Pascal Schöttle

Orcid: 0000-0001-8710-9188

According to our database1, Pascal Schöttle authored at least 34 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Incremental Whole Plate ALPR Under Data Availability Constraints.
Proceedings of the 13th International Conference on Pattern Recognition Applications and Methods, 2024

2023
Less is More: The Influence of Pruning on the Explainability of CNNs.
CoRR, 2023

On the Effect of Adversarial Training Against Invariance-based Adversarial Examples.
Proceedings of the 8th International Conference on Machine Learning Technologies, 2023

HE-MAN - Homomorphically Encrypted MAchine learning with oNnx models.
Proceedings of the 8th International Conference on Machine Learning Technologies, 2023

Generating Invariance-Based Adversarial Examples: Bringing Humans Back into the Loop.
Proceedings of the Image Analysis and Processing - ICIAP 2023 Workshops, 2023

Pruning for Power: Optimizing Energy Efficiency in IoT with Neural Network Pruning.
Proceedings of the Engineering Applications of Neural Networks, 2023

2022
Perspectives on Socially Intelligent Conversational Agents.
Multimodal Technol. Interact., 2022

Machine unlearning: linear filtration for logit-based classifiers.
Mach. Learn., 2022

Pruning in the Face of Adversaries.
Proceedings of the Image Analysis and Processing - ICIAP 2022, 2022

U Can't (re)Touch This - A Deep Learning Approach for Detecting Image Retouching.
Proceedings of the Image Analysis and Processing - ICIAP 2022, 2022

2021
When Should You Defend Your Classifier? - - A Game-Theoretical Analysis of Countermeasures Against Adversarial Examples.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Adversarial Examples Against a BERT ABSA Model - Fooling Bert With L33T, Misspellign, and Punctuation, .
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Continuous Planning and Forecasting Framework (CPFF) for Agile Project Management: Overcoming the.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

2018
Detecting Adversarial Examples - A Lesson from Multimedia Forensics.
CoRR, 2018

Detecting Adversarial Examples - a Lesson from Multimedia Security.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
Decoy Password Vaults: At Least as Hard as Steganography?
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Mixing Coins of Different Quality: A Game-Theoretic Approach.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Game Theory and Adaptive Steganography.
IEEE Trans. Inf. Forensics Secur., 2016

Telltale Watermarks for Counting JPEG Compressions.
Proceedings of the Media Watermarking, 2016

Forensics of High Quality and Nearly Identical JPEG Image Recompression.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

2015
Adaptive Steganography and Steganalysis with Fixed-Size Embedding.
Trans. Data Hiding Multim. Secur., 2015

Forensics of high-quality JPEG images with color subsampling.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Thinking beyond the block: block matching for copy-move forgery detection revisited.
Proceedings of the Media Watermarking, 2015

2014
Secure Team Composition to Thwart Insider Threats and Cyber-Espionage.
ACM Trans. Internet Techn., 2014

On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Predictable rain?: steganalysis of public-key steganography using wet paper codes.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

The role of side information in steganography.
PhD thesis, 2014

2013
Bitspotting: Detecting Optimal Adaptive Steganography.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

A game-theoretic analysis of content-adaptive steganography with independent embedding.
Proceedings of the 21st European Signal Processing Conference, 2013

Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Weighted stego-image steganalysis for naive content-adaptive embedding.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

A Game-Theoretic Approach to Content-Adaptive Steganography.
Proceedings of the Information Hiding - 14th International Conference, 2012

Where to Hide the Bits ?
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

2008
On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacks.
Proceedings of the LCN 2008, 2008


  Loading...