no code implementations • 9 Feb 2024 • Nicolas M. Müller, Piotr Kawa, Shen Hu, Matthias Neu, Jennifer Williams, Philip Sperl, Konstantin Böttinger
We argue that this binary distinction is oversimplified.
no code implementations • 17 Jan 2023 • Christian Rathgeb, Benjamin Tams, Johannes Merkle, Vanessa Nesterowicz, Ulrike Korte, Matthias Neu
The fuzzy vault scheme has been established as cryptographic primitive suitable for privacy-preserving biometric authentication.
1 code implementation • 27 Apr 2022 • Lukas Schulth, Christian Berghoff, Matthias Neu
We compare this method with a similar method, called Activation Clustering, which also uses $k$-means clustering but applies it on the activation of certain hidden layers of the neural network as input.
no code implementations • 13 Aug 2021 • Christian Berghoff, Pavol Bielik, Matthias Neu, Petar Tsankov, Arndt von Twickel
In the last years, AI systems, in particular neural networks, have seen a tremendous increase in performance, and they are now used in a broad range of applications.
no code implementations • 18 Mar 2020 • Christian Berghoff, Matthias Neu, Arndt von Twickel
This article deals with the IT security of connectionist artificial intelligence (AI) applications, focusing on threats to integrity, one of the three IT security goals.