Machine unlearning: Linear filtration for logit-based classifiers T Baumhauer, P Schöttle, M Zeppelzauer Machine Learning 111 (9), 3203-3226, 2022 | 140 | 2022 |
Where to hide the bits? B Johnson, P Schöttle, R Böhme Decision and Game Theory for Security: Third International Conference …, 2012 | 88 | 2012 |
Game theory and adaptive steganography P Schöttle, R Böhme IEEE Transactions on Information Forensics and Security 11 (4), 760-773, 2015 | 53 | 2015 |
A game-theoretic approach to content-adaptive steganography P Schöttle, R Böhme Information Hiding: 14th International Conference, IH 2012, Berkeley, CA …, 2013 | 49 | 2013 |
Detecting adversarial examples-a lesson from multimedia security P Schöttle, A Schlögl, C Pasquini, R Böhme 2018 26th European Signal Processing Conference (EUSIPCO), 947-951, 2018 | 31 | 2018 |
Weighted stego-image steganalysis for naive content-adaptive embedding P Schöttle, S Korff, R Böhme 2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012 | 27 | 2012 |
Mixing coins of different quality: A game-theoretic approach S Abramova, P Schöttle, R Böhme Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017 | 19 | 2017 |
Secure team composition to thwart insider threats and cyber-espionage A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme ACM Transactions on Internet Technology (TOIT) 14 (2-3), 1-22, 2014 | 18 | 2014 |
Forensics of high quality and nearly identical jpeg image recompression C Pasquini, P Schöttle, R Böhme, G Boato, F Perez-Gonzalez Proceedings of the 4th ACM workshop on information hiding and multimedia …, 2016 | 15 | 2016 |
Managing the weakest link: A game-theoretic approach for the mitigation of insider threats A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 15 | 2013 |
A game-theoretic analysis of content-adaptive steganography with independent embedding P Schöttle, A Laszka, B Johnson, J Grossklags, R Böhme 21st European Signal Processing Conference (EUSIPCO 2013), 1-5, 2013 | 13 | 2013 |
Thinking beyond the block: block matching for copy-move forgery detection revisited M Kirchner, P Schoettle, C Riess Media Watermarking, Security, and Forensics 2015 9409, 11-22, 2015 | 12 | 2015 |
Blockchain use cases against climate destruction F Thalhammer, P Schöttle, M Janetschek, C Ploder Cloud Computing and Data Science, 60-76, 2022 | 11 | 2022 |
Forensics of high-quality JPEG images with color subsampling M Carnein, P Schöttle, R Böhme 2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015 | 11 | 2015 |
Adversarial examples against a bert absa model–fooling bert with l33t, misspellign, and punctuation N Hofer, P Schöttle, A Rietzler, S Stabinger Proceedings of the 16th International Conference on Availability …, 2021 | 10 | 2021 |
Continuous Planning and Forecasting Framework (CPFF) for Agile Project Management: Overcoming the T Dilger, C Ploder, W Haas, P Schöttle, R Bernsteiner Proceedings of the 21st Annual Conference on Information Technology …, 2020 | 10 | 2020 |
On the application of anomaly detection in reliable server pooling systems for improved robustness against denial of service attacks P Schottle, T Dreibholz, EP Rathgeb 2008 33rd IEEE Conference on Local Computer Networks (LCN), 207-214, 2008 | 9 | 2008 |
Bitspotting: Detecting optimal adaptive steganography B Johnson, P Schöttle, A Laszka, J Grossklags, R Böhme International Workshop on Digital Watermarking, 3-18, 2013 | 8 | 2013 |
Detecting adversarial examples-a lesson from multimedia forensics P Schöttle, A Schlögl, C Pasquini, R Böhme arXiv preprint arXiv:1803.03613, 2018 | 7 | 2018 |
Predictable rain? Steganalysis of public-key steganography using wet paper codes M Carnein, P Schöttle, R Böhme Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014 | 7 | 2014 |