---
_id: '15738'
author:
- first_name: Tatsuhiko
  full_name: Ohto, Tatsuhiko
  last_name: Ohto
- first_name: Mayank
  full_name: Dodia, Mayank
  last_name: Dodia
- first_name: Jianhang
  full_name: Xu, Jianhang
  last_name: Xu
- first_name: Sho
  full_name: Imoto, Sho
  last_name: Imoto
- first_name: Fujie
  full_name: Tang, Fujie
  last_name: Tang
- first_name: Frederik
  full_name: Zysk, Frederik
  last_name: Zysk
- first_name: Thomas D.
  full_name: Kühne, Thomas D.
  last_name: Kühne
- first_name: Yasuteru
  full_name: Shigeta, Yasuteru
  last_name: Shigeta
- first_name: Mischa
  full_name: Bonn, Mischa
  last_name: Bonn
- first_name: Xifan
  full_name: Wu, Xifan
  last_name: Wu
- first_name: Yuki
  full_name: Nagata, Yuki
  last_name: Nagata
citation:
  ama: Ohto T, Dodia M, Xu J, et al. Accessing the Accuracy of Density Functional
    Theory through Structure and Dynamics of the Water–Air Interface. <i>The Journal
    of Physical Chemistry Letters</i>. 2019;10:4914-4919. doi:<a href="https://doi.org/10.1021/acs.jpclett.9b01983">10.1021/acs.jpclett.9b01983</a>
  apa: Ohto, T., Dodia, M., Xu, J., Imoto, S., Tang, F., Zysk, F., … Nagata, Y. (2019).
    Accessing the Accuracy of Density Functional Theory through Structure and Dynamics
    of the Water–Air Interface. <i>The Journal of Physical Chemistry Letters</i>,
    <i>10</i>, 4914–4919. <a href="https://doi.org/10.1021/acs.jpclett.9b01983">https://doi.org/10.1021/acs.jpclett.9b01983</a>
  bibtex: '@article{Ohto_Dodia_Xu_Imoto_Tang_Zysk_Kühne_Shigeta_Bonn_Wu_et al._2019,
    title={Accessing the Accuracy of Density Functional Theory through Structure and
    Dynamics of the Water–Air Interface}, volume={10}, DOI={<a href="https://doi.org/10.1021/acs.jpclett.9b01983">10.1021/acs.jpclett.9b01983</a>},
    journal={The Journal of Physical Chemistry Letters}, author={Ohto, Tatsuhiko and
    Dodia, Mayank and Xu, Jianhang and Imoto, Sho and Tang, Fujie and Zysk, Frederik
    and Kühne, Thomas D. and Shigeta, Yasuteru and Bonn, Mischa and Wu, Xifan and
    et al.}, year={2019}, pages={4914–4919} }'
  chicago: 'Ohto, Tatsuhiko, Mayank Dodia, Jianhang Xu, Sho Imoto, Fujie Tang, Frederik
    Zysk, Thomas D. Kühne, et al. “Accessing the Accuracy of Density Functional Theory
    through Structure and Dynamics of the Water–Air Interface.” <i>The Journal of
    Physical Chemistry Letters</i> 10 (2019): 4914–19. <a href="https://doi.org/10.1021/acs.jpclett.9b01983">https://doi.org/10.1021/acs.jpclett.9b01983</a>.'
  ieee: T. Ohto <i>et al.</i>, “Accessing the Accuracy of Density Functional Theory
    through Structure and Dynamics of the Water–Air Interface,” <i>The Journal of
    Physical Chemistry Letters</i>, vol. 10, pp. 4914–4919, 2019.
  mla: Ohto, Tatsuhiko, et al. “Accessing the Accuracy of Density Functional Theory
    through Structure and Dynamics of the Water–Air Interface.” <i>The Journal of
    Physical Chemistry Letters</i>, vol. 10, 2019, pp. 4914–19, doi:<a href="https://doi.org/10.1021/acs.jpclett.9b01983">10.1021/acs.jpclett.9b01983</a>.
  short: T. Ohto, M. Dodia, J. Xu, S. Imoto, F. Tang, F. Zysk, T.D. Kühne, Y. Shigeta,
    M. Bonn, X. Wu, Y. Nagata, The Journal of Physical Chemistry Letters 10 (2019)
    4914–4919.
date_created: 2020-01-30T13:14:09Z
date_updated: 2022-01-06T06:52:32Z
department:
- _id: '304'
doi: 10.1021/acs.jpclett.9b01983
intvolume: '        10'
language:
- iso: eng
page: 4914-4919
publication: The Journal of Physical Chemistry Letters
publication_identifier:
  issn:
  - 1948-7185
  - 1948-7185
publication_status: published
status: public
title: Accessing the Accuracy of Density Functional Theory through Structure and Dynamics
  of the Water–Air Interface
type: journal_article
user_id: '71692'
volume: 10
year: '2019'
...
---
_id: '15740'
author:
- first_name: Maxim
  full_name: Guc, Maxim
  last_name: Guc
- first_name: Tim
  full_name: Kodalle, Tim
  last_name: Kodalle
- first_name: Ramya
  full_name: Kormath Madam Raghupathy, Ramya
  id: '71692'
  last_name: Kormath Madam Raghupathy
  orcid: https://orcid.org/0000-0003-4667-9744
- first_name: Hossein
  full_name: Mirhosseini, Hossein
  last_name: Mirhosseini
- first_name: Thomas D.
  full_name: Kühne, Thomas D.
  last_name: Kühne
- first_name: Ignacio
  full_name: Becerril-Romero, Ignacio
  last_name: Becerril-Romero
- first_name: Alejandro
  full_name: Pérez-Rodríguez, Alejandro
  last_name: Pérez-Rodríguez
- first_name: Christian A.
  full_name: Kaufmann, Christian A.
  last_name: Kaufmann
- first_name: Victor
  full_name: Izquierdo-Roca, Victor
  last_name: Izquierdo-Roca
citation:
  ama: 'Guc M, Kodalle T, Kormath Madam Raghupathy R, et al. Vibrational Properties
    of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations. <i>The
    Journal of Physical Chemistry C</i>. 2019;124:1285-1291. doi:<a href="https://doi.org/10.1021/acs.jpcc.9b08781">10.1021/acs.jpcc.9b08781</a>'
  apa: 'Guc, M., Kodalle, T., Kormath Madam Raghupathy, R., Mirhosseini, H., Kühne,
    T. D., Becerril-Romero, I., … Izquierdo-Roca, V. (2019). Vibrational Properties
    of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations. <i>The
    Journal of Physical Chemistry C</i>, <i>124</i>, 1285–1291. <a href="https://doi.org/10.1021/acs.jpcc.9b08781">https://doi.org/10.1021/acs.jpcc.9b08781</a>'
  bibtex: '@article{Guc_Kodalle_Kormath Madam Raghupathy_Mirhosseini_Kühne_Becerril-Romero_Pérez-Rodríguez_Kaufmann_Izquierdo-Roca_2019,
    title={Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle
    Calculations}, volume={124}, DOI={<a href="https://doi.org/10.1021/acs.jpcc.9b08781">10.1021/acs.jpcc.9b08781</a>},
    journal={The Journal of Physical Chemistry C}, author={Guc, Maxim and Kodalle,
    Tim and Kormath Madam Raghupathy, Ramya and Mirhosseini, Hossein and Kühne, Thomas
    D. and Becerril-Romero, Ignacio and Pérez-Rodríguez, Alejandro and Kaufmann, Christian
    A. and Izquierdo-Roca, Victor}, year={2019}, pages={1285–1291} }'
  chicago: 'Guc, Maxim, Tim Kodalle, Ramya Kormath Madam Raghupathy, Hossein Mirhosseini,
    Thomas D. Kühne, Ignacio Becerril-Romero, Alejandro Pérez-Rodríguez, Christian
    A. Kaufmann, and Victor Izquierdo-Roca. “Vibrational Properties of RbInSe2: Raman
    Scattering Spectroscopy and First-Principle Calculations.” <i>The Journal of Physical
    Chemistry C</i> 124 (2019): 1285–91. <a href="https://doi.org/10.1021/acs.jpcc.9b08781">https://doi.org/10.1021/acs.jpcc.9b08781</a>.'
  ieee: 'M. Guc <i>et al.</i>, “Vibrational Properties of RbInSe2: Raman Scattering
    Spectroscopy and First-Principle Calculations,” <i>The Journal of Physical Chemistry
    C</i>, vol. 124, pp. 1285–1291, 2019.'
  mla: 'Guc, Maxim, et al. “Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy
    and First-Principle Calculations.” <i>The Journal of Physical Chemistry C</i>,
    vol. 124, 2019, pp. 1285–91, doi:<a href="https://doi.org/10.1021/acs.jpcc.9b08781">10.1021/acs.jpcc.9b08781</a>.'
  short: M. Guc, T. Kodalle, R. Kormath Madam Raghupathy, H. Mirhosseini, T.D. Kühne,
    I. Becerril-Romero, A. Pérez-Rodríguez, C.A. Kaufmann, V. Izquierdo-Roca, The
    Journal of Physical Chemistry C 124 (2019) 1285–1291.
date_created: 2020-01-30T13:23:09Z
date_updated: 2022-01-06T06:52:32Z
department:
- _id: '304'
doi: 10.1021/acs.jpcc.9b08781
intvolume: '       124'
language:
- iso: eng
page: 1285-1291
project:
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: The Journal of Physical Chemistry C
publication_identifier:
  issn:
  - 1932-7447
  - 1932-7455
publication_status: published
status: public
title: 'Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle
  Calculations'
type: journal_article
user_id: '71051'
volume: 124
year: '2019'
...
---
_id: '15741'
abstract:
- lang: eng
  text: "\r\nIn many cyber–physical systems, we encounter the problem of remote state
    estimation of geo- graphically distributed and remote physical processes. This
    paper studies the scheduling of sensor transmissions to estimate the states of
    multiple remote, dynamic processes. Information from the different sensors has
    to be transmitted to a central gateway over a wireless network for monitoring
    purposes, where typically fewer wireless channels are available than there are
    processes to be monitored. For effective estimation at the gateway, the sensors
    need to be scheduled appropriately, i.e., at each time instant one needs to decide
    which sensors have network access and which ones do not. To address this scheduling
    problem, we formulate an associated Markov decision process (MDP). This MDP is
    then solved using a Deep Q-Network, a recent deep reinforcement learning algorithm
    that is at once scalable and model-free. We compare our scheduling algorithm to
    popular scheduling algorithms such as round-robin and reduced-waiting-time, among
    others. Our algorithm is shown to significantly outperform these algorithms for
    many example scenario"
article_number: '108759'
author:
- first_name: Alex S.
  full_name: Leong, Alex S.
  last_name: Leong
- first_name: Arunselvan
  full_name: Ramaswamy, Arunselvan
  id: '66937'
  last_name: Ramaswamy
  orcid: https://orcid.org/ 0000-0001-7547-8111
- first_name: Daniel E.
  full_name: Quevedo, Daniel E.
  last_name: Quevedo
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
- first_name: Ling
  full_name: Shi, Ling
  last_name: Shi
citation:
  ama: Leong AS, Ramaswamy A, Quevedo DE, Karl H, Shi L. Deep reinforcement learning
    for wireless sensor scheduling in cyber–physical systems. <i>Automatica</i>. 2019.
    doi:<a href="https://doi.org/10.1016/j.automatica.2019.108759">10.1016/j.automatica.2019.108759</a>
  apa: Leong, A. S., Ramaswamy, A., Quevedo, D. E., Karl, H., &#38; Shi, L. (2019).
    Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems.
    <i>Automatica</i>. <a href="https://doi.org/10.1016/j.automatica.2019.108759">https://doi.org/10.1016/j.automatica.2019.108759</a>
  bibtex: '@article{Leong_Ramaswamy_Quevedo_Karl_Shi_2019, title={Deep reinforcement
    learning for wireless sensor scheduling in cyber–physical systems}, DOI={<a href="https://doi.org/10.1016/j.automatica.2019.108759">10.1016/j.automatica.2019.108759</a>},
    number={108759}, journal={Automatica}, author={Leong, Alex S. and Ramaswamy, Arunselvan
    and Quevedo, Daniel E. and Karl, Holger and Shi, Ling}, year={2019} }'
  chicago: Leong, Alex S., Arunselvan Ramaswamy, Daniel E. Quevedo, Holger Karl, and
    Ling Shi. “Deep Reinforcement Learning for Wireless Sensor Scheduling in Cyber–Physical
    Systems.” <i>Automatica</i>, 2019. <a href="https://doi.org/10.1016/j.automatica.2019.108759">https://doi.org/10.1016/j.automatica.2019.108759</a>.
  ieee: A. S. Leong, A. Ramaswamy, D. E. Quevedo, H. Karl, and L. Shi, “Deep reinforcement
    learning for wireless sensor scheduling in cyber–physical systems,” <i>Automatica</i>,
    2019.
  mla: Leong, Alex S., et al. “Deep Reinforcement Learning for Wireless Sensor Scheduling
    in Cyber–Physical Systems.” <i>Automatica</i>, 108759, 2019, doi:<a href="https://doi.org/10.1016/j.automatica.2019.108759">10.1016/j.automatica.2019.108759</a>.
  short: A.S. Leong, A. Ramaswamy, D.E. Quevedo, H. Karl, L. Shi, Automatica (2019).
date_created: 2020-01-31T15:55:27Z
date_updated: 2022-01-06T06:52:32Z
ddc:
- '000'
department:
- _id: '7'
- _id: '34'
- _id: '3'
- _id: '75'
- _id: '57'
doi: 10.1016/j.automatica.2019.108759
file:
- access_level: closed
  content_type: application/pdf
  creator: hkarl
  date_created: 2020-01-31T15:57:50Z
  date_updated: 2020-01-31T15:57:50Z
  file_id: '15743'
  file_name: leoram20a.pdf
  file_size: '675382'
  relation: main_file
  success: 1
file_date_updated: 2020-01-31T15:57:50Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '24'
  name: Netzgewahre Regelung & regelungsgewahre Netze
publication: Automatica
publication_identifier:
  issn:
  - 0005-1098
publication_status: published
quality_controlled: '1'
status: public
title: Deep reinforcement learning for wireless sensor scheduling in cyber–physical
  systems
type: journal_article
user_id: '126'
year: '2019'
...
---
_id: '15746'
author:
- first_name: Oliver
  full_name: Otte, Oliver
  last_name: Otte
citation:
  ama: Otte O. <i>Outsourced Decryption of Attribute-Based Ciphertexts</i>.; 2019.
  apa: Otte, O. (2019). <i>Outsourced Decryption of Attribute-based Ciphertexts</i>.
  bibtex: '@book{Otte_2019, title={Outsourced Decryption of Attribute-based Ciphertexts},
    author={Otte, Oliver}, year={2019} }'
  chicago: Otte, Oliver. <i>Outsourced Decryption of Attribute-Based Ciphertexts</i>,
    2019.
  ieee: O. Otte, <i>Outsourced Decryption of Attribute-based Ciphertexts</i>. 2019.
  mla: Otte, Oliver. <i>Outsourced Decryption of Attribute-Based Ciphertexts</i>.
    2019.
  short: O. Otte, Outsourced Decryption of Attribute-Based Ciphertexts, 2019.
date_created: 2020-02-03T09:43:19Z
date_updated: 2022-01-06T06:52:32Z
department:
- _id: '64'
language:
- iso: eng
status: public
title: Outsourced Decryption of Attribute-based Ciphertexts
type: mastersthesis
user_id: '13703'
year: '2019'
...
---
_id: '15747'
author:
- first_name: Nico Christof
  full_name: Wördenweber, Nico Christof
  last_name: Wördenweber
citation:
  ama: Wördenweber NC. <i>On the Security of the Rouselakis-Waters Ciphertext-Policy
    Attribute-Based Encryption Scheme in the Random Oracle Model</i>.; 2019.
  apa: Wördenweber, N. C. (2019). <i>On the Security of the Rouselakis-Waters Ciphertext-Policy
    Attribute-Based Encryption Scheme in the Random Oracle Model</i>.
  bibtex: '@book{Wördenweber_2019, title={On the Security of the Rouselakis-Waters
    Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model},
    author={Wördenweber, Nico Christof}, year={2019} }'
  chicago: Wördenweber, Nico Christof. <i>On the Security of the Rouselakis-Waters
    Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model</i>,
    2019.
  ieee: N. C. Wördenweber, <i>On the Security of the Rouselakis-Waters Ciphertext-Policy
    Attribute-Based Encryption Scheme in the Random Oracle Model</i>. 2019.
  mla: Wördenweber, Nico Christof. <i>On the Security of the Rouselakis-Waters Ciphertext-Policy
    Attribute-Based Encryption Scheme in the Random Oracle Model</i>. 2019.
  short: N.C. Wördenweber, On the Security of the Rouselakis-Waters Ciphertext-Policy
    Attribute-Based Encryption Scheme in the Random Oracle Model, 2019.
date_created: 2020-02-03T09:45:01Z
date_updated: 2022-01-06T06:52:32Z
department:
- _id: '64'
language:
- iso: eng
status: public
title: On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based
  Encryption Scheme in the Random Oracle Model
type: bachelorsthesis
user_id: '13703'
year: '2019'
...
---
_id: '15812'
abstract:
- lang: eng
  text: Connectionist temporal classification (CTC) is a sequence-level loss that
    has been successfully applied to train recurrent neural network (RNN) models for
    automatic speech recognition. However, one major weakness of CTC is the conditional
    independence assumption that makes it difficult for the model to learn label dependencies.
    In this paper, we propose stimulated CTC, which uses stimulated learning to help
    CTC models learn label dependencies implicitly by using an auxiliary RNN to generate
    the appropriate stimuli. This stimuli comes in the form of an additional stimulation
    loss term which encourages the model to learn said label dependencies. The auxiliary
    network is only used during training and the inference model has the same structure
    as a standard CTC model. The proposed stimulated CTC model achieves about 35%
    relative character error rate improvements on a synthetic gesture keyboard recognition
    task and over 30% relative word error rate improvements on the Librispeech automatic
    speech recognition tasks over a baseline model trained with CTC only.
author:
- first_name: Jahn
  full_name: Heymann, Jahn
  last_name: Heymann
- first_name: Bo Li
  full_name: Khe Chai Sim, Bo Li
  last_name: Khe Chai Sim
citation:
  ama: 'Heymann J, Khe Chai Sim BL. Improving CTC Using Stimulated Learning for Sequence
    Modeling. In: <i>ICASSP 2019, Brighton, UK</i>. ; 2019.'
  apa: Heymann, J., &#38; Khe Chai Sim, B. L. (2019). Improving CTC Using Stimulated
    Learning for Sequence Modeling. In <i>ICASSP 2019, Brighton, UK</i>.
  bibtex: '@inproceedings{Heymann_Khe Chai Sim_2019, title={Improving CTC Using Stimulated
    Learning for Sequence Modeling}, booktitle={ICASSP 2019, Brighton, UK}, author={Heymann,
    Jahn and Khe Chai Sim, Bo Li}, year={2019} }'
  chicago: Heymann, Jahn, and Bo Li Khe Chai Sim. “Improving CTC Using Stimulated
    Learning for Sequence Modeling.” In <i>ICASSP 2019, Brighton, UK</i>, 2019.
  ieee: J. Heymann and B. L. Khe Chai Sim, “Improving CTC Using Stimulated Learning
    for Sequence Modeling,” in <i>ICASSP 2019, Brighton, UK</i>, 2019.
  mla: Heymann, Jahn, and Bo Li Khe Chai Sim. “Improving CTC Using Stimulated Learning
    for Sequence Modeling.” <i>ICASSP 2019, Brighton, UK</i>, 2019.
  short: 'J. Heymann, B.L. Khe Chai Sim, in: ICASSP 2019, Brighton, UK, 2019.'
date_created: 2020-02-06T07:22:47Z
date_updated: 2022-01-06T06:52:35Z
ddc:
- '000'
department:
- _id: '54'
file:
- access_level: open_access
  content_type: application/pdf
  creator: huesera
  date_created: 2020-02-06T07:24:26Z
  date_updated: 2020-02-06T07:24:26Z
  file_id: '15813'
  file_name: ICASSP_2019_Heymann_1_Paper.pdf
  file_size: 239665
  relation: main_file
file_date_updated: 2020-02-06T07:24:26Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
project:
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: ICASSP 2019, Brighton, UK
status: public
title: Improving CTC Using Stimulated Learning for Sequence Modeling
type: conference
user_id: '59789'
year: '2019'
...
---
_id: '15816'
abstract:
- lang: eng
  text: 'Despite the strong modeling power of neural network acoustic models, speech
    enhancement has been shown to deliver additional word error rate improvements
    if multi-channel data is available. However, there has been a longstanding debate
    whether enhancement should also be carried out on the ASR training data. In an
    extensive experimental evaluation on the acoustically very challenging CHiME-5
    dinner party data we show that: (i) cleaning up the training data can lead to
    substantial error rate reductions, and (ii) enhancement in training is advisable
    as long as enhancement in test is at least as strong as in training. This approach
    stands in contrast and delivers larger gains than the common strategy reported
    in the literature to augment the training database with additional artificially
    degraded speech. Together with an acoustic model topology consisting of initial
    CNN layers followed by factorized TDNN layers we achieve with 41.6% and 43.2%
    WER on the DEV and EVAL test sets, respectively, a new single-system state-of-the-art
    result on the CHiME-5 data. This is a 8% relative improvement compared to the
    best word error rate published so far for a speech recognizer without system combination.'
author:
- first_name: Catalin
  full_name: Zorila, Catalin
  last_name: Zorila
- first_name: Christoph
  full_name: Boeddeker, Christoph
  id: '40767'
  last_name: Boeddeker
- first_name: Rama
  full_name: Doddipatla, Rama
  last_name: Doddipatla
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: 'Zorila C, Boeddeker C, Doddipatla R, Haeb-Umbach R. An Investigation Into
    the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party
    Transcription. In: <i>ASRU 2019, Sentosa, Singapore</i>. ; 2019.'
  apa: Zorila, C., Boeddeker, C., Doddipatla, R., &#38; Haeb-Umbach, R. (2019). An
    Investigation Into the Effectiveness of Enhancement in ASR Training and Test for
    Chime-5 Dinner Party Transcription. In <i>ASRU 2019, Sentosa, Singapore</i>.
  bibtex: '@inproceedings{Zorila_Boeddeker_Doddipatla_Haeb-Umbach_2019, title={An
    Investigation Into the Effectiveness of Enhancement in ASR Training and Test for
    Chime-5 Dinner Party Transcription}, booktitle={ASRU 2019, Sentosa, Singapore},
    author={Zorila, Catalin and Boeddeker, Christoph and Doddipatla, Rama and Haeb-Umbach,
    Reinhold}, year={2019} }'
  chicago: Zorila, Catalin, Christoph Boeddeker, Rama Doddipatla, and Reinhold Haeb-Umbach.
    “An Investigation Into the Effectiveness of Enhancement in ASR Training and Test
    for Chime-5 Dinner Party Transcription.” In <i>ASRU 2019, Sentosa, Singapore</i>,
    2019.
  ieee: C. Zorila, C. Boeddeker, R. Doddipatla, and R. Haeb-Umbach, “An Investigation
    Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner
    Party Transcription,” in <i>ASRU 2019, Sentosa, Singapore</i>, 2019.
  mla: Zorila, Catalin, et al. “An Investigation Into the Effectiveness of Enhancement
    in ASR Training and Test for Chime-5 Dinner Party Transcription.” <i>ASRU 2019,
    Sentosa, Singapore</i>, 2019.
  short: 'C. Zorila, C. Boeddeker, R. Doddipatla, R. Haeb-Umbach, in: ASRU 2019, Sentosa,
    Singapore, 2019.'
date_created: 2020-02-06T07:35:08Z
date_updated: 2022-01-06T06:52:37Z
ddc:
- '000'
department:
- _id: '54'
file:
- access_level: open_access
  content_type: application/pdf
  creator: huesera
  date_created: 2020-02-06T07:42:42Z
  date_updated: 2020-02-06T07:42:42Z
  file_id: '15817'
  file_name: ASRU_2019_Boeddeker_Paper.pdf
  file_size: 200256
  relation: main_file
- access_level: open_access
  content_type: application/pdf
  creator: huesera
  date_created: 2020-02-06T07:42:55Z
  date_updated: 2020-02-06T07:42:55Z
  file_id: '15818'
  file_name: ASRU_2019_Boeddeker_Poster.pdf
  file_size: 123963
  relation: main_file
file_date_updated: 2020-02-06T07:42:55Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
project:
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: ASRU 2019, Sentosa, Singapore
status: public
title: An Investigation Into the Effectiveness of Enhancement in ASR Training and
  Test for Chime-5 Dinner Party Transcription
type: conference
user_id: '59789'
year: '2019'
...
---
_id: '15819'
author:
- first_name: Matthias
  full_name: Leutnant, Matthias
  last_name: Leutnant
citation:
  ama: Leutnant M. <i>Experimentelle Untersuchung Des SEM-Algorithmus</i>.; 2019.
  apa: Leutnant, M. (2019). <i>Experimentelle Untersuchung des SEM-Algorithmus</i>.
  bibtex: '@book{Leutnant_2019, title={Experimentelle Untersuchung des SEM-Algorithmus},
    author={Leutnant, Matthias}, year={2019} }'
  chicago: Leutnant, Matthias. <i>Experimentelle Untersuchung Des SEM-Algorithmus</i>,
    2019.
  ieee: M. Leutnant, <i>Experimentelle Untersuchung des SEM-Algorithmus</i>. 2019.
  mla: Leutnant, Matthias. <i>Experimentelle Untersuchung Des SEM-Algorithmus</i>.
    2019.
  short: M. Leutnant, Experimentelle Untersuchung Des SEM-Algorithmus, 2019.
date_created: 2020-02-06T08:51:51Z
date_updated: 2022-01-06T06:52:37Z
department:
- _id: '64'
language:
- iso: eng
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Experimentelle Untersuchung des SEM-Algorithmus
type: bachelorsthesis
user_id: '13291'
year: '2019'
...
---
_id: '15838'
abstract:
- lang: eng
  text: In the field of software analysis a trade-off between scalability and accuracy
    always exists. In this respect, Android app analysis is no exception, in particular,
    analyzing large or many apps can be challenging. Dealing with many small apps
    is a typical challenge when facing micro-benchmarks such as DROIDBENCH or ICC-BENCH.
    These particular benchmarks are not only used for the evaluation of novel tools
    but also in continuous integration pipelines of existing mature tools to maintain
    and guarantee a certain quality-level. Considering this latter usage it becomes
    very important to be able to achieve benchmark results as fast as possible. Hence,
    benchmarks have to be optimized for this purpose. One approach to do so is app
    merging. We implemented the Android Merge Tool (AMT) following this approach and
    show that its novel aspects can be used to produce scaled up and accurate benchmarks.
    For such benchmarks Android app analysis tools do not suffer from the scalability-accuracy
    trade-off anymore. We show this throughout detailed experiments on DROIDBENCH
    employing three different analysis tools (AMANDROID, ICCTA, FLOWDROID). Benchmark
    execution times are largely reduced without losing benchmark accuracy. Moreover,
    we argue why AMT is an advantageous successor of the state-of-the-art app merging
    tool (APKCOMBINER) in analysis lift-up scenarios.
author:
- first_name: Felix
  full_name: Pauck, Felix
  id: '22398'
  last_name: Pauck
- first_name: Shikun
  full_name: Zhang, Shikun
  last_name: Zhang
citation:
  ama: 'Pauck F, Zhang S. Android App Merging for Benchmark Speed-Up and Analysis
    Lift-Up. In: <i>2019 34th IEEE/ACM International Conference on Automated Software
    Engineering Workshop (ASEW)</i>. ; 2019. doi:<a href="https://doi.org/10.1109/asew.2019.00019">10.1109/asew.2019.00019</a>'
  apa: Pauck, F., &#38; Zhang, S. (2019). Android App Merging for Benchmark Speed-Up
    and Analysis Lift-Up. In <i>2019 34th IEEE/ACM International Conference on Automated
    Software Engineering Workshop (ASEW)</i>. <a href="https://doi.org/10.1109/asew.2019.00019">https://doi.org/10.1109/asew.2019.00019</a>
  bibtex: '@inproceedings{Pauck_Zhang_2019, title={Android App Merging for Benchmark
    Speed-Up and Analysis Lift-Up}, DOI={<a href="https://doi.org/10.1109/asew.2019.00019">10.1109/asew.2019.00019</a>},
    booktitle={2019 34th IEEE/ACM International Conference on Automated Software Engineering
    Workshop (ASEW)}, author={Pauck, Felix and Zhang, Shikun}, year={2019} }'
  chicago: Pauck, Felix, and Shikun Zhang. “Android App Merging for Benchmark Speed-Up
    and Analysis Lift-Up.” In <i>2019 34th IEEE/ACM International Conference on Automated
    Software Engineering Workshop (ASEW)</i>, 2019. <a href="https://doi.org/10.1109/asew.2019.00019">https://doi.org/10.1109/asew.2019.00019</a>.
  ieee: F. Pauck and S. Zhang, “Android App Merging for Benchmark Speed-Up and Analysis
    Lift-Up,” in <i>2019 34th IEEE/ACM International Conference on Automated Software
    Engineering Workshop (ASEW)</i>, 2019.
  mla: Pauck, Felix, and Shikun Zhang. “Android App Merging for Benchmark Speed-Up
    and Analysis Lift-Up.” <i>2019 34th IEEE/ACM International Conference on Automated
    Software Engineering Workshop (ASEW)</i>, 2019, doi:<a href="https://doi.org/10.1109/asew.2019.00019">10.1109/asew.2019.00019</a>.
  short: 'F. Pauck, S. Zhang, in: 2019 34th IEEE/ACM International Conference on Automated
    Software Engineering Workshop (ASEW), 2019.'
date_created: 2020-02-06T17:06:51Z
date_updated: 2022-01-06T06:52:38Z
ddc:
- '004'
department:
- _id: '77'
doi: 10.1109/asew.2019.00019
file:
- access_level: closed
  content_type: application/pdf
  creator: fpauck
  date_created: 2020-02-06T17:09:45Z
  date_updated: 2020-02-06T17:09:45Z
  file_id: '15839'
  file_name: AMT_final.pdf
  file_size: 644517
  relation: main_file
file_date_updated: 2020-02-06T17:09:45Z
has_accepted_license: '1'
keyword:
- Program Analysis
- Android App Analysis
- Taint Analysis
- App Merging
- Benchmark
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '12'
  name: SFB 901 - Subproject B4
publication: 2019 34th IEEE/ACM International Conference on Automated Software Engineering
  Workshop (ASEW)
publication_identifier:
  isbn:
  - '9781728141367'
publication_status: published
status: public
title: Android App Merging for Benchmark Speed-Up and Analysis Lift-Up
type: conference
user_id: '477'
year: '2019'
...
---
_id: '15875'
author:
- first_name: Alan Adam
  full_name: Camberg, Alan Adam
  id: '60544'
  last_name: Camberg
- first_name: Thomas
  full_name: Tröster, Thomas
  id: '553'
  last_name: Tröster
- first_name: F.
  full_name: Bohner, F.
  last_name: Bohner
- first_name: J.
  full_name: Tölle, J.
  last_name: Tölle
citation:
  ama: 'Camberg AA, Tröster T, Bohner F, Tölle J. Predicting plasticity and fracture
    of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb fracture
    model in sheet forming applications. <i>IOP Conference Series: Materials Science
    and Engineering</i>. 2019;651:012057. doi:<a href="https://doi.org/10.1088/1757-899X/651/1/012057">10.1088/1757-899X/651/1/012057</a>'
  apa: 'Camberg, A. A., Tröster, T., Bohner, F., &#38; Tölle, J. (2019). Predicting
    plasticity and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus
    and Hosford-Coulomb fracture model in sheet forming applications. <i>IOP Conference
    Series: Materials Science and Engineering</i>, <i>651</i>, 012057. <a href="https://doi.org/10.1088/1757-899X/651/1/012057">https://doi.org/10.1088/1757-899X/651/1/012057</a>'
  bibtex: '@article{Camberg_Tröster_Bohner_Tölle_2019, title={Predicting plasticity
    and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb
    fracture model in sheet forming applications}, volume={651}, DOI={<a href="https://doi.org/10.1088/1757-899X/651/1/012057">10.1088/1757-899X/651/1/012057</a>},
    journal={IOP Conference Series: Materials Science and Engineering}, author={Camberg,
    Alan Adam and Tröster, Thomas and Bohner, F. and Tölle, J.}, year={2019}, pages={012057}
    }'
  chicago: 'Camberg, Alan Adam, Thomas Tröster, F. Bohner, and J. Tölle. “Predicting
    Plasticity and Fracture of Severe Pre-Strained EN AW-5182 by Yld2000 Yield Locus
    and Hosford-Coulomb Fracture Model in Sheet Forming Applications.” <i>IOP Conference
    Series: Materials Science and Engineering</i> 651 (2019): 012057. <a href="https://doi.org/10.1088/1757-899X/651/1/012057">https://doi.org/10.1088/1757-899X/651/1/012057</a>.'
  ieee: 'A. A. Camberg, T. Tröster, F. Bohner, and J. Tölle, “Predicting plasticity
    and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb
    fracture model in sheet forming applications,” <i>IOP Conference Series: Materials
    Science and Engineering</i>, vol. 651, p. 012057, 2019.'
  mla: 'Camberg, Alan Adam, et al. “Predicting Plasticity and Fracture of Severe Pre-Strained
    EN AW-5182 by Yld2000 Yield Locus and Hosford-Coulomb Fracture Model in Sheet
    Forming Applications.” <i>IOP Conference Series: Materials Science and Engineering</i>,
    vol. 651, 2019, p. 012057, doi:<a href="https://doi.org/10.1088/1757-899X/651/1/012057">10.1088/1757-899X/651/1/012057</a>.'
  short: 'A.A. Camberg, T. Tröster, F. Bohner, J. Tölle, IOP Conference Series: Materials
    Science and Engineering 651 (2019) 012057.'
date_created: 2020-02-11T10:21:57Z
date_updated: 2022-01-06T06:52:39Z
department:
- _id: '9'
- _id: '321'
- _id: '149'
doi: 10.1088/1757-899X/651/1/012057
intvolume: '       651'
language:
- iso: eng
page: '012057'
project:
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: 'IOP Conference Series: Materials Science and Engineering'
publication_identifier:
  issn:
  - 1757-899X
status: public
title: Predicting plasticity and fracture of severe pre-strained EN AW-5182 by Yld2000
  yield locus and Hosford-Coulomb fracture model in sheet forming applications
type: journal_article
user_id: '60544'
volume: 651
year: '2019'
...
---
_id: '15883'
author:
- first_name: Shankar
  full_name: Kumar Jeyakumar, Shankar
  last_name: Kumar Jeyakumar
citation:
  ama: Kumar Jeyakumar S. <i>Incremental Learning with Support Vector Machine on Embedded
    Platforms</i>.; 2019.
  apa: Kumar Jeyakumar, S. (2019). <i>Incremental learning with Support Vector Machine
    on embedded platforms</i>.
  bibtex: '@book{Kumar Jeyakumar_2019, title={Incremental learning with Support Vector
    Machine on embedded platforms}, author={Kumar Jeyakumar, Shankar}, year={2019}
    }'
  chicago: Kumar Jeyakumar, Shankar. <i>Incremental Learning with Support Vector Machine
    on Embedded Platforms</i>, 2019.
  ieee: S. Kumar Jeyakumar, <i>Incremental learning with Support Vector Machine on
    embedded platforms</i>. 2019.
  mla: Kumar Jeyakumar, Shankar. <i>Incremental Learning with Support Vector Machine
    on Embedded Platforms</i>. 2019.
  short: S. Kumar Jeyakumar, Incremental Learning with Support Vector Machine on Embedded
    Platforms, 2019.
date_created: 2020-02-11T16:43:38Z
date_updated: 2022-01-06T06:52:39Z
department:
- _id: '78'
language:
- iso: eng
status: public
supervisor:
- first_name: Hassan
  full_name: Ghasemzadeh Mohammadi, Hassan
  id: '61186'
  last_name: Ghasemzadeh Mohammadi
title: Incremental learning with Support Vector Machine on embedded platforms
type: mastersthesis
user_id: '61186'
year: '2019'
...
---
_id: '15908'
author:
- first_name: Jens
  full_name: Müller, Jens
  last_name: Müller
- first_name: Marcus
  full_name: Brinkmann, Marcus
  last_name: Brinkmann
- first_name: Damian
  full_name: Poddebniak, Damian
  last_name: Poddebniak
- first_name: Hanno
  full_name: Böck, Hanno
  last_name: Böck
- first_name: Sebastian
  full_name: Schinzel, Sebastian
  last_name: Schinzel
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Müller J, Brinkmann M, Poddebniak D, et al. “Johnny, you are fired!” -- Spoofing
    OpenPGP and S/MIME Signatures in Emails. In: <i>28th {USENIX} Security Symposium
    ({USENIX} Security 19)</i>. Santa Clara, CA: {USENIX} Association; 2019:1011-1028.'
  apa: 'Müller, J., Brinkmann, M., Poddebniak, D., Böck, H., Schinzel, S., Somorovsky,
    J., &#38; Schwenk, J. (2019). “Johnny, you are fired!” -- Spoofing OpenPGP and
    S/MIME Signatures in Emails. In <i>28th {USENIX} Security Symposium ({USENIX}
    Security 19)</i> (pp. 1011–1028). Santa Clara, CA: {USENIX} Association.'
  bibtex: '@inproceedings{Müller_Brinkmann_Poddebniak_Böck_Schinzel_Somorovsky_Schwenk_2019,
    place={Santa Clara, CA}, title={“Johnny, you are fired!” -- Spoofing OpenPGP and
    S/MIME Signatures in Emails}, booktitle={28th {USENIX} Security Symposium ({USENIX}
    Security 19)}, publisher={{USENIX} Association}, author={Müller, Jens and Brinkmann,
    Marcus and Poddebniak, Damian and Böck, Hanno and Schinzel, Sebastian and Somorovsky,
    Juraj and Schwenk, Jörg}, year={2019}, pages={1011–1028} }'
  chicago: 'Müller, Jens, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian
    Schinzel, Juraj Somorovsky, and Jörg Schwenk. “‘Johnny, You Are Fired!’ -- Spoofing
    OpenPGP and S/MIME Signatures in Emails.” In <i>28th {USENIX} Security Symposium
    ({USENIX} Security 19)</i>, 1011–28. Santa Clara, CA: {USENIX} Association, 2019.'
  ieee: J. Müller <i>et al.</i>, “‘Johnny, you are fired!’ -- Spoofing OpenPGP and
    S/MIME Signatures in Emails,” in <i>28th {USENIX} Security Symposium ({USENIX}
    Security 19)</i>, 2019, pp. 1011–1028.
  mla: Müller, Jens, et al. “‘Johnny, You Are Fired!’ -- Spoofing OpenPGP and S/MIME
    Signatures in Emails.” <i>28th {USENIX} Security Symposium ({USENIX} Security
    19)</i>, {USENIX} Association, 2019, pp. 1011–28.
  short: 'J. Müller, M. Brinkmann, D. Poddebniak, H. Böck, S. Schinzel, J. Somorovsky,
    J. Schwenk, in: 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX}
    Association, Santa Clara, CA, 2019, pp. 1011–1028.'
date_created: 2020-02-15T09:50:57Z
date_updated: 2022-01-06T06:52:40Z
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.usenix.org/conference/usenixsecurity19/presentation/muller
oa: '1'
page: 1011-1028
place: Santa Clara, CA
publication: 28th {USENIX} Security Symposium ({USENIX} Security 19)
publication_identifier:
  isbn:
  - 978-1-939133-06-9
publisher: '{USENIX} Association'
status: public
title: '"Johnny, you are fired!" -- Spoofing OpenPGP and S/MIME Signatures in Emails'
type: conference
user_id: '83504'
year: '2019'
...
---
_id: '15909'
author:
- first_name: Robert
  full_name: Merget, Robert
  last_name: Merget
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Nimrod
  full_name: Aviram, Nimrod
  last_name: Aviram
- first_name: Craig
  full_name: Young, Craig
  last_name: Young
- first_name: Janis
  full_name: Fliegenschmidt, Janis
  last_name: Fliegenschmidt
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
- first_name: Yuval
  full_name: Shavitt, Yuval
  last_name: Shavitt
citation:
  ama: 'Merget R, Somorovsky J, Aviram N, et al. Scalable Scanning and Automatic Classification
    of TLS Padding Oracle Vulnerabilities. In: <i>28th {USENIX} Security Symposium
    ({USENIX} Security 19)</i>. Santa Clara, CA: {USENIX} Association; 2019:1029-1046.'
  apa: 'Merget, R., Somorovsky, J., Aviram, N., Young, C., Fliegenschmidt, J., Schwenk,
    J., &#38; Shavitt, Y. (2019). Scalable Scanning and Automatic Classification of
    TLS Padding Oracle Vulnerabilities. In <i>28th {USENIX} Security Symposium ({USENIX}
    Security 19)</i> (pp. 1029–1046). Santa Clara, CA: {USENIX} Association.'
  bibtex: '@inproceedings{Merget_Somorovsky_Aviram_Young_Fliegenschmidt_Schwenk_Shavitt_2019,
    place={Santa Clara, CA}, title={Scalable Scanning and Automatic Classification
    of TLS Padding Oracle Vulnerabilities}, booktitle={28th {USENIX} Security Symposium
    ({USENIX} Security 19)}, publisher={{USENIX} Association}, author={Merget, Robert
    and Somorovsky, Juraj and Aviram, Nimrod and Young, Craig and Fliegenschmidt,
    Janis and Schwenk, Jörg and Shavitt, Yuval}, year={2019}, pages={1029–1046} }'
  chicago: 'Merget, Robert, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt,
    Jörg Schwenk, and Yuval Shavitt. “Scalable Scanning and Automatic Classification
    of TLS Padding Oracle Vulnerabilities.” In <i>28th {USENIX} Security Symposium
    ({USENIX} Security 19)</i>, 1029–46. Santa Clara, CA: {USENIX} Association, 2019.'
  ieee: R. Merget <i>et al.</i>, “Scalable Scanning and Automatic Classification of
    TLS Padding Oracle Vulnerabilities,” in <i>28th {USENIX} Security Symposium ({USENIX}
    Security 19)</i>, 2019, pp. 1029–1046.
  mla: Merget, Robert, et al. “Scalable Scanning and Automatic Classification of TLS
    Padding Oracle Vulnerabilities.” <i>28th {USENIX} Security Symposium ({USENIX}
    Security 19)</i>, {USENIX} Association, 2019, pp. 1029–46.
  short: 'R. Merget, J. Somorovsky, N. Aviram, C. Young, J. Fliegenschmidt, J. Schwenk,
    Y. Shavitt, in: 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX}
    Association, Santa Clara, CA, 2019, pp. 1029–1046.'
date_created: 2020-02-15T09:51:09Z
date_updated: 2022-01-06T06:52:40Z
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.usenix.org/conference/usenixsecurity19/presentation/merget
oa: '1'
page: 1029-1046
place: Santa Clara, CA
publication: 28th {USENIX} Security Symposium ({USENIX} Security 19)
publication_identifier:
  isbn:
  - 978-1-939133-06-9
publisher: '{USENIX} Association'
status: public
title: Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities
type: conference
user_id: '83504'
year: '2019'
...
---
_id: '15910'
author:
- first_name: Nils
  full_name: Engelbertz, Nils
  last_name: Engelbertz
- first_name: Vladislav
  full_name: Mladenov, Vladislav
  last_name: Mladenov
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: David
  full_name: Herring, David
  last_name: Herring
- first_name: Nurullah
  full_name: Erinola, Nurullah
  last_name: Erinola
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Engelbertz N, Mladenov V, Somorovsky J, Herring D, Erinola N, Schwenk J. Security
    Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In:
    Roßnagel H, Wagner S, Hühnlein D, eds. <i>Open Identity Summit 2019</i>. Gesellschaft
    für Informatik, Bonn; 2019:95-106.'
  apa: Engelbertz, N., Mladenov, V., Somorovsky, J., Herring, D., Erinola, N., &#38;
    Schwenk, J. (2019). Security Analysis of XAdES Validation in the CEF Digital Signature
    Services (DSS). In H. Roßnagel, S. Wagner, &#38; D. Hühnlein (Eds.), <i>Open Identity
    Summit 2019</i> (pp. 95–106). Gesellschaft für Informatik, Bonn.
  bibtex: '@inproceedings{Engelbertz_Mladenov_Somorovsky_Herring_Erinola_Schwenk_2019,
    title={Security Analysis of XAdES Validation in the CEF Digital Signature Services
    (DSS)}, booktitle={Open Identity Summit 2019}, publisher={Gesellschaft für Informatik,
    Bonn}, author={Engelbertz, Nils and Mladenov, Vladislav and Somorovsky, Juraj
    and Herring, David and Erinola, Nurullah and Schwenk, Jörg}, editor={Roßnagel,
    Heiko and Wagner, Sven and Hühnlein, DetlefEditors}, year={2019}, pages={95–106}
    }'
  chicago: Engelbertz, Nils, Vladislav Mladenov, Juraj Somorovsky, David Herring,
    Nurullah Erinola, and Jörg Schwenk. “Security Analysis of XAdES Validation in
    the CEF Digital Signature Services (DSS).” In <i>Open Identity Summit 2019</i>,
    edited by Heiko Roßnagel, Sven Wagner, and Detlef Hühnlein, 95–106. Gesellschaft
    für Informatik, Bonn, 2019.
  ieee: N. Engelbertz, V. Mladenov, J. Somorovsky, D. Herring, N. Erinola, and J.
    Schwenk, “Security Analysis of XAdES Validation in the CEF Digital Signature Services
    (DSS),” in <i>Open Identity Summit 2019</i>, 2019, pp. 95–106.
  mla: Engelbertz, Nils, et al. “Security Analysis of XAdES Validation in the CEF
    Digital Signature Services (DSS).” <i>Open Identity Summit 2019</i>, edited by
    Heiko Roßnagel et al., Gesellschaft für Informatik, Bonn, 2019, pp. 95–106.
  short: 'N. Engelbertz, V. Mladenov, J. Somorovsky, D. Herring, N. Erinola, J. Schwenk,
    in: H. Roßnagel, S. Wagner, D. Hühnlein (Eds.), Open Identity Summit 2019, Gesellschaft
    für Informatik, Bonn, 2019, pp. 95–106.'
date_created: 2020-02-15T10:01:05Z
date_updated: 2022-01-06T06:52:40Z
editor:
- first_name: Heiko
  full_name: Roßnagel, Heiko
  last_name: Roßnagel
- first_name: Sven
  full_name: Wagner, Sven
  last_name: Wagner
- first_name: Detlef
  full_name: Hühnlein, Detlef
  last_name: Hühnlein
language:
- iso: eng
page: ' 95-106 '
publication: Open Identity Summit 2019
publisher: Gesellschaft für Informatik, Bonn
status: public
title: Security Analysis of XAdES Validation in the CEF Digital Signature Services
  (DSS)
type: conference
user_id: '83504'
year: '2019'
...
---
_id: '15920'
abstract:
- lang: eng
  text: "Secure hardware design is the most important aspect to be considered in addition
    to functional correctness. Achieving hardware security in today’s globalized Integrated
    Cir- cuit(IC) supply chain is a challenging task. One solution that is widely
    considered to help achieve secure hardware designs is Information Flow Tracking(IFT).
    It provides an ap- proach to verify that the systems adhere to security properties
    either by static verification during design phase or dynamic checking during runtime.\r\nProof-Carrying
    Hardware(PCH) is an approach to verify a functional design prior to using it in
    hardware. It is a two-party verification approach, where the target party, the
    consumer requests new functionalities with pre-defined properties to the producer.
    In response, the producer designs the IP (Intellectual Property) cores with the
    requested functionalities that adhere to the consumer-defined properties. The
    producer provides the IP cores and a proof certificate combined into a proof-carrying
    bitstream to the consumer to verify it. If the verification is successful, the
    consumer can use the IP cores in his hardware. In essence, the consumer can only
    run verified IP cores. Correctly applied, PCH techniques can help consumers to
    defend against many unintentional modifications and malicious alterations of the
    modules they receive. There are numerous published examples of how to use PCH
    to detect any change in the functionality of a circuit, i.e., pairing a PCH approach
    with functional equivalence checking for combinational or sequential circuits.
    For non-functional properties, since opening new covert channels to leak secret
    information from secure circuits is a viable attack vector for hardware trojans,
    i.e., intentionally added malicious circuitry, IFT technique is employed to make
    sure that secret/untrusted information never reaches any unclassified/trusted
    outputs.\r\nThis master thesis aims to explore the possibility of adapting Information
    Flow Tracking into a Proof-Carrying Hardware scenario. It aims to create a method
    that combines Infor- mation Flow Tracking(IFT) with a PCH approach at bitstream
    level enabling consumers to validate the trustworthiness of a module’s information
    flow without the computational costs of a complete flow analysis."
author:
- first_name: Monica
  full_name: Keerthipati, Monica
  last_name: Keerthipati
citation:
  ama: Keerthipati M. <i>A Bitstream-Level Proof-Carrying Hardware Technique for Information
    Flow Tracking</i>. Universität Paderborn; 2019.
  apa: Keerthipati, M. (2019). <i>A Bitstream-Level Proof-Carrying Hardware Technique
    for Information Flow Tracking</i>. Universität Paderborn.
  bibtex: '@book{Keerthipati_2019, title={A Bitstream-Level Proof-Carrying Hardware
    Technique for Information Flow Tracking}, publisher={Universität Paderborn}, author={Keerthipati,
    Monica}, year={2019} }'
  chicago: Keerthipati, Monica. <i>A Bitstream-Level Proof-Carrying Hardware Technique
    for Information Flow Tracking</i>. Universität Paderborn, 2019.
  ieee: M. Keerthipati, <i>A Bitstream-Level Proof-Carrying Hardware Technique for
    Information Flow Tracking</i>. Universität Paderborn, 2019.
  mla: Keerthipati, Monica. <i>A Bitstream-Level Proof-Carrying Hardware Technique
    for Information Flow Tracking</i>. Universität Paderborn, 2019.
  short: M. Keerthipati, A Bitstream-Level Proof-Carrying Hardware Technique for Information
    Flow Tracking, Universität Paderborn, 2019.
date_created: 2020-02-17T12:03:40Z
date_updated: 2022-01-06T06:52:41Z
department:
- _id: '78'
language:
- iso: eng
project:
- _id: '12'
  name: SFB 901 - Subproject B4
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '1'
  name: SFB 901
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Tobias
  full_name: Wiersema, Tobias
  id: '3118'
  last_name: Wiersema
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
- first_name: Sybille
  full_name: Hellebrand, Sybille
  id: '209'
  last_name: Hellebrand
  orcid: 0000-0002-3717-3939
title: A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking
type: mastersthesis
user_id: '477'
year: '2019'
...
---
_id: '15921'
abstract:
- lang: eng
  text: "Ranking plays a central role in a large number of applications driven by
    RDF knowledge graphs. Over the last years, many popular RDF knowledge graphs have
    grown so large that rankings for the facts they contain cannot be computed directly
    using the currently common 64-bit platforms. In this paper, we tackle two problems:\r\nComputing
    ranks on such large knowledge bases efficiently and incrementally. First, we present
    D-HARE, a distributed approach for computing ranks on very large knowledge graphs.
    D-HARE assumes the random surfer model and relies on data partitioning to compute
    matrix multiplications and transpositions on disk for matrices of arbitrary size.
    Moreover, the data partitioning underlying D-HARE allows the execution of most
    of its steps in parallel.\r\nAs very large knowledge graphs are often updated
    periodically, we tackle the incremental computation of ranks on large knowledge
    bases as a second problem. We address this problem by presenting\r\nI-HARE, an
    approximation technique for calculating the overall ranking scores of a knowledge
    without the need to recalculate the ranking from scratch at each new revision.
    We evaluate our approaches by calculating ranks on the 3 × 10^9 and 2.4 × 10^9
    triples from Wikidata resp. LinkedGeoData. Our evaluation demonstrates\r\nthat
    D-HARE is the first holistic approach for computing ranks on very large RDF knowledge
    graphs. In addition, our incremental approach achieves a root mean squared error
    of less than 10E−7 in the best case. Both D-HARE\r\n and I-HARE are open-source
    and are available at: https://github.com/dice-group/incrementalHARE.\r\n"
author:
- first_name: Abdelmoneim Amer
  full_name: Desouki, Abdelmoneim Amer
  last_name: Desouki
- first_name: Michael
  full_name: Röder, Michael
  last_name: Röder
- first_name: Axel-Cyrille
  full_name: Ngonga Ngomo, Axel-Cyrille
  last_name: Ngonga Ngomo
citation:
  ama: 'Desouki AA, Röder M, Ngonga Ngomo A-C. Ranking on Very Large Knowledge Graphs.
    In: <i>Proceedings of the 30th ACM Conference on Hypertext and Social Media  -
    HT ’19</i>. ACM; 2019:163-171. doi:<a href="https://doi.org/10.1145/3342220.3343660">10.1145/3342220.3343660</a>'
  apa: Desouki, A. A., Röder, M., &#38; Ngonga Ngomo, A.-C. (2019). Ranking on Very
    Large Knowledge Graphs. In <i>Proceedings of the 30th ACM Conference on Hypertext
    and Social Media  - HT ’19</i> (pp. 163–171). ACM. <a href="https://doi.org/10.1145/3342220.3343660">https://doi.org/10.1145/3342220.3343660</a>
  bibtex: '@inproceedings{Desouki_Röder_Ngonga Ngomo_2019, title={Ranking on Very
    Large Knowledge Graphs}, DOI={<a href="https://doi.org/10.1145/3342220.3343660">10.1145/3342220.3343660</a>},
    booktitle={Proceedings of the 30th ACM Conference on Hypertext and Social Media 
    - HT ’19}, publisher={ACM}, author={Desouki, Abdelmoneim Amer and Röder, Michael
    and Ngonga Ngomo, Axel-Cyrille}, year={2019}, pages={163–171} }'
  chicago: Desouki, Abdelmoneim Amer, Michael Röder, and Axel-Cyrille Ngonga Ngomo.
    “Ranking on Very Large Knowledge Graphs.” In <i>Proceedings of the 30th ACM Conference
    on Hypertext and Social Media  - HT ’19</i>, 163–71. ACM, 2019. <a href="https://doi.org/10.1145/3342220.3343660">https://doi.org/10.1145/3342220.3343660</a>.
  ieee: A. A. Desouki, M. Röder, and A.-C. Ngonga Ngomo, “Ranking on Very Large Knowledge
    Graphs,” in <i>Proceedings of the 30th ACM Conference on Hypertext and Social
    Media  - HT ’19</i>, 2019, pp. 163–171.
  mla: Desouki, Abdelmoneim Amer, et al. “Ranking on Very Large Knowledge Graphs.”
    <i>Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT
    ’19</i>, ACM, 2019, pp. 163–71, doi:<a href="https://doi.org/10.1145/3342220.3343660">10.1145/3342220.3343660</a>.
  short: 'A.A. Desouki, M. Röder, A.-C. Ngonga Ngomo, in: Proceedings of the 30th
    ACM Conference on Hypertext and Social Media  - HT ’19, ACM, 2019, pp. 163–171.'
conference:
  end_date: 2019-09-20
  name: 30th ACM Conference on Hypertext and Social Media
  start_date: 2019-09-17
date_created: 2020-02-18T16:39:35Z
date_updated: 2022-01-06T06:52:41Z
department:
- _id: '574'
doi: 10.1145/3342220.3343660
keyword:
- Knowledge Graphs
- Ranking
- RDF
language:
- iso: eng
page: 163-171
project:
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: Proceedings of the 30th ACM Conference on Hypertext and Social Media  -
  HT '19
publication_identifier:
  isbn:
  - '9781450368858'
publication_status: published
publisher: ACM
status: public
title: Ranking on Very Large Knowledge Graphs
type: conference
user_id: '69382'
year: '2019'
...
---
_id: '14568'
author:
- first_name: Stefan
  full_name: Heindorf, Stefan
  id: '11871'
  last_name: Heindorf
  orcid: 0000-0002-4525-6865
- first_name: Yan
  full_name: Scholten, Yan
  last_name: Scholten
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
- first_name: Martin
  full_name: Potthast, Martin
  last_name: Potthast
citation:
  ama: 'Heindorf S, Scholten Y, Engels G, Potthast M. Debiasing Vandalism Detection
    Models at Wikidata (Extended Abstract). In: <i>INFORMATIK</i>. ; 2019:289-290.
    doi:<a href="https://doi.org/10.18420/inf2019_48">10.18420/inf2019_48</a>'
  apa: Heindorf, S., Scholten, Y., Engels, G., &#38; Potthast, M. (2019). Debiasing
    Vandalism Detection Models at Wikidata (Extended Abstract). In <i>INFORMATIK</i>
    (pp. 289–290). <a href="https://doi.org/10.18420/inf2019_48">https://doi.org/10.18420/inf2019_48</a>
  bibtex: '@inproceedings{Heindorf_Scholten_Engels_Potthast_2019, title={Debiasing
    Vandalism Detection Models at Wikidata (Extended Abstract)}, DOI={<a href="https://doi.org/10.18420/inf2019_48">10.18420/inf2019_48</a>},
    booktitle={INFORMATIK}, author={Heindorf, Stefan and Scholten, Yan and Engels,
    Gregor and Potthast, Martin}, year={2019}, pages={289–290} }'
  chicago: Heindorf, Stefan, Yan Scholten, Gregor Engels, and Martin Potthast. “Debiasing
    Vandalism Detection Models at Wikidata (Extended Abstract).” In <i>INFORMATIK</i>,
    289–90, 2019. <a href="https://doi.org/10.18420/inf2019_48">https://doi.org/10.18420/inf2019_48</a>.
  ieee: S. Heindorf, Y. Scholten, G. Engels, and M. Potthast, “Debiasing Vandalism
    Detection Models at Wikidata (Extended Abstract),” in <i>INFORMATIK</i>, 2019,
    pp. 289–290.
  mla: Heindorf, Stefan, et al. “Debiasing Vandalism Detection Models at Wikidata
    (Extended Abstract).” <i>INFORMATIK</i>, 2019, pp. 289–90, doi:<a href="https://doi.org/10.18420/inf2019_48">10.18420/inf2019_48</a>.
  short: 'S. Heindorf, Y. Scholten, G. Engels, M. Potthast, in: INFORMATIK, 2019,
    pp. 289–290.'
date_created: 2019-11-05T15:48:52Z
date_updated: 2022-01-06T06:52:03Z
department:
- _id: '66'
doi: 10.18420/inf2019_48
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://dl.gi.de/bitstream/handle/20.500.12116/24997/paper3_25.pdf
oa: '1'
page: 289-290
publication: INFORMATIK
status: public
title: Debiasing Vandalism Detection Models at Wikidata (Extended Abstract)
type: conference
user_id: '11871'
year: '2019'
...
---
_id: '14817'
article_number: '101975'
author:
- first_name: Christoph
  full_name: Sommer, Christoph
  id: '49154'
  last_name: Sommer
  orcid: 0000-0002-4336-7350
- first_name: Stefano
  full_name: Basagni, Stefano
  last_name: Basagni
citation:
  ama: Sommer C, Basagni S. Advances and novel applications of mobile wireless networking.
    <i>Ad Hoc Networks</i>. 2019. doi:<a href="https://doi.org/10.1016/j.adhoc.2019.101975">10.1016/j.adhoc.2019.101975</a>
  apa: Sommer, C., &#38; Basagni, S. (2019). Advances and novel applications of mobile
    wireless networking. <i>Ad Hoc Networks</i>. <a href="https://doi.org/10.1016/j.adhoc.2019.101975">https://doi.org/10.1016/j.adhoc.2019.101975</a>
  bibtex: '@article{Sommer_Basagni_2019, title={Advances and novel applications of
    mobile wireless networking}, DOI={<a href="https://doi.org/10.1016/j.adhoc.2019.101975">10.1016/j.adhoc.2019.101975</a>},
    number={101975}, journal={Ad Hoc Networks}, author={Sommer, Christoph and Basagni,
    Stefano}, year={2019} }'
  chicago: Sommer, Christoph, and Stefano Basagni. “Advances and Novel Applications
    of Mobile Wireless Networking.” <i>Ad Hoc Networks</i>, 2019. <a href="https://doi.org/10.1016/j.adhoc.2019.101975">https://doi.org/10.1016/j.adhoc.2019.101975</a>.
  ieee: C. Sommer and S. Basagni, “Advances and novel applications of mobile wireless
    networking,” <i>Ad Hoc Networks</i>, 2019.
  mla: Sommer, Christoph, and Stefano Basagni. “Advances and Novel Applications of
    Mobile Wireless Networking.” <i>Ad Hoc Networks</i>, 101975, 2019, doi:<a href="https://doi.org/10.1016/j.adhoc.2019.101975">10.1016/j.adhoc.2019.101975</a>.
  short: C. Sommer, S. Basagni, Ad Hoc Networks (2019).
date_created: 2019-11-05T18:38:44Z
date_updated: 2022-01-06T06:52:06Z
department:
- _id: '589'
doi: 10.1016/j.adhoc.2019.101975
language:
- iso: eng
publication: Ad Hoc Networks
publication_identifier:
  issn:
  - 1570-8705
publication_status: published
status: public
title: Advances and novel applications of mobile wireless networking
type: journal_article
user_id: '49154'
year: '2019'
...
---
_id: '14819'
author:
- first_name: Julian
  full_name: Heinovski, Julian
  last_name: Heinovski
- first_name: Lukas
  full_name: Stratmann, Lukas
  last_name: Stratmann
- first_name: Dominik S.
  full_name: Buse, Dominik S.
  last_name: Buse
- first_name: Florian
  full_name: Klingler, Florian
  last_name: Klingler
- first_name: Mario
  full_name: Franke, Mario
  last_name: Franke
- first_name: Marie-Christin H.
  full_name: Oczko, Marie-Christin H.
  last_name: Oczko
- first_name: Christoph
  full_name: Sommer, Christoph
  id: '49154'
  last_name: Sommer
  orcid: 0000-0002-4336-7350
- first_name: Ingrid
  full_name: Scharlau, Ingrid
  last_name: Scharlau
- first_name: Falko
  full_name: Dressler, Falko
  last_name: Dressler
citation:
  ama: 'Heinovski J, Stratmann L, Buse DS, et al. Modeling Cycling Behavior to Improve
    Bicyclists’ Safety at Intersections - A Networking Perspective. In: <i>2019 IEEE
    20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks”
    (WoWMoM)</i>. ; 2019. doi:<a href="https://doi.org/10.1109/wowmom.2019.8793008">10.1109/wowmom.2019.8793008</a>'
  apa: Heinovski, J., Stratmann, L., Buse, D. S., Klingler, F., Franke, M., Oczko,
    M.-C. H., … Dressler, F. (2019). Modeling Cycling Behavior to Improve Bicyclists’
    Safety at Intersections - A Networking Perspective. In <i>2019 IEEE 20th International
    Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)</i>.
    <a href="https://doi.org/10.1109/wowmom.2019.8793008">https://doi.org/10.1109/wowmom.2019.8793008</a>
  bibtex: '@inproceedings{Heinovski_Stratmann_Buse_Klingler_Franke_Oczko_Sommer_Scharlau_Dressler_2019,
    title={Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections
    - A Networking Perspective}, DOI={<a href="https://doi.org/10.1109/wowmom.2019.8793008">10.1109/wowmom.2019.8793008</a>},
    booktitle={2019 IEEE 20th International Symposium on “A World of Wireless, Mobile
    and Multimedia Networks” (WoWMoM)}, author={Heinovski, Julian and Stratmann, Lukas
    and Buse, Dominik S. and Klingler, Florian and Franke, Mario and Oczko, Marie-Christin
    H. and Sommer, Christoph and Scharlau, Ingrid and Dressler, Falko}, year={2019}
    }'
  chicago: Heinovski, Julian, Lukas Stratmann, Dominik S. Buse, Florian Klingler,
    Mario Franke, Marie-Christin H. Oczko, Christoph Sommer, Ingrid Scharlau, and
    Falko Dressler. “Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections
    - A Networking Perspective.” In <i>2019 IEEE 20th International Symposium on “A
    World of Wireless, Mobile and Multimedia Networks” (WoWMoM)</i>, 2019. <a href="https://doi.org/10.1109/wowmom.2019.8793008">https://doi.org/10.1109/wowmom.2019.8793008</a>.
  ieee: J. Heinovski <i>et al.</i>, “Modeling Cycling Behavior to Improve Bicyclists’
    Safety at Intersections - A Networking Perspective,” in <i>2019 IEEE 20th International
    Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)</i>,
    2019.
  mla: Heinovski, Julian, et al. “Modeling Cycling Behavior to Improve Bicyclists’
    Safety at Intersections - A Networking Perspective.” <i>2019 IEEE 20th International
    Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)</i>,
    2019, doi:<a href="https://doi.org/10.1109/wowmom.2019.8793008">10.1109/wowmom.2019.8793008</a>.
  short: 'J. Heinovski, L. Stratmann, D.S. Buse, F. Klingler, M. Franke, M.-C.H. Oczko,
    C. Sommer, I. Scharlau, F. Dressler, in: 2019 IEEE 20th International Symposium
    on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2019.'
date_created: 2019-11-05T18:38:48Z
date_updated: 2022-01-06T06:52:06Z
department:
- _id: '589'
doi: 10.1109/wowmom.2019.8793008
language:
- iso: eng
publication: 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile
  and Multimedia Networks" (WoWMoM)
publication_identifier:
  isbn:
  - '9781728102702'
publication_status: published
status: public
title: Modeling Cycling Behavior to Improve Bicyclists' Safety at Intersections -
  A Networking Perspective
type: conference
user_id: '49154'
year: '2019'
...
---
_id: '14821'
article_type: original
author:
- first_name: Agnes Regina
  full_name: Seipelt, Agnes Regina
  id: '24239'
  last_name: Seipelt
citation:
  ama: Seipelt AR. Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript
    der Freischütz-Erstaufführung 1821 in Wien. <i>Weberiana</i>. 2019;29:107–161.
  apa: Seipelt, A. R. (2019). Aufführungs- und zensurbedingte Veränderungen im Wiener
    Manuskript der Freischütz-Erstaufführung 1821 in Wien. <i>Weberiana</i>, <i>29</i>,
    107–161.
  bibtex: '@article{Seipelt_2019, title={Aufführungs- und zensurbedingte Veränderungen
    im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien}, volume={29},
    journal={Weberiana}, publisher={Allitera}, author={Seipelt, Agnes Regina}, year={2019},
    pages={107–161} }'
  chicago: 'Seipelt, Agnes Regina. “Aufführungs- und zensurbedingte Veränderungen
    im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien.” <i>Weberiana</i>
    29 (2019): 107–161.'
  ieee: A. R. Seipelt, “Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript
    der Freischütz-Erstaufführung 1821 in Wien,” <i>Weberiana</i>, vol. 29, pp. 107–161,
    2019.
  mla: Seipelt, Agnes Regina. “Aufführungs- und zensurbedingte Veränderungen im Wiener
    Manuskript der Freischütz-Erstaufführung 1821 in Wien.” <i>Weberiana</i>, vol.
    29, Allitera, 2019, pp. 107–161.
  short: A.R. Seipelt, Weberiana 29 (2019) 107–161.
date_created: 2019-11-06T08:34:40Z
date_updated: 2022-01-06T06:52:06Z
intvolume: '        29'
keyword:
- Weber
- Wien
- Zensur
language:
- iso: ger
page: 107–161
publication: Weberiana
publication_identifier:
  isbn:
  - 978-3-96233-182-5
publication_status: published
publisher: Allitera
status: public
title: Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung
  1821 in Wien
type: journal_article
user_id: '24239'
volume: 29
year: '2019'
...
