Aidmar Wainakh
Aidmar Wainakh
Ph.D., Researcher Product Cybersecurity and Privacy at Continental AG
Verified email at
Cited by
Cited by
On generating network traffic datasets with synthetic attacks for intrusion detection
CG Cordero, E Vasilomanolakis, A Wainakh, M Mühlhäuser, ...
ACM Transactions on Privacy and Security (TOPS) 24 (2), 1-39, 2021
Enhancing privacy via hierarchical federated learning
A Wainakh, AS Guinea, T Grube, M Mühlhäuser
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
User label leakage from gradients in federated learning
A Wainakh, F Ventola, T Müßig, J Keim, CG Cordero, E Zimmer, T Grube, ...
arXiv preprint arXiv:2105.09369, 2021
Efficient privacy-preserving recommendations based on social graphs
A Wainakh, T Grube, J Daubert, M Mühlhäuser
Proceedings of the 13th ACM Conference on Recommender Systems, 78-86, 2019
Label leakage from gradients in distributed machine learning
A Wainakh, T Müßig, T Grube, M Mühlhäuser
2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC …, 2021
Tweet beyond the cage: a hybrid solution for the privacy dilemma in online social networks
A Wainakh, T Grube, J Daubert, C Porth, M Muhlhauser
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
Verification of single-person access in a mantrap portal using RGB-D images
D Siegmund, A Wainakh, A Braun
XII Workshop de Visao Computacional (WVC), 2016
Mitigating Privacy Concerns by Developing Trust-related Software Features for a Hybrid Social Media Application.
A Borchert, A Wainakh, N Krämer, M Mühlhäuser, M Heisel
ENASE, 269-280, 2021
User-Level Label Leakage from Gradients in Federated Learning
A Wainakh, F Ventola, T Müßig, J Keim, CG Cordero, E Zimmer, T Grube, ...
Proceedings on Privacy Enhancing Technologies 2022 (2), 227-244, 2022
Attack detection in an autonomous entrance system using optical flow
D Siegmund, B Fu, T Samartzidis, A Wainakh, A Kuijper, A Braun
7th International Conference on Imaging for Crime Detection and Prevention …, 2016
Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups
A Wainakh, E Zimmer, S Subedi, J Keim, T Grube, S Karuppayah, ...
arXiv preprint arXiv:2111.03363, 2021
Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks
A Wainakh, A Strassheim, T Grube, J Daubert, M Mühlhäuser
The 16th International Conference on Availability, Reliability and Security …, 2021
Text localization in born-digital images of advertisements
D Siegmund, A Wainakh, T Ebert, A Braun, A Kuijper
Iberoamerican Congress on Pattern Recognition, 627-634, 2017
On Privacy-Enhanced Distributed Analytics in Online Social Networks
A Wainakh
Technische Universität Darmstadt, 2022
The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social Media
A Borchert, A Wainakh, N Krämer, M Mühlhäuser, M Heisel
International Conference on Evaluation of Novel Approaches to Software …, 2021
Design & Develop Misconfiguration Vulnerabilities Scanner for Web Applications
A Wainakh, A Wabbi, B Alkhatib
The system can't perform the operation now. Try again later.
Articles 1–16