Refine
Document Type
- Conference Proceeding (194) (remove)
Conference Type
- Konferenzartikel (169)
- Konferenz-Abstract (19)
- Sonstiges (5)
- Konferenz-Poster (1)
Language
- English (194) (remove)
Is part of the Bibliography
- yes (194)
Keywords
- RoboCup (12)
- Machine Learning (9)
- Deep Leaning (7)
- Heart rhythm model (5)
- Modeling and simulation (5)
- Robustness (4)
- machine learning (4)
- Generative Adversarial Network (3)
- Radar (3)
- cryptography (3)
- neural networks (3)
- printed electronics (3)
- Computer Vision (2)
- Cryoballoon catheter ablation (2)
- Current measurement (2)
- Energy Flexibility (2)
- Geophysik (2)
- NB-IoT (2)
- Neural networks (2)
- Predictive Maintenance (2)
- Security (2)
- Stability (2)
- Supraventricular tachycardia (2)
- Switches (2)
- UWB radars (2)
- accountability (2)
- artificial intelligence (2)
- atrial fibrillation (2)
- autoattack (2)
- cardiac ablation (2)
- catheter ablation (2)
- certificate management (2)
- convolutional neural networks (2)
- efficient training (2)
- explainability (2)
- fairness (2)
- heart rhythm model (2)
- image classification (2)
- imaging algorithms (2)
- interactive visualization (2)
- medical imaging (2)
- microwave (2)
- programming (2)
- responsibility (2)
- scattering measurements (2)
- semantics (2)
- trust (2)
- understandability (2)
- 3D print (1)
- 3D-Modelling (1)
- 5G (1)
- 5G mobile communication (1)
- 5G private networks (1)
- AC machines (1)
- AIN Cantilever (1)
- AV nodal reentry tachycardia (1)
- AV reentrant tachycardia (1)
- Additive Manufacturing (1)
- Adversarial Attacks (1)
- Adversarial Robustness (1)
- Agent based sensor (1)
- Air Pollution (1)
- Aliasing (1)
- Aluminum (1)
- Amplitude and Phase Errors (1)
- Angle of Arrival (1)
- Anti-Windup (1)
- Approximation (1)
- Artificial Intelligence (1)
- Atrial fibrillation (1)
- Authentication (1)
- Authorization (1)
- Automated idea generation (1)
- Automotive Radar (1)
- Battery storage (1)
- Bearings (1)
- Bioimpedance measurement (1)
- Biomimetics (1)
- Blockchain (1)
- Blockchains (1)
- Boundary conditions (1)
- Bowtie antenna (1)
- CNN (1)
- CNNs (1)
- Calibration (1)
- Cardiac Resynchronization Therapy (1)
- Cardiac resynchronization therapy (1)
- Challenges in Action Recognition (1)
- Chemical engineering (1)
- Cleaning (1)
- Clustering (1)
- Collaboration of Academia and Industry (1)
- Compensation (1)
- Control Algorithms (1)
- Current Control (1)
- DC-AC converters (1)
- Data Mining (1)
- Data breech (1)
- Debinding (1)
- Deep Learning (1)
- Deep Neural Network (1)
- Demand side flexibility (1)
- Device characterization (1)
- Diagnostics (1)
- Digital Beamforming (1)
- Digital Flex Twin Optimization (1)
- Digital Twin (1)
- Digitalization (1)
- EAP-TLS (1)
- ETAP Simulations (1)
- Eco-inventive principles (1)
- Economics (1)
- Edge AI (1)
- Education (1)
- Eigenvalues (1)
- Electromagnetic and thermal simulation (1)
- Embedded AI (1)
- Embedded Systems (1)
- Energiemanagement (1)
- Energy Flexibility for Companies (1)
- Energy Management (1)
- Energy Marketing of Industrial Flexibilities (1)
- Energy management (1)
- Energy systems modeling (1)
- Environmental monitoring (1)
- Error (1)
- Esophageal catheter (1)
- Estimation (1)
- FUSION (1)
- Failure analysis (1)
- Fault Classification (1)
- Featherweight Go (1)
- Federated Learning (1)
- Field Programmable Gate Array (FPGA) (1)
- Fused Filament Fabrication (1)
- GPU Computing (1)
- Handschrift (1)
- Handswritten Character Recognition (1)
- Harmonic analysis (1)
- Heart Rhythm Simulation (1)
- Hemodynamic monitoring (1)
- High frequency ablation (1)
- His-Bundle Pacing (1)
- Hybrid system (1)
- IEC/IEEE 60802 security (1)
- IEEE802.15.4 (1)
- IIoT (1)
- InceptionTime (1)
- Industrial Blockchain (1)
- Ink (1)
- Internet of Things (1)
- Inventive principles (1)
- Inventive problem solving (1)
- Inverters (1)
- IoT Security (1)
- IoT security (1)
- Künstliche Intelligenz (1)
- LPWAN (1)
- Large Grid-Connected PV Systems (1)
- Left Atrial Appendage Closure (1)
- Limiting (1)
- Load Flow Analysis (1)
- Logic gates (1)
- Long Term Evolution (1)
- MEMS (1)
- MIMO (1)
- MLOps (1)
- Machine learning (1)
- Magnetic sensors (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Mean Square Error (1)
- Measurement (1)
- Medizintechnik (1)
- Microgrid(s) (1)
- Mode Collapse (1)
- Model Calibration (1)
- Model Predictive Control (1)
- Model Search (1)
- Monitoring (1)
- Monocular Depth Estimation (1)
- Monte-Carlo (1)
- Monte-Carlo Simulation (1)
- Monte-Carlo method (1)
- Multiside heart stimulation (1)
- NETCONF security (1)
- Nature-inspired principles (1)
- Network Test (1)
- Nyquist-Shannon (1)
- OT security (1)
- Octave Convolution (1)
- Optimization (1)
- Optimization and control (1)
- Optimization with Digital Twins (1)
- Optische Zeichenerkennung (1)
- PI control (1)
- PKI (1)
- PROFINET IO (1)
- PROFINET Security (1)
- PV System (1)
- Parallelization (1)
- Parameter Estimation (1)
- Parameter estimation (1)
- Pattern Recognition (1)
- Peak shaving (1)
- Peer to peer network (1)
- Performance (1)
- Performance evaluation (1)
- Permanent magnet machines (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Physiological Pacing (1)
- Power Loss (1)
- Predictions (1)
- Predictive Models (1)
- Process design (1)
- Pulmonary vein isolation (1)
- Pulse width modulation (1)
- RFID (1)
- RUL (1)
- Radio frequency (1)
- Random call model (1)
- Real-Time Communication (1)
- Regularization (1)
- Renewable Energy Markets (1)
- Representation Learning (1)
- ResNet (1)
- Road-Quality Prediction (1)
- Roboter (1)
- Rotors (1)
- Sampling (1)
- Second-order Optimization (1)
- Self-Calibration (1)
- Semiconductor Device (1)
- Semiconductor device measurement (1)
- Sensor phenomena and characterization (1)
- Sintering (1)
- Smart Energy Metering (1)
- Smart Grids (1)
- Smart-UPS (1)
- SmartMAC (1)
- Software (1)
- Software algorithms (1)
- Software for measurements (1)
- Solar Radiation (1)
- Spinal cord stimulation (1)
- Stromregelung (1)
- Stromzustandsregler (1)
- Subspace Clustering (1)
- Substrates (1)
- Sustainable technology (1)
- Synchronmaschine (1)
- Systematic innovation (1)
- TLS (1)
- TRIZ methodology (1)
- TSN security (1)
- Testbed (1)
- Time Sensitive Networking (1)
- Time Synchronization (1)
- Time series data (1)
- Time-series Classification (1)
- TinyML (1)
- Torque (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Transesophageal left atrial pacing (1)
- Trust management (1)
- Ultra-Low Energy (1)
- Unsupervised Conditional Training (1)
- Unsupervised Learning (1)
- Variational Autoencoders (1)
- Virtual Reality (1)
- Wireless IoT (1)
- Yolov5 (1)
- accelerometer (1)
- adversarial (1)
- adversarial attacks (1)
- adversarial detection (1)
- atrial flutter (1)
- attribute manipulation (1)
- autoML (1)
- autonomous systems (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- biocompatibility test (1)
- biodegradable (1)
- biomaterials (1)
- biomechanical stimulation (1)
- building management systems (1)
- camera-based navigation (1)
- cellular radio (1)
- cifar (1)
- computer network management (1)
- correlation (1)
- credentials (1)
- crossbar (1)
- curb (1)
- curriculum learning (1)
- cybersecurity (1)
- deep learning (1)
- deep reinforcement learning (1)
- defense (1)
- degradation stages (1)
- detection (1)
- dictionary passing (1)
- echocardiography (1)
- electrolyte-gated transistors (1)
- embedded systems (1)
- energy harvesting (1)
- face editing (1)
- face recognition (1)
- fail-operational (1)
- fingerprinting (1)
- fourier (1)
- gan (1)
- generative adversarial networks (1)
- ground penetrating radar (1)
- hair (1)
- heart rhythm simulation (1)
- heat pump (1)
- height estimation (1)
- home automation (1)
- hybrid systems (1)
- identification (1)
- image color analysis (1)
- imagenet (1)
- impedance cardiography (1)
- industrial Ethernet (1)
- industrial IoT (1)
- industrial communication (1)
- irrigation (1)
- lid (1)
- machine-to-machine communication (1)
- mahalanobis (1)
- metal oxide transistor (1)
- millimeter-wave (1)
- model-predictive control (1)
- molybdenum (1)
- multipath (1)
- mutual authentication (1)
- neural architecture search (1)
- noise measurement (1)
- nose (1)
- parking (1)
- pattern recognition (1)
- perception (1)
- performance (1)
- physical unclonable function (1)
- physically unclonable function (PUF) (1)
- predictive maintenance (1)
- primary authentication (1)
- printed Antennas (1)
- programming languages (1)
- pruning (1)
- pulmonary vein isolation (1)
- radio networks (1)
- rekeying (1)
- resource efficiency (1)
- secure communication (1)
- security (1)
- skin cancer (1)
- skin cancer detection (1)
- software defined radio (1)
- solar module (1)
- sparse backpropagation (1)
- spectral defense (1)
- spectraldefense (1)
- statistical methods, ROS (1)
- stochastic computing (1)
- style (1)
- style transfer (1)
- system authenticity (1)
- telecommunication equipment testing (1)
- temperature sensor (1)
- thinned ASIC in foil (1)
- transmit beamforming (1)
- ventricular tachycardia (1)
- wide area networks (1)
- wireless sensor networks (1)
Institute
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (194) (remove)
Open Access
- Closed Access (79)
- Open Access (63)
- Closed (51)
- Bronze (22)
- Diamond (9)
- Grün (3)
- Gold (1)
Artificial intelligence (AI), and in particular machine learning algorithms, are of increasing importance in many application areas but interpretability and understandability as well as responsibility, accountability, and fairness of the algorithms' results, all crucial for increasing the humans' trust into the systems, are still largely missing. Big industrial players, including Google, Microsoft, and Apple, have become aware of this gap and recently published their own guidelines for the use of AI in order to promote fairness, trust, interpretability, and other goals. Interactive visualization is one of the technologies that may help to increase trust in AI systems. During the seminar, we discussed the requirements for trustworthy AI systems as well as the technological possibilities provided by interactive visualizations to increase human trust in AI.
The use of artificial intelligence continues to impact a broad variety of domains, application areas, and people. However, interpretability, understandability, responsibility, accountability, and fairness of the algorithms' results - all crucial for increasing humans' trust into the systems - are still largely missing. The purpose of this seminar is to understand how these components factor into the holistic view of trust. Further, this seminar seeks to identify design guidelines and best practices for how to build interactive visualization systems to calibrate trust.
Detecting Images Generated by Deep Diffusion Models using their Local Intrinsic Dimensionality
(2023)
Diffusion models recently have been successfully applied for the visual synthesis of strikingly realistic appearing images. This raises strong concerns about their potential for malicious purposes. In this paper, we propose using the lightweight multi Local Intrinsic Dimensionality (multiLID), which has been originally developed in context of the detection of adversarial examples, for the automatic detection of synthetic images and the identification of the according generator networks. In contrast to many existing detection approaches, which often only work for GAN-generated images, the proposed method provides close to perfect detection results in many realistic use cases. Extensive experiments on known and newly created datasets demonstrate that the proposed multiLID approach exhibits superiority in diffusion detection and model identification.Since the empirical evaluations of recent publications on the detection of generated images are often mainly focused on the "LSUN-Bedroom" dataset, we further establish a comprehensive benchmark for the detection of diffusion-generated images, including samples from several diffusion models with different image sizes.The code for our experiments is provided at https://github.com/deepfake-study/deepfake-multiLID.
Printed electronics can add value to existing products by providing new smart functionalities, such as sensing elements over large-areas on flexible or non-conformal surfaces. Here we present a hardware concept and prototype for a thinned ASIC integrated with an inkjet-printed temperature sensor alongside in-built additional security and unique identification features. The hybrid system exploits the advantages of inkjet-printable platinum-based sensors, physically unclonable function circuits and a fluorescent particle-based coating as a tamper protection layer.
PROFINET Security: A Look on Selected Concepts for Secure Communication in the Automation Domain
(2023)
We provide a brief overview of the cryptographic security extensions for PROFINET, as defined and specified by PROFIBUS & PROFINET International (PI). These come in three hierarchically defined Security Classes, called Security Class 1,2 and 3. Security Class 1 provides basic security improvements with moderate implementation impact on PROFINET components. Security Classes 2 and 3, in contrast, introduce an integrated cryptographic protection of PROFINET communication. We first highlight and discuss the security features that the PROFINET specification offers for future PROFINET products. Then, as our main focus, we take a closer look at some of the technical challenges that were faced during the conceptualization and design of Security Class 2 and 3 features. In particular, we elaborate on how secure application relations between PROFINET components are established and how a disruption-free availability of a secure communication channel is guaranteed despite the need to refresh cryptographic keys regularly. The authors are members of the PI Working Group CB/PG10 Security.
Wireless communication networks are crucial for enabling megatrends like the Internet of Things (IoT) and Industry 4.0. However, testing these networks can be challenging due to the complex network topology and RF characteristics, requiring a multitude of scenarios to be tested. To address this challenge, the authors developed and extended an automated testbed called Automated Physical TestBed (APTB). This testbed provides the means to conduct controlled tests, analyze coexistence, emulate multiple propagation paths, and model dependable channel conditions. Additionally, the platform supports test automation to facilitate efficient and systematic experimentation. This paper describes the extended architecture, implementation, and performance evaluation of the APTB testbed. The APTB testbed provides a reliable and efficient solution for testing wireless communication networks under various scenarios. The implementation and performance verification of the testbed demonstrate its effectiveness and usefulness for researchers and industry practitioners.
TSN, or Time Sensitive Networking, is becoming an essential technology for integrated networks, enabling deterministic and best effort traffic to coexist on the same infrastructure. In order to properly configure, run and secure such TSN, monitoring functionality is a must. The TSN standard already has some preparations to provide such functionality and there are different methods to choose from. We implemented different methods to measure the time synchronisation accuracy between devices as a C library and compared the measurement results. Furthermore, the library has been integrated into the ControlTSN engineering framework.
As industrial networks continue to expand and connect more devices and users, they face growing security challenges such as unauthorized access and data breaches. This paper delves into the crucial role of security and trust in industrial networks and how trust management systems (TMS) can mitigate malicious access to these networks.The TMS presented in this paper leverages distributed ledger technology (blockchain) to evaluate the trustworthiness of blockchain nodes, including devices and users, and make access decisions accordingly. While this approach is applicable to blockchain, it can also be extended to other areas. This approach can help prevent malicious actors from penetrating industrial networks and causing harm. The paper also presents the results of a simulation to demonstrate the behavior of the TMS and provide insights into its effectiveness.
Fused Filament Fabrication (FFF) is a widespread additive manufacturing technology, mostly in the field of printable polymers. The use of filaments filled with metal particles for the manufacture of metallic parts by FFF presents specific challenges regarding debinding and sintering. For aluminium and its alloys, the sintering temperature range overlaps with the temperature range of thermal decomposition of many commonly used “backbone” polymers, which provide stability to the green parts. Moreover, the high oxygen affinity of aluminium necessitates the use of special sintering regimes and alloying strategies. Therefore, it is challenging to achieve both low porosity and low levels of oxygen and carbon impurities at the same time. Feedstocks compatible with the special requirements of aluminium alloys were developed. We present results on the investigation of debinding/sintering regimes by Fourier Transform Infrared spectroscopy (FTIR) based In-Situ Process Gas Analysis and discuss optimized thermal treatment strategies for Al-based FFF.