Search Results - "Muehlhaeuser, Max"
-
1
Analyzing business process anomalies using autoencoders
Published in Machine learning (01-11-2018)“…Businesses are naturally interested in detecting anomalies in their internal processes, because these can be indicators for fraud and inefficiencies. Within…”
Get full text
Journal Article -
2
BINet: Multi-perspective business process anomaly classification
Published in Information systems (Oxford) (01-01-2022)“…In this paper, we introduce BINet, a neural network architecture for real-time multi-perspective anomaly detection in business process event logs. BINet is…”
Get full text
Journal Article -
3
Service Entity Placement for Social Virtual Reality Applications in Edge Computing
Published in IEEE INFOCOM 2018 - IEEE Conference on Computer Communications (01-04-2018)“…While social Virtual Reality (VR) applications such as Facebook Spaces are becoming popular, they are not compatible with classic mobile-or cloud-based…”
Get full text
Conference Proceeding -
4
A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources
Published in Computers & security (01-02-2022)“…Global malware campaigns and large-scale data breaches show how everyday life can be impacted when the defensive measures fail to protect computer systems from…”
Get full text
Journal Article -
5
Detecting and Tracking Criminals in the Real World through an IoT-Based System
Published in Sensors (Basel, Switzerland) (07-07-2020)“…Criminals and related illegal activities represent problems that are neither trivial to predict nor easy to handle once they are identified. The Police Forces…”
Get full text
Journal Article -
6
A Feature-Based Model for the Identification of Electrical Devices in Smart Environments
Published in Sensors (Basel, Switzerland) (08-06-2019)“…Smart Homes (SHs) represent the human side of a Smart Grid (SG). Data mining and analysis of energy data of electrical devices in SHs, e.g., for the dynamic…”
Get full text
Journal Article -
7
Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds
Published in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (01-06-2017)“…As clouds move to the network edge to facilitate mobile applications, edge cloud providers are facing new challenges on resource allocation. As users may move…”
Get full text
Conference Proceeding -
8
Improving Wearable-Based Activity Recognition Using Image Representations
Published in Sensors (Basel, Switzerland) (25-02-2022)“…Activity recognition based on inertial sensors is an essential task in mobile and ubiquitous computing. To date, the best performing approaches in this task…”
Get full text
Journal Article -
9
Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems
Published in International journal of network management (01-03-2019)“…Summary Collaborative defensive approaches such as collaborative intrusion detection system (CIDS) have emerged as a response to the continuous increase in the…”
Get full text
Journal Article -
10
A multi-language approach towards the identification of suspicious users on social networks
Published in 2017 International Carnahan Conference on Security Technology (ICCST) (01-10-2017)“…The use of IT technology for the planning and implementation of illegal activities has been gaining ground in recent years. Nowadays, through the web and the…”
Get full text
Conference Proceeding -
11
Autonomously detecting sensors in fully distributed botnets
Published in Computers & security (01-06-2019)“…Botnet attacks have devastating effects on public and private infrastructures. The botmasters controlling these networks aim to prevent takedown attempts by…”
Get full text
Journal Article -
12
What the Fog? Edge Computing Revisited: Promises, Applications and Future Challenges
Published in IEEE access (2019)“…Edge computing brings computing and storage resources closer to (mobile) end users and data sources, thus bypassing expensive and slow links to distant cloud…”
Get full text
Journal Article -
13
Unsupervised 4D LiDAR Moving Object Segmentation in Stationary Settings with Multivariate Occupancy Time Series
Published in 2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) (01-01-2023)“…In this work, we address the problem of unsupervised moving object segmentation (MOS) in 4D LiDAR data recorded from a stationary sensor, where no ground truth…”
Get full text
Conference Proceeding -
14
Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups
Published in Sensors (Basel, Switzerland) (20-12-2022)“…Deep learning pervades heavy data-driven disciplines in research and development. The Internet of Things and sensor systems, which enable smart environments…”
Get full text
Journal Article -
15
"Can You Handle the Truth?": Investigating the Effects of AR-Based Visualization of the Uncertainty of Deep Learning Models on Users of Autonomous Vehicles
Published in 2023 IEEE International Symposium on Mixed and Augmented Reality (ISMAR) (16-10-2023)“…The recent advances in deep learning have paved the way for autonomous vehicles (AVs) to take charge of more complex tasks in the navigation process. However,…”
Get full text
Conference Proceeding -
16
PABO: Mitigating congestion via packet bounce in data center networks
Published in Computer communications (01-05-2019)“…In today’s data center, a diverse mix of throughput-sensitive long flows and delay-sensitive short flows are commonly presented. However, commodity switches…”
Get full text
Journal Article -
17
Holonic System Model for Resilient Energy Grid Operation
Published in Energies (Basel) (01-07-2021)“…The transformation of energy grids towards smart grids is driven by numerous political, economic, and ecological goals. As part of this process, the…”
Get full text
Journal Article -
18
PDSProxy: Trusted IoT Proxies for Confidential Ad-hoc Personalization of AI Services
Published in 2020 29th International Conference on Computer Communications and Networks (ICCCN) (01-08-2020)“…Personal data stores (PDS) typically provide internal confidential processing mechanisms for personalizing AI services. However, these mechanisms cannot be…”
Get full text
Conference Proceeding -
19
Towards Continual Knowledge Learning of Vehicle CAN-data
Published in 2023 IEEE Intelligent Vehicles Symposium (IV) (04-06-2023)“…In this paper, we propose a continual learning (CL) approach that adapts to the vehicle CAN-data flexibly and continuously. Our approach is capable of learning…”
Get full text
Conference Proceeding -
20
Manifestation of virtual assistants and robots into daily life: vision and challenges
Published in CCF transactions on pervasive computing and interaction (Online) (01-11-2019)“…Similar to how the smartphone and Internet have significantly changed our daily lives, artificial intelligence (AI) applications have started to profoundly…”
Get full text
Journal Article