piwik-script

Intern
    Graduate School Science and Technology

    Current Projects

    Current doctoral projects

    Doctoral Candidate

    Title of the doctoral research project

    Cooperating Institutions

    Philipp Koch 

    Befahrbarkeitsanalyse in unwegsamem Gelände unter Berücksichtigung der kinematischen Konzepte mobiler Roboter

    TH Nürnberg,

    Uni Würzburg

    Andreas Schütz

    Effiziente und zielgerichtete Sensibilisierung der Mitarbeiter von kleinen und mittelständischen Unternehmen für Informationssicherheit

    FHWS Würzburg-Schweinfurt,

    FAU Erlangen-Nürnberg

         
    Gabriel Herl

     Multipositionale Computertomographie

    TH Deggendorf,

    FAU Erlangen-Nürnberg

    Thomas Schulz A Reference Architecture for Smart Mobility Platforms

    HS Neu-Ulm,

    TU München

    Daniel Vögele Kamerabasiertes System zur Ermittlung der realen Aufspannsituation auf Werkzeugmaschinen

    OTH Regensburg,

    Uni Passau

    Florian Olbrich Safety Systems for UAVs

    OTH Regensburg,

    TU München

    Bettina Kriegl Service Innovation at Healthcare`s Frontline

    TH Ingolstadt,

    Uni Bayreuth

    Hanning Liang
                  Deflectometric Measurement of the Topography of Reflecting Freeform Surfaces in Motion

    HAW Landshut,

    Uni Passau

    Manuel Fritsche Entwicklung eines kombinierten Auslegungsverfahrens für radiale Ventilatoren auf Basis eines mit theoretischen Ansätzen, digitalen CFD-Berechnungen und physischen Versuchen trainierten künstlichen neuronalen Netzes (Metamodell)

    HS Coburg,

    FAU Erlangen-Nürnberg

    Stefan Kerscher Robuste Prädiktion von Verkehrsteilnehmern in einer urbanen Umgebung

    TH Deggendorf,

    Uni Regensburg,

    Continental

    Tobias Fertig Messen der Information Security Awareness in KMUs

    FHWS Würzburg-Schweinfurt,

    FAU Erlangen-Nürnberg

    Helge Olberding Thematische Kartographie und 3D-Geovisualisierung in interaktiven VR-Anwendungen

    FHWS Würzburg-Schweinfurt,

    Uni Würzburg

    Simon Seibt Bildbasierte Medienproduktionskette

    TH Nürnberg,

    Uni Würzburg

    Markus Miller Auf künstliche Intelligenz basierende rekonstruktive Verfahren zur Umfeldmodellierung

    HAW München

    TU München

    Theresa Meyer Änderungsdetektion durch Analyse von Bildsequenzen und BIM-konformen Innenraummodellen

    FHWS Würzburg-Schweinfurt

    TU München

    Elisabeth Wittmann Exploring the power of AI in spectral analysis particularly leveraging simulation via transfer learning

    OTH Regensburg,

    TU München

    Stefan Böhm Untersuchung verschiedener Ansätze der künstlichen Intelligenz zur Optimierung der Prozessaubläufe und Mensch-Maschinen-Kollaboration in der I4.0-Produktion

    TH Rosenheim,

    TU München

    Peter Meier Real-Time Signal Processing Algorithms for Interactive Music Analysis Applications

    TH Deggendorf,

    FAU Erlangen-Nürnberg

    Markus Schmidtner Konzeption und Realisierung eines adaptiven Referenzmodells für agile und hybride Vorgehensmodelle im Produktentstehungsprozess der Automobilindustrie

    HAW Landshut,

    FAU Erlangen-Nürnberg

     

    Sebastian Renner Sichere leichtgewichtige authentifizierte Verschlüsselung für kritische Infrastrukturen im Internet der Dinge

    OTH Regensburg,

    TU München

    Sina Zimmermann

    Incentives for Sustainable Tranportation Behaviour Enabled by Digital Mobility Platforms

    HS Neu-Ulm;

    TU München

    Nikolai Körber Energy-Efficient Deep Learning-Based Image Compression for LPWANs on Resource-Constrainded AIoT

    HAW Landshut;

    TU München

    Finn Reiche Entwicklung eines Referenzmodells zur Plattformökonomie von Hochschulen

    HAW Landshut,

    FAU Erlangen-Nürnberg

    Tobias Höfer
       Vergleich unterschiedlicher Deep Learning Ansätze im Hinblick auf Genauigkeit, Stabilität, Effizienz und Interpretierbarkeit

    HAW München,

    TU München

    Christian Sauer Development, Simulation and Evaluation of Mobile Wireless Networks in Industrial Applications

    FHWS Würzburg-Schweinfurt,

    Uni Würzburg

    Maximilian Hell Synergetic use of Sentinel-1 and Sentinel-2 data for large-scale Land cover/Land use mapping

    FHWS Würzburg Schweinfurt,

    Uni Würzburg

      Dominik Stecher
    Fault Detection and Monitoring of District Heating Systems using Machine Learning

    TH Rosenheim,

    Uni Würzburg

      Maximilian Karthan

     

    Adaptive Feedback for mHealth-Applications with Gamification and Serious Games

    HAW Neu-Ulm,

    Uni Würzburg

    Alumni

    Dr. Rainer Koch

    Sensor fusion for precise mapping of transparent and specular reflective objects

     

    TH Nürnberg,

    Uni Würzburg

     

    Prof. Dr. Christian Pfitzner

    Visual body weight estimation with focus on clinical applications

    TH Nürnberg,

    Uni Würzburg

    Dr.-Ing. Maria Chizhova Virtuelle 3D-Rekonstruktion von zerstörten russisch-orthodoxen Kirchen aus unvollständigen Punktwolken 

    FHWS Würzburg-Schweinfurt,

    TU München

    Dr.-Ing. Matthias Niedermaier Security Herausforderungen und Werkzeuge für robuste industrielle Systeme im Internet-der-Dinge 

    HAW Augsburg;

    TU München

    Dr. Markus Ring

    Detektion sicherheitskritischer Ereignisse in Unternehmensnetzwerken mittels Data Mining

    HS Coburg;

    Universität Würzburg

    Dr. Manuel Ciba

    Messung der Synchronität und Abschätzung der Konnektivität von in-vitro Spike-Trains

    TH Aschaffenburg;

    Universität Würzburg

    Dr.-Ing. Katja Auernhammer Mask-Based Black-Box Attacks on Safety-Critical Systems thath use Maschine Learning

    TH Nürnberg;

    FAU Erlangen-Nürnberg

    Dr.-Ing. Markus Zoppelt Software Security Design for Cyber-Physical Systems

    TH Nürnberg,

    Universität Würzburg

    Latest Publications

    [ 2022 ] [ 2021 ] [ 2020 ] [ 2019 ] [ 2018 ] [ 2017 ]

    2022 [ nach oben ]

    • 1.
      Timinger, H., Schmidtner, M., Reiche, F.: A Framework for the Construction and Tailoring of Engineering Development Process Models. IEEE Transactions on Engineering Management. 1–22 (2022).
       

    2021 [ nach oben ]

    • 1.
      Koerber, N., Siebert, A., Hauke, S., Muelle-Gritschneder: Tiny Generative Image Compression for Bandwidth-Constrained Sensor Applications. IEEE International Conference on Machine Learning and Applications. (2021).
       
    • 2.
      Schmidtner, M., Doering, C., Timinger, H.: Agile Working During COVID-19 Pandemic. IEEE Engineering Management Review. 49, 18–32 (2021).
       
    • 3.
      Schmidtner, M., Doering, C., Hilpoltsteiner, D., Martens, M., Timinger, H.: A fractional 0–1 decision making approach for process variant management. 2021 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC). pp. 1–8 (2021).
       
    • 4.
      Kerscher, S., Müller, N., Ludwig, B.: Assessing the lack of context knowledge for a pedestrian predicting neural network. International Journal of Intelligent Robotics and Applications. (2021).
       
    • 5.
      Sauer, C., Lyczkowski, E., Schmidt, M., Nüchter, A., Hoßfeld, T.: Testing AGV Mobility Control Method for MANET Coverage Optimization using Procedural Generation. Proceedings of the ACM Conference MSWiM: Modeling, Analysis and Simulation of Wireless and Mobile Systems. , Alicante, Spain (2021).
       
    • 6.
      Weiss, N., Renner, S., Mottok, J., Vaclav, M.: Automated Threat Evaluation of Automotive Diagnostic Protocols. 8th Embedded Security in Cars Conference (ESCAR USA) (2021).
       
    • 7.
      Ulsamer, P., Schütz, A., Fertig, T., Keller, L.: Immersive Storytelling for Information Security Awareness Training in Virtual Reality. Proceedings of the 54th Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences (2021).
       
    • 8.
      Schmidtner, M., Timinger, H.: HyValue – Ein adaptives Referenzmodell für den hybriden Produktentstehungsprozess in der Automobilindustrie. In: Lehmann L., E.D. (ed.) Kompetenzen für die digitale Transformation 2020 Digitalisierung der Arbeit - Kompetenzen - Nachhaltigkeit 1. Digitalkompetenz-Tagung. pp. 37–48. Springer Vieweg, Berlin, Heidelberg (2021).
       
    • 9.
      Doering, C., Schmidtner, M., Timinger, H.: Collaboration for Innovation Between Universities and Smart Cities. 2021 IEEE European Technology and Engineering Management Summit (E-TEMS). pp. 82–86 (2021).
       
    • 10.
      Herl, G., Hiller, J., Thies, M., Zaech, J., Unberath, M., Maier, A.: Task-Specific Trajectory Optimisation for Twin-Robotic X-Ray Tomography. IEEE Transactions on Computational Imaging. 7, 894–907 (2021).
       
    • 11.
      Bergler, M., Tolvanen, J., Zoppelt, M., Tavakoli Kolagari, R.: Social Engineering Exploits in Automotive Software Security: Modeling Human-targeted Attacks with SAM. In: Castanier, B., Cepin, M., Bigaud, D., and Berenguer, C. (eds.) The 31st European Safety and Reliability Conference, Angers, France (2021).
       
    • 12.
      Schulz, T., Zimmermann, S., Böhm, M., Gewald, H., Krcmar, H.: Value co-creation and co-destruction in service ecosystems: The case of the Reach Now app. Technological Forecasting and Social Change. 170, issue C, (2021).
       
    • 13.
      Zimmermann, S., Wagner, H.-T., Rössler, P., Gewald, H., Krcmar, H.: The Role of Utilitarian vs. Hedonic Factors for the Adoption of AI-based Smart Speakers. (Proceedings of the) 27th Americas Conference on Information Systems (AMCIS) "Digital Innovation and Entrepreneurship" (2021).
       
    • 14.
      Zimmermann, S., Hein, A., Schulz, T., Gewald, H., Krcmar, H.: Digital Nudging Toward Pro-Environmental Behavior: A Literature Review. Proceedings of the 25th Pacific Asia Conference on Information Systems (PACIS) (2021).
       
    • 15.
      Miller, M., Nischwitz, A., Westermann, R.: Deep Light Direction Reconstruction from single RGB images. WSCG 2021: full papers proceedings: 29. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, p. 31-40. (2021).
       
    • 16.
      Meyer, T., Brunn, A., Stilla, U.: Accuracy investigation on image-based change detection for BIM compliant indoor models. International Society for Photogrammetry and Remote Sensing. V-4-2021, 105–112 (2021).
       
    • 17.
      Weigl, S., Wittmann, E., Rück, T., Bierl, R., Matysik, F.-M.: Effects of ambient parameters and cross-sensitivities from O2, CO2 and H2O on the photoacoustic detection of acetone in the UV region. Sensors and Actuators B: Chemical. 328, (2021).
       
    • 18.
      Meier, P., Krump, G., Müller, M.: A Real-Time Beat Tracking System Based on Predominant Local Pulse Information. Demos and Late Breaking News of the InternationalSociety for Music Information Retrieval Conference (ISMIR) (2021).
       

    2020 [ nach oben ]

    • 1.
      Wunderlich, S., Ring, M., Landes, D., Hotho, A.: Comparison of System Call Representations for Intrusion Detection. Logic Journal of the IGPL. jzaa058, (2020).
       
    • 2.
      Doering, C., Schmidtner, M., Maerz, J., Mueller, V., Timinger, H.: Agile working during COVID-19 pandemic. Research Notes on Data and Process Science. issue 1, (2020).
       
    • 3.
      Auernhammer, K., Freiling, F., Tavakoli Kolagari, R.: Efficient Black-Box Search for Adversarial Examples using Relevance Masks. In DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security (DYNAMICS) Workshop (2020).
       
    • 4.
      Schmidtner, M., Timinger, H.: HyValue – a Hybrid Reference Model for the Automotive Product Development Process. IEEE TEMS Technology & Engineering Management Society (2020).
       
    • 5.
      Kriegl, B., Woratschek, H., Raab, A.: Physicians and Institutional Work: Unpacking the Black Box of Institutionalization at the Front Lines of Healthcare. Proceedings of the European Markting Academy (2020).
       
    • 6.
      Schulz, T., Böhm, M., Gewald, H., Krcmar, H.: Smart mobility – an analysis of potential customers’ preference structures Electronic Markets. Electronic Markets. Springer (2020).
       
    • 7.
      Ulsamer, P., Fertig, T., Pfeffel, K., Müller, N.H.: Motor Imagery to Control Mobile Applications - An fNIRS Study. In: Vogel, D., Shen, K.N., Ling, P.S., Hsu, C., Thong, J.Y.L., Marco, M.D., Limayem, M., and Xu, S.X. (eds.) PACIS. p. 56 (2020).
       
    • 8.
      Fertig, T., Schütz, A.E., Weber, K.: Current Issues Of Metrics For Information Security Awareness. In: Rowe, F., Amrani, R.E., Limayem, M., Newell, S., Pouloudi, N., van Heck, E., and Quammah, A.E. (eds.) ECIS (2020).
       
    • 9.
      Fertig, T., Schütz, A.E., Weber, K., Müller, N.H.: Towards an Information Security Awareness Maturity Model. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (26). pp. 587–599. Springer (2020).
       
    • 10.
      Müller-Wuttke, M., Schütz, A.E., Franz, F., Müller, N.H.: Proactive Smart City Interactions. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (26). pp. 615–624. Springer (2020).
       
    • 11.
      Schlör, D., Ring, M., Krause, A., Hotho, A.: Financial Fraud Detection with Improved Neural Arithmetic Logic Units. Springer (2020).
       
    • 12.
      Stock, A., Herl, G., Sauer, T., Hiller, J.: Edge-preserving compression of CT scans using wavelets. Insight- Non-Destructive Testing and Condition Monitoring. 62, 345–351 (7) (2020).
       
    • 13.
      Schmidtner, M., Timinger, H., Blust, M., Döring, C., Hilpoltsteiner, D.: Towards an adaptive reference model for agile and hybrid frameworks in automotive development. ICE/ITMC. pp. 1–10. IEEE (2020).
       
    • 14.
      Schulz, T., Böhm, M., Gewald, H.: Information Technology Choice in Mobility Service Ecosystems: A Qualitative Comparative Analysis. International Conference on Information Systems, ICIS 2020 Proceedings (2020).
       
    • 15.
      Schulz, T., Gewald, H., Böhm, M., Krcmar, H.: Smart Mobility: Contradictions in Value Co-Creation. Information Systems Frontiers. 22, (2020).
       
    • 16.
      Böhm, S.-A.: AI Approaches to Optimize Human-Machine Collaboration in Manufacturing Facilities with IoT-Ready Machinery. In: Davidsson, P., Langheinrich, M., Linde, P., Mayer, S., Casado-Mansilla, D., Spikol, D., Kraemer, F.A., and Russo, N.L. (eds.) IOT Companion. pp. 23:1–23:5. ACM (2020).
       
    • 17.
      Ciba, M., Bestel, R., Nick, C., de Arruda, G.F., Peron, T.K.D.M., Comin, C.H., da Fontoura Costa, L., Rodrigues, F.A., Thielemann, C.: Comparison of Different Spike Train Synchrony Measures Regarding Their Robustness to Erroneous Data From Bicuculline-Induced Epileptiform Activity. Neural Comput. 32, 887–911 (2020).
       
    • 18.
      Fertig, T., Schütz, A.: About the Measuring of Information Security Awareness: A Systematic Literature Review. 53rd Hawaii International Conference on System Sciences (2020).
       
    • 19.
      Brost, J., Egger, C., Lai, R.W.F., Schmid, F., Schröder, D., Zoppelt, M.: Threshold Password-Hardened Encryption Services. In: Ligatti, J., Ou, X., Katz, J., and Vigna, G. (eds.) ACM Conference on Computer and Communications Security. pp. 409–424. ACM (2020).
       
    • 20.
      Schütz, A., Fertig, T., Weber, K.: Analyze Before You Sensitize: Preparation of a Targeted ISA Training. 53rd Hawaii International Conference on System Sciences (2020).
       
    • 21.
      Fischer, F., Niedermaier, M., Hanka, T., Knauer, P., Merli, D.: Analysis of Industrial Device Architectures for Real-Time Operations under Denial of Service Attacks. CoRR. abs/2007.08885, (2020).
       
    • 22.
      Tritscher, J., Ring, M., Schlör, D., Hettinger, L., Hotho, A.: Evaluation of Post-hoc XAI Approaches Through Synthetic Tabular Data. In: Helic, D., Leitner, G., Stettinger, M., Felfernig, A., and Ras, Z.W. (eds.) ISMIS. pp. 422–430. Springer (2020).
       
    • 23.
      Schlör, D., Ring, M., Krause, A., Hotho, A.: Financial Fraud Detection with Improved Neural Arithmetic Logic Units. Presented at the (2020).
       
    • 24.
      Wolf, M., Ring, M., Landes, D.: Impact of Generative Adversarial Networks on NetFlow-Based Traffic Classification. In: Herrero, Álvaro, Cambra, C., Urda, D., Sedano, J., Quintián, H., and Corchado, E. (eds.) CISIS. pp. 393–404. Springer (2020).
       
    • 25.
      Schlör, D., Ring, M., Hotho, A.: iNALU: Improved Neural Arithmetic Logic Unit. Frontiers in Artificial Intelligence. 3, 71 (2020).
       
    • 26.
      Renner, S., Pozzobon, E., Mottok, J.: A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers. ICICS. pp. 495–509. Springer (2020).
       
    • 27.
      Weiss, N., Renner, S., Mottok, J., Matousek, V.: Transport Layer Scanning for Attack Surface Detection in Vehicular Networks. Transport Layer Scanning for Attack Surface Detection in Vehicular Networks. pp. 1–8. ACM Computer Science in Cars Symposium (2020).
       
    • 28.
      Liang, H., Sauer, T., Faber, C.: Using wavelet transform to evaluate single-shot phase measuring deflectometry data. SPIE Proceedings. SPIE The international society for optics and photonics (2020).
       
    • 29.
      Herl, G., Hiller, J., Maier, A.: Scanning trajectory optimisation using a quantitative Tuybased local quality estimation for robot-based X-ray computed tomography. Nondestructive Testing and Evaluation. 35, 287–303 (2020).
       
    • 30.
      Hilpoltsteiner, D., Schmidtner, M.: ADAMO - Echtzeit Kollaboration mit adaptiven Prozessmodellen (ADAMO - Real-Time Collaboration with Adaptive Process Models). In: Michael, J., Bork, D., Fill, H.-G., Fettke, P., Karagiannis, D., Köpke, J., Koschmider, A., Mayr, H.C., Rehse, J.-R., Reimer, U., Striewe, M., Tropmann-Frick, M., and Ullrich, M. (eds.) Modellierung (Companion). pp. 193–197. CEUR-WS.org (2020).
       

    2019 [ nach oben ]

    • 1.
      Liang, H., Zimmermann, A., Kickingereder, R., Faber, C.: Eine neue Methode zur Lösung des Höhenproblems in der Deflektometrie. Deutsche Gesellschaft für angewandte Optik e.V (2019).
       
    • 2.
      Niedermaier, M., Striegel, M., Sauer, F., Merli, D., Sigl, G.: Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node Devices. Computing Research Repository CoRR. abs/1908.03964, (2019).
       
    • 3.
      Zoppelt, M., Kolagari, R.T.: What Today’s Serious Cyber Attacks on Cars Tell Us: Consequences for Automotive Security and Dependability. In: Papadopoulos, Y., Aslansefat, K., Katsaros, P., and Bozzano, M. (eds.) IMBSA. pp. 270–285. Springer (2019).
       
    • 4.
      Zoppelt, M., Tavakoli Kolagari, R.: UnCle SAM : Modeling Cloud Attacks with the Automotive Security Abstraction Model. In CLOUD COMPUTING 2019. CLOUD COMPUTING 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization, At Venice, Italy (2019).
       
    • 5.
      Ring, M., Wunderlich, S., Scheuring, D., Landes, D., Hotho, A.: A survey of network-based intrusion detection data sets. In Computers and Security 86, 2019, 147-167, DOI:. Computers and Security. pp. 147–167 (2019).
       
    • 6.
      Fertig, T., Schütz, A.E., Weber, K., Müller, N.H.: Measuring the Impact of E-Learning Platforms on Information Security Awareness. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (25). pp. 26–37. Springer (2019).
       
    • 7.
      Schütz, A., Tobias, F., Kristin, W., Nicholas, M.: How E-Learning can Faciliate Information Security Awareness. Learning and Collaboration Technologies. (2019).
       
    • 8.
      Franz, F., Fertig, T., Schütz, A.E., Vu, H.: Towards Human-readable Smart Contracts. IEEE ICBC. pp. 38–42. IEEE (2019).
       
    • 9.
      Kerscher, S., Ludwig, B., Müller, N.: Investigating the Added Value of Combining Regression Results from Different Window Lengths. AIKE. pp. 128–135. IEEE (2019).
       
    • 10.
      Koch, P., May, S., Engelhardt, H., Ziegler, J., Nüchter, A.: Signed Distance Based Reconstruction for Exploration and Change Detection in Underground Mining Disaster Prevention. SSRR. pp. 1–2. IEEE (2019).
       
    • 11.
      Niedermaier, M., Hanka, T., Plaga, S., von Bodisco, A., Merli, D.: Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation. Computing Research Repository CoRR. abs/1904.04271, (2019).
       
    • 12.
      Weber, K., Saueressig, G., Schütz, A.: Informationssicherheit und Datenschutz an Hochschulen organisieren. Angewandte Forschung in der Wirtschaftsinformatik. (2019).
       
    • 13.
      Liang, H., Zimmermann, A., Reiner, K., Christian, F.: A new method for solving the height problem in deflectometry. Proceedings Applied Optical Metrology III (2019).
       
    • 14.
      Herl, G., Hiller, J., Kasperl, S., Maier, A.: Reduktion von Metallartefakten durch multipositionale Datenfusion in der industriellen Röntgen-Computertomographie. de Gruyter, tm-Technisches Messen. (2019).
       
    • 15.
      Sauer, F., Niedermaier, M., Kießling, S., Merli, D.: LICSTER - A Low-cost ICS Security Testbed for Education and Research. Computing Research Repository CoRR. abs/1910.00303, (2019).
       
    • 16.
      Herl, G., Hiller, J., Sauer, T.: Artifact reduction in X-ray computed tomography by multipositional data fusion using local image quality measures. Proceedings of the 9th Conference on Industrial Computed Tomography, Padova, Italy (iCT 2019) (2019).
       
    • 17.
      Schütz, A.E., Fertig, T., Weber, K., Müller, N.H.: How E-Learning Can Facilitate Information Security Awareness. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (25). pp. 390–401. Springer (2019).
       
    • 18.
      Niedermaier, M., Fischer, F., Merli, D., Sigl, G.: Network Scanning and Mapping for IIoT Edge Node Device Security. Computing Research Repository CoRR. abs/1910.07622, (2019).
       
    • 19.
      Niedermaier, M., Merli, D., Georg, S.: A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices. Mediterranean Conference on Embedded Computing (MECO); IEEE. (2019).
       
    • 20.
      Koch, P., May, S., Engelhardt, H., Ziegler, J., Nüchter, A.: Signed Distance Based Reconstruction for Exploration and Change Detection in Underground Mining Disaster Prevention. IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR ’19). pp. 1–2 (2019).
       
    • 21.
      Reinker, F., Wagner, R., Hasselmann, K., aus der Wiesche, S., Fritsche, M., Epple, P., Rußwurm, H.J.: Testing, modeling and simulation of fans working with organic vapors. Proceedings of 13th European Conference on Turbomachinery Fluid dynamics & Thermodynamics (2019).
       
    • 22.
      Auernhammer, K., Tavakoli Kolagari, R., Zoppelt, M.: Attacks on Machine Learning: Lurking Danger for Accountability. Proceedings of the Association for the Advancement of Artificial Intelligence AAAI Workshop on Artificial Intelligence Safety 2019 (2019).
       
    • 23.
      aus der Wiesche, S., Reinker, F., Wagner, R., Epple, P., Fritsche, M., Russwurm, H.J.: An Accurate Thermal Measurement Approach for Determining Fan Efficiencies Based on System Identification. ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference (2019).
       
    • 24.
      Fritsche, M., Epple, P., Hasselmann, K., Reinker, F., Wagner, R., aus der Wiesche, S., Russwurm, H.: CFD-Simulation of Centrifugal Fan Performance Characteristics Using Ideal and Real Gas Models for Air and Organic Fluids. ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference (2019).
       
    • 25.
      Epple, P., Steppert, M., Malcherek, A., Fritsche, M.: Theoretical and Numerical Analysis of the Pressure Distribution and Discharge Velocity in Flows Under Inclined Sluice Gates. ASME-JSME_KSME 2019 8th Joint Fluids Engineering Conference. (2019).
       
    • 26.
      von Rymon Lipinski, B., Seibt, S., Roth, J., Abé, D.: Level Graph - Incremental Procedural Generation of Indoor Levels using Minimum Spanning Trees. CoG. pp. 1–7. IEEE (2019).
       

    2018 [ nach oben ]

    • 1.
      Kasperl, S., Hanke, R., Oeckl, S., Schmitt, P., Uhlmann, N., Heinz, D., Herl, G., Hiller, J., Kämmler, A., Miller, T., Stock, A.M., Sauer, T.: Digitization, Data Processing and Analysis of Industrial and Cultural Objects: Creating Additional Value from Big Data. Proceedings of the 12th, European Conference on Non-Destructive Testing (ECNDT) 2018, Gothenburg-Sweden (2018).
       
    • 2.
      Pfitzner, C., May, S., Nüchter, A.: Body Weight Estimation for Dose-Finding and Health Monitoring of Lying, Standing and Walking Patients Based on RGB-D Data. Sensors. 18, (2018).
       
    • 3.
      Ring, M., Schlör, D., Landes, D., Hotho, A.: Flow-based Network Traffic Generation using Generative Adversarial Networks. Computing Research Repository CoRR. abs/1810.07795, (2018).
       
    • 4.
      Schütz, A.E., Fertig, T., Weber, K., Vu, H., Hirth, M., Tran-Gia, T.: Vertrauen ist gut, Blockchain ist besser - Einsatzmöglichkeiten von Blockchain für Vertrauensprobleme im Crowdsourcing. HMD Prax. der Wirtschaftsinformatik. 55, 1155–1166 (2018).
       
    • 5.
      Kasperl, S., Hanke, R., Oeckl, S., Schmitt, P., Uhlmann, N., Heinz, D., Herl, G., Hiller, J., Kämmler, A., Miller, T., Stock, A., Sauer, T.: Digitalisierung, Verarbeitung und Analyse kultureller und industrieller Objekte: Wertschöpfung aus großen Datenmengen. Jahrestagung für zerstörungsfreie Prüfung (2018), Deutsche Gesellschaft DGZfP (2018).
       
    • 6.
      Stock, M., Herl, G., Sauer, T., Hiller, J.: Edge Preserving Compression of CT Scans using Wavelets. Proceedings of the Structural Health Monitoring, International Symposium Nondestructive Testing 4-5 October 2018, Saarbruecken, Germany (2018).
       
    • 7.
      Herl, G., Rettenberger, S., Hiller, J., Sauer, T.: Metal artifact reduction by fusion of CT scans from different positions using the unfiltered backprojection. Proceedings of the 8th Conference on Industrial Computed Tomography, Wels, Austria (iCT 2018) (2018).
       
    • 8.
      Niedermaier, M., Malchow, J.-O., Fischer, F., Marzin, D., Merli, D., Roth, V., von Bodisco, A.: You Snooze, You Lose: Measuring PLC Cycle Times under Attacks. In: Rossow, C. and Younan, Y. (eds.) WOOT @ USENIX Security Symposium. USENIX Association (2018).
       
    • 9.
      Ring, M., Landes, D., Hotho, A.: Detection of slow port scans in flow-based network traffic. PLOS ONE. 13, 1–18 (2018).
       
    • 10.
      Schulz, T., Überle, M.: How Institutional Arrangements impede Realization of Smart Ecosystems: the Case of Door-to-Door Mobility integrators. In: Bednar, P.M., Frank, U., and Kautz, K. (eds.) Proceedings of the European Conference on Information Systems (ECIS 2018), Portsmouth, UK, 2018. p. 135 (2018).
       
    • 11.
      Schütz, A., Fertig, T., Weber, K., Vu, H., Hirth, M., Tran-Gia, T.: Vertrauen ist gut, Blockchain ist besser - Einsatzmöglichkeiten von Blockchain für Vertrauensprobleme im Crowdsourcing. HMD Praxis der Wirtschaftsinformatik. (2018).
       
    • 12.
      Stieler, M., Kriegl, B.: How do consumers experience the emotional rollercoaster? A smartphone app to measure emotions continously, transfer. Werbeforschung & Praxis. 64, 43–53 (2018).
       

    2017 [ nach oben ]

    • 1.
      Koch, R., May, S., Nüchter, A.: Detection and Purging of Specular Reflective and Transparent Object Influences in 3D Range Measurements. Proceedings of the 7th International Society for Photogrammetry and Remote Sensing, ISPRS International Workshop 3D-ARCH 2017: "3D Virtual Reconstruction and Visualization of Complex Architectures". pp. 377–384. , Nafplio, Greece (2017).
       
    • 2.
      Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: Creation of Flow-Based Data Sets for Intrusion Detection. Journal of Information Warfare. 16, 41–54 (2017).
       
    • 3.
      Ring, M., Landes, D., Dallmann, A., Hotho, A.: IP2Vec: Learning Similarities Between IP Addresses. 2017 IEEE International Conference on Data Mining Workshops (ICDMW). pp. 657–666 (2017).
       
    • 4.
      Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: A Toolset for Intrusion and Insider Threat Detection. In: Palomares Carrascosa, I., Kalutarage, H.K., and Huang, Y. (eds.) Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications. pp. 3–31. Springer International Publishing, Cham (2017).
       
    • 5.
      Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: Flow-based benchmark data sets for intrusion detection. Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS). pp. 361–369. ACPI (2017).
       
    • 6.
      Pfitzner, C., May, S., Nüchter, A.: Evaluation of Features from RGB-D Data for Human Body Weight Estimation. International Federation of Automatic Control. , Toulouse, France (2017).
       
    • 7.
      Marc Philipp Dietrich, G.W.: Towards EEG-Based Eye-Tracking for Interaction Design in Head-Mounted Devices. Proceedings of the 7th International Conference on Consumer Electronics Berlin (ICCE-Berlin), 2017 IEEE (2017).
       
    • 8.
      Koch, R., Böttcher, L., Jahrsdörfer, M., Maier, J., Trommer, M., May, S., Nüchter, A.: Out of lab calibration of a rotating 2D scanner for 3D mapping. Proceedings of the International Society for Optics and Photonics SPIE optical metrology, Videometrics, Range Imaging, and Applications. pp. 10332 – 10332 . , Munich, Germany (2017).
       
    • 9.
      Koch, R., May, S., Nüchter, A.: Effective Distinction Of Transparent And Specular Reflective Objects In Point Clouds Of A Multi-Echo Laser Scanner. Proceedings of the 18th IEEE International Conference on Advanced Robotics (ICAR ’17). pp. 566–571. , Hong Kong, China (2017).