Konstantin Böttinger

Orcid: 0000-0002-9337-7506

According to our database1, Konstantin Böttinger authored at least 54 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Imbalance in Regression Datasets.
CoRR, 2024

A New Approach to Voice Authenticity.
CoRR, 2024

MLAAD: The Multi-Language Audio Anti-Spoofing Dataset.
CoRR, 2024

2023
Physical Adversarial Examples for Multi-Camera Systems.
CoRR, 2023

Complex-valued neural networks for voice anti-spoofing.
CoRR, 2023

Shortcut Detection with Variational Autoencoders.
CoRR, 2023

Introducing Model Inversion Attacks on Automatic Speaker Recognition.
CoRR, 2023

Localized Shortcut Removal.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Protecting Publicly Available Data With Machine Learning Shortcuts.
Proceedings of the 34th British Machine Vision Conference 2023, 2023

2022
Shortcut Removal for Improved OOD-Generalization.
CoRR, 2022

Visualizing Automatic Speech Recognition - Means for a Better Understanding?
CoRR, 2022

Language Dependencies in Adversarial Attacks on Speech Recognition Systems.
CoRR, 2022

R2-AD2: Detecting Anomalies by Analysing the Raw Gradient.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Real or Fake? A Practical Method for Detecting Tempered Images.
Proceedings of the 5th IEEE International Conference on Image Processing Applications and Systems, 2022

Does Audio Deepfake Detection Generalize?
Proceedings of the Interspeech 2022, 2022

Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators.
Proceedings of the International Joint Conference on Neural Networks, 2022

Anomaly Detection by Recombining Gated Unsupervised Experts.
Proceedings of the International Joint Conference on Neural Networks, 2022

Rectifying adversarial inputs using XAI techniques.
Proceedings of the 30th European Signal Processing Conference, 2022

Assessing the Impact of Transformations on Physical Adversarial Attacks.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

2021
Robuste Lernverfahren.
Datenschutz und Datensicherheit, 2021

Human Perception of Audio Deepfakes.
CoRR, 2021

Speech is Silver, Silence is Golden: What do ASVspoof-trained Models Really Learn?
CoRR, 2021

Gradient Masking and the Underestimated Robustness Threats of Differential Privacy in Deep Learning.
CoRR, 2021

Defending against Adversarial Denial-of-Service Attacks.
CoRR, 2021

Deep Reinforcement Learning for Backup Strategies against Adversaries.
CoRR, 2021

Adversarial Vulnerability of Active Transfer Learning.
Proceedings of the Advances in Intelligent Data Analysis XIX, 2021

DA3G: Detecting Adversarial Attacks by Analysing Gradients.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Towards Resistant Audio Adversarial Examples.
CoRR, 2020

Optimizing Information Loss Towards Robust Neural Networks.
CoRR, 2020

A<sup>3</sup>: Activation Anomaly Analysis.
CoRR, 2020

Data Poisoning Attacks on Regression Learning and Corresponding Defenses.
Proceedings of the 25th IEEE Pacific Rim International Symposium on Dependable Computing, 2020

Activation Anomaly Analysis.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020

DLA: Dense-Layer-Analysis for Adversarial Example Detection.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
Fuzzing with Stochastic Feedback Processes.
PhD thesis, 2019

DLA: Dense-Layer-Analysis for Adversarial Example Detection.
CoRR, 2019

Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography.
Proceedings of the 28th USENIX Security Symposium, 2019

On GDPR Compliance of Companies' Privacy Policies.
Proceedings of the Text, Speech, and Dialogue - 22nd International Conference, 2019

Context by Proxy: Identifying Contextual Anomalies Using an Output Proxy.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Distributed Anomaly Detection of Single Mote Attacks in RPL Networks.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications.
Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation, 2019

Side-Channel Aware Fuzzing.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Deep Reinforcement Fuzzing.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

High-Performance Unsupervised Anomaly Detection for Cyber-Physical System Networks.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

2017
A collaborative cyber incident management system for European interconnected critical infrastructures.
J. Inf. Secur. Appl., 2017

Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Guiding a Colony of Black-Box Fuzzers with Chemotaxis.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

2016
Chemotactic Test Case Recombinationfor Large-Scale Fuzzing.
J. Cyber Secur. Mobil., 2016

Fuzzing binaries with Lévy flight swarms.
EURASIP J. Inf. Secur., 2016

Hunting Bugs with Lévy Flight Foraging.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
A Blueprint for a Pan-European Cyber Incident Analysis System.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Detecting Fingerprinted Data in TLS Traffic.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
TrustID: trustworthy identities for untrusted mobile devices.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2012
A Secure Architecture for Smart Meter Systems.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012


  Loading...