Search Results - "Muehlhaeuser, Max"

Refine Results
  1. 1

    Analyzing business process anomalies using autoencoders by Nolle, Timo, Luettgen, Stefan, Seeliger, Alexander, Mühlhäuser, Max

    Published in Machine learning (01-11-2018)
    “…Businesses are naturally interested in detecting anomalies in their internal processes, because these can be indicators for fraud and inefficiencies. Within…”
    Get full text
    Journal Article
  2. 2

    BINet: Multi-perspective business process anomaly classification by Nolle, Timo, Luettgen, Stefan, Seeliger, Alexander, Mühlhäuser, Max

    Published in Information systems (Oxford) (01-01-2022)
    “…In this paper, we introduce BINet, a neural network architecture for real-time multi-perspective anomaly detection in business process event logs. BINet is…”
    Get full text
    Journal Article
  3. 3

    Service Entity Placement for Social Virtual Reality Applications in Edge Computing by Wang, Lin, Jiao, Lei, He, Ting, Li, Jun, Muhlhauser, Max

    “…While social Virtual Reality (VR) applications such as Facebook Spaces are becoming popular, they are not compatible with classic mobile-or cloud-based…”
    Get full text
    Conference Proceeding
  4. 4

    A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources by Tundis, Andrea, Ruppert, Samuel, Mühlhäuser, Max

    Published in Computers & security (01-02-2022)
    “…Global malware campaigns and large-scale data breaches show how everyday life can be impacted when the defensive measures fail to protect computer systems from…”
    Get full text
    Journal Article
  5. 5

    Detecting and Tracking Criminals in the Real World through an IoT-Based System by Tundis, Andrea, Kaleem, Humayun, Mühlhäuser, Max

    Published in Sensors (Basel, Switzerland) (07-07-2020)
    “…Criminals and related illegal activities represent problems that are neither trivial to predict nor easy to handle once they are identified. The Police Forces…”
    Get full text
    Journal Article
  6. 6

    A Feature-Based Model for the Identification of Electrical Devices in Smart Environments by Tundis, Andrea, Faizan, Ali, Mühlhäuser, Max

    Published in Sensors (Basel, Switzerland) (08-06-2019)
    “…Smart Homes (SHs) represent the human side of a Smart Grid (SG). Data mining and analysis of energy data of electrical devices in SHs, e.g., for the dynamic…”
    Get full text
    Journal Article
  7. 7

    Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds by Lin Wang, Lei Jiao, Jun Li, Muhlhauser, Max

    “…As clouds move to the network edge to facilitate mobile applications, edge cloud providers are facing new challenges on resource allocation. As users may move…”
    Get full text
    Conference Proceeding
  8. 8

    Improving Wearable-Based Activity Recognition Using Image Representations by Sanchez Guinea, Alejandro, Sarabchian, Mehran, Mühlhäuser, Max

    Published in Sensors (Basel, Switzerland) (25-02-2022)
    “…Activity recognition based on inertial sensors is an essential task in mobile and ubiquitous computing. To date, the best performing approaches in this task…”
    Get full text
    Journal Article
  9. 9

    Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems by Vasilomanolakis, Emmanouil, Mühlhäuser, Max

    “…Summary Collaborative defensive approaches such as collaborative intrusion detection system (CIDS) have emerged as a response to the continuous increase in the…”
    Get full text
    Journal Article
  10. 10

    A multi-language approach towards the identification of suspicious users on social networks by Tundis, Andrea, Muhlhauser, Max

    “…The use of IT technology for the planning and implementation of illegal activities has been gaining ground in recent years. Nowadays, through the web and the…”
    Get full text
    Conference Proceeding
  11. 11

    Autonomously detecting sensors in fully distributed botnets by Böck, Leon, Vasilomanolakis, Emmanouil, Wolf, Jan Helge, Mühlhäuser, Max

    Published in Computers & security (01-06-2019)
    “…Botnet attacks have devastating effects on public and private infrastructures. The botmasters controlling these networks aim to prevent takedown attempts by…”
    Get full text
    Journal Article
  12. 12

    What the Fog? Edge Computing Revisited: Promises, Applications and Future Challenges by Gedeon, Julien, Brandherm, Florian, Egert, Rolf, Grube, Tim, Muhlhauser, Max

    Published in IEEE access (2019)
    “…Edge computing brings computing and storage resources closer to (mobile) end users and data sources, thus bypassing expensive and slow links to distant cloud…”
    Get full text
    Journal Article
  13. 13

    Unsupervised 4D LiDAR Moving Object Segmentation in Stationary Settings with Multivariate Occupancy Time Series by Kreutz, Thomas, Muhlhauser, Max, Guinea, Alejandro Sanchez

    “…In this work, we address the problem of unsupervised moving object segmentation (MOS) in 4D LiDAR data recorded from a stationary sensor, where no ground truth…”
    Get full text
    Conference Proceeding
  14. 14

    Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups by Wainakh, Aidmar, Zimmer, Ephraim, Subedi, Sandeep, Keim, Jens, Grube, Tim, Karuppayah, Shankar, Sanchez Guinea, Alejandro, Mühlhäuser, Max

    Published in Sensors (Basel, Switzerland) (20-12-2022)
    “…Deep learning pervades heavy data-driven disciplines in research and development. The Internet of Things and sensor systems, which enable smart environments…”
    Get full text
    Journal Article
  15. 15

    "Can You Handle the Truth?": Investigating the Effects of AR-Based Visualization of the Uncertainty of Deep Learning Models on Users of Autonomous Vehicles by Doula, Achref, Schmidt, Lennart, Muhlhauser, Max, Guinea, Alejandro Sanchez

    “…The recent advances in deep learning have paved the way for autonomous vehicles (AVs) to take charge of more complex tasks in the navigation process. However,…”
    Get full text
    Conference Proceeding
  16. 16

    PABO: Mitigating congestion via packet bounce in data center networks by Shi, Xiang, Wang, Lin, Zhang, Fa, Zheng, Kai, Mühlhäuser, Max, Liu, Zhiyong

    Published in Computer communications (01-05-2019)
    “…In today’s data center, a diverse mix of throughput-sensitive long flows and delay-sensitive short flows are commonly presented. However, commodity switches…”
    Get full text
    Journal Article
  17. 17

    Holonic System Model for Resilient Energy Grid Operation by Egert, Rolf, Grube, Tim, Volk, Florian, Mühlhäuser, Max

    Published in Energies (Basel) (01-07-2021)
    “…The transformation of energy grids towards smart grids is driven by numerous political, economic, and ecological goals. As part of this process, the…”
    Get full text
    Journal Article
  18. 18

    PDSProxy: Trusted IoT Proxies for Confidential Ad-hoc Personalization of AI Services by Meurisch, Christian, Bayrak, Bekir, Giger, Florian, Muhlhauser, Max

    “…Personal data stores (PDS) typically provide internal confidential processing mechanisms for personalizing AI services. However, these mechanisms cannot be…”
    Get full text
    Conference Proceeding
  19. 19

    Towards Continual Knowledge Learning of Vehicle CAN-data by Ahmed, Sajeel, Esbel, Ousama, Muhlhauser, Max, Guinea, Alejandro Sanchez

    “…In this paper, we propose a continual learning (CL) approach that adapts to the vehicle CAN-data flexibly and continuously. Our approach is capable of learning…”
    Get full text
    Conference Proceeding
  20. 20

    Manifestation of virtual assistants and robots into daily life: vision and challenges by Rawassizadeh, Reza, Sen, Taylan, Kim, Sunny Jung, Meurisch, Christian, Keshavarz, Hamidreza, Mühlhäuser, Max, Pazzani, Michael

    “…Similar to how the smartphone and Internet have significantly changed our daily lives, artificial intelligence (AI) applications have started to profoundly…”
    Get full text
    Journal Article