Machine unlearning: Linear filtration for logit-based classifiers T Baumhauer, P Schöttle, M Zeppelzauer Machine Learning 111 (9), 3203-3226, 2022 | 63 | 2022 |
Game theory and adaptive steganography P Schöttle, R Böhme IEEE Transactions on Information Forensics and Security 11 (4), 760-773, 2015 | 49 | 2015 |
A game-theoretic approach to content-adaptive steganography P Schöttle, R Böhme Information Hiding: 14th International Conference, IH 2012, Berkeley, CA …, 2013 | 48 | 2013 |
Weighted stego-image steganalysis for naive content-adaptive embedding P Schöttle, S Korff, R Böhme 2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012 | 25 | 2012 |
Detecting adversarial examples-a lesson from multimedia security P Schöttle, A Schlögl, C Pasquini, R Böhme 2018 26th European Signal Processing Conference (EUSIPCO), 947-951, 2018 | 24 | 2018 |
Where to hide the bits? B Johnson, P Schöttle, R Böhme Decision and Game Theory for Security: Third International Conference …, 2012 | 20 | 2012 |
Mixing coins of different quality: A game-theoretic approach S Abramova, P Schöttle, R Böhme Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017 | 15 | 2017 |
Forensics of high quality and nearly identical jpeg image recompression C Pasquini, P Schöttle, R Böhme, G Boato, F Perez-Gonzalez Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia …, 2016 | 15 | 2016 |
Secure team composition to thwart insider threats and cyber-espionage A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme ACM Transactions on Internet Technology (TOIT) 14 (2-3), 1-22, 2014 | 15 | 2014 |
Forensics of high-quality JPEG images with color subsampling M Carnein, P Schöttle, R Böhme 2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015 | 12 | 2015 |
A game-theoretic analysis of content-adaptive steganography with independent embedding P Schöttle, A Laszka, B Johnson, J Grossklags, R Böhme 21st European Signal Processing Conference (EUSIPCO 2013), 1-5, 2013 | 12 | 2013 |
Managing the weakest link: A game-theoretic approach for the mitigation of insider threats A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 11 | 2013 |
Thinking beyond the block: block matching for copy-move forgery detection revisited M Kirchner, P Schoettle, C Riess Media Watermarking, Security, and Forensics 2015 9409, 11-22, 2015 | 9 | 2015 |
On the application of anomaly detection in reliable server pooling systems for improved robustness against denial of service attacks P Schottle, T Dreibholz, EP Rathgeb 2008 33rd IEEE Conference on Local Computer Networks (LCN), 207-214, 2008 | 9 | 2008 |
Continuous Planning and Forecasting Framework (CPFF) for Agile Project Management: Overcoming the T Dilger, C Ploder, W Haas, P Schöttle, R Bernsteiner Proceedings of the 21st Annual Conference on Information Technology …, 2020 | 7 | 2020 |
Bitspotting: Detecting optimal adaptive steganography B Johnson, P Schöttle, A Laszka, J Grossklags, R Böhme Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013 …, 2014 | 7 | 2014 |
Predictable rain? Steganalysis of public-key steganography using wet paper codes M Carnein, P Schöttle, R Böhme Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014 | 7 | 2014 |
Detecting adversarial examples-a lesson from multimedia forensics P Schöttle, A Schlögl, C Pasquini, R Böhme arXiv preprint arXiv:1803.03613, 2018 | 6 | 2018 |
Decoy password vaults: at least as hard as steganography? C Pasquini, P Schöttle, R Böhme ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017 | 6 | 2017 |
Telltale Watermarks for Counting JPEG Compressions. M Carnein, P Schöttle, R Böhme Media Watermarking, Security, and Forensics, 1-10, 2016 | 6 | 2016 |