Stefanie Roos

According to our database1, Stefanie Roos authored at least 67 papers between 2010 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
First Steps Towards Game and Activity Inference on Encrypted VR Datastreams.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025

2024
Gradient Inversion of Federated Diffusion Models.
CoRR, 2024

SFDDM: Single-fold Distillation for Diffusion models.
CoRR, 2024

Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network.
CoRR, 2024

2023
Blockchain Nodes are Heterogeneous and Your P2P Overlay Should be Too: PODS.
CoRR, 2023

A Deployment-First Methodology to Mechanism Design and Refinement in Distributed Systems.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

Maverick Matters: Client Contribution and Selection in Federated Learning.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Game-Theoretic Analysis of (Non-)Refundable Fees in the Lightning Network.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

LeadFL: Client Self-Defense against Model Poisoning in Federated Learning.
Proceedings of the International Conference on Machine Learning, 2023

Defending Against Free-Riders Attacks in Distributed Generative Adversarial Networks.
Proceedings of the Financial Cryptography and Data Security, 2023

Extras and Premiums: Local PCN Routing with Redundancy and Fees.
Proceedings of the Financial Cryptography and Data Security, 2023

Fabricated Flips: Poisoning Federated Learning without Data.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Get Me out of This Payment! Bailout: An HTLC Re-routing Protocol.
IACR Cryptol. ePrint Arch., 2022

Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

Blind leads Blind: A Zero-Knowledge Attack on Federated Learning.
CoRR, 2022

A Sybil-Resistant and Decentralized Market Place.
CoRR, 2022

Attacks and Defenses for Free-Riders in Multi-Discriminator GAN.
CoRR, 2022

Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings.
Proceedings of the ICDCN '22: 23rd International Conference on Distributed Computing and Networking, Delhi, AA, India, January 4, 2022

SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony.
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022

2021
Is Shapley Value fair? Improving Client Selection for Mavericks in Federated Learning.
CoRR, 2021

Comparative Analysis of Lightning's Routing Clients.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021

The Merchant: Avoiding Payment Channel Depletion through Incentives.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021

How Lightning's Routing Diminishes its Anonymity.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Splitting Payments Locally While Routing Interdimensionally.
IACR Cryptol. ePrint Arch., 2020

Exploiting Centrality: Attacks in Payment Channel Networks with Local Routing.
CoRR, 2020

An Exploratory Analysis on Users' Contributions in Federated Learning.
Proceedings of the Second IEEE International Conference on Trust, 2020

Secure Embedding of Rooted Spanning Trees for Scalable Routing in Topology-Restricted Networks.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Attack resistant Leader Election in Social Overlay Networks by Leveraging Local Voting.
Proceedings of the ICDCN 2020: 21st International Conference on Distributed Computing and Networking, 2020

SoK: Layer-Two Blockchain Protocols.
Proceedings of the Financial Cryptography and Data Security, 2020

How to Profit from Payments Channels.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
SoK: Off The Chain Transactions.
IACR Cryptol. ePrint Arch., 2019

On the Limits of Byzantine-tolerant Spanning Tree Construction in Route-Restricted Overlay Networks.
CoRR, 2019

Attack-Resistant Spanning Tree Construction in Route-Restricted Overlay Networks.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

2018
A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Balanced Dynamic Content Addressing in Trees.
CoRR, 2017

BD-CAT: Balanced dynamic content addressing in trees.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Analyzing and Enhancing Routing Protocols for Friend-to-Friend Overlays.
PhD thesis, 2016

Dealing with Dead Ends: Efficient Routing in Darknets.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2016

VOUTE-Virtual Overlays Using Tree Embeddings.
CoRR, 2016

SWAP: Protecting pull-based P2P video streaming systems from inference attacks.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Anonymous addresses for efficient and resilient routing in F2F overlays.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Analyse und Verbesserung von Routingprotokollen für Friend-to-Friend Overlays.
Proceedings of the Ausgezeichnete Informatikdissertationen 2016, 2016

2015
RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streaming.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Inferring obfuscated values in Freenet.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Integrating churn into the formal analysis of routing algorithms.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

On the impossibility of efficient self-stabilization in virtual overlays with churn.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems.
CoRR, 2014

NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings.
CoRR, 2014

DarknetSim: a simulation framework for social overlays.
Proceedings of the 17th Communications & Networking Symposium, 2014

Measuring Freenet in the Wild: Censorship-Resilience under Observation.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Diversity entails improvement: A new neighbour selection scheme for Kademlia-type systems.
Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing, 2014

Enhancing compact routing in CCN with prefix embedding and topology-aware hashing.
Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, 2014

Characterizing graph-theoretic properties of a large-scale DHT: Measurements vs. simulations.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

An additional protection layer for confidential OSNs posts.
Proceedings of the IEEE International Conference on Communications, 2014

Mitigating Eclipse attacks in Peer-To-Peer networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Comprehending Kademlia Routing - A Theoretical Framework for the Hop Count Distribution.
CoRR, 2013

Protecting Public OSN Posts from Unintended Access.
CoRR, 2013

Greedy Embedding, Routing and Content Addressing for Darknets.
Proceedings of the 2013 Conference on Networked Systems, 2013

A contribution to analyzing and enhancing Darknet routing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Provable Polylog Routing for Darknets.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Quantifying Semantics using Complex Network Analysis.
Proceedings of the COLING 2012, 2012

2011
Attack Resistant Network Embeddings for Darknets.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

2010
Medical Outcome Prediction for Intensive Care Unit Patients.
Int. J. Comput. Model. Algorithms Medicine, 2010

Prognosis of Breast Cancer Using Genetic Programming.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2010


  Loading...