no code implementations • 2 May 2024 • Tolga Buz, Benjamin Frost, Nikola Genchev, Moritz Schneider, Lucie-Aimée Kaffee, Gerard de Melo
Recent Large Language Models (LLMs) have shown the ability to generate content that is difficult or impossible to distinguish from human writing.
no code implementations • 11 Mar 2024 • Moritz Schneider, Lukas Halekotte, Tina Comes, Daniel Lichte, Frank Fiedrich
The output of the ERIMap method is a dynamically evolving and spatially resolved map of beliefs about key variables of an emergency that is updated each time a new observation becomes available.
no code implementations • 4 Feb 2021 • Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun
The majority of smartphones either run iOS or Android operating systems.
Cryptography and Security
2 code implementations • 23 May 2020 • Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Čapkun
We show that the adversary can use the Frontal attack to extract a secret from an SGX enclave if that secret was used as a branching condition for two instruction-wise identical branches.
Cryptography and Security
no code implementations • 7 Apr 2020 • Richard Meyes, Moritz Schneider, Tobias Meisen
We show that the healthy agent's behavior is characterized by a distinct correlation pattern between the network's layer activation and the performed actions during an episode and that network ablations, which cause a strong change of this pattern, lead to the agent failing its trained control task.