TY - GEN AU - Kumar Jeyakumar, Shankar ID - 15883 TI - Incremental learning with Support Vector Machine on embedded platforms ER - TY - CONF AU - Müller, Jens AU - Brinkmann, Marcus AU - Poddebniak, Damian AU - Böck, Hanno AU - Schinzel, Sebastian AU - Somorovsky, Juraj AU - Schwenk, Jörg ID - 15908 SN - 978-1-939133-06-9 T2 - 28th {USENIX} Security Symposium ({USENIX} Security 19) TI - "Johnny, you are fired!" -- Spoofing OpenPGP and S/MIME Signatures in Emails ER - TY - CONF AU - Merget, Robert AU - Somorovsky, Juraj AU - Aviram, Nimrod AU - Young, Craig AU - Fliegenschmidt, Janis AU - Schwenk, Jörg AU - Shavitt, Yuval ID - 15909 SN - 978-1-939133-06-9 T2 - 28th {USENIX} Security Symposium ({USENIX} Security 19) TI - Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities ER - TY - CONF AU - Engelbertz, Nils AU - Mladenov, Vladislav AU - Somorovsky, Juraj AU - Herring, David AU - Erinola, Nurullah AU - Schwenk, Jörg ED - Roßnagel, Heiko ED - Wagner, Sven ED - Hühnlein, Detlef ID - 15910 T2 - Open Identity Summit 2019 TI - Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS) ER - TY - GEN AB - Secure hardware design is the most important aspect to be considered in addition to functional correctness. Achieving hardware security in today’s globalized Integrated Cir- cuit(IC) supply chain is a challenging task. One solution that is widely considered to help achieve secure hardware designs is Information Flow Tracking(IFT). It provides an ap- proach to verify that the systems adhere to security properties either by static verification during design phase or dynamic checking during runtime. Proof-Carrying Hardware(PCH) is an approach to verify a functional design prior to using it in hardware. It is a two-party verification approach, where the target party, the consumer requests new functionalities with pre-defined properties to the producer. In response, the producer designs the IP (Intellectual Property) cores with the requested functionalities that adhere to the consumer-defined properties. The producer provides the IP cores and a proof certificate combined into a proof-carrying bitstream to the consumer to verify it. If the verification is successful, the consumer can use the IP cores in his hardware. In essence, the consumer can only run verified IP cores. Correctly applied, PCH techniques can help consumers to defend against many unintentional modifications and malicious alterations of the modules they receive. There are numerous published examples of how to use PCH to detect any change in the functionality of a circuit, i.e., pairing a PCH approach with functional equivalence checking for combinational or sequential circuits. For non-functional properties, since opening new covert channels to leak secret information from secure circuits is a viable attack vector for hardware trojans, i.e., intentionally added malicious circuitry, IFT technique is employed to make sure that secret/untrusted information never reaches any unclassified/trusted outputs. This master thesis aims to explore the possibility of adapting Information Flow Tracking into a Proof-Carrying Hardware scenario. It aims to create a method that combines Infor- mation Flow Tracking(IFT) with a PCH approach at bitstream level enabling consumers to validate the trustworthiness of a module’s information flow without the computational costs of a complete flow analysis. AU - Keerthipati, Monica ID - 15920 TI - A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking ER - TY - CONF AB - Ranking plays a central role in a large number of applications driven by RDF knowledge graphs. Over the last years, many popular RDF knowledge graphs have grown so large that rankings for the facts they contain cannot be computed directly using the currently common 64-bit platforms. In this paper, we tackle two problems: Computing ranks on such large knowledge bases efficiently and incrementally. First, we present D-HARE, a distributed approach for computing ranks on very large knowledge graphs. D-HARE assumes the random surfer model and relies on data partitioning to compute matrix multiplications and transpositions on disk for matrices of arbitrary size. Moreover, the data partitioning underlying D-HARE allows the execution of most of its steps in parallel. As very large knowledge graphs are often updated periodically, we tackle the incremental computation of ranks on large knowledge bases as a second problem. We address this problem by presenting I-HARE, an approximation technique for calculating the overall ranking scores of a knowledge without the need to recalculate the ranking from scratch at each new revision. We evaluate our approaches by calculating ranks on the 3 × 10^9 and 2.4 × 10^9 triples from Wikidata resp. LinkedGeoData. Our evaluation demonstrates that D-HARE is the first holistic approach for computing ranks on very large RDF knowledge graphs. In addition, our incremental approach achieves a root mean squared error of less than 10E−7 in the best case. Both D-HARE and I-HARE are open-source and are available at: https://github.com/dice-group/incrementalHARE. AU - Desouki, Abdelmoneim Amer AU - Röder, Michael AU - Ngonga Ngomo, Axel-Cyrille ID - 15921 KW - Knowledge Graphs KW - Ranking KW - RDF SN - 9781450368858 T2 - Proceedings of the 30th ACM Conference on Hypertext and Social Media - HT '19 TI - Ranking on Very Large Knowledge Graphs ER - TY - CONF AU - Heindorf, Stefan AU - Scholten, Yan AU - Engels, Gregor AU - Potthast, Martin ID - 14568 T2 - INFORMATIK TI - Debiasing Vandalism Detection Models at Wikidata (Extended Abstract) ER - TY - JOUR AU - Sommer, Christoph AU - Basagni, Stefano ID - 14817 JF - Ad Hoc Networks SN - 1570-8705 TI - Advances and novel applications of mobile wireless networking ER - TY - CONF AU - Heinovski, Julian AU - Stratmann, Lukas AU - Buse, Dominik S. AU - Klingler, Florian AU - Franke, Mario AU - Oczko, Marie-Christin H. AU - Sommer, Christoph AU - Scharlau, Ingrid AU - Dressler, Falko ID - 14819 SN - 9781728102702 T2 - 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) TI - Modeling Cycling Behavior to Improve Bicyclists' Safety at Intersections - A Networking Perspective ER - TY - JOUR AU - Seipelt, Agnes Regina ID - 14821 JF - Weberiana KW - Weber KW - Wien KW - Zensur SN - 978-3-96233-182-5 TI - Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien VL - 29 ER - TY - CONF AB - Multi-talker speech and moving speakers still pose a significant challenge to automatic speech recognition systems. Assuming an enrollment utterance of the target speakeris available, the so-called SpeakerBeam concept has been recently proposed to extract the target speaker from a speech mixture. If multi-channel input is available, spatial properties of the speaker can be exploited to support the source extraction. In this contribution we investigate different approaches to exploit such spatial information. In particular, we are interested in the question, how useful this information is if the target speaker changes his/her position. To this end, we present a SpeakerBeam-based source extraction network that is adapted to work on moving speakers by recursively updating the beamformer coefficients. Experimental results are presented on two data sets, one with articially created room impulse responses, and one with real room impulse responses and noise recorded in a conference room. Interestingly, spatial features turn out to be advantageous even if the speaker position changes. AU - Heitkaemper, Jens AU - Feher, Thomas AU - Freitag, Michael AU - Haeb-Umbach, Reinhold ID - 14822 T2 - International Conference on Statistical Language and Speech Processing 2019, Ljubljana, Slovenia TI - A Study on Online Source Extraction in the Presence of Changing Speaker Positions ER - TY - CONF AB - This paper deals with multi-channel speech recognition in scenarios with multiple speakers. Recently, the spectral characteristics of a target speaker, extracted from an adaptation utterance, have been used to guide a neural network mask estimator to focus on that speaker. In this work we present two variants of speakeraware neural networks, which exploit both spectral and spatial information to allow better discrimination between target and interfering speakers. Thus, we introduce either a spatial preprocessing prior to the mask estimation or a spatial plus spectral speaker characterization block whose output is directly fed into the neural mask estimator. The target speaker’s spectral and spatial signature is extracted from an adaptation utterance recorded at the beginning of a session. We further adapt the architecture for low-latency processing by means of block-online beamforming that recursively updates the signal statistics. Experimental results show that the additional spatial information clearly improves source extraction, in particular in the same-gender case, and that our proposal achieves state-of-the-art performance in terms of distortion reduction and recognition accuracy. AU - Martin-Donas, Juan M. AU - Heitkaemper, Jens AU - Haeb-Umbach, Reinhold AU - Gomez, Angel M. AU - Peinado, Antonio M. ID - 14824 T2 - INTERSPEECH 2019, Graz, Austria TI - Multi-Channel Block-Online Source Extraction based on Utterance Adaptation ER - TY - CONF AB - In this paper, we present Hitachi and Paderborn University’s joint effort for automatic speech recognition (ASR) in a dinner party scenario. The main challenges of ASR systems for dinner party recordings obtained by multiple microphone arrays are (1) heavy speech overlaps, (2) severe noise and reverberation, (3) very natural onversational content, and possibly (4) insufficient training data. As an example of a dinner party scenario, we have chosen the data presented during the CHiME-5 speech recognition challenge, where the baseline ASR had a 73.3% word error rate (WER), and even the best performing system at the CHiME-5 challenge had a 46.1% WER. We extensively investigated a combination of the guided source separation-based speech enhancement technique and an already proposed strong ASR backend and found that a tight combination of these techniques provided substantial accuracy improvements. Our final system achieved WERs of 39.94% and 41.64% for the development and evaluation data, respectively, both of which are the best published results for the dataset. We also investigated with additional training data on the official small data in the CHiME-5 corpus to assess the intrinsic difficulty of this ASR task. AU - Kanda, Naoyuki AU - Boeddeker, Christoph AU - Heitkaemper, Jens AU - Fujita, Yusuke AU - Horiguchi, Shota AU - Haeb-Umbach, Reinhold ID - 14826 T2 - INTERSPEECH 2019, Graz, Austria TI - Guided Source Separation Meets a Strong ASR Backend: Hitachi/Paderborn University Joint Investigation for Dinner Party ASR ER - TY - CHAP AU - Seipelt, Agnes Regina AU - Klugseder, Robert ED - Aringer, Klaus ED - Utz, Christian ED - Wozonig, Thomas ID - 14828 SN - 978-3-99012-553-3 T2 - Musik im Zusammenhang: Festschrift Peter Revers zum 65. Geburtstag TI - Digitale Musikanalyse auf Grundlage von MEI-codierten Daten ER - TY - GEN ED - Scheideler, Christian ED - Berenbrink, Petra ID - 14829 SN - 978-1-4503-6184-2 TI - The 31st ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2019, Phoenix, AZ, USA, June 22-24, 2019 ER - TY - JOUR AU - Gmyr, Robert AU - Lefevre, Jonas AU - Scheideler, Christian ID - 14830 IS - 2 JF - Theory Comput. Syst. TI - Self-Stabilizing Metric Graphs VL - 63 ER - TY - GEN AU - Sabu, Nithin S. ID - 14831 TI - FPGA Acceleration of String Search Techniques in Huge Data Sets ER - TY - THES AU - Vaz, Gavin Francis ID - 14849 TI - Using Just-in-Time Code Generation to Transparently Accelerate Applications in Heterogeneous Systems ER - TY - THES AU - Mäcker, Alexander ID - 14851 TI - On Scheduling with Setup Times ER - TY - CONF AB - In a variety of industrial applications, liquids are atomized to produce aerosols for further processing. Example applications are the coating of surfaces with paints, the application of ultra-thin adhesive layers and the atomization of fuels for the production of combustible dispersions. In this publication different atomizing principles (standing-wave, capillary-wave, vibrating-mesh) are examined and discussed. Using an optimized standing-wave system, tough liquids with viscosities of up to about 100 Pas could be successfully atomized. AU - Dunst, Paul AU - Bornmann, Peter AU - Hemsel, Tobias AU - Littmann, Walter AU - Sextro, Walter ED - Lötters, Joost ED - Urban, Gerald ID - 14852 KW - atomization KW - ultrasound KW - standing-wave KW - capillarywave KW - vibrating-mesh T2 - Conference Proceedings - The 4th Conference on MicroFluidic Handling Systems (MFHS2019) TI - Atomization of Fluids with Ultrasound ER -