However, feature computation is problem-specific and can
    be costly in terms of computational resources. This paper investigates feature-free
    approaches that rely on state-of-the-art deep learning techniques operating on
    either images or point clouds. We show that point-cloud-based strategies, in particular,
    are highly competitive and also substantially reduce the size of the required
    solver portfolio. Moreover, we highlight the effect and importance of cost-sensitive
    learning in automated algorithm selection models.
author:
- first_name: Raphael Patrick
  full_name: Prager, Raphael Patrick
  last_name: Prager
- first_name: Moritz
  full_name: Seiler, Moritz
  id: '105520'
  last_name: Seiler
- first_name: Heike
  full_name: Trautmann, Heike
  id: '100740'
  last_name: Trautmann
  orcid: 0000-0002-9788-8282
- first_name: Pascal
  full_name: Kerschke, Pascal
  last_name: Kerschke
citation:
  ama: 'Prager RP, Seiler M, Trautmann H, Kerschke P. Automated Algorithm Selection
    in Single-Objective Continuous Optimization: A Comparative Study of Deep Learning
    and Landscape Analysis Methods. In: Rudolph G, Kononova AV, Aguirre H, Kerschke
    P, Ochoa G, Tušar T, eds. <i>Parallel Problem Solving from Nature — PPSN XVII</i>.
    Springer International Publishing; 2022:3–17. doi:<a href="https://doi.org/10.1007/978-3-031-14714-2_1">10.1007/978-3-031-14714-2_1</a>'
  apa: 'Prager, R. P., Seiler, M., Trautmann, H., &#38; Kerschke, P. (2022). Automated
    Algorithm Selection in Single-Objective Continuous Optimization: A Comparative
    Study of Deep Learning and Landscape Analysis Methods. In G. Rudolph, A. V. Kononova,
    H. Aguirre, P. Kerschke, G. Ochoa, &#38; T. Tušar (Eds.), <i>Parallel Problem
    Solving from Nature — PPSN XVII</i> (pp. 3–17). Springer International Publishing.
    <a href="https://doi.org/10.1007/978-3-031-14714-2_1">https://doi.org/10.1007/978-3-031-14714-2_1</a>'
  bibtex: '@inproceedings{Prager_Seiler_Trautmann_Kerschke_2022, place={Cham}, title={Automated
    Algorithm Selection in Single-Objective Continuous Optimization: A Comparative
    Study of Deep Learning and Landscape Analysis Methods}, DOI={<a href="https://doi.org/10.1007/978-3-031-14714-2_1">10.1007/978-3-031-14714-2_1</a>},
    booktitle={Parallel Problem Solving from Nature — PPSN XVII}, publisher={Springer
    International Publishing}, author={Prager, Raphael Patrick and Seiler, Moritz
    and Trautmann, Heike and Kerschke, Pascal}, editor={Rudolph, Günter and Kononova,
    Anna V. and Aguirre, Hernán and Kerschke, Pascal and Ochoa, Gabriela and Tušar,
    Tea}, year={2022}, pages={3–17} }'
  chicago: 'Prager, Raphael Patrick, Moritz Seiler, Heike Trautmann, and Pascal Kerschke.
    “Automated Algorithm Selection in Single-Objective Continuous Optimization: A
    Comparative Study of Deep Learning and Landscape Analysis Methods.” In <i>Parallel
    Problem Solving from Nature — PPSN XVII</i>, edited by Günter Rudolph, Anna V.
    Kononova, Hernán Aguirre, Pascal Kerschke, Gabriela Ochoa, and Tea Tušar, 3–17.
    Cham: Springer International Publishing, 2022. <a href="https://doi.org/10.1007/978-3-031-14714-2_1">https://doi.org/10.1007/978-3-031-14714-2_1</a>.'
  ieee: 'R. P. Prager, M. Seiler, H. Trautmann, and P. Kerschke, “Automated Algorithm
    Selection in Single-Objective Continuous Optimization: A Comparative Study of
    Deep Learning and Landscape Analysis Methods,” in <i>Parallel Problem Solving
    from Nature — PPSN XVII</i>, 2022, pp. 3–17, doi: <a href="https://doi.org/10.1007/978-3-031-14714-2_1">10.1007/978-3-031-14714-2_1</a>.'
  mla: 'Prager, Raphael Patrick, et al. “Automated Algorithm Selection in Single-Objective
    Continuous Optimization: A Comparative Study of Deep Learning and Landscape Analysis
    Methods.” <i>Parallel Problem Solving from Nature — PPSN XVII</i>, edited by Günter
    Rudolph et al., Springer International Publishing, 2022, pp. 3–17, doi:<a href="https://doi.org/10.1007/978-3-031-14714-2_1">10.1007/978-3-031-14714-2_1</a>.'
  short: 'R.P. Prager, M. Seiler, H. Trautmann, P. Kerschke, in: G. Rudolph, A.V.
    Kononova, H. Aguirre, P. Kerschke, G. Ochoa, T. Tušar (Eds.), Parallel Problem
    Solving from Nature — PPSN XVII, Springer International Publishing, Cham, 2022,
    pp. 3–17.'
date_created: 2023-08-04T07:12:33Z
date_updated: 2024-06-07T07:13:47Z
department:
- _id: '34'
- _id: '819'
doi: 10.1007/978-3-031-14714-2_1
editor:
- first_name: Günter
  full_name: Rudolph, Günter
  last_name: Rudolph
- first_name: Anna V.
  full_name: Kononova, Anna V.
  last_name: Kononova
- first_name: Hernán
  full_name: Aguirre, Hernán
  last_name: Aguirre
- first_name: Pascal
  full_name: Kerschke, Pascal
  last_name: Kerschke
- first_name: Gabriela
  full_name: Ochoa, Gabriela
  last_name: Ochoa
- first_name: Tea
  full_name: Tušar, Tea
  last_name: Tušar
language:
- iso: eng
page: 3–17
place: Cham
publication: Parallel Problem Solving from Nature — PPSN XVII
publication_identifier:
  isbn:
  - 978-3-031-14714-2
publisher: Springer International Publishing
status: public
title: 'Automated Algorithm Selection in Single-Objective Continuous Optimization:
  A Comparative Study of Deep Learning and Landscape Analysis Methods'
type: conference
user_id: '15504'
year: '2022'
...
---
_id: '46303'
abstract:
- lang: eng
  text: Social media platforms are essential for information sharing and, thus, prone
    to coordinated dis- and misinformation campaigns. Nevertheless, research in this
    area is hampered by strict data sharing regulations imposed by the platforms,
    resulting in a lack of benchmark data. Previous work focused on circumventing
    these rules by either pseudonymizing the data or sharing fragments. In this work,
    we will address the benchmarking crisis by presenting a methodology that can be
    used to create artificial campaigns out of original campaign building blocks.
    We conduct a proof-of-concept study using the freely available generative language
    model GPT-Neo in this context and demonstrate that the campaign patterns can flexibly
    be adapted to an underlying social media stream and evade state-of-the-art campaign
    detection approaches based on stream clustering. Thus, we not only provide a framework
    for artificial benchmark generation but also demonstrate the possible adversarial
    nature of such benchmarks for challenging and advancing current campaign detection
    methods.
author:
- first_name: Janina Susanne
  full_name: Pohl, Janina Susanne
  last_name: Pohl
- first_name: Dennis
  full_name: Assenmacher, Dennis
  last_name: Assenmacher
- first_name: Moritz
  full_name: Seiler, Moritz
  id: '105520'
  last_name: Seiler
- first_name: Heike
  full_name: Trautmann, Heike
  id: '100740'
  last_name: Trautmann
  orcid: 0000-0002-9788-8282
- first_name: Christian
  full_name: Grimme, Christian
  last_name: Grimme
citation:
  ama: 'Pohl JS, Assenmacher D, Seiler M, Trautmann H, Grimme C. Artificial Social
    Media Campaign Creation for Benchmarking and Challenging Detection Approaches.
    In: the Advancement of Artificial Intelligence (AAAI) Association  for, ed. <i>Workshop
    Proceedings of the 16$^th$ International Conference on Web and Social Media (ICWSM)</i>.
    AAAI Press; 2022:1–10. doi:<a href="https://doi.org/10.36190/2022.91">10.36190/2022.91</a>'
  apa: Pohl, J. S., Assenmacher, D., Seiler, M., Trautmann, H., &#38; Grimme, C. (2022).
    Artificial Social Media Campaign Creation for Benchmarking and Challenging Detection
    Approaches. In  for the Advancement of Artificial Intelligence (AAAI) Association
    (Ed.), <i>Workshop Proceedings of the 16$^th$ International Conference on Web
    and Social Media (ICWSM)</i> (pp. 1–10). AAAI Press. <a href="https://doi.org/10.36190/2022.91">https://doi.org/10.36190/2022.91</a>
  bibtex: '@inproceedings{Pohl_Assenmacher_Seiler_Trautmann_Grimme_2022, place={Palo
    Alto, CA, USA}, title={Artificial Social Media Campaign Creation for Benchmarking
    and Challenging Detection Approaches}, DOI={<a href="https://doi.org/10.36190/2022.91">10.36190/2022.91</a>},
    booktitle={Workshop Proceedings of the 16$^th$ International Conference on Web
    and Social Media (ICWSM)}, publisher={AAAI Press}, author={Pohl, Janina Susanne
    and Assenmacher, Dennis and Seiler, Moritz and Trautmann, Heike and Grimme, Christian},
    editor={the Advancement of Artificial Intelligence (AAAI) Association, for}, year={2022},
    pages={1–10} }'
  chicago: 'Pohl, Janina Susanne, Dennis Assenmacher, Moritz Seiler, Heike Trautmann,
    and Christian Grimme. “Artificial Social Media Campaign Creation for Benchmarking
    and Challenging Detection Approaches.” In <i>Workshop Proceedings of the 16$^th$
    International Conference on Web and Social Media (ICWSM)</i>, edited by for the
    Advancement of Artificial Intelligence (AAAI) Association, 1–10. Palo Alto, CA,
    USA: AAAI Press, 2022. <a href="https://doi.org/10.36190/2022.91">https://doi.org/10.36190/2022.91</a>.'
  ieee: 'J. S. Pohl, D. Assenmacher, M. Seiler, H. Trautmann, and C. Grimme, “Artificial
    Social Media Campaign Creation for Benchmarking and Challenging Detection Approaches,”
    in <i>Workshop Proceedings of the 16$^th$ International Conference on Web and
    Social Media (ICWSM)</i>, 2022, pp. 1–10, doi: <a href="https://doi.org/10.36190/2022.91">10.36190/2022.91</a>.'
  mla: Pohl, Janina Susanne, et al. “Artificial Social Media Campaign Creation for
    Benchmarking and Challenging Detection Approaches.” <i>Workshop Proceedings of
    the 16$^th$ International Conference on Web and Social Media (ICWSM)</i>, edited
    by for the Advancement of Artificial Intelligence (AAAI) Association, AAAI Press,
    2022, pp. 1–10, doi:<a href="https://doi.org/10.36190/2022.91">10.36190/2022.91</a>.
  short: 'J.S. Pohl, D. Assenmacher, M. Seiler, H. Trautmann, C. Grimme, in:  for
    the Advancement of Artificial Intelligence (AAAI) Association (Ed.), Workshop
    Proceedings of the 16$^th$ International Conference on Web and Social Media (ICWSM),
    AAAI Press, Palo Alto, CA, USA, 2022, pp. 1–10.'
date_created: 2023-08-04T07:11:34Z
date_updated: 2024-06-07T07:13:35Z
department:
- _id: '34'
- _id: '819'
doi: 10.36190/2022.91
editor:
- first_name: for
  full_name: the Advancement of Artificial Intelligence (AAAI) Association, for
  last_name: the Advancement of Artificial Intelligence (AAAI) Association
language:
- iso: eng
page: 1–10
place: Palo Alto, CA, USA
publication: Workshop Proceedings of the 16$^th$ International Conference on Web and
  Social Media (ICWSM)
publisher: AAAI Press
status: public
title: Artificial Social Media Campaign Creation for Benchmarking and Challenging
  Detection Approaches
type: conference
user_id: '15504'
year: '2022'
...
---
_id: '46309'
abstract:
- lang: eng
  text: Due to the rise of continuous data-generating applications, analyzing data
    streams has gained increasing attention over the past decades. A core research
    area in stream data is stream classification, which categorizes or detects data
    points within an evolving stream of observations. Areas of stream classification
    are diverse—ranging, e.g., from monitoring sensor data to analyzing a wide range
    of (social) media applications. Research in stream classification is related to
    developing methods that adapt to the changing and potentially volatile data stream.
    It focuses on individual aspects of the stream classification pipeline, e.g.,
    designing suitable algorithm architectures, an efficient train and test procedure,
    or detecting so-called concept drifts. As a result of the many different research
    questions and strands, the field is challenging to grasp, especially for beginners.
    This survey explores, summarizes, and categorizes work within the domain of stream
    classification and identifies core research threads over the past few years. It
    is structured based on the stream classification process to facilitate coordination
    within this complex topic, including common application scenarios and benchmarking
    data sets. Thus, both newcomers to the field and experts who want to widen their
    scope can gain (additional) insight into this research area and find starting
    points and pointers to more in-depth literature on specific issues and research
    directions in the field.
author:
- first_name: Lena
  full_name: Clever, Lena
  last_name: Clever
- first_name: Janina Susanne
  full_name: Pohl, Janina Susanne
  last_name: Pohl
- first_name: Jakob
  full_name: Bossek, Jakob
  id: '102979'
  last_name: Bossek
  orcid: 0000-0002-4121-4668
- first_name: Pascal
  full_name: Kerschke, Pascal
  last_name: Kerschke
- first_name: Heike
  full_name: Trautmann, Heike
  id: '100740'
  last_name: Trautmann
  orcid: 0000-0002-9788-8282
citation:
  ama: 'Clever L, Pohl JS, Bossek J, Kerschke P, Trautmann H. Process-Oriented Stream
    Classification Pipeline: A Literature Review. <i>Applied Sciences</i>. 2022;12(8):1–44.
    doi:<a href="https://doi.org/10.3390/app12189094">10.3390/app12189094</a>'
  apa: 'Clever, L., Pohl, J. S., Bossek, J., Kerschke, P., &#38; Trautmann, H. (2022).
    Process-Oriented Stream Classification Pipeline: A Literature Review. <i>Applied
    Sciences</i>, <i>12</i>(8), 1–44. <a href="https://doi.org/10.3390/app12189094">https://doi.org/10.3390/app12189094</a>'
  bibtex: '@article{Clever_Pohl_Bossek_Kerschke_Trautmann_2022, title={Process-Oriented
    Stream Classification Pipeline: A Literature Review}, volume={12}, DOI={<a href="https://doi.org/10.3390/app12189094">10.3390/app12189094</a>},
    number={8}, journal={Applied Sciences}, author={Clever, Lena and Pohl, Janina
    Susanne and Bossek, Jakob and Kerschke, Pascal and Trautmann, Heike}, year={2022},
    pages={1–44} }'
  chicago: 'Clever, Lena, Janina Susanne Pohl, Jakob Bossek, Pascal Kerschke, and
    Heike Trautmann. “Process-Oriented Stream Classification Pipeline: A Literature
    Review.” <i>Applied Sciences</i> 12, no. 8 (2022): 1–44. <a href="https://doi.org/10.3390/app12189094">https://doi.org/10.3390/app12189094</a>.'
  ieee: 'L. Clever, J. S. Pohl, J. Bossek, P. Kerschke, and H. Trautmann, “Process-Oriented
    Stream Classification Pipeline: A Literature Review,” <i>Applied Sciences</i>,
    vol. 12, no. 8, pp. 1–44, 2022, doi: <a href="https://doi.org/10.3390/app12189094">10.3390/app12189094</a>.'
  mla: 'Clever, Lena, et al. “Process-Oriented Stream Classification Pipeline: A Literature
    Review.” <i>Applied Sciences</i>, vol. 12, no. 8, 2022, pp. 1–44, doi:<a href="https://doi.org/10.3390/app12189094">10.3390/app12189094</a>.'
  short: L. Clever, J.S. Pohl, J. Bossek, P. Kerschke, H. Trautmann, Applied Sciences
    12 (2022) 1–44.
date_created: 2023-08-04T07:17:23Z
date_updated: 2024-06-10T12:02:17Z
department:
- _id: '34'
- _id: '819'
doi: 10.3390/app12189094
intvolume: '        12'
issue: '8'
language:
- iso: eng
page: 1–44
publication: Applied Sciences
status: public
title: 'Process-Oriented Stream Classification Pipeline: A Literature Review'
type: journal_article
user_id: '15504'
volume: 12
year: '2022'
...
---
_id: '46302'
author:
- first_name: J
  full_name: Heins, J
  last_name: Heins
- first_name: J
  full_name: Rook, J
  last_name: Rook
- first_name: L
  full_name: Schäpermeier, L
  last_name: Schäpermeier
- first_name: P
  full_name: Kerschke, P
  last_name: Kerschke
- first_name: Jakob
  full_name: Bossek, Jakob
  id: '102979'
  last_name: Bossek
  orcid: 0000-0002-4121-4668
- first_name: Heike
  full_name: Trautmann, Heike
  id: '100740'
  last_name: Trautmann
  orcid: 0000-0002-9788-8282
citation:
  ama: 'Heins J, Rook J, Schäpermeier L, Kerschke P, Bossek J, Trautmann H. BBE: Basin-Based
    Evaluation of Multimodal Multi-objective Optimization Problems. In: Rudolph G,
    Kononova A, Aguirre H, Kerschke P, Ochoa G, Tušar T, eds. <i>Parallel Problem
    Solving from Nature — PPSN XVII</i>. Springer International Publishing; 2022:192–206.'
  apa: 'Heins, J., Rook, J., Schäpermeier, L., Kerschke, P., Bossek, J., &#38; Trautmann,
    H. (2022). BBE: Basin-Based Evaluation of Multimodal Multi-objective Optimization
    Problems. In G. Rudolph, A. Kononova, H. Aguirre, P. Kerschke, G. Ochoa, &#38;
    T. Tušar (Eds.), <i>Parallel Problem Solving from Nature — PPSN XVII</i> (pp.
    192–206). Springer International Publishing.'
  bibtex: '@inproceedings{Heins_Rook_Schäpermeier_Kerschke_Bossek_Trautmann_2022,
    place={Cham}, title={BBE: Basin-Based Evaluation of Multimodal Multi-objective
    Optimization Problems}, booktitle={Parallel Problem Solving from Nature — PPSN
    XVII}, publisher={Springer International Publishing}, author={Heins, J and Rook,
    J and Schäpermeier, L and Kerschke, P and Bossek, Jakob and Trautmann, Heike},
    editor={Rudolph, G and Kononova, AV and Aguirre, H and Kerschke, P and Ochoa,
    G and Tušar, T}, year={2022}, pages={192–206} }'
  chicago: 'Heins, J, J Rook, L Schäpermeier, P Kerschke, Jakob Bossek, and Heike
    Trautmann. “BBE: Basin-Based Evaluation of Multimodal Multi-Objective Optimization
    Problems.” In <i>Parallel Problem Solving from Nature — PPSN XVII</i>, edited
    by G Rudolph, AV Kononova, H Aguirre, P Kerschke, G Ochoa, and T Tušar, 192–206.
    Cham: Springer International Publishing, 2022.'
  ieee: 'J. Heins, J. Rook, L. Schäpermeier, P. Kerschke, J. Bossek, and H. Trautmann,
    “BBE: Basin-Based Evaluation of Multimodal Multi-objective Optimization Problems,”
    in <i>Parallel Problem Solving from Nature — PPSN XVII</i>, 2022, pp. 192–206.'
  mla: 'Heins, J., et al. “BBE: Basin-Based Evaluation of Multimodal Multi-Objective
    Optimization Problems.” <i>Parallel Problem Solving from Nature — PPSN XVII</i>,
    edited by G Rudolph et al., Springer International Publishing, 2022, pp. 192–206.'
  short: 'J. Heins, J. Rook, L. Schäpermeier, P. Kerschke, J. Bossek, H. Trautmann,
    in: G. Rudolph, A. Kononova, H. Aguirre, P. Kerschke, G. Ochoa, T. Tušar (Eds.),
    Parallel Problem Solving from Nature — PPSN XVII, Springer International Publishing,
    Cham, 2022, pp. 192–206.'
date_created: 2023-08-04T07:10:52Z
date_updated: 2024-06-10T12:02:35Z
department:
- _id: '34'
- _id: '819'
editor:
- first_name: G
  full_name: Rudolph, G
  last_name: Rudolph
- first_name: AV
  full_name: Kononova, AV
  last_name: Kononova
- first_name: H
  full_name: Aguirre, H
  last_name: Aguirre
- first_name: P
  full_name: Kerschke, P
  last_name: Kerschke
- first_name: G
  full_name: Ochoa, G
  last_name: Ochoa
- first_name: T
  full_name: Tušar, T
  last_name: Tušar
language:
- iso: eng
page: 192–206
place: Cham
publication: Parallel Problem Solving from Nature — PPSN XVII
publication_identifier:
  isbn:
  - 978-3-031-14714-2
publisher: Springer International Publishing
status: public
title: 'BBE: Basin-Based Evaluation of Multimodal Multi-objective Optimization Problems'
type: conference
user_id: '15504'
year: '2022'
...
---
_id: '55337'
abstract:
- lang: eng
  text: As AI is more and more pervasive in everyday life, humans have an increasing
    demand to understand its behavior and decisions. Most research on explainable
    AI builds on the premise that there is one ideal explanation to be found. In fact,
    however, everyday explanations are co-constructed in a dialogue between the person
    explaining (the explainer) and the specific person being explained to (the explainee).
    In this paper, we introduce a first corpus of dialogical explanations to enable
    NLP research on how humans explain as well as on how AI can learn to imitate this
    process. The corpus consists of 65 transcribed English dialogues from the Wired
    video series 5 Levels, explaining 13 topics to five explainees of different proficiency.
    All 1550 dialogue turns have been manually labeled by five independent professionals
    for the topic discussed as well as for the dialogue act and the explanation move
    performed. We analyze linguistic patterns of explainers and explainees, and we
    explore differences across proficiency levels. BERT-based baseline results indicate
    that sequence information helps predicting topics, acts, and moves effectively.
author:
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Milad
  full_name: Alshomary, Milad
  id: '73059'
  last_name: Alshomary
citation:
  ama: 'Wachsmuth H, Alshomary M. “Mama Always Had a Way of Explaining Things So I
    Could Understand”: A Dialogue Corpus for Learning to Construct Explanations. In:
    Calzolari N, Huang C-R, Kim H, et al., eds. <i>Proceedings of the 29th International
    Conference on Computational Linguistics</i>. International Committee on Computational
    Linguistics; 2022:344–354.'
  apa: 'Wachsmuth, H., &#38; Alshomary, M. (2022). “Mama Always Had a Way of Explaining
    Things So I Could Understand”: A Dialogue Corpus for Learning to Construct Explanations.
    In N. Calzolari, C.-R. Huang, H. Kim, J. Pustejovsky, L. Wanner, K.-S. Choi, P.-M.
    Ryu, H.-H. Chen, L. Donatelli, H. Ji, S. Kurohashi, P. Paggio, N. Xue, S. Kim,
    Y. Hahm, Z. He, T. K. Lee, E. Santus, F. Bond, &#38; S.-H. Na (Eds.), <i>Proceedings
    of the 29th International Conference on Computational Linguistics</i> (pp. 344–354).
    International Committee on Computational Linguistics.'
  bibtex: '@inproceedings{Wachsmuth_Alshomary_2022, place={Gyeongju, Republic of Korea},
    title={“Mama Always Had a Way of Explaining Things So I Could Understand”: A Dialogue
    Corpus for Learning to Construct Explanations}, booktitle={Proceedings of the
    29th International Conference on Computational Linguistics}, publisher={International
    Committee on Computational Linguistics}, author={Wachsmuth, Henning and Alshomary,
    Milad}, editor={Calzolari, Nicoletta and Huang, Chu-Ren and Kim, Hansaem and Pustejovsky,
    James and Wanner, Leo and Choi, Key-Sun and Ryu, Pum-Mo and Chen, Hsin-Hsi and
    Donatelli, Lucia and Ji, Heng and et al.}, year={2022}, pages={344–354} }'
  chicago: 'Wachsmuth, Henning, and Milad Alshomary. “‘Mama Always Had a Way of Explaining
    Things So I Could Understand’: A Dialogue Corpus for Learning to Construct Explanations.”
    In <i>Proceedings of the 29th International Conference on Computational Linguistics</i>,
    edited by Nicoletta Calzolari, Chu-Ren Huang, Hansaem Kim, James Pustejovsky,
    Leo Wanner, Key-Sun Choi, Pum-Mo Ryu, et al., 344–354. Gyeongju, Republic of Korea:
    International Committee on Computational Linguistics, 2022.'
  ieee: 'H. Wachsmuth and M. Alshomary, “‘Mama Always Had a Way of Explaining Things
    So I Could Understand’: A Dialogue Corpus for Learning to Construct Explanations,”
    in <i>Proceedings of the 29th International Conference on Computational Linguistics</i>,
    2022, pp. 344–354.'
  mla: 'Wachsmuth, Henning, and Milad Alshomary. “‘Mama Always Had a Way of Explaining
    Things So I Could Understand’: A Dialogue Corpus for Learning to Construct Explanations.”
    <i>Proceedings of the 29th International Conference on Computational Linguistics</i>,
    edited by Nicoletta Calzolari et al., International Committee on Computational
    Linguistics, 2022, pp. 344–354.'
  short: 'H. Wachsmuth, M. Alshomary, in: N. Calzolari, C.-R. Huang, H. Kim, J. Pustejovsky,
    L. Wanner, K.-S. Choi, P.-M. Ryu, H.-H. Chen, L. Donatelli, H. Ji, S. Kurohashi,
    P. Paggio, N. Xue, S. Kim, Y. Hahm, Z. He, T.K. Lee, E. Santus, F. Bond, S.-H.
    Na (Eds.), Proceedings of the 29th International Conference on Computational Linguistics,
    International Committee on Computational Linguistics, Gyeongju, Republic of Korea,
    2022, pp. 344–354.'
date_created: 2024-07-22T13:05:42Z
date_updated: 2024-07-26T13:05:45Z
department:
- _id: '600'
- _id: '660'
editor:
- first_name: Nicoletta
  full_name: Calzolari, Nicoletta
  last_name: Calzolari
- first_name: Chu-Ren
  full_name: Huang, Chu-Ren
  last_name: Huang
- first_name: Hansaem
  full_name: Kim, Hansaem
  last_name: Kim
- first_name: James
  full_name: Pustejovsky, James
  last_name: Pustejovsky
- first_name: Leo
  full_name: Wanner, Leo
  last_name: Wanner
- first_name: Key-Sun
  full_name: Choi, Key-Sun
  last_name: Choi
- first_name: Pum-Mo
  full_name: Ryu, Pum-Mo
  last_name: Ryu
- first_name: Hsin-Hsi
  full_name: Chen, Hsin-Hsi
  last_name: Chen
- first_name: Lucia
  full_name: Donatelli, Lucia
  last_name: Donatelli
- first_name: Heng
  full_name: Ji, Heng
  last_name: Ji
- first_name: Sadao
  full_name: Kurohashi, Sadao
  last_name: Kurohashi
- first_name: Patrizia
  full_name: Paggio, Patrizia
  last_name: Paggio
- first_name: Nianwen
  full_name: Xue, Nianwen
  last_name: Xue
- first_name: Seokhwan
  full_name: Kim, Seokhwan
  last_name: Kim
- first_name: Younggyun
  full_name: Hahm, Younggyun
  last_name: Hahm
- first_name: Zhong
  full_name: He, Zhong
  last_name: He
- first_name: Tony Kyungil
  full_name: Lee, Tony Kyungil
  last_name: Lee
- first_name: Enrico
  full_name: Santus, Enrico
  last_name: Santus
- first_name: Francis
  full_name: Bond, Francis
  last_name: Bond
- first_name: Seung-Hoon
  full_name: Na, Seung-Hoon
  last_name: Na
language:
- iso: eng
page: 344–354
place: Gyeongju, Republic of Korea
project:
- _id: '118'
  name: 'TRR 318 - INF: TRR 318 - Project Area INF'
publication: Proceedings of the 29th International Conference on Computational Linguistics
publisher: International Committee on Computational Linguistics
status: public
title: '“Mama Always Had a Way of Explaining Things So I Could Understand”: A Dialogue
  Corpus for Learning to Construct Explanations'
type: conference
user_id: '3900'
year: '2022'
...
---
_id: '34067'
author:
- first_name: Meghdut
  full_name: Sengupta, Meghdut
  id: '99459'
  last_name: Sengupta
- first_name: Milad
  full_name: Alshomary, Milad
  id: '73059'
  last_name: Alshomary
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
citation:
  ama: 'Sengupta M, Alshomary M, Wachsmuth H. Back to the Roots: Predicting the Source
    Domain of Metaphors using Contrastive Learning. In: <i>Proceedings of the 2022
    Workshop on Figurative Language Processing</i>. ; 2022.'
  apa: 'Sengupta, M., Alshomary, M., &#38; Wachsmuth, H. (2022). Back to the Roots:
    Predicting the Source Domain of Metaphors using Contrastive Learning. <i>Proceedings
    of the 2022 Workshop on Figurative Language Processing</i>.'
  bibtex: '@inproceedings{Sengupta_Alshomary_Wachsmuth_2022, title={Back to the Roots:
    Predicting the Source Domain of Metaphors using Contrastive Learning}, booktitle={Proceedings
    of the 2022 Workshop on Figurative Language Processing}, author={Sengupta, Meghdut
    and Alshomary, Milad and Wachsmuth, Henning}, year={2022} }'
  chicago: 'Sengupta, Meghdut, Milad Alshomary, and Henning Wachsmuth. “Back to the
    Roots: Predicting the Source Domain of Metaphors Using Contrastive Learning.”
    In <i>Proceedings of the 2022 Workshop on Figurative Language Processing</i>,
    2022.'
  ieee: 'M. Sengupta, M. Alshomary, and H. Wachsmuth, “Back to the Roots: Predicting
    the Source Domain of Metaphors using Contrastive Learning,” 2022.'
  mla: 'Sengupta, Meghdut, et al. “Back to the Roots: Predicting the Source Domain
    of Metaphors Using Contrastive Learning.” <i>Proceedings of the 2022 Workshop
    on Figurative Language Processing</i>, 2022.'
  short: 'M. Sengupta, M. Alshomary, H. Wachsmuth, in: Proceedings of the 2022 Workshop
    on Figurative Language Processing, 2022.'
date_created: 2022-11-14T08:49:07Z
date_updated: 2024-07-26T13:08:46Z
department:
- _id: '600'
- _id: '660'
language:
- iso: eng
project:
- _id: '127'
  name: 'TRR 318 - C4: TRR 318 - Subproject C4 - Metaphern als Werkzeug des Erklärens'
publication: Proceedings of the 2022 Workshop on Figurative Language Processing
status: public
title: 'Back to the Roots: Predicting the Source Domain of Metaphors using Contrastive
  Learning'
type: conference
user_id: '3900'
year: '2022'
...
---
_id: '35674'
abstract:
- lang: eng
  text: <jats:p>We report on our work with students in our data science courses, focusing
    on the analysis of students’ results. This study represents an in-depth analysis
    of students’ creation and documentation of machine learning models. The students
    were supported by educationally designed Jupyter Notebooks, which are used as
    worked examples. Using the worked example, students document their results in
    a so-called computational essay. We examine which aspects of creating computational
    essays are difficult for students to find out how worked examples should be designed
    to support students without being too prescriptive. We analyze the computational
    essays produced by students and draw consequences for redesigning our worked example.</jats:p>
author:
- first_name: Franz Yannik
  full_name: Fleischer, Franz Yannik
  id: '42660'
  last_name: Fleischer
  orcid: https://orcid.org/0000-0003-0318-0329
- first_name: Sven
  full_name: Hüsing, Sven
  id: '58465'
  last_name: Hüsing
- first_name: Rolf
  full_name: Biehler, Rolf
  id: '16274'
  last_name: Biehler
- first_name: Susanne
  full_name: Podworny, Susanne
  id: '30619'
  last_name: Podworny
  orcid: 0000-0002-6313-5987
- first_name: Carsten
  full_name: Schulte, Carsten
  id: '60311'
  last_name: Schulte
citation:
  ama: 'Fleischer FY, Hüsing S, Biehler R, Podworny S, Schulte C. Jupyter Notebooks
    for Teaching, Learning, and Doing Data Science. In: Peters SA, Zapata-Cardona
    L, Bonafini F, Fan A, eds. <i>Bridging the Gap: Empowering and Educating Today’s
    Learners in Statistics. Proceedings of the Eleventh International Conference on
    Teaching Statistics</i>. International Association for Statistical Education;
    2022. doi:<a href="https://doi.org/10.52041/iase.icots11.t10e3">10.52041/iase.icots11.t10e3</a>'
  apa: 'Fleischer, F. Y., Hüsing, S., Biehler, R., Podworny, S., &#38; Schulte, C.
    (2022). Jupyter Notebooks for Teaching, Learning, and Doing Data Science. In S.
    A. Peters, L. Zapata-Cardona, F. Bonafini, &#38; A. Fan (Eds.), <i>Bridging the
    Gap: Empowering and Educating Today’s Learners in Statistics. Proceedings of the
    Eleventh International Conference on Teaching Statistics</i>. International Association
    for Statistical Education. <a href="https://doi.org/10.52041/iase.icots11.t10e3">https://doi.org/10.52041/iase.icots11.t10e3</a>'
  bibtex: '@inproceedings{Fleischer_Hüsing_Biehler_Podworny_Schulte_2022, title={Jupyter
    Notebooks for Teaching, Learning, and Doing Data Science}, DOI={<a href="https://doi.org/10.52041/iase.icots11.t10e3">10.52041/iase.icots11.t10e3</a>},
    booktitle={Bridging the Gap: Empowering and Educating Today’s Learners in Statistics.
    Proceedings of the Eleventh International Conference on Teaching Statistics},
    publisher={International Association for Statistical Education}, author={Fleischer,
    Franz Yannik and Hüsing, Sven and Biehler, Rolf and Podworny, Susanne and Schulte,
    Carsten}, editor={Peters, S. A. and Zapata-Cardona, L. and Bonafini, F. and Fan,
    A.}, year={2022} }'
  chicago: 'Fleischer, Franz Yannik, Sven Hüsing, Rolf Biehler, Susanne Podworny,
    and Carsten Schulte. “Jupyter Notebooks for Teaching, Learning, and Doing Data
    Science.” In <i>Bridging the Gap: Empowering and Educating Today’s Learners in
    Statistics. Proceedings of the Eleventh International Conference on Teaching Statistics</i>,
    edited by S. A. Peters, L. Zapata-Cardona, F. Bonafini, and A. Fan. International
    Association for Statistical Education, 2022. <a href="https://doi.org/10.52041/iase.icots11.t10e3">https://doi.org/10.52041/iase.icots11.t10e3</a>.'
  ieee: 'F. Y. Fleischer, S. Hüsing, R. Biehler, S. Podworny, and C. Schulte, “Jupyter
    Notebooks for Teaching, Learning, and Doing Data Science,” in <i>Bridging the
    Gap: Empowering and Educating Today’s Learners in Statistics. Proceedings of the
    Eleventh International Conference on Teaching Statistics</i>, 2022, doi: <a href="https://doi.org/10.52041/iase.icots11.t10e3">10.52041/iase.icots11.t10e3</a>.'
  mla: 'Fleischer, Franz Yannik, et al. “Jupyter Notebooks for Teaching, Learning,
    and Doing Data Science.” <i>Bridging the Gap: Empowering and Educating Today’s
    Learners in Statistics. Proceedings of the Eleventh International Conference on
    Teaching Statistics</i>, edited by S. A. Peters et al., International Association
    for Statistical Education, 2022, doi:<a href="https://doi.org/10.52041/iase.icots11.t10e3">10.52041/iase.icots11.t10e3</a>.'
  short: 'F.Y. Fleischer, S. Hüsing, R. Biehler, S. Podworny, C. Schulte, in: S.A.
    Peters, L. Zapata-Cardona, F. Bonafini, A. Fan (Eds.), Bridging the Gap: Empowering
    and Educating Today’s Learners in Statistics. Proceedings of the Eleventh International
    Conference on Teaching Statistics, International Association for Statistical Education,
    2022.'
date_created: 2023-01-10T08:50:47Z
date_updated: 2024-08-21T10:03:47Z
department:
- _id: '363'
- _id: '67'
doi: 10.52041/iase.icots11.t10e3
editor:
- first_name: S. A.
  full_name: Peters, S. A.
  last_name: Peters
- first_name: L.
  full_name: Zapata-Cardona, L.
  last_name: Zapata-Cardona
- first_name: F.
  full_name: Bonafini, F.
  last_name: Bonafini
- first_name: A.
  full_name: Fan, A.
  last_name: Fan
language:
- iso: eng
publication: 'Bridging the Gap: Empowering and Educating Today’s Learners in Statistics.
  Proceedings of the Eleventh International Conference on Teaching Statistics'
publication_status: published
publisher: International Association for Statistical Education
status: public
title: Jupyter Notebooks for Teaching, Learning, and Doing Data Science
type: conference
user_id: '37888'
year: '2022'
...
---
_id: '35672'
abstract:
- lang: eng
  text: <jats:p>This study examines modelling with machine learning. In the context
    of a yearlong data science course, the study explores how upper secondary students
    apply machine learning with Jupyter Notebooks and document the modelling process
    as a computational essay incorporating the different steps of the CRISP-DM cycle.
    The students’ work is based on a teaching module about decision trees in machine
    learning and a worked example of such a modelling process. The study outlines
    the students’ performance in carrying out the machine learning technically and
    reasoning about bias in the data, different data preparation steps, the application
    context, and the resulting decision model. Furthermore, the context of the study
    and the theoretical backgrounds are presented.</jats:p>
article_number: '7'
author:
- first_name: Franz Yannik
  full_name: Fleischer, Franz Yannik
  id: '42660'
  last_name: Fleischer
  orcid: https://orcid.org/0000-0003-0318-0329
- first_name: Rolf
  full_name: Biehler, Rolf
  id: '16274'
  last_name: Biehler
- first_name: Carsten
  full_name: Schulte, Carsten
  id: '60311'
  last_name: Schulte
citation:
  ama: Fleischer FY, Biehler R, Schulte C. Teaching and Learning Data-Driven Machine
    Learning with Educationally Designed Jupyter Notebooks. <i>Statistics Education
    Research Journal</i>. 2022;21(2). doi:<a href="https://doi.org/10.52041/serj.v21i2.61">10.52041/serj.v21i2.61</a>
  apa: Fleischer, F. Y., Biehler, R., &#38; Schulte, C. (2022). Teaching and Learning
    Data-Driven Machine Learning with Educationally Designed Jupyter Notebooks. <i>Statistics
    Education Research Journal</i>, <i>21</i>(2), Article 7. <a href="https://doi.org/10.52041/serj.v21i2.61">https://doi.org/10.52041/serj.v21i2.61</a>
  bibtex: '@article{Fleischer_Biehler_Schulte_2022, title={Teaching and Learning Data-Driven
    Machine Learning with Educationally Designed Jupyter Notebooks}, volume={21},
    DOI={<a href="https://doi.org/10.52041/serj.v21i2.61">10.52041/serj.v21i2.61</a>},
    number={27}, journal={Statistics Education Research Journal}, publisher={International
    Association for Statistical Education}, author={Fleischer, Franz Yannik and Biehler,
    Rolf and Schulte, Carsten}, year={2022} }'
  chicago: Fleischer, Franz Yannik, Rolf Biehler, and Carsten Schulte. “Teaching and
    Learning Data-Driven Machine Learning with Educationally Designed Jupyter Notebooks.”
    <i>Statistics Education Research Journal</i> 21, no. 2 (2022). <a href="https://doi.org/10.52041/serj.v21i2.61">https://doi.org/10.52041/serj.v21i2.61</a>.
  ieee: 'F. Y. Fleischer, R. Biehler, and C. Schulte, “Teaching and Learning Data-Driven
    Machine Learning with Educationally Designed Jupyter Notebooks,” <i>Statistics
    Education Research Journal</i>, vol. 21, no. 2, Art. no. 7, 2022, doi: <a href="https://doi.org/10.52041/serj.v21i2.61">10.52041/serj.v21i2.61</a>.'
  mla: Fleischer, Franz Yannik, et al. “Teaching and Learning Data-Driven Machine
    Learning with Educationally Designed Jupyter Notebooks.” <i>Statistics Education
    Research Journal</i>, vol. 21, no. 2, 7, International Association for Statistical
    Education, 2022, doi:<a href="https://doi.org/10.52041/serj.v21i2.61">10.52041/serj.v21i2.61</a>.
  short: F.Y. Fleischer, R. Biehler, C. Schulte, Statistics Education Research Journal
    21 (2022).
date_created: 2023-01-10T08:48:23Z
date_updated: 2024-08-21T10:04:41Z
department:
- _id: '363'
- _id: '67'
doi: 10.52041/serj.v21i2.61
intvolume: '        21'
issue: '2'
keyword:
- Education
- Statistics and Probability
language:
- iso: eng
publication: Statistics Education Research Journal
publication_identifier:
  issn:
  - 1570-1824
publication_status: published
publisher: International Association for Statistical Education
status: public
title: Teaching and Learning Data-Driven Machine Learning with Educationally Designed
  Jupyter Notebooks
type: journal_article
user_id: '37888'
volume: 21
year: '2022'
...
---
_id: '34716'
author:
- first_name: Philipp
  full_name: Terhörst, Philipp
  id: '97123'
  last_name: Terhörst
- first_name: Jan Niklas
  full_name: Kolf, Jan Niklas
  last_name: Kolf
- first_name: Marco
  full_name: Huber, Marco
  last_name: Huber
- first_name: Florian
  full_name: Kirchbuchner, Florian
  last_name: Kirchbuchner
- first_name: Naser
  full_name: Damer, Naser
  last_name: Damer
- first_name: Aythami Morales
  full_name: Moreno, Aythami Morales
  last_name: Moreno
- first_name: Julian
  full_name: Fierrez, Julian
  last_name: Fierrez
- first_name: Arjan
  full_name: Kuijper, Arjan
  last_name: Kuijper
citation:
  ama: Terhörst P, Kolf JN, Huber M, et al. A Comprehensive Study on Face Recognition
    Biases Beyond Demographics. <i>IEEE Transactions on Technology and Society</i>.
    2022;3(1):16-30. doi:<a href="https://doi.org/10.1109/TTS.2021.3111823">10.1109/TTS.2021.3111823</a>
  apa: Terhörst, P., Kolf, J. N., Huber, M., Kirchbuchner, F., Damer, N., Moreno,
    A. M., Fierrez, J., &#38; Kuijper, A. (2022). A Comprehensive Study on Face Recognition
    Biases Beyond Demographics. <i>IEEE Transactions on Technology and Society</i>,
    <i>3</i>(1), 16–30. <a href="https://doi.org/10.1109/TTS.2021.3111823">https://doi.org/10.1109/TTS.2021.3111823</a>
  bibtex: '@article{Terhörst_Kolf_Huber_Kirchbuchner_Damer_Moreno_Fierrez_Kuijper_2022,
    title={A Comprehensive Study on Face Recognition Biases Beyond Demographics},
    volume={3}, DOI={<a href="https://doi.org/10.1109/TTS.2021.3111823">10.1109/TTS.2021.3111823</a>},
    number={1}, journal={IEEE Transactions on Technology and Society}, author={Terhörst,
    Philipp and Kolf, Jan Niklas and Huber, Marco and Kirchbuchner, Florian and Damer,
    Naser and Moreno, Aythami Morales and Fierrez, Julian and Kuijper, Arjan}, year={2022},
    pages={16–30} }'
  chicago: 'Terhörst, Philipp, Jan Niklas Kolf, Marco Huber, Florian Kirchbuchner,
    Naser Damer, Aythami Morales Moreno, Julian Fierrez, and Arjan Kuijper. “A Comprehensive
    Study on Face Recognition Biases Beyond Demographics.” <i>IEEE Transactions on
    Technology and Society</i> 3, no. 1 (2022): 16–30. <a href="https://doi.org/10.1109/TTS.2021.3111823">https://doi.org/10.1109/TTS.2021.3111823</a>.'
  ieee: 'P. Terhörst <i>et al.</i>, “A Comprehensive Study on Face Recognition Biases
    Beyond Demographics,” <i>IEEE Transactions on Technology and Society</i>, vol.
    3, no. 1, pp. 16–30, 2022, doi: <a href="https://doi.org/10.1109/TTS.2021.3111823">10.1109/TTS.2021.3111823</a>.'
  mla: Terhörst, Philipp, et al. “A Comprehensive Study on Face Recognition Biases
    Beyond Demographics.” <i>IEEE Transactions on Technology and Society</i>, vol.
    3, no. 1, 2022, pp. 16–30, doi:<a href="https://doi.org/10.1109/TTS.2021.3111823">10.1109/TTS.2021.3111823</a>.
  short: P. Terhörst, J.N. Kolf, M. Huber, F. Kirchbuchner, N. Damer, A.M. Moreno,
    J. Fierrez, A. Kuijper, IEEE Transactions on Technology and Society 3 (2022) 16–30.
date_created: 2022-12-21T12:30:34Z
date_updated: 2023-01-17T09:15:42Z
department:
- _id: '761'
doi: 10.1109/TTS.2021.3111823
intvolume: '         3'
issue: '1'
language:
- iso: eng
page: 16-30
publication: IEEE Transactions on Technology and Society
status: public
title: A Comprehensive Study on Face Recognition Biases Beyond Demographics
type: journal_article
user_id: '14931'
volume: 3
year: '2022'
...
---
_id: '34710'
author:
- first_name: Marco
  full_name: Huber, Marco
  last_name: Huber
- first_name: Philipp
  full_name: Terhörst, Philipp
  id: '97123'
  last_name: Terhörst
- first_name: Anh Thi
  full_name: Luu, Anh Thi
  last_name: Luu
- first_name: Florian
  full_name: Kirchbuchner, Florian
  last_name: Kirchbuchner
- first_name: Naser
  full_name: Damer, Naser
  last_name: Damer
citation:
  ama: 'Huber M, Terhörst P, Luu AT, Kirchbuchner F, Damer N. Verification of Sitter
    Identity Across Historical Portrait Paintings by Confidence-aware Face Recognition.
    In: <i>26th International Conference on Pattern Recognition, ICPR 2022, Montreal,
    QC, Canada, August 21-25, 2022</i>. IEEE; 2022:938–944. doi:<a href="https://doi.org/10.1109/ICPR56361.2022.9956452">10.1109/ICPR56361.2022.9956452</a>'
  apa: Huber, M., Terhörst, P., Luu, A. T., Kirchbuchner, F., &#38; Damer, N. (2022).
    Verification of Sitter Identity Across Historical Portrait Paintings by Confidence-aware
    Face Recognition. <i>26th International Conference on Pattern Recognition, ICPR
    2022, Montreal, QC, Canada, August 21-25, 2022</i>, 938–944. <a href="https://doi.org/10.1109/ICPR56361.2022.9956452">https://doi.org/10.1109/ICPR56361.2022.9956452</a>
  bibtex: '@inproceedings{Huber_Terhörst_Luu_Kirchbuchner_Damer_2022, title={Verification
    of Sitter Identity Across Historical Portrait Paintings by Confidence-aware Face
    Recognition}, DOI={<a href="https://doi.org/10.1109/ICPR56361.2022.9956452">10.1109/ICPR56361.2022.9956452</a>},
    booktitle={26th International Conference on Pattern Recognition, ICPR 2022, Montreal,
    QC, Canada, August 21-25, 2022}, publisher={IEEE}, author={Huber, Marco and Terhörst,
    Philipp and Luu, Anh Thi and Kirchbuchner, Florian and Damer, Naser}, year={2022},
    pages={938–944} }'
  chicago: Huber, Marco, Philipp Terhörst, Anh Thi Luu, Florian Kirchbuchner, and
    Naser Damer. “Verification of Sitter Identity Across Historical Portrait Paintings
    by Confidence-Aware Face Recognition.” In <i>26th International Conference on
    Pattern Recognition, ICPR 2022, Montreal, QC, Canada, August 21-25, 2022</i>,
    938–944. IEEE, 2022. <a href="https://doi.org/10.1109/ICPR56361.2022.9956452">https://doi.org/10.1109/ICPR56361.2022.9956452</a>.
  ieee: 'M. Huber, P. Terhörst, A. T. Luu, F. Kirchbuchner, and N. Damer, “Verification
    of Sitter Identity Across Historical Portrait Paintings by Confidence-aware Face
    Recognition,” in <i>26th International Conference on Pattern Recognition, ICPR
    2022, Montreal, QC, Canada, August 21-25, 2022</i>, 2022, pp. 938–944, doi: <a
    href="https://doi.org/10.1109/ICPR56361.2022.9956452">10.1109/ICPR56361.2022.9956452</a>.'
  mla: Huber, Marco, et al. “Verification of Sitter Identity Across Historical Portrait
    Paintings by Confidence-Aware Face Recognition.” <i>26th International Conference
    on Pattern Recognition, ICPR 2022, Montreal, QC, Canada, August 21-25, 2022</i>,
    IEEE, 2022, pp. 938–944, doi:<a href="https://doi.org/10.1109/ICPR56361.2022.9956452">10.1109/ICPR56361.2022.9956452</a>.
  short: 'M. Huber, P. Terhörst, A.T. Luu, F. Kirchbuchner, N. Damer, in: 26th International
    Conference on Pattern Recognition, ICPR 2022, Montreal, QC, Canada, August 21-25,
    2022, IEEE, 2022, pp. 938–944.'
date_created: 2022-12-21T12:25:25Z
date_updated: 2023-01-17T09:19:51Z
department:
- _id: '761'
doi: 10.1109/ICPR56361.2022.9956452
language:
- iso: eng
page: 938–944
publication: 26th International Conference on Pattern Recognition, ICPR 2022, Montreal,
  QC, Canada, August 21-25, 2022
publication_status: published
publisher: IEEE
status: public
title: Verification of Sitter Identity Across Historical Portrait Paintings by Confidence-aware
  Face Recognition
type: conference
user_id: '14931'
year: '2022'
...
