Skip to main content

Showing 1–8 of 8 results for author: Schöttle, P

.
  1. arXiv:2504.06712  [pdf, other

    cs.CR

    Large-Scale (Semi-)Automated Security Assessment of Consumer IoT Devices -- A Roadmap

    Authors: Pascal Schöttle, Matthias Janetschek, Florian Merkle, Martin Nocker, Christoph Egger

    Abstract: The Internet of Things (IoT) has rapidly expanded across various sectors, with consumer IoT devices - such as smart thermostats and security cameras - experiencing growth. Although these devices improve efficiency and promise additional comfort, they also introduce new security challenges. Common and easy-to-explore vulnerabilities make IoT devices prime targets for malicious actors. Upcoming mand… ▽ More

    Submitted 10 April, 2025; v1 submitted 9 April, 2025; originally announced April 2025.

    Comments: Submitted to SpliTech 2025

  2. arXiv:2302.08878  [pdf, other

    cs.CV cs.AI

    Less is More: The Influence of Pruning on the Explainability of CNNs

    Authors: Florian Merkle, David Weber, Pascal Schöttle, Stephan Schlögl, Martin Nocker

    Abstract: Over the last century, deep learning models have become the state-of-the-art for solving complex computer vision problems. These modern computer vision models have millions of parameters, which presents two major challenges: (1) the increased computational requirements hamper the deployment in resource-constrained environments, such as mobile or IoT devices, and (2) explaining the complex decision… ▽ More

    Submitted 14 January, 2025; v1 submitted 17 February, 2023; originally announced February 2023.

  3. HE-MAN -- Homomorphically Encrypted MAchine learning with oNnx models

    Authors: Martin Nocker, David Drexel, Michael Rader, Alessio Montuoro, Pascal Schöttle

    Abstract: Machine learning (ML) algorithms are increasingly important for the success of products and services, especially considering the growing amount and availability of data. This also holds for areas handling sensitive data, e.g. applications processing medical data or facial images. However, people are reluctant to pass their personal sensitive data to a ML service provider. At the same time, service… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

  4. On the Effect of Adversarial Training Against Invariance-based Adversarial Examples

    Authors: Roland Rauter, Martin Nocker, Florian Merkle, Pascal Schöttle

    Abstract: Adversarial examples are carefully crafted attack points that are supposed to fool machine learning classifiers. In the last years, the field of adversarial machine learning, especially the study of perturbation-based adversarial examples, in which a perturbation that is not perceptible for humans is added to the images, has been studied extensively. Adversarial training can be used to achieve rob… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

  5. arXiv:2108.08560  [pdf, ps, other

    cs.LG cs.CR

    Pruning in the Face of Adversaries

    Authors: Florian Merkle, Maximilian Samsinger, Pascal Schöttle

    Abstract: The vulnerability of deep neural networks against adversarial examples - inputs with small imperceptible perturbations - has gained a lot of attention in the research community recently. Simultaneously, the number of parameters of state-of-the-art deep learning models has been growing massively, with implications on the memory and computational resources required to train and deploy such models. O… ▽ More

    Submitted 19 August, 2021; originally announced August 2021.

  6. arXiv:2108.07602  [pdf, ps, other

    cs.LG cs.GT

    When Should You Defend Your Classifier -- A Game-theoretical Analysis of Countermeasures against Adversarial Examples

    Authors: Maximilian Samsinger, Florian Merkle, Pascal Schöttle, Tomas Pevny

    Abstract: Adversarial machine learning, i.e., increasing the robustness of machine learning algorithms against so-called adversarial examples, is now an established field. Yet, newly proposed methods are evaluated and compared under unrealistic scenarios where costs for adversary and defender are not considered and either all samples or no samples are adversarially perturbed. We scrutinize these assumptions… ▽ More

    Submitted 27 September, 2021; v1 submitted 17 August, 2021; originally announced August 2021.

  7. arXiv:2002.02730  [pdf, other

    cs.LG stat.ML

    Machine Unlearning: Linear Filtration for Logit-based Classifiers

    Authors: Thomas Baumhauer, Pascal Schöttle, Matthias Zeppelzauer

    Abstract: Recently enacted legislation grants individuals certain rights to decide in what fashion their personal data may be used, and in particular a "right to be forgotten". This poses a challenge to machine learning: how to proceed when an individual retracts permission to use data which has been part of the training process of a model? From this question emerges the field of machine unlearning, which c… ▽ More

    Submitted 8 July, 2020; v1 submitted 7 February, 2020; originally announced February 2020.

  8. arXiv:1803.03613  [pdf, ps, other

    cs.CR

    Detecting Adversarial Examples - A Lesson from Multimedia Forensics

    Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme

    Abstract: Adversarial classification is the task of performing robust classification in the presence of a strategic attacker. Originating from information hiding and multimedia forensics, adversarial classification recently received a lot of attention in a broader security context. In the domain of machine learning-based image classification, adversarial classification can be interpreted as detecting so-cal… ▽ More

    Submitted 9 March, 2018; originally announced March 2018.

    Comments: Submitted to EUSIPCO 2018, Special Session on Adversarial Multimedia Forensics