default search action
Pascal Schöttle
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2014
- [b1]Pascal Schöttle:
The role of side information in steganography. Universität Münster, 2014, pp. 1-157
Journal Articles
- 2024
- [j6]Florian Merkle, Maximilian Samsinger, Pascal Schöttle, Tomás Pevný:
On the Economics of Adversarial Machine Learning. IEEE Trans. Inf. Forensics Secur. 19: 4670-4685 (2024) - 2022
- [j5]Thomas Baumhauer, Pascal Schöttle, Matthias Zeppelzauer:
Machine unlearning: linear filtration for logit-based classifiers. Mach. Learn. 111(9): 3203-3226 (2022) - [j4]Luisa Brinkschulte, Stephan Schlögl, Alexander Monz, Pascal Schöttle, Matthias Janetschek:
Perspectives on Socially Intelligent Conversational Agents. Multimodal Technol. Interact. 6(8): 62 (2022) - 2016
- [j3]Pascal Schöttle, Rainer Böhme:
Game Theory and Adaptive Steganography. IEEE Trans. Inf. Forensics Secur. 11(4): 760-773 (2016) - 2015
- [j2]Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme:
Adaptive Steganography and Steganalysis with Fixed-Size Embedding. Trans. Data Hiding Multim. Secur. 10: 69-91 (2015) - 2014
- [j1]Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Secure Team Composition to Thwart Insider Threats and Cyber-Espionage. ACM Trans. Internet Techn. 14(2-3): 19:1-19:22 (2014)
Conference and Workshop Papers
- 2024
- [c26]Markus Russold, Martin Nocker, Pascal Schöttle:
Incremental Whole Plate ALPR Under Data Availability Constraints. ICPRAM 2024: 131-140 - 2023
- [c25]Thomas Widmann, Florian Merkle, Martin Nocker, Pascal Schöttle:
Pruning for Power: Optimizing Energy Efficiency in IoT with Neural Network Pruning. EANN 2023: 251-263 - [c24]Florian Merkle, Mihaela Roxana Sirbu, Martin Nocker, Pascal Schöttle:
Generating Invariance-Based Adversarial Examples: Bringing Humans Back into the Loop. ICIAP Workshops (1) 2023: 15-27 - [c23]Martin Nocker, David Drexel, Michael Rader, Alessio Montuoro, Pascal Schöttle:
HE-MAN - Homomorphically Encrypted MAchine learning with oNnx models. ICMLT 2023: 35-45 - [c22]Roland Rauter, Martin Nocker, Florian Merkle, Pascal Schöttle:
On the Effect of Adversarial Training Against Invariance-based Adversarial Examples. ICMLT 2023: 54-60 - 2022
- [c21]Daniel Aumayr, Pascal Schöttle:
U Can't (re)Touch This - A Deep Learning Approach for Detecting Image Retouching. ICIAP (2) 2022: 127-138 - [c20]Florian Merkle, Maximilian Samsinger, Pascal Schöttle:
Pruning in the Face of Adversaries. ICIAP (1) 2022: 658-669 - 2021
- [c19]Nora Hofer, Pascal Schöttle, Alexander Rietzler, Sebastian Stabinger:
Adversarial Examples Against a BERT ABSA Model - Fooling Bert With L33T, Misspellign, and Punctuation, . ARES 2021: 33:1-33:6 - [c18]Maximilian Samsinger, Florian Merkle, Pascal Schöttle, Tomás Pevný:
When Should You Defend Your Classifier? - - A Game-Theoretical Analysis of Countermeasures Against Adversarial Examples. GameSec 2021: 158-177 - 2020
- [c17]Thomas Dilger, Christian Ploder, Wolfgang Haas, Pascal Schöttle, Reinhard Bernsteiner:
Continuous Planning and Forecasting Framework (CPFF) for Agile Project Management: Overcoming the. SIGITE 2020: 371-377 - 2018
- [c16]Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme:
Detecting Adversarial Examples - a Lesson from Multimedia Security. EUSIPCO 2018: 947-951 - 2017
- [c15]Svetlana Abramova, Pascal Schöttle, Rainer Böhme:
Mixing Coins of Different Quality: A Game-Theoretic Approach. Financial Cryptography Workshops 2017: 280-297 - [c14]Cecilia Pasquini, Pascal Schöttle, Rainer Böhme:
Decoy Password Vaults: At Least as Hard as Steganography? SEC 2017: 356-370 - 2016
- [c13]Cecilia Pasquini, Pascal Schöttle, Rainer Böhme, Giulia Boato, Fernando Pérez-González:
Forensics of High Quality and Nearly Identical JPEG Image Recompression. IH&MMSec 2016: 11-21 - [c12]Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Telltale Watermarks for Counting JPEG Compressions. Media Watermarking, Security, and Forensics 2016: 1-10 - 2015
- [c11]Matthias Kirchner, Pascal Schöttle, Christian Riess:
Thinking beyond the block: block matching for copy-move forgery detection revisited. Media Watermarking, Security, and Forensics 2015: 940903 - [c10]Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Forensics of high-quality JPEG images with color subsampling. WIFS 2015: 1-6 - 2014
- [c9]Erwin Quiring, Pascal Schöttle:
On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks. IH&MMSec 2014: 41-48 - [c8]Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Predictable rain?: steganalysis of public-key steganography using wet paper codes. IH&MMSec 2014: 97-108 - 2013
- [c7]Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats. ESORICS 2013: 273-290 - [c6]Pascal Schöttle, Aron Laszka, Benjamin Johnson, Jens Grossklags, Rainer Böhme:
A game-theoretic analysis of content-adaptive steganography with independent embedding. EUSIPCO 2013: 1-5 - [c5]Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme:
Bitspotting: Detecting Optimal Adaptive Steganography. IWDW 2013: 3-18 - 2012
- [c4]Benjamin Johnson, Pascal Schöttle, Rainer Böhme:
Where to Hide the Bits ? GameSec 2012: 1-17 - [c3]Pascal Schöttle, Rainer Böhme:
A Game-Theoretic Approach to Content-Adaptive Steganography. Information Hiding 2012: 125-141 - [c2]Pascal Schöttle, Stefan Korff, Rainer Böhme:
Weighted stego-image steganalysis for naive content-adaptive embedding. WIFS 2012: 193-198 - 2008
- [c1]Pascal Schöttle, Thomas Dreibholz, Erwin P. Rathgeb:
On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacks. LCN 2008: 207-214
Editorship
- 2018
- [e1]Rainer Böhme, Cecilia Pasquini, Giulia Boato, Pascal Schöttle:
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018. ACM 2018 [contents]
Informal and Other Publications
- 2023
- [i7]Roland Rauter, Martin Nocker, Florian Merkle, Pascal Schöttle:
On the Effect of Adversarial Training Against Invariance-based Adversarial Examples. CoRR abs/2302.08257 (2023) - [i6]Martin Nocker, David Drexel, Michael Rader, Alessio Montuoro, Pascal Schöttle:
HE-MAN - Homomorphically Encrypted MAchine learning with oNnx models. CoRR abs/2302.08260 (2023) - [i5]David Weber, Florian Merkle, Pascal Schöttle, Stephan Schlögl:
Less is More: The Influence of Pruning on the Explainability of CNNs. CoRR abs/2302.08878 (2023) - 2021
- [i4]Maximilian Samsinger, Florian Merkle, Pascal Schöttle, Tomás Pevný:
When Should You Defend Your Classifier - A Game-theoretical Analysis of Countermeasures against Adversarial Examples. CoRR abs/2108.07602 (2021) - [i3]Florian Merkle, Maximilian Samsinger, Pascal Schöttle:
Pruning in the Face of Adversaries. CoRR abs/2108.08560 (2021) - 2020
- [i2]Thomas Baumhauer, Pascal Schöttle, Matthias Zeppelzauer:
Machine Unlearning: Linear Filtration for Logit-based Classifiers. CoRR abs/2002.02730 (2020) - 2018
- [i1]Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme:
Detecting Adversarial Examples - A Lesson from Multimedia Forensics. CoRR abs/1803.03613 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint