Im da/sec scientific talk werden Forschungsergebnisse, die erst kürzlich veröffentlicht wurden oder es demnächst werden, am Fachbereich Informatik präsentiert. Wir möchten mit Studenten/innen, Mitarbeitern/innen und Professoren/innen über unsere Forschung diskutieren und freuen uns auf Feedback zur Präsentation. Die scientific talks sind einerseits Ergebnispräsentationen und andererseits gegenseitige Hilfen beim Probevortragen, was jeden Studierenden betrifft, spätestens zum Studiumende.
The da/sec scientific talk is a platform for discussing recent research results of our group with our faculty of computer science. We like to share our knowledge with our students, colleagues, and professors. Please feel free to join the talks and to discuss recent gains and presentation styles with us. Our scientific talks are not only results presentations, but also presentation rehearsals. Where, at the latest in the end of studies, presentation rehearsals affect all students as well.
Upcoming talk
Archive
2024
- 2024-11-21: André Dörsch — Fairness of Biometric Sample Quality Assessement
- 2024-07-24: David Benavente-Rios — Iris Recognition with Deep Learning: A Survey
- 2024-06-19: Marcel Grimmer — AgeDiff: Latent Diffusion-based Face Age Editing with Dual Cross-Attention
- 2024-05-15: Torsten Schlett — Quality Degradation Impact on Differential Morphing Attack Detection
- 2024-04-18: Mathias Ibsen — Human and Algorithm Detection of Manipulated Face Images
- 2024-03-28: Robert Nichols — Not My Hands: Identity-guided Diffusion for Generating Synthetic Hand Images
- 2024-02-22: Jannis Priesnitz — Secure Contactless Fingerprint Recognition
- 2024-01-18: Maciej Salwowski — Synthetically Template Transformation Network for Tattoo Retrieval
2023
- 2023-12-14: Daile Osorio-Roig — Privacy Preserving Workload Reduction in Biometric Systems
- 2023-11-23: Juan Tapia — Impact of Synthetic Images on Morphing Attack Detection Using a Siamese Network
- 2023-10-19: Pia Bauspieß — Type^2: A Secure and Seamless Biometric Two-Factor Authentication Protocol Using Keystroke Dynamics
- 2023-07-20: Torsten Schlett — Duplicate Detection in Face Image Datasets
- 2023-06-22: Daile Osorio Roig — Circumventing Adversarial Attacks by Key Selection:A Closer Look
- 2023-05-16: Mathias Ibsen — Detection of Synthetic Face Images
- 2023-04-27: Fabian Stockhardt — Project conclusion ZIM-Bio
- 2023-03-23: Jascha Kolberg — Benchmarking Established Presentation Attack Detection Algorithms in a new Context of Contactless Fingerprint Data
- 2023-02-23: Marcel Grimmer — Pose Impact Estimation on Face Recognition using 3D-Aware Synthetic Data with Application to Quality Assessment
- 2023-01-19: Jannis Priesnitz — COLFISPOOF: A new Database for Contactless Fingerprint Presentation Attack Detection Research
2022
- 2022-12-08: Juan Tapia — Impact of Face Image Quality Estimation on Presentation Attack Detection
- 2022-11-23: Lazaro Janier Gonzalez-Soler — Generalisable Presentation Attack Detection for Multiple Types of Biometric Characteristics
- 2022-10-28: Pia Bauspieß — Improved Biometrics-Authenticated Key Exchange
- 2022-07-21: Lazaro Janier Gonzalez-Soler — Towards Generalisable Facial Presentation Attack Detection Based on the Analysis of Facial Regions
- 2022-06-23: Torsten Schlett — Utility-centric Ranking of Quality Assessment Methods
- 2022-05-19: Daile Osorio-Roig — Indexing Protected Deep Face Templates by Frequent Binary Patterns
- 2022-04-28: Marcel Grimmer — Face Age Progression using StyleGAN Latent Space Manipulations
- 2022-03-31: Siri Lorenz and Jannis Priesnitz — SynCoLFinGer – Synthetic ContactLess Fingerprint Generator
- 2022-02-24: Jannis Priesnitz — Recent Advances in the Research Area of Contactless Fingerprint Recognition
- 2022-01-27: Fabian Stockhardt — Computational-cheap hand RoI extraction
2021
- 2021-12-16: Jascha Kolberg — Fairness in Biometric Systems – The Watchlist Imbalance Effect
- 2021-11-25: Juan Tapia — Morphing Detection using Siameses networks and few-shots learning approach
- 2021-10-21: Lazaro Janier Gonzalez-Soler — Two-stream Temporal Convolutional Neural Network for Voice Presentation Attack Detection
- 2021-09-23: Siri Lorenz — Morphing Attack Detection: A Fusion Approach
- 2021-07-07: Cristian Botezatu — Impact of Selfie Filters on Face Recognition Systems
- 2021-06-10: Jascha Kolberg — Security Enhancement and Privacy Protection for Biometric Systems
- 2021-05-12: Torsten Schlett — Face Image Quality Assessment: An Overview
- 2021-04-08: Dailé Osorio-Roig — Stable Hash Generation for Efficient Privacy-Preserving Face Identification
- 2021-03-11: Mathias Ibsen — Impact of Facial Manipulations on Face Recognition Systems: Improving Robustness Towards Facial Tattoos
- 2021-02-04: Lazaro Janier Gonzalez-Soler — Towards Deep Generative Models for improving generalisation capabilities on Face Presentation Attack Detection
- 2021-01-07: Jannis Priesnitz — Touchless Fingerprint Recognition put into practice: Performance and Usability Aspects
2020
- 2020-12-10: Marcel Grimmer — Deep Face Age Progression: An Introduction
- 2020-11-05: Pia Bauspieß — Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
- 2020-10-08: Fabian Stockhardt — Accelerating facial identification with morphing
- 2020-07-23: Ulrich Scherhag — Morphing attack detection for face recognition algorithms
- 2020-06-25: Mathias Ibsen — Impact of Facial Tattoos on Face Recognition Systems
- 2020-05-28: Jascha Kolberg — Efficient Post-quantum-secure Biometric Face Template Protection
- 2020-04-23: Marcel Meuter, Lorenz Liebler — Developing a hypervisor-agnostic VMI Framework
- 2020-03-18: Pawel Drozdowski — Efficient privacy-preserving biometric identification in large-scale multibiometric systems
- 2020-02-27: Daniel Fischer — State Of The Art of Morphing Detection (SOTAMD)
- 2020-01-16: Jannis Priesnitz — Touchless Fingerprint Sample Quality and Biometric Performance Prediction: Prerequisites for the Applicability of NFIQ2.0
2019
- 2019-12-19: Thomas Schäfer — Generating data sets for digital forensics with the hystck framework
- 2019-11-14: Lazaro Janier Gonzalez-Soler — Fingerprint Presentation Attack Detection based on local features encoding for Unknown Attacks
- 2019-10-17: Thomas Göbel — A Novel Approach for Generating Synthetic Datasets for Digital Forensics
- 2019-08-14: Alexander Zeier — API Usability of Stateful Signature Schemes
- 2019-08-21: Rolf Huesmann — Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software
- 2019-07-04: Ulrich Scherhag — Face Morphing Attack Detection
- 2019-07-02: Vivian Ives Philipp Erbenich — Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation
- 2019-06-19: Christian Rathgeb — Beautifying your Face Image can have its Price: A Study on the Impact of Beautification Apps on Face Recognition
- 2019-05-09: Pawel Drozdowski — Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing
- 2019-04-11: Lorenz Liebler — Towards Exact and Inexact Approximate Matching of Executable Binaries
- 2019-03-20: Jascha Kolberg — Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging
- 2019-02-21: Michael Wirth — Is an IP-Camera IoT and how secure is it at all?
- 2019-01-23: Marta Gomez-Barrero — Multimodal Fingerprint Presentation Attack Detection
2018
- 2018-11-15: Christian Meng — Forensic Data Analysis and Recovery of Deleted SQLite Records
- 2018-10-18: Lorenz Liebler, Patrick Schmitt — Evaluating and extending Hierarchical Bloom Filter Trees for forensic purposes
- 2018-09-06: Pascal Keilbach — Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging
- 2018-07-12: Ruben Tolosana — Fingerprint Presentation Attack Detection
- 2018-06-21: Christian Rathgeb — Differential Face Morph Detection: Screening Uncorrelated Facial Galleries
- 2018-06-07: Adrian Kailus, Christian Hecht, Thomas Göbel — fishy – A Framework for Implementing Filesystem-based Data Hiding Techniques
- 2018-05-17: Daniel Fischer — Multi-Instance Fingerprint Classification using Global Features
- 2018-04-20: Daniel Träder — Auf dem Weg zu sicheren abgeleiteten Identitäten mit Hilfe der Payment Service Directive 2
- 2018-04-12: Andreas Nautsch — Bayesian Decision Theory: Evaluation of binary Decision Systems
- 2018-03-29: Ulrich Scherhag — Angriffserkennung für Gesichtserkennungsalgorithmen – aktuelle Entwicklungen
- 2018-02-15: Sebastian Gärtner — Generating synthetic data for digital forensic training and education
- 2018-01-25: Jascha Kolberg — Computationally Efficient Homomorphic Encryption for Iris Codes
2017
- 2017-12-07: Marta Gomez-Barrero — Fingerprint Presentation Attack Detection
- 2017-11-30: Benedikt-Alexander Mokroß — Efficient Biometric Identification in Palm Vein Databases
- 2017-10-19: Lorenz Liebler — Approxis: a first step torwards fast data reduction and cross validation in the field of memory forensics
- 2017-08-24: Daniel Träder — Design and Implementation Aspects of Mobile Derived Identities
- 2017-07-13: Jessica Steinberger — Distributed DDoS Defense: A collaborative Approach at Internet Scale
- 2017-06-22: Marta Gomez-Barrero — Biometric Symmetry: Implications on Template Protection
- 2017-05-11: Christian Rathgeb — On the Feasibility of Creating Morphed Iris-Codes
- 2017-04-27: Thomas Göbel — Anti-Forensik mit dem Fokus auf das ext4-Dateisystem
- 2017-03-02: Nicolas Buchmann — Enhancing breeder document long-term security by blockchain technology
- 2017-01-12: Sebastian Gärtner — Forensische Artefakte im Windows Betriebssystem
2016
- 2016-12-01, Ulrich Scherhag — Angriffserkennung für Gesichtserkennungsalgorithmen
- 2016-11-03, Andreas Nautsch — Speaker Recognition in unconstrained Environments
- 2016-07-14, Ulrich Scherhag — Unit-Selection Attack Detection Based on Unfiltered Frequency-Domain Features
- 2016-06-23, Sebastian Abt — Understanding and Improving State-of-Data in Network Security Research
- 2016-05-19, Saed Alavi — Booters and certificates: An overview of TLS in the DDoS-as-a-Service landscape
- 2016-05-12, Andersen Hoppe, Esbern — Iris Recognition on Mobile Devices
- 2016-04-07, Benjamin Kuhnert — Collaborative DDoS Defense using Flow-based Security Event Information
- 2016-01-21, Sebastian Gärtner — ForensicLab
2015
- 2015-12-03, Johannes Wagner & Christian Rathgeb — SIFT based Iris Recognition
- 2015-11-12, Martin Olsen — Fingerprint Image Quality – Predicting Biometric Performance
- 2015-10-22, Nicolas Buchmann — Post Quantum Cryptography for electronic travel documents
- 2015-07-02, Hong Hao — Deep Learning in Speaker Recognition
- 2015-05-07, Anika Pflug — Biometric Identification using 2- and 3-Dimensional Images of Human Ears
- 2015-04-30, Sven Ossenbühl — Towards automated incident handling: How to select an appropriate response against a network-based attack?
- 2015-04-16, Jessica Steinberger — How to Exchange Security Events? Overview and Evaluation of Formats and Protocols
- 2015-02-06, Guest talk: Rahim Saeidi — Including Quality Metrics in Calibration of Biometric Matching Scores (Aalto University, Finland)
2014
- 2014-12-04, Christian Rathgeb — Towards Bloom Filter-based Indexing of Iris Biometric Data
- 2014-11-13, Andreas Nautsch — Speaker Verification using i-Vectors
- 2014-10-23, Lisa Schehlmann — Blessing or Curse? Revisiting Security Aspects of Software-Defined Networking
List of our Scientific Afternoons, our previous event series at CASED
02.07.2014 | Daniel Kopp | Towards quantifying the IP spoofing phenomenon |
02.07.2014 | Pascal Paul | Eine vergleichende Studie zu Textur Deskriptoren für Ohren-Erkennung |
26.05.2014 | Frank Breitinger | On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations |
18.04.2014 | Nicolas Buchmann | Towards electronic identification and trusted services for biometric authenticated transactions in the Single Euro Payments Area |
18.04.2014 | Anika Pflug | Classification of Ear Images Based on Texture Features |
24.03.2014 | Andreas Heinemann | User Centric Security |
24.03.2014 | Christian Rathgeb (Stefan Billeb) | Efficient Two-Stage Speaker Identification |
24.02.2014 | Lisa Schehlmann | Security aspects of SDN |
24.02.2014 | Johannes Wagner | Effects of Severe Signal Degradation on Ear Biometrics |
17.01.2014 | Andreas Nautsch | Speaker recognition |
17.01.2014 | Lukas Bielinski | Netzwerkforensik |
16.12.2013 | Martin Olsen | A tutorial on random forests |
16.12.2013 | Christoph Dietzel | Analyse mobiler Malware |
25.11.2013 | Anders Pedersen | ASM for Ear Recognition |
25.11.2013 | Sven Ossenbühl | Reaction strategies on anomalous events within flow-based data |
18.10.2013 | Marta Gomez | Face recognition mit Bloom-Filtern |
18.10.2013 | Sebastien Gärtner | Identifying people on their network fingerprint |
30.09.2013 | Marius Klimmek | Towards a flexible botnet simulation framework |
30.09.2013 | Reinhard Stampp | Entwicklung eines Frameworks zur Synthese gutartigen Netzwerkverkehrs |
26.08.2013 | Saad Azam | Face recognition using Active Appearance Model |
26.08.2013 | Jessica Steinberger | A FLEXible and efficient exchange format for network flow data |
24.06.2013 | Ivan Danov | Modelling Blockwise Fingerprint Images with SOM |
24.06.2013 | Nicolas Buchmann | Security considerations on extending PACE to a biometric-based connection establishment |
27.05.2013 | Reinhard Stampp | Towards a Framework for Synthesis of Benign Network Traffic |
27.05.2013 | Raul Sanchez-Reillo (UC3M) | R&D at UC3M Group for Identification Technologies (GUTI) |
29.04.2013 | Vikas Gupta | File fragment detection on network level |
29.04.2013 | Martin Boeckeler | Landmarkdetektion fuer 3D-Gesichtserkennung |
25.03.2013 | Christian Dietz | Passive Remote Detection of Network Address Translation (NAT) by using NetFlow |
25.03.2013 | Marek Dusio | Fingerprint Sample Quality |
25.02.2013 | Malte Wiest | Automatic Person Detection and Recognition in Surveillance Videos |
25.02.2013 | Jessica Steinberger | Is network defense at ISP level feasible? A survey on anomaly detection and mitigation at Internet scale |
28.01.2013 | Georgios Stivaktakis | Framework for testing Similarity Preserving Hash functions |
28.01.2013 | Naser Damer | Multi-Biometric Fusion |
17.12.2012 | Heiko Witte | A context-aware mobile biometric system |
17.12.2012 | Anika Pflug | Applied Sciences or just Engineering? – Where`s the science in Biometrics? |
26.11.2012 | Sebastian Hohmann | Ear Recognition Using Local features |
26.11.2012 | Simon Thurner | Entwicklung von Methoden zur Erkennung von Verschlüsselung und ihre Anwendung auf die digitale Forensik |
29.10.2012 | Maboud Farzaneh Kaloorazi | 3D Ear Recognition based on Force Field Transform |
29.10.2012 | Carmen Gaißer | Realization and evaluation of a command and control channel via IPv6 extension headers |
29.10.2012 | Christopher Knöll | Das Tablet in der Cloud: Forensische Untersuchung und rechtliche Handhabe anhand eines IPad“ |
28.08.2012 | Xuebing Zhou | 3D Face Recognition |
28.08.2012 | Chrisitan Rathgeb | Iris Biometrics: Template Protection and Advanced Comparators |
26.06.2012 | Sebastian Abt | Towards Efficient and Privacy-Preserving Network-Based Botnet Detection Using Netflow Data |
26.06.2012 | Ruediger Gad (FH Frankfurt a.M.) | Performance Evaluation of On-Demand IP Address Assignment for Layer-2 Devices |
29.05.2012 | Anton Makarov | Fingerprint quality estimation using Self-Organizing Maps |
29.05.2012 | Arthur Gervais | Attacks and defense mechanisms against industrial control systems (SCADA) |
24.04.2012 | Frank Breitinger | A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance |
24.04.2012 | Prof. Dr. Martin Kappes (FH Frankfurt) | IT-Sicherheit in kleinen und mittelstaendischen Unternehmen |
27.03.2012 | Heiko Witte | BioAPI – A brief introduction |
27.03.2012 | Claudia Nickel | Accelerometer-based Biometric Gait Recognition for Authentication on Smartphones |
27.02.2012 | Pierre Schnarz | Bürgerbefragung zur IT-Sicherheit im Endanwenderbereich |
27.02.2012 | Knut Asboel | Fuzzy Hashing based on Run-Length-Encoding using Dilation and Erosion |
31.01.2012 | Philip Back | 3D Ear Detection Using Shape Index Histograms |
19.12.2011 | Jesse Beckingham | Security Analysis of SD Hash |
19.12.2011 | Georg Ziroff | Statistical approach for fuzzy hashing |
29.11.2011 | Julian Knauer | Security Considerations of Password Protection of HDDs |
29.11.2011 | Nicolas Buchmann | Evaluation of the Security Infrastructure of MRTD |