Martin Härterich

Orcid: 0000-0002-8349-5912

According to our database1, Martin Härterich authored at least 15 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hunting for Truth: Analyzing Explanation Methods in Learning-based Vulnerability Discovery.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

Detecting Backdoors in Collaboration Graphs of Software Repositories.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability Discovery.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

PAVUDI: Patch-based Vulnerability Discovery using Machine Learning.
Proceedings of the Annual Computer Security Applications Conference, 2023

2021
Explaining Graph Neural Networks for Vulnerability Discovery.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

2019
Monte Carlo and Reconstruction Membership Inference Attacks against Generative Models.
Proc. Priv. Enhancing Technol., 2019

Reconstruction and Membership Inference Attacks against Generative Models.
CoRR, 2019

2018
Towards an Automatic Generation of Low-Interaction Web Application Honeypots.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

2014
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Privacy by Encrypted Databases.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
An Encrypted In-Memory Column-Store: The Onion Selection Problem.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Optimal Re-encryption Strategy for Joins in Encrypted Databases.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Adjustably encrypted in-memory column-store.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013


  Loading...