Alert button
Picture for Matthias Neu

Matthias Neu

Alert button

A New Approach to Voice Authenticity

Add code
Bookmark button
Alert button
Feb 09, 2024
Nicolas M. Müller, Piotr Kawa, Shen Hu, Matthias Neu, Jennifer Williams, Philip Sperl, Konstantin Böttinger

Viaarxiv icon

Multi-Biometric Fuzzy Vault based on Face and Fingerprints

Add code
Bookmark button
Alert button
Jan 17, 2023
Christian Rathgeb, Benjamin Tams, Johannes Merkle, Vanessa Nesterowicz, Ulrike Korte, Matthias Neu

Figure 1 for Multi-Biometric Fuzzy Vault based on Face and Fingerprints
Figure 2 for Multi-Biometric Fuzzy Vault based on Face and Fingerprints
Figure 3 for Multi-Biometric Fuzzy Vault based on Face and Fingerprints
Figure 4 for Multi-Biometric Fuzzy Vault based on Face and Fingerprints
Viaarxiv icon

Detecting Backdoor Poisoning Attacks on Deep Neural Networks by Heatmap Clustering

Add code
Bookmark button
Alert button
Apr 27, 2022
Lukas Schulth, Christian Berghoff, Matthias Neu

Figure 1 for Detecting Backdoor Poisoning Attacks on Deep Neural Networks by Heatmap Clustering
Figure 2 for Detecting Backdoor Poisoning Attacks on Deep Neural Networks by Heatmap Clustering
Figure 3 for Detecting Backdoor Poisoning Attacks on Deep Neural Networks by Heatmap Clustering
Figure 4 for Detecting Backdoor Poisoning Attacks on Deep Neural Networks by Heatmap Clustering
Viaarxiv icon

Robustness testing of AI systems: A case study for traffic sign recognition

Add code
Bookmark button
Alert button
Aug 13, 2021
Christian Berghoff, Pavol Bielik, Matthias Neu, Petar Tsankov, Arndt von Twickel

Figure 1 for Robustness testing of AI systems: A case study for traffic sign recognition
Figure 2 for Robustness testing of AI systems: A case study for traffic sign recognition
Figure 3 for Robustness testing of AI systems: A case study for traffic sign recognition
Figure 4 for Robustness testing of AI systems: A case study for traffic sign recognition
Viaarxiv icon

Vulnerabilities of Connectionist AI Applications: Evaluation and Defence

Add code
Bookmark button
Alert button
Mar 18, 2020
Christian Berghoff, Matthias Neu, Arndt von Twickel

Figure 1 for Vulnerabilities of Connectionist AI Applications: Evaluation and Defence
Figure 2 for Vulnerabilities of Connectionist AI Applications: Evaluation and Defence
Figure 3 for Vulnerabilities of Connectionist AI Applications: Evaluation and Defence
Figure 4 for Vulnerabilities of Connectionist AI Applications: Evaluation and Defence
Viaarxiv icon