Refine
Departments, institutes and facilities
- Institut für Cyber Security & Privacy (ICSP) (201) (remove)
Document Type
- Conference Object (201) (remove)
Year of publication
Keywords
- Usable Security (8)
- DPA (6)
- Privacy (5)
- Cloud (4)
- HTTP (4)
- Power Analysis (4)
- Usable Privacy (4)
- Web (4)
- security (4)
- Authentication (3)
- Fault analysis (3)
- IP protection (3)
- Machine Learning (3)
- REST (3)
- Risk-based Authentication (3)
- Robotics (3)
- Security (3)
- Stochastic Model (3)
- visualization (3)
- web caching (3)
- web services (3)
- Basic Access Control (2)
- Boolean Masking (2)
- Cloud Security (2)
- Cooperative Awareness Message (2)
- E-Passport (2)
- Embedded software (2)
- GDPR (2)
- Host-Based Code Injection Attacks (2)
- MRTD (2)
- Malware analysis (2)
- Memory forensics (2)
- Password (2)
- Pseudonym Concept (2)
- SOA (2)
- SOAP (2)
- Side Channel Analysis (2)
- Side Channel Cryptanalysis (2)
- Side-channel analysis (2)
- TLS (2)
- Template Attack (2)
- User Interface Design (2)
- Vehicle-to-Vehicle Communication (2)
- WS-Security (2)
- XML Signature (2)
- XML Signature Wrapping (2)
- knowledge learning (2)
- neural networks (2)
- virtual reality (2)
- AES (1)
- AES hardware (1)
- AMD Family 15h (1)
- API usability (1)
- ARM Cortex M3 Processor (1)
- Account Security (1)
- Adaptive Media Streaming (1)
- Advance Encryption Standard (1)
- Adversarial Model (1)
- Agent-oriented software engineering (1)
- Assistive robots (1)
- Attacks and Attack Implementations (1)
- Authorship watermark (1)
- Bag of Features (1)
- Beacon Chain (1)
- Behaviour-Driven Development (1)
- Benchmarking (1)
- Big Data Analysis (1)
- Biometrics (1)
- Black Hole (1)
- Block cipher (1)
- Boolean and arithmetic operations (1)
- Botnet tracking (1)
- Browser cache (1)
- COPACOBANA (1)
- CPA (1)
- CPUID instruction (1)
- CRT (1)
- CUDA (1)
- Cache Poisoning (1)
- Cache line fingerprinting (1)
- Cache-independent (1)
- Cipher Block Chain (1)
- Cloud Computing security (1)
- Cloud Malware Injection (1)
- Cloud Standards (1)
- Code similarity analysis (1)
- Component Models (1)
- Computer Security (1)
- Conformance Testing (1)
- Conversational Interface (1)
- Covert channel (1)
- Cross-core (1)
- Cryptography (1)
- Cypher (1)
- DEMA (1)
- DES (1)
- DFA Lab (1)
- DNSSEC (1)
- DPA Lab (1)
- Data Compression (1)
- Data Generation (1)
- Data Protection Officer (1)
- Data Reduction (1)
- Data Tiles (1)
- Denial of Service (1)
- Design patterns (1)
- Difference-coding (1)
- Differential Side Channel Cryptanalysis (1)
- Differential analysis (1)
- Differential side-channel analysis (1)
- Digital Ecosystem (1)
- Digital watermarking (1)
- Disaster Area (1)
- Distance Bounding (1)
- Domain Expert (1)
- E-Health (1)
- EM Algorithm (1)
- Eclipse Modeling Framework (1)
- Electromagnetic Analysis (1)
- Electronic Immobilizer (1)
- Elliptic Curve Cryptography (1)
- Employee data protection (1)
- Ethereum (1)
- Evaluation (1)
- Expert Interviews (1)
- Explainability (1)
- FPGA implementation (1)
- Fake Link (1)
- Fault Channel Watermarking Lab (1)
- Fault-channel watermarks (1)
- File carving (1)
- Fingerprint watermark (1)
- Fragmented files (1)
- Frontend architecture (1)
- Full-text Search (1)
- Gaussian Mixture Models (1)
- Graphics Cards (1)
- HMAC-construction (1)
- Hardware Testbed (1)
- Header whitelisting (1)
- High-Order Attacks (1)
- Higher-Order Analysis (1)
- Higher-Order Side Channel Analysis (1)
- Human factors (1)
- Human-Robot Interaction (1)
- Human-agent interaction (1)
- Humanoid Robot (1)
- IDEA (1)
- Implementation Attack (1)
- Implementation Challenges (1)
- Information hiding (1)
- Informational self-determination (1)
- Informationssicherheit (1)
- Instruction scheduling (1)
- Integrate Development Environment (1)
- Intelligent Transport System (1)
- Interactive Smart Card Applications (1)
- Intermediaries (1)
- Internet Technology (1)
- JOSE (1)
- JPEGs (1)
- JSON (1)
- Key Search Machine (1)
- LOTUS Sensor Node (1)
- MESD (1)
- MRTD Cracker (1)
- Mafia Attack (1)
- Malware (1)
- Malware Detection (1)
- Maximum Likelihood Principle (1)
- Mental Models (1)
- Message Authentication (1)
- Microarchitectural Data Sampling (MDS) (1)
- Microservices (1)
- Minimum Principle (1)
- Mobility Model (1)
- Mobility modeling (1)
- Model-based Approach (1)
- Model-based engineering approaches to AI safety (1)
- Model-driven Development (1)
- Model-driven engineering (1)
- Motion Generator (1)
- Motor Control Unit (1)
- Multi-hop Net-works (1)
- Multimedia Communication (1)
- Multimedia forensics (1)
- Multithreaded and multicore architecture (1)
- Multivariate Side Channel Analysis (1)
- Neural Machine Translation (1)
- Online Services (1)
- OpenStack (1)
- PHR (1)
- Partial Data Protection (1)
- Partial Signature (1)
- PartialEncryption (1)
- Password Masking (1)
- Password Visualization (1)
- Passwords (1)
- People Detection (1)
- Performance (1)
- Performance Analysis (1)
- Performance Evaluation (1)
- Periodic structures (1)
- Personal Health Record (1)
- Phishing (1)
- Physical Security (1)
- Privacy engineering (1)
- Privacy in the workplace (1)
- Privacy perceptions (1)
- Proof of Stake (1)
- Public Key Infrastructures (1)
- Push-based Streaming (1)
- QoS (1)
- RBAR (1)
- RC6 (1)
- REST security (1)
- RF Eavesdropper (1)
- RFID (1)
- RGB-D (1)
- RSA (1)
- Rank correlation (1)
- Rapid Prototyping (1)
- Re-authentication (1)
- Requirements (1)
- Restful Web Services (1)
- Reusable Software (1)
- Risk-Based Account Recovery (1)
- Risk-based Authentication (RBA) (1)
- Robot software (1)
- Robotics competitions (1)
- Robots (1)
- Runtime AI safety monitoring (1)
- Runtime Adaptation (1)
- SAML (1)
- SEMA (1)
- SHA-1 (1)
- SQL (1)
- SaaS (1)
- ScalarMultiplication (1)
- Second-Order DPA (1)
- Secure Cloud Storage (1)
- Security APIs (1)
- Security Approaches (1)
- Security Protocol (1)
- Semantic gap (1)
- Semi-Virtual Testbed (1)
- Service-Oriented Architecture (1)
- Side Channel Countermeasures (1)
- Side Channel Cryptanalysis, Stochastic Methods (1)
- Side Channel Watermarking Lab (1)
- Side channel attack (1)
- Side-channel watermarking (1)
- Similarity matrix (1)
- Simulator (1)
- Smart Card (1)
- SmartMANET Jamming (1)
- Software (1)
- Software Architectures (1)
- Software Development Process (1)
- Software IP protection (1)
- Software Security (1)
- Software and Architecture (1)
- Software reverse engineering (1)
- Support Vector Machine (1)
- Tactical Wireless Multi-hop Networks (1)
- Tamper-Proof Hardware (1)
- Tampering (1)
- Template Attacks (1)
- Template attacks (1)
- Templates (1)
- Testing (1)
- Testing Tool (1)
- Thin Client (1)
- Timing analysis (1)
- Timing channel (1)
- TinyECC 2.0 (1)
- Transponder (1)
- Trusted Computing (1)
- Two-factor Authentication (1)
- UAV teleoperation (1)
- UI-Dressing (1)
- URI (1)
- Usable Security and Privacy (1)
- Variability Management (1)
- Variability Resolution (1)
- Vehicle-to- Vehicle Communication (V2V) (1)
- Vehicle-to-Infrastructure Communication (V2I) (1)
- Vehicular Ad hoc Networks (1)
- Vehicular Ad hoc Networks (VANETs) (1)
- Warnings (1)
- Watermarking (1)
- Web Browser (1)
- Web Browser Cache (1)
- Web Information Systems and Technologies (1)
- Web Interfaces and Applications (1)
- Web Portal (1)
- Web Service (1)
- Web Service Security (1)
- Web Services and Web Engineering (1)
- WebSocket (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- Wireless Sensor Network (1)
- Wizard of Oz (1)
- Workflow (1)
- Worm Hole (1)
- XAI (1)
- XML (1)
- XML Security (1)
- XSpRES (1)
- ZombieLoad (1)
- analyses (1)
- analysis (1)
- attacks (1)
- blockchain (1)
- caching (1)
- classifier combination (1)
- clustering (1)
- cognitive agents (1)
- component based (1)
- cooperation (1)
- crawling (1)
- cryptographic apis (1)
- developer console (1)
- distributed systems (1)
- embedded systems (1)
- end-to-end security (1)
- feature extraction (1)
- focus groups (1)
- interactive-learning (1)
- link quality (1)
- machine learning (1)
- modular reduction (1)
- multi robot systems (1)
- network (1)
- neural-networks (1)
- object categorization (1)
- participatory design (1)
- property-based testing for robots (1)
- remote-controlled robots (1)
- reproducible node motion (1)
- routing metrics (1)
- security warning design (1)
- signature (1)
- simulation-based robot testing (1)
- smartcard (1)
- software development (1)
- usable secure email (1)
- user interface design (1)
- verification and validation of robot action execution (1)
- virtual-reality (1)
- web (1)
- website (1)
This paper presents the b-it-bots RoboCup@Work team and its current hardware and functional architecture for the KUKA youBot robot.We describe the underlying software framework and the developed capabilities required for operating in industrial environments including features such as reliable and precise navigation, flexible manipulation and robust object recognition.
Target meaning representations for semantic parsing tasks are often based on programming or query languages, such as SQL, and can be formalized by a context-free grammar. Assuming a priori knowledge of the target domain, such grammars can be exploited to enforce syntactical constraints when predicting logical forms. To that end, we assess how syntactical parsers can be integrated into modern encoder-decoder frameworks. Specifically, we implement an attentional SEQ2SEQ model that uses an LR parser to maintain syntactically valid sequences throughout the decoding procedure. Compared to other approaches to grammar-guided decoding that modify the underlying neural network architecture or attempt to derive full parse trees, our approach is conceptually simpler, adds less computational overhead during inference and integrates seamlessly with current SEQ2SEQ frameworks. We present preliminary evaluation results against a recurrent SEQ2SEQ baseline on GEOQUERY and ATIS and demonstrate improved performance while enforcing grammatical constraints.