Follow
Pascal Schöttle
Pascal Schöttle
Professor, Department Digital Business & Software Engineering, MCI Innsbruck, Austria
Verified email at mci.edu - Homepage
Title
Cited by
Cited by
Year
Machine unlearning: Linear filtration for logit-based classifiers
T Baumhauer, P Schöttle, M Zeppelzauer
Machine Learning 111 (9), 3203-3226, 2022
1402022
Where to hide the bits?
B Johnson, P Schöttle, R Böhme
Decision and Game Theory for Security: Third International Conference …, 2012
882012
Game theory and adaptive steganography
P Schöttle, R Böhme
IEEE Transactions on Information Forensics and Security 11 (4), 760-773, 2015
532015
A game-theoretic approach to content-adaptive steganography
P Schöttle, R Böhme
Information Hiding: 14th International Conference, IH 2012, Berkeley, CA …, 2013
492013
Detecting adversarial examples-a lesson from multimedia security
P Schöttle, A Schlögl, C Pasquini, R Böhme
2018 26th European Signal Processing Conference (EUSIPCO), 947-951, 2018
312018
Weighted stego-image steganalysis for naive content-adaptive embedding
P Schöttle, S Korff, R Böhme
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
272012
Mixing coins of different quality: A game-theoretic approach
S Abramova, P Schöttle, R Böhme
Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017
192017
Secure team composition to thwart insider threats and cyber-espionage
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
ACM Transactions on Internet Technology (TOIT) 14 (2-3), 1-22, 2014
182014
Forensics of high quality and nearly identical jpeg image recompression
C Pasquini, P Schöttle, R Böhme, G Boato, F Perez-Gonzalez
Proceedings of the 4th ACM workshop on information hiding and multimedia …, 2016
152016
Managing the weakest link: A game-theoretic approach for the mitigation of insider threats
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
152013
A game-theoretic analysis of content-adaptive steganography with independent embedding
P Schöttle, A Laszka, B Johnson, J Grossklags, R Böhme
21st European Signal Processing Conference (EUSIPCO 2013), 1-5, 2013
132013
Thinking beyond the block: block matching for copy-move forgery detection revisited
M Kirchner, P Schoettle, C Riess
Media Watermarking, Security, and Forensics 2015 9409, 11-22, 2015
122015
Blockchain use cases against climate destruction
F Thalhammer, P Schöttle, M Janetschek, C Ploder
Cloud Computing and Data Science, 60-76, 2022
112022
Forensics of high-quality JPEG images with color subsampling
M Carnein, P Schöttle, R Böhme
2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015
112015
Adversarial examples against a bert absa model–fooling bert with l33t, misspellign, and punctuation
N Hofer, P Schöttle, A Rietzler, S Stabinger
Proceedings of the 16th International Conference on Availability …, 2021
102021
Continuous Planning and Forecasting Framework (CPFF) for Agile Project Management: Overcoming the
T Dilger, C Ploder, W Haas, P Schöttle, R Bernsteiner
Proceedings of the 21st Annual Conference on Information Technology …, 2020
102020
On the application of anomaly detection in reliable server pooling systems for improved robustness against denial of service attacks
P Schottle, T Dreibholz, EP Rathgeb
2008 33rd IEEE Conference on Local Computer Networks (LCN), 207-214, 2008
92008
Bitspotting: Detecting optimal adaptive steganography
B Johnson, P Schöttle, A Laszka, J Grossklags, R Böhme
International Workshop on Digital Watermarking, 3-18, 2013
82013
Detecting adversarial examples-a lesson from multimedia forensics
P Schöttle, A Schlögl, C Pasquini, R Böhme
arXiv preprint arXiv:1803.03613, 2018
72018
Predictable rain? Steganalysis of public-key steganography using wet paper codes
M Carnein, P Schöttle, R Böhme
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
72014
The system can't perform the operation now. Try again later.
Articles 1–20