Search Results for author: Moritz Schneider

Found 5 papers, 1 papers with code

Emergency Response Inference Mapping (ERIMap): A Bayesian Network-based Method for Dynamic Observation Processing in Spatially Distributed Emergencies

no code implementations11 Mar 2024 Moritz Schneider, Lukas Halekotte, Tina Comes, Daniel Lichte, Frank Fiedrich

The output of the ERIMap method is a dynamically evolving and spatially resolved map of beliefs about key variables of an emergency that is updated each time a new observation becomes available.

Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones

no code implementations4 Feb 2021 Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun

The majority of smartphones either run iOS or Android operating systems.

Cryptography and Security

Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend

2 code implementations23 May 2020 Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Čapkun

We show that the adversary can use the Frontal attack to extract a secret from an SGX enclave if that secret was used as a branching condition for two instruction-wise identical branches.

Cryptography and Security

How Do You Act? An Empirical Study to Understand Behavior of Deep Reinforcement Learning Agents

no code implementations7 Apr 2020 Richard Meyes, Moritz Schneider, Tobias Meisen

We show that the healthy agent's behavior is characterized by a distinct correlation pattern between the network's layer activation and the performed actions during an episode and that network ablations, which cause a strong change of this pattern, lead to the agent failing its trained control task.

Autonomous Driving Decision Making

Cannot find the paper you are looking for? You can Submit a new open access paper.