Follow
Pascal Schöttle
Pascal Schöttle
Professor, Department Digital Business & Software Engineering, MCI Innsbruck, Austria
Verified email at mci.edu - Homepage
Title
Cited by
Cited by
Year
Machine unlearning: Linear filtration for logit-based classifiers
T Baumhauer, P Schöttle, M Zeppelzauer
Machine Learning 111 (9), 3203-3226, 2022
632022
Game theory and adaptive steganography
P Schöttle, R Böhme
IEEE Transactions on Information Forensics and Security 11 (4), 760-773, 2015
492015
A game-theoretic approach to content-adaptive steganography
P Schöttle, R Böhme
Information Hiding: 14th International Conference, IH 2012, Berkeley, CA …, 2013
482013
Weighted stego-image steganalysis for naive content-adaptive embedding
P Schöttle, S Korff, R Böhme
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
252012
Detecting adversarial examples-a lesson from multimedia security
P Schöttle, A Schlögl, C Pasquini, R Böhme
2018 26th European Signal Processing Conference (EUSIPCO), 947-951, 2018
242018
Where to hide the bits?
B Johnson, P Schöttle, R Böhme
Decision and Game Theory for Security: Third International Conference …, 2012
202012
Mixing coins of different quality: A game-theoretic approach
S Abramova, P Schöttle, R Böhme
Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017
152017
Forensics of high quality and nearly identical jpeg image recompression
C Pasquini, P Schöttle, R Böhme, G Boato, F Perez-Gonzalez
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia …, 2016
152016
Secure team composition to thwart insider threats and cyber-espionage
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
ACM Transactions on Internet Technology (TOIT) 14 (2-3), 1-22, 2014
152014
Forensics of high-quality JPEG images with color subsampling
M Carnein, P Schöttle, R Böhme
2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015
122015
A game-theoretic analysis of content-adaptive steganography with independent embedding
P Schöttle, A Laszka, B Johnson, J Grossklags, R Böhme
21st European Signal Processing Conference (EUSIPCO 2013), 1-5, 2013
122013
Managing the weakest link: A game-theoretic approach for the mitigation of insider threats
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
112013
Thinking beyond the block: block matching for copy-move forgery detection revisited
M Kirchner, P Schoettle, C Riess
Media Watermarking, Security, and Forensics 2015 9409, 11-22, 2015
92015
On the application of anomaly detection in reliable server pooling systems for improved robustness against denial of service attacks
P Schottle, T Dreibholz, EP Rathgeb
2008 33rd IEEE Conference on Local Computer Networks (LCN), 207-214, 2008
92008
Continuous Planning and Forecasting Framework (CPFF) for Agile Project Management: Overcoming the
T Dilger, C Ploder, W Haas, P Schöttle, R Bernsteiner
Proceedings of the 21st Annual Conference on Information Technology …, 2020
72020
Bitspotting: Detecting optimal adaptive steganography
B Johnson, P Schöttle, A Laszka, J Grossklags, R Böhme
Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013 …, 2014
72014
Predictable rain? Steganalysis of public-key steganography using wet paper codes
M Carnein, P Schöttle, R Böhme
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
72014
Detecting adversarial examples-a lesson from multimedia forensics
P Schöttle, A Schlögl, C Pasquini, R Böhme
arXiv preprint arXiv:1803.03613, 2018
62018
Decoy password vaults: at least as hard as steganography?
C Pasquini, P Schöttle, R Böhme
ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017
62017
Telltale Watermarks for Counting JPEG Compressions.
M Carnein, P Schöttle, R Böhme
Media Watermarking, Security, and Forensics, 1-10, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20