• Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI 

      Yildirim-Yayilgan, Sule; Yamin, Muhammad Mudassar; Ali, Subhan; Abomhara, Mohamed Ali Saleh (Peer reviewed; Journal article, 2024)
      The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ...
    • Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI 

      Hashmi, Ehtesham; Yildirim-Yayilgan, Sule; Yamin, Muhammad Mudassar; Ali, Subhan; Abomhara, Mohamed Ali Saleh (Journal article; Peer reviewed, 2024)
      The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ...
    • Adversarial Attacks against Face Recognition: A Comprehensive Study 

      Vakhshiteh, Fatemeh; Nickabadi, Ahmad; Ramachandra, Raghavendra (Peer reviewed; Journal article, 2021)
      Face recognition (FR) systems have demonstrated reliable verification performance, suggesting suitability for real-world applications ranging from photo tagging in social media to automated border control (ABC). In an ...
    • Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive Survey 

      Mandalapu, Hareesh (Peer reviewed; Journal article, 2021)
      Biometric recognition is a trending technology that uses unique characteristics data to identify or verify/authenticate security applications. Amidst the classically used biometrics, voice and face attributes are the most ...
    • Blockchain State Channels: A State of the Art 

      Negka, Lydia; Spathoulas, Georgios (Peer reviewed; Journal article, 2021)
      Blockchain technology has been quite popular during recent years and it finally seems to present a significant rise with respect to its use for real-world applications. This advancement has brought up a critical challenge ...
    • Bloom’s Learning Outcomes’ Automatic Classification Using LSTM and Pretrained Word Embeddings 

      Shaikh, Sarang; Daudpotta, Sher Muhammad; Imran, Ali Shariq (Peer reviewed; Journal article, 2021)
      Bloom’s taxonomy is a popular model to classify educational learning objectives into different learning levels for three domains including cognitive, affective and psycho motor. Each domain is further detailed into different ...
    • BRAKE: Biometric Resilient Authenticated Key Exchange 

      Silde, Tjerand Aga; Bauspieß, Pia; Costache, Anamaria; Poljuha, Matej; Tullot, Alexandre; Rathgeb, Christian; Kolberg, Jascha; Busch, Christoph (Journal article; Peer reviewed, 2024)
      Biometric data are uniquely suited for connecting individuals to their digital identities. Deriving cryptographic key exchange from successful biometric authentication therefore gives an additional layer of trust compared ...
    • Compact and Mobile Full-Field Optical Coherence Tomography Sensor for Subsurface Fingerprint Imaging 

      Auksorius, Egidijus; Raja, Kiran; Topcu, Berkay; Ramachandra, Raghavendra; Busch, Christoph; Boccara, Claude A (Peer reviewed; Journal article, 2020)
      Conventional fingerprint sensors that are deployed in real-life applications lack the ability to peer inside a finger beyond the external surface. Subsurface information can provide complimentary biometric characteristics ...
    • Comparing the Scalability of Communication Networks and Systems 

      Hossfeld, Tobias; Heegaard, Poul Einar; Kellerer, Wolfgang (Journal article; Peer reviewed, 2023)
      Scalability is often mentioned in literature, but a stringent definition is missing. In particular, there is no general scalability assessment which clearly indicates whether a system scales or not or whether a system ...
    • Construction of Human Motivational Profiles by Observation for Risk Analysis 

      Szekeres, Adam; Snekkenes, Einar Arthur (Peer reviewed; Journal article, 2020)
      This study aimed at analyzing the extent to which publicly observable pieces of information representing stakeholders’ past and current choices can be utilized for the construction of motivational profiles. Motivation is ...
    • Deep Composite Face Image Attacks: Generation, Vulnerability and Detection 

      Singh, Jag Mohan; Ramachandra, Raghavendra (Peer reviewed; Journal article, 2023)
      Face manipulation attacks have drawn the attention of biometric researchers because of their vulnerability to Face Recognition Systems (FRS). This paper proposes a novel scheme to generate Composite Face Image Attacks ...
    • Deep Face Age Progression: A Survey 

      Grimmer, Marcel; Ramachandra, Raghavendra; Busch, Christoph (Peer reviewed; Journal article, 2021)
    • Delay and Delay-Constrained Throughput Performance of a Wireless-Powered Communication System 

      Li, Zhidu; Jiang, Yuming; Gao, Yuehong; Li, Pengxiang; Sang, Lin; Yang, Dacheng (Journal article; Peer reviewed, 2017)
      In this paper, the delay and delay-constrained throughput performance of a point-to-point wireless-powered communication system is investigated. In this system, the wireless-powered node, e.g., a user equipment (UE), ...
    • Differential Privacy Preservation in Robust Continual Learning 

      Hassanpour, Ahmad; Moradikia, Majid; Yang, Bian; Abdelhadi, Ahmed; Busch, Christoph; Fierrez, Julian (Peer reviewed; Journal article, 2022)
      Enhancing the privacy of machine learning (ML) algorithms has become crucial with the presence of different types of attacks on AI applications. Continual learning (CL) is a branch of ML with the aim of learning a set of ...
    • E2F-GAN: Eyes-to-Face Inpainting via Edge-Aware Coarse-to-Fine GANs 

      Hassanpour, Ahmad; Daryani, Amir Etefaghi; Mirmahdi, Mahdieh; Raja, Kiran; Yang, Bian; Busch, Christoph; Fierrez, Julian (Peer reviewed; Journal article, 2022)
      Face inpainting is a challenging task aiming to fill the damaged or masked regions in face images with plausibly synthesized contents. Based on the given information, the reconstructed regions should look realistic and ...
    • Effect of Communication Failures on State Estimation of 5G-Enabled Smart Grid 

      Zerihun, Tesfaye Amare; Garau, Michele; Helvik, Bjarne Emil (Peer reviewed; Journal article, 2020)
      Information and Communication Technologies (ICT), Wide Area Measurement Systems (WAMS) and state estimation represent the key-tools for achieving a reliable and accurate knowledge of the power grid, and represent the ...
    • Enabling the Internet of Arctic Things with Freely-Drifting Small-Satellite Swarms 

      Palma, David; Birkeland, Roger (Journal article; Peer reviewed, 2018)
      The widespread deployment of Internet-capable devices, also known as the Internet of Things (IoT), reaches even the most remote areas of the planet, including the Arctic. However, and despite the vast scientific and economic ...
    • Expanded combinatorial designs as tool to model network slicing in 5G 

      Gligoroski, Danilo; Kralevska, Katina (Journal article; Peer reviewed, 2019)
      The network slice management function (NSMF) in 5G has a task to configure the network slice instances and to combine network slice subnet instances from the new-generation radio access network and the core network into ...
    • Fog Computing in Healthcare – A Review and Discussion 

      Kraemer, Frank Alexander; Bråten, Anders Eivind; Tamkittikhun, Nattachart; Palma, David (Journal article; Peer reviewed, 2017)
      Fog computing is an architectural style in which network components between devices and the cloud execute application-specific logic. We present the first review on fog computing within healthcare informatics, and explore, ...
    • General TCP state inference model from passive measurements using machine learning techniques 

      Hagos, Desta Haileselassie; Engelstad, Paal E.; Yazidi, Anis; Kure, Øivind (Journal article; Peer reviewed, 2018)
      Many applications in the Internet use the reliable end-to-end Transmission Control Protocol (TCP) as a transport protocol due to practical considerations. There are many different TCP variants widely in use, and each variant ...