Skip to main content

Showing 1–15 of 15 results for author: Schutte, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.05026  [pdf, other

    cs.LG math.FA math.NA

    Multi-level Neural Networks for high-dimensional parametric obstacle problems

    Authors: Martin Eigel, Cosmas Heiß, Janina E. Schütte

    Abstract: A new method to solve computationally challenging (random) parametric obstacle problems is developed and analyzed, where the parameters can influence the related partial differential equation (PDE) and determine the position and surface structure of the obstacle. As governing equation, a stationary elliptic diffusion problem is assumed. The high-dimensional solution of the obstacle problem is appr… ▽ More

    Submitted 7 April, 2025; originally announced April 2025.

    MSC Class: 68T07; 68T09; 35J85 ACM Class: I.2.0; I.5.2; I.5.4; G.1.8; F.1

  2. arXiv:2412.07637  [pdf, other

    cs.LG math.OC

    Sampling from Boltzmann densities with physics informed low-rank formats

    Authors: Paul Hagemann, Janina Schütte, David Sommer, Martin Eigel, Gabriele Steidl

    Abstract: Our method proposes the efficient generation of samples from an unnormalized Boltzmann density by solving the underlying continuity equation in the low-rank tensor train (TT) format. It is based on the annealing path commonly used in MCMC literature, which is given by the linear interpolation in the space of energies. Inspired by Sequential Monte Carlo, we alternate between deterministic time step… ▽ More

    Submitted 10 December, 2024; originally announced December 2024.

  3. arXiv:2408.10838  [pdf, other

    cs.LG math.NA

    Multilevel CNNs for Parametric PDEs based on Adaptive Finite Elements

    Authors: Janina Enrica Schütte, Martin Eigel

    Abstract: A neural network architecture is presented that exploits the multilevel properties of high-dimensional parameter-dependent partial differential equations, enabling an efficient approximation of parameter-to-solution maps, rivaling best-in-class methods such as low-rank tensor regression in terms of accuracy and complexity. The neural network is trained with data on adaptively refined finite elemen… ▽ More

    Submitted 20 August, 2024; originally announced August 2024.

  4. arXiv:2403.12650  [pdf, other

    math.NA cs.LG

    Adaptive Multilevel Neural Networks for Parametric PDEs with Error Estimation

    Authors: Janina E. Schütte, Martin Eigel

    Abstract: To solve high-dimensional parameter-dependent partial differential equations (pPDEs), a neural network architecture is presented. It is constructed to map parameters of the model data to corresponding finite element solutions. To improve training efficiency and to enable control of the approximation error, the network mimics an adaptive finite element method (AFEM). It outputs a coarse grid soluti… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    MSC Class: 65M55; 68T07 ACM Class: G.1.8

  5. arXiv:2311.03242  [pdf, other

    cs.LG math.PR math.ST stat.ML

    Approximating Langevin Monte Carlo with ResNet-like Neural Network architectures

    Authors: Charles Miranda, Janina Schütte, David Sommer, Martin Eigel

    Abstract: We sample from a given target distribution by constructing a neural network which maps samples from a simple reference, e.g. the standard normal distribution, to samples from the target. To that end, we propose using a neural network architecture inspired by the Langevin Monte Carlo (LMC) algorithm. Based on LMC perturbation results, we show approximation rates of the proposed architecture for smo… ▽ More

    Submitted 10 December, 2024; v1 submitted 6 November, 2023; originally announced November 2023.

  6. arXiv:2109.02554  [pdf, other

    cs.IR

    Job Posting-Enriched Knowledge Graph for Skills-based Matching

    Authors: Maurits de Groot, Jelle Schutte, David Graus

    Abstract: The labor market is constantly evolving. Occupations are changing, being added, or disappearing to fit the needs of today's market. In recent years the pace of this change has accelerated, due to factors such as globalization, digitization, and the shift to working from home. Different factors are relevant when selecting employment, e.g., cultural fit, compensation, provided degree of freedom. To… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

  7. Towards Tracking Data Flows in Cloud Architectures

    Authors: Immanuel Kunz, Valentina Casola, Angelika Schneider, Christian Banse, Julian Schütte

    Abstract: As cloud services become central in an increasing number of applications, they process and store more personal and business-critical data. At the same time, privacy and compliance regulations such as GDPR, the EU ePrivacy regulation, PCI, and the upcoming EU Cybersecurity Act raise the bar for secure processing and traceability of critical data. Especially the demand to provide information about e… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

    Comments: 11 pages, 5 figures, 2020 IEEE 13th International Conference on Cloud Computing (CLOUD)

  8. arXiv:2003.12901  [pdf, other

    cs.CR

    liOS: Lifting iOS apps for fun and profit

    Authors: Julian Schütte, Dennis Titze

    Abstract: Although iOS is the second most popular mobile operating system and is often considered the more secure one, approaches to automatically analyze iOS applications are scarce and generic app analysis frameworks do not exist. This is on the one hand due to the closed ecosystem putting obstacles in the way of reverse engineers and on the other hand due to the complexity of reverse engineering and anal… ▽ More

    Submitted 28 March, 2020; originally announced March 2020.

  9. ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques

    Authors: Martin Schanzenbach, Thomas Kilian, Julian Schütte, Christian Banse

    Abstract: In this paper we present ZKlaims: a system that allows users to present attribute-based credentials in a privacy-preserving way. We achieve a zero-knowledge property on the basis of Succinct Non-interactive Arguments of Knowledge (SNARKs). ZKlaims allow users to prove statements on credentials issued by trusted third parties. The credential contents are never revealed to the verifier as part of th… ▽ More

    Submitted 22 July, 2019; originally announced July 2019.

    Comments: 8 pages, published at SECRYPT 2019

    Journal ref: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT, 325-332, 2019, Prague, Czech Republic

  10. arXiv:1907.03868  [pdf, other

    cs.CR cs.SC

    Annotary: A Concolic Execution System for Developing Secure Smart Contracts

    Authors: Konrad Weiss, Julian Schütte

    Abstract: Ethereum smart contracts are executable programs, deployed on a peer-to-peer network and executed in a consensus-based fashion. Their bytecode is public, immutable and once deployed to the blockchain, cannot be patched anymore. As smart contracts may hold Ether worth of several million dollars, they are attractive targets for attackers and indeed some contracts have successfully been exploited in… ▽ More

    Submitted 8 July, 2019; originally announced July 2019.

  11. Practical Decentralized Attribute-Based Delegation using Secure Name Systems

    Authors: Martin Schanzenbach, Christian Banse, Julian Schütte

    Abstract: Identity and trust in the modern Internet are centralized around an oligopoly of identity service providers consisting solely of major tech companies. The problem with centralizing trust has become evident in recent discoveries of mass surveillance and censorship programs as well as information leakage through hacking incidents. One approach to decentralizing trust is distributed, attribute-based… ▽ More

    Submitted 16 May, 2018; originally announced May 2018.

    Comments: 8 pages

    Journal ref: TrustCom/BigDataSE 2018: 244-251

  12. reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption

    Authors: Martin Schanzenbach, Georg Bramm, Julian Schütte

    Abstract: In this paper we present reclaimID: An architecture that allows users to reclaim their digital identities by securely sharing identity attributes without the need for a centralised service provider. We propose a design where user attributes are stored in and shared over a name system under user-owned namespaces. Attributes are encrypted using attribute-based encryption (ABE), allowing the user to… ▽ More

    Submitted 16 May, 2018; originally announced May 2018.

    Comments: 12 pages

    Journal ref: TrustCom/BigDataSE 2018: 946-957

  13. arXiv:1805.05887  [pdf, other

    cs.CR cs.SE

    LUCON: Data Flow Control for Message-Based IoT Systems

    Authors: Julian Schütte, Gerd Stefan Brost

    Abstract: Today's emerging Industrial Internet of Things (IIoT) scenarios are characterized by the exchange of data between services across enterprises. Traditional access and usage control mechanisms are only able to determine if data may be used by a subject, but lack an understanding of how it may be used. The ability to control the way how data is processed is however crucial for enterprises to guarante… ▽ More

    Submitted 14 May, 2018; originally announced May 2018.

    Comments: data flow control, information flow control, trustcom, 11 pages

  14. arXiv:1804.09442  [pdf, other

    cs.CR cs.DC

    Der Trusted Connector im Industrial Data Space

    Authors: Julian Schütte, Gerd Brost, Sascha Wessel

    Abstract: Digitalization affects all industrial domains and causes disruption of various business models. Especially in domains such as logistics and manufacturing, inter-connected devices and near-realtime exchange of sensor data across enterprises allows to speed up processes, reduce costs and respond to customer's needs. However, the advent of the Industrial Internet of Things (IIoT) also raises challeng… ▽ More

    Submitted 25 April, 2018; originally announced April 2018.

    Comments: in German. IDS, IoT, Industrial Data Space, Edge Device, Usage Control

    Report number: TR-AISEC-04-20

  15. arXiv:1802.06012  [pdf, other

    cs.CR cs.LG

    WebEye - Automated Collection of Malicious HTTP Traffic

    Authors: Johann Vierthaler, Roman Kruszelnicki, Julian Schütte

    Abstract: With malware detection techniques increasingly adopting machine learning approaches, the creation of precise training sets becomes more and more important. Large data sets of realistic web traffic, correctly classified as benign or malicious are needed, not only to train classic and deep learning algorithms, but also to serve as evaluation benchmarks for existing malware detection products. Intere… ▽ More

    Submitted 16 February, 2018; originally announced February 2018.

    Comments: Software implementation description, dataset, machine learning, 11 pages