Pascal Schöttle
Orcid: 0000-0001-8710-9188
According to our database1,
Pascal Schöttle
authored at least 35 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
Proceedings of the 13th International Conference on Pattern Recognition Applications and Methods, 2024
2023
Proceedings of the 8th International Conference on Machine Learning Technologies, 2023
Proceedings of the 8th International Conference on Machine Learning Technologies, 2023
Generating Invariance-Based Adversarial Examples: Bringing Humans Back into the Loop.
Proceedings of the Image Analysis and Processing - ICIAP 2023 Workshops, 2023
Proceedings of the Engineering Applications of Neural Networks, 2023
2022
Multimodal Technol. Interact., 2022
Mach. Learn., 2022
Proceedings of the Image Analysis and Processing - ICIAP 2022, 2022
Proceedings of the Image Analysis and Processing - ICIAP 2022, 2022
2021
When Should You Defend Your Classifier? - - A Game-Theoretical Analysis of Countermeasures Against Adversarial Examples.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
Adversarial Examples Against a BERT ABSA Model - Fooling Bert With L33T, Misspellign, and Punctuation, .
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Continuous Planning and Forecasting Framework (CPFF) for Agile Project Management: Overcoming the.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020
2018
Proceedings of the 26th European Signal Processing Conference, 2018
2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Proceedings of the Media Watermarking, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
2015
Trans. Data Hiding Multim. Secur., 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the Media Watermarking, 2015
2014
ACM Trans. Internet Techn., 2014
On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
The role of side information in steganography.
PhD thesis, 2014
2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
A game-theoretic analysis of content-adaptive steganography with independent embedding.
Proceedings of the 21st European Signal Processing Conference, 2013
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
2008
On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacks.
Proceedings of the LCN 2008, 2008