TY - CHAP A1 - Alhaskir, Mohamed A1 - Tschesche, Matteo A1 - Linke, Florian A1 - Schriewer, Elisabeth A1 - Weber, Yvonne A1 - Wolking, Stefan A1 - Röhrig, Rainer A1 - Koch, Henner A1 - Kutafina, Ekaterina ED - Röhrig, Rainer ED - Grabe, Niels ED - Haag, Martin ED - Hübner, Ursula ED - Sax, Ulrich ED - Schmidt, Carsten Oliver ED - Sedlmayr, Martin ED - Zapf, Antonia T1 - ECG matching: an approach to synchronize ECG datasets for data quality comparisons T2 - German Medical Data Sciences 2023 – Science. Close to People. N2 - Clinical assessment of newly developed sensors is important for ensuring their validity. Comparing recordings of emerging electrocardiography (ECG) systems to a reference ECG system requires accurate synchronization of data from both devices. Current methods can be inefficient and prone to errors. To address this issue, three algorithms are presented to synchronize two ECG time series from different recording systems: Binned R-peak Correlation, R-R Interval Correlation, and Average R-peak Distance. These algorithms reduce ECG data to their cyclic features, mitigating inefficiencies and minimizing discrepancies between different recording systems. We evaluate the performance of these algorithms using high-quality data and then assess their robustness after manipulating the R-peaks. Our results show that R-R Interval Correlation was the most efficient, whereas the Average R-peak Distance and Binned R-peak Correlation were more robust against noisy data. KW - Electrocardiography KW - Wearable electronic device KW - Sensors comparison KW - Time-series synchronization Y1 - 2023 SN - 978-1-64368-428-4 (Print) SN - 978-1-64368-429-1 (Online) U6 - http://dx.doi.org/10.3233/SHTI230718 N1 - Proceedings of the 68th. Annual Meeting of the German Association of Medical Informatics, Biometry, and Epidemiology e.V. (gmds) 2023 in Heilbron, Germany Part of the series: Studies in Health Technology and Informatics VL - 307 SP - 225 EP - 232 PB - IOS Press ER - TY - CHAP A1 - Neugebauer, Georg A1 - Brutschy, Lucas A1 - Meyer, Ulrike A1 - Wetzel, Susanne ED - Garcia-Alfaro, Joaquin ED - Lioudakis, Georgios ED - Cuppens-Boulahia, Nora ED - Foley, Simon ED - Fitzgerald, William M. T1 - Privacy-preserving multi-party reconciliation secure in the malicious model T2 - DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security N2 - The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case. KW - Privacy-enhancing technologies KW - Secure multi-party computation KW - Cryptographic protocols KW - Zero-knowledge proofs KW - Malicious model Y1 - 2014 SN - 978-3-642-54567-2 (Print) SN - 978-3-642-54568-9 (Online) U6 - http://dx.doi.org/10.1007/978-3-642-54568-9_12 N1 - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013. Part of the Lecture Notes in Computer Science book series (LNSC,volume 8247) SP - 178 EP - 193 PB - Springer CY - Berlin ER - TY - CHAP A1 - Viehmann, Tarik A1 - Limpert, Nicolas A1 - Hofmann, Till A1 - Henning, Mike A1 - Ferrein, Alexander A1 - Lakemeyer, Gerhard ED - Eguchi, Amy ED - Lau, Nuno ED - Paetzel-Prüsmann, Maike ED - Wanichanon, Thanapat T1 - Winning the RoboCup logistics league with visual servoing and centralized goal reasoning T2 - RoboCup 2022 N2 - The RoboCup Logistics League (RCLL) is a robotics competition in a production logistics scenario in the context of a Smart Factory. In the competition, a team of three robots needs to assemble products to fulfill various orders that are requested online during the game. This year, the Carologistics team was able to win the competition with a new approach to multi-agent coordination as well as significant changes to the robot’s perception unit and a pragmatic network setup using the cellular network instead of WiFi. In this paper, we describe the major components of our approach with a focus on the changes compared to the last physical competition in 2019. Y1 - 2023 SN - 978-3-031-28468-7 (Print) SN - 978-3-031-28469-4 (Online) U6 - http://dx.doi.org/https://doi.org/10.1007/978-3-031-28469-4_25 N1 - Robot World Cup, RoboCup 2022. 17. July 2023. Bangkok, Thailand. Part of the Lecture Notes in Computer Science book series (LNAI,volume 13561) SP - 300 EP - 312 PB - Springer CY - Cham ER - TY - CHAP A1 - Zähl, Philipp M. A1 - Theis, Sabine A1 - Wolf, Martin A1 - Köhler, Klemens ED - Chen, Jessie Y. C. ED - Fragomeni, Gino T1 - Teamwork in software development and what personality has to do with it - an overview T2 - Virtual, Augmented and Mixed Reality N2 - Due to the increasing complexity of software projects, software development is becoming more and more dependent on teams. The quality of this teamwork can vary depending on the team composition, as teams are always a combination of different skills and personality types. This paper aims to answer the question of how to describe a software development team and what influence the personality of the team members has on the team dynamics. For this purpose, a systematic literature review (n=48) and a literature search with the AI research assistant Elicit (n=20) were conducted. Result: A person’s personality significantly shapes his or her thinking and actions, which in turn influences his or her behavior in software development teams. It has been shown that team performance and satisfaction can be strongly influenced by personality. The quality of communication and the likelihood of conflict can also be attributed to personality. KW - Teamwork KW - Software KW - Personality KW - Performance KW - Elicit Y1 - 2023 SN - 978-3-031-35633-9 (Print) SN - 978-3-031-35634-6 (Online) U6 - http://dx.doi.org/10.1007/978-3-031-35634-6_10 N1 - Virtual, Augmented and Mixed Reality: 15th International Conference. VAMR 2023. Held as Part of the 25th HCI International Conference. HCII 2023. Copenhagen, Denmark. July 23–28, 2023. SP - 130 EP - 153 PB - Springer CY - Cham ER - TY - CHAP A1 - Arndt, Tobias A1 - Conzen, Max A1 - Elsen, Ingo A1 - Ferrein, Alexander A1 - Galla, Oskar A1 - Köse, Hakan A1 - Schiffer, Stefan A1 - Tschesche, Matteo T1 - Anomaly detection in the metal-textile industry for the reduction of the cognitive load of quality control workers T2 - PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments N2 - This paper presents an approach for reducing the cognitive load for humans working in quality control (QC) for production processes that adhere to the 6σ -methodology. While 100% QC requires every part to be inspected, this task can be reduced when a human-in-the-loop QC process gets supported by an anomaly detection system that only presents those parts for manual inspection that have a significant likelihood of being defective. This approach shows good results when applied to image-based QC for metal textile products. KW - Datasets KW - Neural networks KW - Anomaly detection KW - Quality control KW - Process optimization Y1 - 2023 SN - 9798400700699 U6 - http://dx.doi.org/10.1145/3594806.3596558 N1 - PETRA '23: Proceedings of the 16th International Conference on Pervasive Technologies Related to Assistive Environments, Corfu Greece, July 5 - 7, 2023. SP - 535 EP - 542 PB - ACM ER - TY - CHAP A1 - Neth, Jannik A1 - Schuba, Marko A1 - Brodkorb, Karsten A1 - Neugebauer, Georg A1 - Höner, Tim A1 - Hack, Sacha T1 - Digital forensics triage app for android T2 - ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security N2 - Digital forensics of smartphones is of utmost importance in many criminal cases. As modern smartphones store chats, photos, videos etc. that can be relevant for investigations and as they can have storage capacities of hundreds of gigabytes, they are a primary target for forensic investigators. However, it is exactly this large amount of data that is causing problems: extracting and examining the data from multiple phones seized in the context of a case is taking more and more time. This bears the risk of wasting a lot of time with irrelevant phones while there is not enough time left to analyze a phone which is worth examination. Forensic triage can help in this case: Such a triage is a preselection step based on a subset of data and is performed before fully extracting all the data from the smartphone. Triage can accelerate subsequent investigations and is especially useful in cases where time is essential. The aim of this paper is to determine which and how much data from an Android smartphone can be made directly accessible to the forensic investigator – without tedious investigations. For this purpose, an app has been developed that can be used with extremely limited storage of data in the handset and which outputs the extracted data immediately to the forensic workstation in a human- and machine-readable format. KW - Android KW - Digital triage KW - Triage-app Y1 - 2023 SN - 9798400707728 U6 - http://dx.doi.org/10.1145/3600160.3605017 N1 - ARES 2023: The 18th International Conference on Availability, Reliability and Security. August 29 - September 1, 2023. Benevento, Italy. PB - ACM ER - TY - CHAP A1 - Küppers, Malte A1 - Schuba, Marko A1 - Neugebauer, Georg A1 - Höner, Tim A1 - Hack, Sacha T1 - Security analysis of the KNX smart building protocol T2 - ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security N2 - KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys. Y1 - 2023 U6 - http://dx.doi.org/10.1145/3600160.3605167 N1 - Article No.: 87 ARES 2023, August 29–September 01, 2023, Benevento, Italy SP - 1 EP - 7 PB - ACM ER - TY - CHAP A1 - Galdi, Chiara A1 - Hartung, Frank A1 - Dugelay, Jean-Luc T1 - Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones T2 - Electronic Imaging N2 - Nowadays, the most employed devices for recoding videos or capturing images are undoubtedly the smartphones. Our work investigates the application of source camera identification on mobile phones. We present a dataset entirely collected by mobile phones. The dataset contains both still images and videos collected by 67 different smartphones. Part of the images consists in photos of uniform backgrounds, especially collected for the computation of the RSPN. Identifying the source camera given a video is particularly challenging due to the strong video compression. The experiments reported in this paper, show the large variation in performance when testing an highly accurate technique on still images and videos. KW - Image Forensics KW - Mobile Phones KW - Image Database Y1 - 2017 U6 - http://dx.doi.org/10.2352/ISSN.2470-1173.2017.7.MWSF-331 SN - 2470-1173 N1 - IS&T International Symposium on Electronic Imaging 2017 Media Watermarking, Security, and Forensics 2017 SP - 100 EP - 103 PB - Society for Imaging Science and Technology CY - Springfield, Virginia ER - TY - JOUR A1 - Coll-Perales, Baldomero A1 - Schulte-Tigges, Joschua A1 - Rondinone, Michele A1 - Gozalvez, Javier A1 - Reke, Michael A1 - Matheis, Dominik A1 - Walter, Thomas T1 - Prototyping and evaluation of infrastructure-assisted transition of control for cooperative automated vehicles JF - IEEE Transactions on Intelligent Transportation Systems N2 - Automated driving is now possible in diverse road and traffic conditions. However, there are still situations that automated vehicles cannot handle safely and efficiently. In this case, a Transition of Control (ToC) is necessary so that the driver takes control of the driving. Executing a ToC requires the driver to get full situation awareness of the driving environment. If the driver fails to get back the control in a limited time, a Minimum Risk Maneuver (MRM) is executed to bring the vehicle into a safe state (e.g., decelerating to full stop). The execution of ToCs requires some time and can cause traffic disruption and safety risks that increase if several vehicles execute ToCs/MRMs at similar times and in the same area. This study proposes to use novel C-ITS traffic management measures where the infrastructure exploits V2X communications to assist Connected and Automated Vehicles (CAVs) in the execution of ToCs. The infrastructure can suggest a spatial distribution of ToCs, and inform vehicles of the locations where they could execute a safe stop in case of MRM. This paper reports the first field operational tests that validate the feasibility and quantify the benefits of the proposed infrastructure-assisted ToC and MRM management. The paper also presents the CAV and roadside infrastructure prototypes implemented and used in the trials. The conducted field trials demonstrate that infrastructure-assisted traffic management solutions can reduce safety risks and traffic disruptions. KW - Automated driving KW - automated vehicles KW - connected automated vehicles KW - CAV KW - experimental evaluation Y1 - 2021 U6 - http://dx.doi.org/10.1109/TITS.2021.3061085 SN - 1524-9050 (Print) SN - 1558-0016 (Online) VL - 23 IS - 7 SP - 6720 EP - 6736 PB - IEEE ER - TY - CHAP A1 - Schulte-Tigges, Joschua A1 - Matheis, Dominik A1 - Reke, Michael A1 - Walter, Thomas A1 - Kaszner, Daniel ED - Krömker, Heidi T1 - Demonstrating a V2X enabled system for transition of control and minimum risk manoeuvre when leaving the operational design domain T2 - HCII 2023: HCI in Mobility, Transport, and Automotive Systems N2 - Modern implementations of driver assistance systems are evolving from a pure driver assistance to a independently acting automation system. Still these systems are not covering the full vehicle usage range, also called operational design domain, which require the human driver as fall-back mechanism. Transition of control and potential minimum risk manoeuvres are currently research topics and will bridge the gap until full autonomous vehicles are available. The authors showed in a demonstration that the transition of control mechanisms can be further improved by usage of communication technology. Receiving the incident type and position information by usage of standardised vehicle to everything (V2X) messages can improve the driver safety and comfort level. The connected and automated vehicle’s software framework can take this information to plan areas where the driver should take back control by initiating a transition of control which can be followed by a minimum risk manoeuvre in case of an unresponsive driver. This transition of control has been implemented in a test vehicle and was presented to the public during the IEEE IV2022 (IEEE Intelligent Vehicle Symposium) in Aachen, Germany. KW - V2X KW - Transiton of Control KW - Minimum Risk Manoeuvre KW - Operational Design Domain KW - Connected Automated Vehicle Y1 - 2023 SN - 978-3-031-35677-3 (Print) SN - 978-3-031-35678-0 (Online) U6 - http://dx.doi.org/10.1007/978-3-031-35678-0_12 N1 - 5th International Conference, MobiTAS 2023, Held as Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23–28, 2023. SP - 200 EP - 210 PB - Springer CY - Cham ER -