Skip to main content

Showing 1–4 of 4 results for author: Nocker, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.06712  [pdf, other

    cs.CR

    Large-Scale (Semi-)Automated Security Assessment of Consumer IoT Devices -- A Roadmap

    Authors: Pascal Schöttle, Matthias Janetschek, Florian Merkle, Martin Nocker, Christoph Egger

    Abstract: The Internet of Things (IoT) has rapidly expanded across various sectors, with consumer IoT devices - such as smart thermostats and security cameras - experiencing growth. Although these devices improve efficiency and promise additional comfort, they also introduce new security challenges. Common and easy-to-explore vulnerabilities make IoT devices prime targets for malicious actors. Upcoming mand… ▽ More

    Submitted 10 April, 2025; v1 submitted 9 April, 2025; originally announced April 2025.

    Comments: Submitted to SpliTech 2025

  2. arXiv:2302.08878  [pdf, other

    cs.CV cs.AI

    Less is More: The Influence of Pruning on the Explainability of CNNs

    Authors: Florian Merkle, David Weber, Pascal Schöttle, Stephan Schlögl, Martin Nocker

    Abstract: Over the last century, deep learning models have become the state-of-the-art for solving complex computer vision problems. These modern computer vision models have millions of parameters, which presents two major challenges: (1) the increased computational requirements hamper the deployment in resource-constrained environments, such as mobile or IoT devices, and (2) explaining the complex decision… ▽ More

    Submitted 14 January, 2025; v1 submitted 17 February, 2023; originally announced February 2023.

  3. HE-MAN -- Homomorphically Encrypted MAchine learning with oNnx models

    Authors: Martin Nocker, David Drexel, Michael Rader, Alessio Montuoro, Pascal Schöttle

    Abstract: Machine learning (ML) algorithms are increasingly important for the success of products and services, especially considering the growing amount and availability of data. This also holds for areas handling sensitive data, e.g. applications processing medical data or facial images. However, people are reluctant to pass their personal sensitive data to a ML service provider. At the same time, service… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

  4. On the Effect of Adversarial Training Against Invariance-based Adversarial Examples

    Authors: Roland Rauter, Martin Nocker, Florian Merkle, Pascal Schöttle

    Abstract: Adversarial examples are carefully crafted attack points that are supposed to fool machine learning classifiers. In the last years, the field of adversarial machine learning, especially the study of perturbation-based adversarial examples, in which a perturbation that is not perceptible for humans is added to the images, has been studied extensively. Adversarial training can be used to achieve rob… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.