Konstantin Böttinger
Konstantin Böttinger
ExtDoktorand
| Fraunhofer AISEC |
Publications
| 2023 | Localized Shortcut Removal
XAI4CV @ CVPR2023 |
|
| R2-AD2: Detecting Anomalies by Analysing the Raw Gradient
Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2022, Grenoble, France, September 19–23, 2022, Proceedings, Part I |
||
| 2022 | Real or Fake? A Practical Method for Detecting Tempered Images
IPAS2022 |
|
| Assessing the Impact of Transformations on Physical Adversarial Attacks
Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security |
||
| Anomaly Detection by Recombining Gated Unsupervised Experts
International Joint Conference on Neural Networks, IJCNN 2022. Proceedings |
||
| Rectifying adversarial inputs using XAI techniques
2022 30th European Signal Processing Conference |
||
| Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators
2022 International Joint Conference on Neural Networks |
||
| 2021 | DA3G: Detecting Adversarial Attacks by Analysing Gradients
Computer Security ESORICS 2021 |
|
| Language Dependencies in Adversarial Attacks on Speech Recognition Systems
2021 ISCA Symposium on Security and Privacy in Speech Communication |
||
| Visualizing Automatic Speech Recognition Means for a Better Understanding?
2021 ISCA Symposium on Security and Privacy in Speech Communication |
||
| 2019 | Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography
28th USENIX Security Symposium (USENIX Security 19) |
|
| 2018 | High-performance unsupervised anomaly detection for cyber-physical system networks
Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC) |
|
| Deep Reinforcement Fuzzing
IEEE Symposium on Security and Privacy Workshops, SPW 2018 |
||
| 2017 | Guiding a colony of black-box fuzzers with chemotaxis
SPW 2017, IEEE Symposium on Security and Privacy Workshops. |
|
| Stack overflow considered harmful? The impact of copy&paste on Android application security
IEEE Symposium on Security and Privacy, SP 2017 |
||
| 2016 | Fuzzing binaries with Lévy flight swarms
EURASIP journal on information security (2016) |
|
| DeepFuzz: Triggering vulnerabilities deeply hidden in binaries
Detection of intrusions and malware, and vulnerability assessment. 13th International Conference |
||
| Detecting and correlating supranational threats for critical infrastructures
15th European Conference on Cyber Warfare and Security |
||
| Hunting bugs with Lévy flight foraging
IEEE Symposium on Security and Privacy Workshops, SPW 2016 |
||
| 2015 | Detecting Fingerprinted Data in TLS Traffic
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS) |
|
| 2012 | A Secure Architecture for Smart Meter Systems
4th International Symposium on Cyberspace Safety and Security (CSS 2012) |
