Folgen
Konstantin Böttinger
Konstantin Böttinger
Bestätigte E-Mail-Adresse bei aisec.fraunhofer.de
Titel
Zitiert von
Zitiert von
Jahr
Stack overflow considered harmful? the impact of copy&paste on android application security
F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl
2017 IEEE symposium on security and privacy (SP), 121-136, 2017
3772017
Does audio deepfake detection generalize?
NM Müller, P Czempin, F Dieckmann, A Froghyar, K Böttinger
arXiv preprint arXiv:2203.16263, 2022
1452022
Deep reinforcement fuzzing
K Böttinger, P Godefroid, R Singh
2018 IEEE Security and Privacy Workshops (SPW), 116-122, 2018
1422018
High-performance unsupervised anomaly detection for cyber-physical system networks
P Schneider, K Böttinger
Proceedings of the 2018 workshop on cyber-physical systems security and …, 2018
972018
A collaborative cyber incident management system for European interconnected critical infrastructures
G Settanni, F Skopik, Y Shovgenya, R Fiedler, M Carolan, D Conroy, ...
Journal of Information Security and Applications 34, 166-182, 2017
762017
Human perception of audio deepfakes
NM Müller, K Pizzi, J Williams
Proceedings of the 1st International Workshop on Deepfake Detection for …, 2022
692022
Speech is silver, silence is golden: What do ASVspoof-trained models really learn?
NM Müller, F Dieckmann, P Czempin, R Canals, K Böttinger, J Williams
arXiv preprint arXiv:2106.12914, 2021
672021
DLA: dense-layer-analysis for adversarial example detection
P Sperl, CY Kao, P Chen, X Lei, K Böttinger
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 198-215, 2020
522020
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography
F Fischer, H Xiao, CY Kao, Y Stachelscheid, B Johnson, D Raza, ...
462019
Deepfuzz: Triggering vulnerabilities deeply hidden in binaries
K Böttinger, C Eckert
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
412016
Deutsche Normungsroadmap Künstliche Intelligenz
R Adler, A Bunte, S Burton, J Großmann, A Jaschke, P Kleen, JM Lorenz, ...
DIN, 2022
272022
Data poisoning attacks on regression learning and corresponding defenses
N Müller, D Kowatsch, K Böttinger
2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing …, 2020
272020
Gradient masking and the underestimated robustness threats of differential privacy in deep learning
F Boenisch, P Sperl, K Böttinger
arXiv preprint arXiv:2105.07985, 2021
252021
Mlaad: The multi-language audio anti-spoofing dataset
NM Müller, P Kawa, WH Choong, E Casanova, E Gölge, T Müller, P Syga, ...
arXiv preprint arXiv:2401.09512, 2024
232024
On GDPR Compliance of Companies’ Privacy Policies
K Böttinger
Text, Speech, and Dialogue: 22nd International Conference, TSD 2019 …, 2019
22*2019
Activation anomaly analysis
P Sperl, JP Schulze, K Böttinger
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2020
192020
A unified architecture for industrial IoT security requirements in open platform communications
G Hansch, P Schneider, K Fischer, K Böttinger
2019 24th ieee international conference on emerging technologies and factory …, 2019
182019
Distributed Anomaly Detection of Single Mote Attacks in RPL Networks.
NM Müller, P Debus, D Kowatsch, K Böttinger
ICETE (2), 378-385, 2019
172019
Side-channel aware fuzzing
P Sperl, K Böttinger
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
132019
Detecting fingerprinted data in TLS traffic
K Böttinger, D Schuster, C Eckert
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
132015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20