TUM Logo

Konstantin Böttinger

Konstantin Böttinger

ExtDoktorand

Fraunhofer AISEC

Publications

2023   Localized Shortcut Removal

XAI4CV @ CVPR2023

  R2-AD2: Detecting Anomalies by Analysing the Raw Gradient

Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2022, Grenoble, France, September 19–23, 2022, Proceedings, Part I

2022   Real or Fake? A Practical Method for Detecting Tempered Images

IPAS2022

  Assessing the Impact of Transformations on Physical Adversarial Attacks

Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security

  Anomaly Detection by Recombining Gated Unsupervised Experts

International Joint Conference on Neural Networks, IJCNN 2022. Proceedings

  Rectifying adversarial inputs using XAI techniques

2022 30th European Signal Processing Conference

  Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators

2022 International Joint Conference on Neural Networks

2021   DA3G: Detecting Adversarial Attacks by Analysing Gradients

Computer Security ESORICS 2021

  Language Dependencies in Adversarial Attacks on Speech Recognition Systems

2021 ISCA Symposium on Security and Privacy in Speech Communication

  Visualizing Automatic Speech Recognition Means for a Better Understanding?

2021 ISCA Symposium on Security and Privacy in Speech Communication

2019   Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography

28th USENIX Security Symposium (USENIX Security 19)

2018   High-performance unsupervised anomaly detection for cyber-physical system networks

Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC)

  Deep Reinforcement Fuzzing

IEEE Symposium on Security and Privacy Workshops, SPW 2018

2017   Guiding a colony of black-box fuzzers with chemotaxis

SPW 2017, IEEE Symposium on Security and Privacy Workshops.

  Stack overflow considered harmful? The impact of copy&paste on Android application security

IEEE Symposium on Security and Privacy, SP 2017

2016   Fuzzing binaries with Lévy flight swarms

EURASIP journal on information security (2016)

  DeepFuzz: Triggering vulnerabilities deeply hidden in binaries

Detection of intrusions and malware, and vulnerability assessment. 13th International Conference

  Detecting and correlating supranational threats for critical infrastructures

15th European Conference on Cyber Warfare and Security

  Hunting bugs with Lévy flight foraging

IEEE Symposium on Security and Privacy Workshops, SPW 2016

2015   Detecting Fingerprinted Data in TLS Traffic

Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS)

2012   A Secure Architecture for Smart Meter Systems

4th International Symposium on Cyberspace Safety and Security (CSS 2012)