Follow
Pascal Schöttle
Pascal Schöttle
Professor, Department Digital Business & Software Engineering, MCI Innsbruck, Austria
Verified email at mci.edu - Homepage
Title
Cited by
Cited by
Year
Machine unlearning: Linear filtration for logit-based classifiers
T Baumhauer, P Schöttle, M Zeppelzauer
Machine Learning 111 (9), 3203-3226, 2022
982022
Game theory and adaptive steganography
P Schöttle, R Böhme
IEEE Transactions on Information Forensics and Security 11 (4), 760-773, 2015
512015
A game-theoretic approach to content-adaptive steganography
P Schöttle, R Böhme
Information Hiding: 14th International Conference, IH 2012, Berkeley, CA …, 2013
492013
Detecting adversarial examples-a lesson from multimedia security
P Schöttle, A Schlögl, C Pasquini, R Böhme
2018 26th European Signal Processing Conference (EUSIPCO), 947-951, 2018
292018
Weighted stego-image steganalysis for naive content-adaptive embedding
P Schöttle, S Korff, R Böhme
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
262012
Where to hide the bits?
B Johnson, P Schöttle, R Böhme
Decision and Game Theory for Security: Third International Conference …, 2012
212012
Mixing coins of different quality: A game-theoretic approach
S Abramova, P Schöttle, R Böhme
Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017
172017
Secure team composition to thwart insider threats and cyber-espionage
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
ACM Transactions on Internet Technology (TOIT) 14 (2-3), 1-22, 2014
172014
Forensics of high quality and nearly identical jpeg image recompression
C Pasquini, P Schöttle, R Böhme, G Boato, F Perez-Gonzalez
Proceedings of the 4th ACM workshop on information hiding and multimedia …, 2016
152016
Managing the weakest link: A game-theoretic approach for the mitigation of insider threats
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
142013
A game-theoretic analysis of content-adaptive steganography with independent embedding
P Schöttle, A Laszka, B Johnson, J Grossklags, R Böhme
21st European Signal Processing Conference (EUSIPCO 2013), 1-5, 2013
132013
Forensics of high-quality JPEG images with color subsampling
M Carnein, P Schöttle, R Böhme
2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015
122015
Thinking beyond the block: block matching for copy-move forgery detection revisited
M Kirchner, P Schoettle, C Riess
Media Watermarking, Security, and Forensics 2015 9409, 11-22, 2015
102015
On the application of anomaly detection in reliable server pooling systems for improved robustness against denial of service attacks
P Schottle, T Dreibholz, EP Rathgeb
2008 33rd IEEE Conference on Local Computer Networks (LCN), 207-214, 2008
92008
Continuous Planning and Forecasting Framework (CPFF) for Agile Project Management: Overcoming the
T Dilger, C Ploder, W Haas, P Schöttle, R Bernsteiner
Proceedings of the 21st Annual Conference on Information Technology …, 2020
82020
Bitspotting: Detecting optimal adaptive steganography
B Johnson, P Schöttle, A Laszka, J Grossklags, R Böhme
International Workshop on Digital Watermarking, 3-18, 2013
82013
Adversarial examples against a bert absa model–fooling bert with l33t, misspellign, and punctuation
N Hofer, P Schöttle, A Rietzler, S Stabinger
Proceedings of the 16th International Conference on Availability …, 2021
72021
Detecting adversarial examples-a lesson from multimedia forensics
P Schöttle, A Schlögl, C Pasquini, R Böhme
arXiv preprint arXiv:1803.03613, 2018
72018
Predictable rain? Steganalysis of public-key steganography using wet paper codes
M Carnein, P Schöttle, R Böhme
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
72014
Decoy password vaults: at least as hard as steganography?
C Pasquini, P Schöttle, R Böhme
ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017
62017
The system can't perform the operation now. Try again later.
Articles 1–20