239 results on '"Scheuermann, Björn"'
Search Results
2. The Collaborative Research Center FONDA
- Author
-
Leser, Ulf, Hilbrich, Marcus, Draxl, Claudia, Eisert, Peter, Grunske, Lars, Hostert, Patrick, Kainmüller, Dagmar, Kao, Odej, Kehr, Birte, Kehrer, Timo, Koch, Christoph, Markl, Volker, Meyerhenke, Henning, Rabl, Tilmann, Reinefeld, Alexander, Reinert, Knut, Ritter, Kerstin, Scheuermann, Björn, Schintke, Florian, Schweikardt, Nicole, and Weidlich, Matthias
- Published
- 2021
- Full Text
- View/download PDF
3. Joint Source-and-Channel Coding for Small Satellite Applications
- Author
-
Kondrateva, Olga, Dietzel, Stefan, Scheuermann, Björn, Kondrateva, Olga, Dietzel, Stefan, and Scheuermann, Björn
- Abstract
Small satellites are widely used today as cost effective means to perform Earth observation and other tasks that generate large amounts of high-dimensional data, such as multi-spectral imagery. These satellites typically operate in low earth orbit, which poses significant challenges for data transmission due to short contact times with ground stations, low bandwidth, and high packet loss probabilities. In this paper, we introduce JSCC-Sat, which applies joint source-and-channel coding using neural networks to provide efficient and robust transmission of compressed image data for satellite applications. We evaluate our mechanism against traditional transmission schemes with separate source and channel coding and demonstrate that it outperforms the existing approaches when applied to Earth observation data of the Sentinel-2 mission.
- Published
- 2024
- Full Text
- View/download PDF
4. Proactive Resource Management to Optimize Distributed Workflow Executions
- Author
-
Witzke, Joel, primary, Schintke, Florian, additional, Lößer, Ansgar, additional, and Scheuermann, Björn, additional
- Published
- 2023
- Full Text
- View/download PDF
5. Lazy Read: Asynchronous Execution of Synchronous File I/O
- Author
-
Lößer, Ansgar, primary, Raskob, Florian, additional, and Scheuermann, Björn, additional
- Published
- 2023
- Full Text
- View/download PDF
6. I'm InterPlanetary, Get Me Out of Here!
- Author
-
Balduf, Leonhard, primary, Rust, Sebastian, additional, and Scheuermann, Björn, additional
- Published
- 2023
- Full Text
- View/download PDF
7. Joint Source-and-Channel Coding for Small Satellite Applications
- Author
-
Kondrateva, Olga, primary, Dietzel, Stefan, additional, and Scheuermann, Björn, additional
- Published
- 2023
- Full Text
- View/download PDF
8. An Analysis of Requirements and Privacy Threats in Mobile Data Donations
- Author
-
Reichert, Leonie, primary and Scheuermann, Björn, additional
- Published
- 2023
- Full Text
- View/download PDF
9. Misbehavior Detection in Industrial Wireless Networks: Challenges and Directions
- Author
-
Henningsen, Sebastian, Dietzel, Stefan, and Scheuermann, Björn
- Published
- 2018
- Full Text
- View/download PDF
10. The Cloud Strikes Back: Investigating the Decentralization of IPFS
- Author
-
Balduf, Leonhard, Korczyński, Maciej, Ascigil, Onur, Keizer, Navin V., Pavlou, George, Scheuermann, Björn, Król, Michał, Balduf, Leonhard, Korczyński, Maciej, Ascigil, Onur, Keizer, Navin V., Pavlou, George, Scheuermann, Björn, and Król, Michał
- Abstract
Interplanetary Filesystem (IPFS) is one of the largest peer-to-peer filesystems in operation. The network is the default storage layer for Web3 and is being presented as a solution to the centralization of the web. In this paper, we present a large-scale, multi-modal measurement study of the IPFS network. We analyze the topology, the traffic, the content providers and the entry points from the classical Internet. Our measurements show significant centralization in the IPFS network and a high share of nodes hosted in the cloud. We also shed light on the main stakeholders in the ecosystem. We discuss key challenges that might disrupt continuing efforts to decentralize the Web and highlight multiple properties that are creating pressures toward centralization., Comment: To be presented at IMC'23
- Published
- 2023
- Full Text
- View/download PDF
11. Challenges of Misbehavior Detection in Industrial Wireless Networks
- Author
-
Henningsen, Sebastian, primary, Dietzel, Stefan, additional, and Scheuermann, Björn, additional
- Published
- 2018
- Full Text
- View/download PDF
12. BottleMod: Modeling Data Flows and Tasks for Fast Bottleneck Analysis
- Author
-
Lößer, Ansgar, Witzke, Joel, Schintke, Florian, and Scheuermann, Björn
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Networking and Internet Architecture ,Computer Science - Distributed, Parallel, and Cluster Computing ,Distributed, Parallel, and Cluster Computing (cs.DC) - Abstract
In the recent years, scientific workflows gained more and more popularity. In scientific workflows, tasks are typically treated as black boxes. Dealing with their complex interrelations to identify optimization potentials and bottlenecks is therefore inherently hard. The progress of a scientific workflow depends on several factors, including the available input data, the available computational power, and the I/O and network bandwidth. Here, we tackle the problem of predicting the workflow progress with very low overhead. To this end, we look at suitable formalizations for the key parameters and their interactions which are sufficiently flexible to describe the input data consumption, the computational effort and the output production of the workflow's tasks. At the same time they allow for computationally simple and fast performance predictions, including a bottleneck analysis over the workflow runtime. A piecewise-defined bottleneck function is derived from the discrete intersections of the task models' limiting functions. This allows to estimate potential performance gains from overcoming the bottlenecks and can be used as a basis for optimized resource allocation and workflow execution.
- Published
- 2022
- Full Text
- View/download PDF
13. Ripples in the Pond: Transmitting Information through Grid Frequency Modulation
- Author
-
Götte, Jan Sebastian, primary, Katzir, Liran, additional, and Scheuermann, Björn, additional
- Published
- 2022
- Full Text
- View/download PDF
14. Dude, where's my NFT
- Author
-
Balduf, Leonhard, primary, Florian, Martin, additional, and Scheuermann, Björn, additional
- Published
- 2022
- Full Text
- View/download PDF
15. On the Use of (Non-)Cryptographic Hashes on FPGAs
- Author
-
Fiessler, Andreas, primary, Loebenberger, Daniel, additional, Hager, Sven, additional, and Scheuermann, Björn, additional
- Published
- 2017
- Full Text
- View/download PDF
16. A statistical approach to calibrating the scores of biased reviewers of scientific papers
- Author
-
Kuhlisch, Wiltrud, Roos, Magnus, Rothe, Jörg, Rudolph, Joachim, Scheuermann, Björn, and Stoyan, Dietrich
- Published
- 2016
- Full Text
- View/download PDF
17. Empirical and Analytical Perspectives on the Robustness of Blockchain-related Peer-to-Peer Networks
- Author
-
Scheuermann, Björn, Hartenstein, Hannes, Wattenhofer, Roger, Henningsen, Sebastian, Scheuermann, Björn, Hartenstein, Hannes, Wattenhofer, Roger, and Henningsen, Sebastian
- Abstract
Die Erfindung von Bitcoin hat ein großes Interesse an dezentralen Systemen geweckt. Eine häufige Zuschreibung an dezentrale Systeme ist dabei, dass eine Dezentralisierung automatisch zu einer höheren Sicherheit und Widerstandsfähigkeit gegenüber Angriffen führt. Diese Dissertation widmet sich dieser Zuschreibung, indem untersucht wird, ob dezentralisierte Anwendungen tatsächlich so robust sind. Dafür werden exemplarisch drei Systeme untersucht, die häufig als Komponenten in komplexen Blockchain-Anwendungen benutzt werden: Ethereum als Infrastruktur, IPFS zur verteilten Datenspeicherung und schließlich "Stablecoins" als Tokens mit Wertstabilität. Die Sicherheit und Robustheit dieser einzelnen Komponenten bestimmt maßgeblich die Sicherheit des Gesamtsystems in dem sie verwendet werden; darüber hinaus erlaubt der Fokus auf Komponenten Schlussfolgerungen über individuelle Anwendungen hinaus. Für die entsprechende Analyse bedient sich diese Arbeit einer empirisch motivierten, meist Netzwerklayer-basierten Perspektive -- angereichert mit einer ökonomischen im Kontext von Wertstabilen Tokens. Dieses empirische Verständnis ermöglicht es Aussagen über die inhärenten Eigenschaften der studierten Systeme zu treffen. Ein zentrales Ergebnis dieser Arbeit ist die Entdeckung und Demonstration einer "Eclipse-Attack" auf das Ethereum Overlay. Mittels eines solchen Angriffs kann ein Angreifer die Verbreitung von Transaktionen und Blöcken behindern und Netzwerkteilnehmer aus dem Overlay ausschließen. Des weiteren wird das IPFS-Netzwerk umfassend analysiert und kartografiert mithilfe (1) systematischer Crawls der DHT sowie (2) des Mitschneidens von Anfragenachrichten für Daten. Erkenntlich wird hierbei, dass die hybride Overlay-Struktur von IPFS Segen und Fluch zugleich ist, da das Gesamtsystem zwar robust gegen Angriffe ist, gleichzeitig aber eine umfassende Überwachung der Netzwerkteilnehmer ermöglicht wird. Im Rahmen der wertstabilen Kryptowährungen wird ein Klassifikations-Framewor, The inception of Bitcoin has sparked a large interest in decentralized systems. In particular, popular narratives imply that decentralization automatically leads to a high security and resilience against attacks, even against powerful adversaries. In this thesis, we investigate whether these ascriptions are appropriate and if decentralized applications are as robust as they are made out to be. To this end, we exemplarily analyze three widely-used systems that function as building blocks for blockchain applications: Ethereum as basic infrastructure, IPFS for distributed storage and lastly "stablecoins" as tokens with a stable value. As reoccurring building blocks for decentralized applications these examples significantly determine the security and resilience of the overall application. Furthermore, focusing on these building blocks allows us to look past individual applications and focus on inherent systemic properties. The analysis is driven by a strong empirical, mostly network-layer based perspective; enriched with an economic point of view in the context of monetary stabilization. The resulting practical understanding allows us to delve into the systems' inherent properties. The fundamental results of this thesis include the demonstration of a network-layer Eclipse attack on the Ethereum overlay which can be leveraged to impede the delivery of transaction and blocks with dire consequences for applications built on top of Ethereum. Furthermore, we extensively map the IPFS network through (1) systematic crawling of its DHT, as well as (2) monitoring content requests. We show that while IPFS' hybrid overlay structure renders it quite robust against attacks, this virtue of the overlay is simultaneously a curse, as it allows for extensive monitoring of participating peers and the data they request. Lastly, we exchange the network-layer perspective for a mostly economic one in the context of monetary stabilization. We present a classification framework to (1) map out
- Published
- 2022
18. Dude, where's my NFT? Distributed Infrastructures for Digital Art
- Author
-
Balduf, Leonhard, Florian, Martin, Scheuermann, Björn, Balduf, Leonhard, Florian, Martin, and Scheuermann, Björn
- Abstract
We explore issues relating to the storage of digital art, based on an empirical investigation into the storage of audiovisual data referenced by non-fungible tokens (NFTs). We identify current trends in NFT data storage and highlight problems with implemented solutions. We particularly focus our investigation on the use of the Interplanetary Filesystem (IPFS), which emerges as a popular and versatile distributed storage solution for NFTs. Based on the analysis of discovered data storage techniques, we propose a set of best practices to ensure long-term storage survivability of NFT data. While helpful for forming the NFT art market into a legitimate long-term environment for digital art, our recommendations are also directly applicable for improving the availability and integrity of non-NFT digital art., Comment: To be presented at the DICG Workshop 2022
- Published
- 2022
- Full Text
- View/download PDF
19. Towards More Realistic Network Simulations: Leveraging the System-Call Barrier
- Author
-
Naumann, Roman, primary, Dietzel, Stefan, additional, and Scheuermann, Björn, additional
- Published
- 2016
- Full Text
- View/download PDF
20. Randomly Walking Can Get You Lost: Graph Segmentation with Unknown Edge Weights
- Author
-
Ackermann, Hanno, primary, Scheuermann, Björn, additional, Chin, Tat-Jun, additional, and Rosenhahn, Bodo, additional
- Published
- 2015
- Full Text
- View/download PDF
21. Count Me If You Can: Enumerating QUIC Servers Behind Load Balancers
- Author
-
Thimmaraju, Kashyap and Scheuermann, Björn
- Subjects
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS - Abstract
QUIC is a new transport protocol over UDP which is recently became an IETF RFC. Our security analysis of the Connection ID mechanism in QUIC reveals that the protocol is underspecified. This allows an attacker to count the number of server instances behind a middlebox, e.g., a load balancer. We found 4/15 (~25%) implementations vulnerable to our enumeration attack. We then concretely describe how an attacker can count the number of instances behind a load balancer that either uses Round Robin or Hashing., Electronic Communications of the EASST, Volume 80: Conference on Networked Systems 2021 (NetSys 2021)
- Published
- 2021
- Full Text
- View/download PDF
22. Can’t Touch This: Inertial HSMs Thwart Advanced Physical Attacks
- Author
-
Götte, Jan Sebastian, primary and Scheuermann, Björn, additional
- Published
- 2021
- Full Text
- View/download PDF
23. Interactive Segmentation of High-Resolution Video Content Using Temporally Coherent Superpixels and Graph Cut
- Author
-
Reso, Matthias, primary, Scheuermann, Björn, additional, Jachalsky, Jörn, additional, Rosenhahn, Bodo, additional, and Ostermann, Jörn, additional
- Published
- 2014
- Full Text
- View/download PDF
24. Secure Computation Protocols for Privacy-Preserving Machine Learning
- Author
-
Scheuermann, Björn, Gascón, Adrià, Scholl, Peter, Schoppmann, Phillipp, Scheuermann, Björn, Gascón, Adrià, Scholl, Peter, and Schoppmann, Phillipp
- Abstract
Machine Learning (ML) profitiert erheblich von der Verfügbarkeit großer Mengen an Trainingsdaten, sowohl im Bezug auf die Anzahl an Datenpunkten, als auch auf die Anzahl an Features pro Datenpunkt. Es ist allerdings oft weder möglich, noch gewollt, mehr Daten unter zentraler Kontrolle zu aggregieren. Multi-Party-Computation (MPC)-Protokolle stellen eine Lösung dieses Dilemmas in Aussicht, indem sie es mehreren Parteien erlauben, ML-Modelle auf der Gesamtheit ihrer Daten zu trainieren, ohne die Eingabedaten preiszugeben. Generische MPC-Ansätze bringen allerdings erheblichen Mehraufwand in der Kommunikations- und Laufzeitkomplexität mit sich, wodurch sie sich nur beschränkt für den Einsatz in der Praxis eignen. Das Ziel dieser Arbeit ist es, Privatsphäreerhaltendes Machine Learning mittels MPC praxistauglich zu machen. Zuerst fokussieren wir uns auf zwei Anwendungen, lineare Regression und Klassifikation von Dokumenten. Hier zeigen wir, dass sich der Kommunikations- und Rechenaufwand erheblich reduzieren lässt, indem die aufwändigsten Teile der Berechnung durch Sub-Protokolle ersetzt werden, welche auf die Zusammensetzung der Parteien, die Verteilung der Daten, und die Zahlendarstellung zugeschnitten sind. Insbesondere das Ausnutzen dünnbesetzter Datenrepräsentationen kann die Effizienz der Protokolle deutlich verbessern. Diese Beobachtung verallgemeinern wir anschließend durch die Entwicklung einer Datenstruktur für solch dünnbesetzte Daten, sowie dazugehöriger Zugriffsprotokolle. Aufbauend auf dieser Datenstruktur implementieren wir verschiedene Operationen der Linearen Algebra, welche in einer Vielzahl von Anwendungen genutzt werden. Insgesamt zeigt die vorliegende Arbeit, dass MPC ein vielversprechendes Werkzeug auf dem Weg zu Privatsphäre-erhaltendem Machine Learning ist, und die von uns entwickelten Protokolle stellen einen wesentlichen Schritt in diese Richtung dar., Machine learning (ML) greatly benefits from the availability of large amounts of training data, both in terms of the number of samples, and the number of features per sample. However, aggregating more data under centralized control is not always possible, nor desirable, due to security and privacy concerns, regulation, or competition. Secure multi-party computation (MPC) protocols promise a solution to this dilemma, allowing multiple parties to train ML models on their joint datasets while provably preserving the confidentiality of the inputs. However, generic approaches to MPC result in large computation and communication overheads, which limits the applicability in practice. The goal of this thesis is to make privacy-preserving machine learning with secure computation practical. First, we focus on two high-level applications, linear regression and document classification. We show that communication and computation overhead can be greatly reduced by identifying the costliest parts of the computation, and replacing them with sub-protocols that are tailored to the number and arrangement of parties, the data distribution, and the number representation used. One of our main findings is that exploiting sparsity in the data representation enables considerable efficiency improvements. We go on to generalize this observation, and implement a low-level data structure for sparse data, with corresponding secure access protocols. On top of this data structure, we develop several linear algebra algorithms that can be used in a wide range of applications. Finally, we turn to improving a cryptographic primitive named vector-OLE, for which we propose a novel protocol that helps speed up a wide range of secure computation tasks, within private machine learning and beyond. Overall, our work shows that MPC indeed offers a promising avenue towards practical privacy-preserving machine learning, and the protocols we developed constitute a substantial step in that direction.
- Published
- 2021
25. Monitoring Data Requests in Decentralized Data Storage Systems: A Case Study of IPFS
- Author
-
Balduf, Leonhard, Henningsen, Sebastian, Florian, Martin, Rust, Sebastian, Scheuermann, Björn, Balduf, Leonhard, Henningsen, Sebastian, Florian, Martin, Rust, Sebastian, and Scheuermann, Björn
- Abstract
Decentralized data storage systems like the Interplanetary Filesystem (IPFS) are becoming increasingly popular, e. g., as a data layer in blockchain applications and for sharing content in a censorship-resistant manner. In IPFS, data is hosted by an open set of nodes and data requests are broadcast to connected peers in addition to being routed via a distributed hash table (DHT). In this paper, we present a passive monitoring methodology that exploits this design for obtaining data requests from a significant and upscalable portion of nodes. Using an implementation of our approach for the IPFS network and data collected over a period of fifteen months, we demonstrate how our methodology enables profound insights into, among other things: the size of the IPFS network, activity levels and structure, and content popularity distributions. We furthermore present that our methodology can be abused for attacks on users' privacy. For example, we were able to identify and successfully surveil the IPFS nodes corresponding to public IPFS/HTTP gateways.We give a detailed analysis of the mechanics and reasons behind implied privacy threats and discuss possible countermeasures., Comment: Accepted at ICDCS 2022
- Published
- 2021
26. Least squares timestamp synchronization for local broadcast networks
- Author
-
Jarre, Florian, Kiess, Wolfgang, Mauve, Martin, Roos, Magnus, and Scheuermann, Björn
- Published
- 2010
- Full Text
- View/download PDF
27. Mapping the Interplanetary Filesystem
- Author
-
Henningsen, Sebastian, Florian, Martin, Rust, Sebastian, and Scheuermann, Björn
- Subjects
Computer Science - Networking and Internet Architecture ,Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,Cryptography and Security (cs.CR) - Abstract
The Interplanetary Filesystem (IPFS) is a distributed data storage service frequently used by blockchain applications and for sharing content in a censorship-resistant manner. Data is distributed within an open set of peers using a Kademlia-based distributed hash table (DHT). In this paper, we study the structure of the resulting overlay network, as it significantly influences the robustness and performance of IPFS. We monitor and systematically crawl IPFS' DHT towards mapping the IPFS overlay network. Our measurements found an average of 44474 nodes at every given time. At least 52.19% of these reside behind a NAT and are not reachable from the outside, suggesting that a large share of the network is operated by private individuals on an as-needed basis. Based on our measurements and our analysis of the IPFS code, we conclude that the topology of the IPFS network is, in its current state, closer to an unstructured overlay network than it is to a classical DHT. While such a structure has benefits for robustness and the resistance against Sybil attacks, it leaves room for improvement in terms of performance and query privacy., Comment: The code can be found at https://github.com/scriptkitty/ipfs-crawler
- Published
- 2020
- Full Text
- View/download PDF
28. Wireless Networking in Future Factories: Protocol Design and Evaluation Strategies
- Author
-
Scheuermann, Björn, Heijenk, Geert, Wolf, Lars, Naumann, Roman, Scheuermann, Björn, Heijenk, Geert, Wolf, Lars, and Naumann, Roman
- Abstract
Industrie-4.0 bringt eine wachsende Nachfrage an Netzwerkprotokollen mit sich, die es erlauben, Informationen vom Produktionsprozess einzelner Maschinen zu erfassen und verfügbar zu machen. Drahtlose Übertragung erfüllt hierbei die für industrielle Anwendungen benötigte Flexibilität, kann in herausfordernden Industrieumgebungen aber nicht immer zeitnahe und zuverlässige Übertragung gewährleisten. Die Beiträge dieser Arbeit behandeln schwerpunktmäßig Protokollentwurf und Protokollevaluation für industrielle Anwendungsfälle. Zunächst identifizieren wir Anforderungen für den industriellen Anwendungsfall und leiten daraus konkrete Entwufskriterien ab, die Protokolle erfüllen sollten. Anschließend schlagen wir Protokollmechanismen vor, die jene Entwurfskriterien für unterschiedliche Arten von Protokollen umsetzen, und die in verschiedenem Maße kompatibel zu existierenden Netzwerken und existierender Hardware sind: Wir zeigen, wie anwendungsfallspezifische Priorisierung von Netzwerkdaten dabei hilft, zuverlässige Übertragung auch unter starken Störeinflüssen zu gewährleisten, indem zunächst eine akkurate Vorschau von Prozessinformationen übertragen wird. Für deren Fehler leiten wir präziser Schranken her. Ferner zeigen wir, dass die Fairness zwischen einzelnen Maschinen durch Veränderung von Warteschlangen verbessert werden kann, wobei hier ein Teil der Algorithmen von Knoten innerhalb des Netzwerks durchgeführt wird. Ferner zeigen wir, wie Network-Coding zu unserem Anwendungsfall beitragen kann, indem wir spezialisierte Kodierungs- und Dekodierungsverfahren einführen. Zuletzt stellen wir eine neuartige Softwarearchitektur und Evaluationstechnik vor, die es erlaubt, potentiell proprietäre Protokollimplementierungen innerhalb moderner diskreter Ereignissimulatoren zu verwenden. Wir zeigen, dass unser vorgeschlagener Ansatz ausreichend performant für praktische Anwendungen ist und, darüber hinaus, die Validität von Evaluationsergebnissen gegenüber existierenden Ansätzen ver, As smart factory trends gain momentum, there is a growing need for robust information transmission protocols that make available sensor information gathered by individual machines. Wireless transmission provides the required flexibility for industry adoption but poses challenges for timely and reliable information delivery in challenging industrial environments. This work focuses on to protocol design and evaluation aspects for industrial applications. We first introduce the industrial use case, identify requirements and derive concrete design principles that protocols should implement. We then propose mechanisms that implement these principles for different types of protocols, which retain compatibility with existing networks and hardware to varying degrees: we show that use-case tailored prioritization at the source is a powerful tool to implement robustness against challenged connectivity by conveying an accurate preview of information from the production process. We also derive precise bounds for the quality of that preview. Moving parts of the computational work into the network, we show that reordering queues in accordance with our prioritization scheme improves fairness among machines. We also demonstrate that network coding can benefit our use case by introducing specialized encoding and decoding mechanisms. Last, we propose a novel architecture and evaluation techniques that allows incorporating possibly proprietary networking protocol implementations with modern discrete event network simulators, rendering, among others, the adaption of protocols to specific industrial use cases more cost efficient. We demonstrate that our approach provides sufficient performance and improves the validity of evaluation results over the state of the art.
- Published
- 2020
29. Robotic self-exploration and acquisition of sensorimotor skills
- Author
-
Hafner, Verena, Scheuermann, Björn, Martius, Georg, Berthold, Oswald, Hafner, Verena, Scheuermann, Björn, Martius, Georg, and Berthold, Oswald
- Abstract
Die Interaktion zwischen Maschinen und ihrer Umgebung sollte zuverlässig, sicher und ökologisch adequat sein. Um das in komplexen Szenarien langfristig zu gewährleisten, wird eine Theorie adaptiven Verhaltens benötigt. In der Entwicklungsrobotik und verkörperten künstlichen Intelligenz wird Verhalten als emergentes Phänomen auf der fortlaufenden dynamischen Interaktion zwischen Agent, Körper und Umgebung betrachtet. Die Arbeit untersucht Roboter, die in der Lage sind, schnell und selbständig einfache Bewegungen auf Grundlage sensomotorischer Information zu erlernen. Das langfristige Ziel dabei ist die Wiederverwendung gelernter Fertigkeiten in späteren Lernprozessen um damit ein komplexes Interaktionsrepertoire mit der Welt entstehen zu lassen, das durch Entwicklungsprozesse vollständig und fortwährend adaptiv in der sensomotorischen Erfahrung verankert ist. Unter Verwendung von Methoden des maschinellen Lernens, der Neurowissenschaft, Statistik und Physik wird die Frage in die Komponenten Repräsentation, Exploration, und Lernen zerlegt. Es wird ein Gefüge für die systematische Variation und Evaluation von Modellen errichtet. Das vorgeschlagene Rahmenwerk behandelt die prozedurale Erzeugung von Hypothesen als Flussgraphen über einer festen Menge von Funktionsbausteinen, was die Modellsuche durch nahtlose Anbindung über simulierte und physikalische Systeme hinweg ermöglicht. Ein Schwerpunkt der Arbeit liegt auf dem kausalen Fussabdruck des Agenten in der sensomotorischen Zeit. Dahingehend wird ein probabilistisches graphisches Modell vorgeschlagen um Infor- mationsflussnetzwerke in sensomotorischen Daten zu repräsentieren. Das Modell wird durch einen auf informationtheoretischen Grössen basierenden Lernalgorithmus ergänzt. Es wird ein allgemeines Modell für Entwicklungslernen auf Basis von Echtzeit-Vorhersagelernen präsentiert und anhand dreier Variationen näher besprochen., The interaction of machines with their environment should be reliable, safe, and ecologically adequate. To ensure this over long-term complex scenarios, a theory of adaptive behavior is needed. In developmental robotics, and embodied artificial intelligence behavior is regarded as a phenomenon that emerges from an ongoing dynamic interaction between entities called agent, body, and environment. The thesis investigates robots that are able to learn rapidly and on their own, how to do primitive motions, using sensorimotor information. The long-term goal is to reuse acquired skills when learning other motions in the future, and thereby grow a complex repertoire of possible interactions with the world, that is fully grounded in, and continually adapted to sensorimotor experience through developmental processes. Using methods from machine learning, neuroscience, statistics, and physics, the question is decomposed into the relationship of representation, exploration, and learning. A framework is provided for systematic variation and evaluation of models. The proposed framework considers procedural generation of hypotheses as scientific workflows using a fixed set of functional building blocks, and allows to search for models by seamless evaluation in simulation and real world experiments. Additional contributions of the thesis are related to the agent's causal footprint in sensorimotor time. A probabilistic graphical model is provided, along with an information-theoretic learning algorithm, to discover networks of information flow in sensorimotor data. A generic developmental model, based on real time prediction learning, is presented and discussed on the basis of three different algorithmic variations.
- Published
- 2020
30. Hyperspectral Image Classification of Satellite Images Using Compressed Neural Networks
- Author
-
Scheuermann, Björn, Reulke, Ralf, Rychlewski, Daniel, Scheuermann, Björn, Reulke, Ralf, and Rychlewski, Daniel
- Abstract
Convolutional Neural Networks haben sich in den letzten Jahren als erfolgreiches Mittel zur hyperspektralen Klassifizierung von Bildern herausgestellt. Der größere Spektralbereich und die höhere Präzision hyperspektraler Bilder verglichen mit RGB-Bildern sind z.B. für Satellitenbilder nützlich. Allerdings stellt die große Anzahl an Bildkanälen, die oftmals redundant sind, eine Herausforderung für eine performante Bildklassifizierung dar. Zusätzlich zeigt das Hughes-Phänomen, dass die Anzahl an Bildkanälen nicht notwendigerweise eine höhere Genauigkeit zufolge hat, nachdem eine bestimmte Anzahl erreicht ist. Darüber hinaus ist das Erfassen von Ground-Truth-Daten aufwendig und komplex, sodass die verfügbaren Trainingdaten oft nicht groß genug sind (Fluch der Dimensionalität). Deshalb beschäftigt sich diese Arbeit mit Methoden zur Dimensionsreduktion und deren Auswirkung auf verschiedenen Ebenen. Auf der einen Seite gibt es Verfahren zur Merkmalsauswahl und -extraktion, um nur die wichtigsten Bildkanäle auszuwählen oder die existierenden so zu transformieren, dass weniger übrig bleiben. Auf der anderen Seite können die neuronalen Netzwerke, die die Bildklassifizierung durchführen, mit Verfahren wie Parameter Pruning und Post-Training Quantization komprimiert werden, mit denen sich die Arbeit befasst. Im Anschluss werden beide Ebenen der Kompression kombiniert, um den Tradeoff zwischen komprimierten Bildkanälen und einem komprimierten neuronalen Netzwerk hinsichtlich relevanter Parameter wie RAM-/VRAM-Verbrauch und Inferenzzeit zu analysieren. Zum Schluss werden Saliency Maps und Activation Maps als Visualisierungstechniken verwendet, um die semantischen Auswirkungen der Kompressionen auf das neuronale Netzwerk nachzuvollziehen zu versuchen., Convolutional neural networks have proven to be a successful instrument for hyperspectral image classification tasks in recent years. These images are useful due to their higher spectral range and precision compared to RGB images, e.g., for satellite imagery. However, the large number of image bands, which are often redundant, poses a challenge to performant image classification. Additionally, the Hughes phenomenon shows that many image bands do not necessarily result in a higher accuracy after a certain number of bands is reached. On top of that, the task of acquiring ground truth data is expensive and complex, so the training datasets available are often not sufficiently large (curse of dimensionality). Therefore, this thesis covers dimensionality reduction techniques and their impact on multiple levels. On the one hand, there are feature selection and feature extraction techniques to only choose the most meaningful image bands or transform existing bands into fewer image bands in total. On the other hand, the neural networks that perform the image classification can be compressed with strategies like parameter pruning and post-training quantization, both of which the thesis addresses. Finally, both levels of compression are combined to analyze the trade-off between compressed image channels and a compressed neural network with respect to appropriate parameters like RAM usage, VRAM usage and inference time. In the end, saliency maps and activation maps are used as neural network visualization techniques to try to understand the semantic implications of the compressions.
- Published
- 2020
31. System-Specialized and Hybrid Approaches to Network Packet Classification
- Author
-
Scheuermann, Björn, Aschenbruck, Nils, Wehrle, Klaus, Hager, Sven, Scheuermann, Björn, Aschenbruck, Nils, Wehrle, Klaus, and Hager, Sven
- Abstract
Paketklassifikation ist eine Kernfunktionalität vieler Netzwerksysteme, wie zum Beispiel Firewalls und SDN-Switches. Für viele dieser Systeme ist Durchsatz von höchster Bedeutung. Weitere wichtige Eigenschaften sind dynamische Aktualisierbarkeit und hohe Regelsatz-Ausdrucksfähigkeit. Die Kombination dieser Eigenschaften macht Paketklassifikation zu einem schwierigen Problem. Diese Arbeit befasst sich mit dem Design von Klassifikationssystemen und -algorithmen, welche mindestens zwei dieser Eigenschaften vereinen. Es werden hybride Systeme sowie Systemspezialisierung verwendet, um effiziente Ansätze zum Paketklassifikationsproblem in drei Bereichen zu erarbeiten: Klassifikationsalgorithmen, Regelsatztransformation und hardwarebasierte Architekturen. Die Beiträge im Bereich der Klassifikationsalgorithmen sind Jit Vector Search (JVS) und das SFL-System. JVS verbessert existierende Techniken durch spezialisierte Suchdatenstrukturen und durch Nutzung von SIMD-Fähigkeiten der CPU, was in fast optimaler Klassifikationsperformanz bei kaum erhöhten Vorberechnungszeiten resultiert. Das hybride SFL-System hingegen kombiniert einen Klassifikationsalgorithmus mit einem Änderungspuffer, um sowohl hohe Klassifikations- als auch Aktualisierungsperformanz zu ermöglichen. Bezüglich Regelsatztransformationen wird die RuleBender-Technik vorgestellt, welche Suchbäume in Regelsätze für Firewalls mit Sprungsemantik kodiert. Somit kann der Durchsatz dieser Systeme unter Beibehaltung komplexer Regelsatzsemantik um eine Größenordnung gesteigert werden. Schließlich wird der MPFC-Ansatz vorgestellt, welcher einen Regelsatz in einen auf einem FPGA implementierbaren Matching-Schaltkreis übersetzt. Die generierten Schaltkreise sind hochoptimiert und kleiner als generische Matching-Schaltkreise. Um dynamische Regelsatzänderungen zu ermöglichen, wird der hybride Consul-Ansatz konzipiert, welcher MPFC-Matcher mit generischen Matching-Schaltkreisen kombiniert., Packet classification is a core functionality of a wide variety of network systems, such as firewalls and SDN switches. For many of these systems, throughput is of paramount importance. Further important system traits are dynamic updateability and high expressiveness in terms of rule set semantics. The combination of several of these properties turns packet classification into a hard problem. This work focuses on the design of classification systems and algorithms that combine at least two of the abovementioned characteristics. To this end, the concepts of hybrid systems and system specialization are employed to obtain efficient approaches to the packet classification problem in three domains: classification algorithms, rule set transformation, and hardware-centric architectures. The contributions in the domain of classification algorithms are Jit Vector Search (JVS) and the SFL system. JVS improves upon existing techniques through specialized search data structures and by exploiting SIMD capabilities of the underlying CPU, which results in near-optimal classification performance at only slightly increased preprocessing times. In contrast, the SFL system is a hybrid approach that combines a classification algorithm with an update buffer to allow for high classification as well as update performance. With respect to rule set transformation, the RuleBender technique is proposed, which encodes search tree structures into rule sets of firewalls with jump semantics. That way, the throughput of these systems can be improved by an order of magnitude, while maintaining complex matching semantics. Finally, the MPFC approach is proposed, which translates a given rule set into a matching circuit that can be implemented on an FPGA. The generated circuits are highly optimized and significantly smaller than those of generic matchers. To allow for dynamic rule set updates, the hybrid Consul approach is devised, which combines MPFC circuits with a generic matcher.
- Published
- 2020
32. The Sum of Its Parts: Analysis of Federated Byzantine Agreement Systems
- Author
-
Florian, Martin, Henningsen, Sebastian, Ndolo, Charmaine, Scheuermann, Björn, Florian, Martin, Henningsen, Sebastian, Ndolo, Charmaine, and Scheuermann, Björn
- Abstract
Federated Byzantine Agreement Systems (FBASs) are a fascinating new paradigm in the context of consensus protocols. Originally proposed for powering the Stellar payment network, FBASs can instantiate Byzantine quorum systems without requiring out-of-band agreement on a common set of validators; every node is free to decide for itself with whom it requires agreement. Sybil-resistant and yet energy-efficient consensus protocols can therefore be built upon FBASs, and the "decentrality" possible with the FBAS paradigm might be sufficient to reduce the use of environmentally unsustainable proof-of-work protocols. In this paper, we first demonstrate how the robustness of individual FBASs can be determined, by precisely determining their safety and liveness buffers and therefore enabling a comparison with threshold-based quorum systems. Using simulations and example node configuration strategies, we then empirically investigate the hypothesis that while FBASs can be bootstrapped in a bottom-up fashion from individual preferences, strategic considerations should additionally be applied by node operators in order to arrive at FBASs that are robust and amenable to monitoring. Finally, we investigate the reported "open-membership" property of FBASs. We observe that an often small group of nodes is exclusively relevant for determining liveness buffers and prove that membership in this top tier is conditional on the approval by current top tier nodes if maintaining safety is a core requirement.
- Published
- 2020
- Full Text
- View/download PDF
33. Foreground Segmentation from Occlusions Using Structure and Motion Recovery
- Author
-
Cordes, Kai, primary, Scheuermann, Björn, additional, Rosenhahn, Bodo, additional, and Ostermann, Jörn, additional
- Published
- 2013
- Full Text
- View/download PDF
34. Learning Object Appearance from Occlusions Using Structure and Motion Recovery
- Author
-
Cordes, Kai, primary, Scheuermann, Björn, additional, Rosenhahn, Bodo, additional, and Ostermann, Jörn, additional
- Published
- 2013
- Full Text
- View/download PDF
35. Multi-sensor Fusion Using Dempster’s Theory of Evidence for Video Segmentation
- Author
-
Scheuermann, Björn, primary, Gkoutelitsas, Sotirios, additional, and Rosenhahn, Bodo, additional
- Published
- 2013
- Full Text
- View/download PDF
36. Cleaning Up Multiple Detections Caused by Sliding Window Based Object Detectors
- Author
-
Ehlers, Arne, primary, Scheuermann, Björn, additional, Baumann, Florian, additional, and Rosenhahn, Bodo, additional
- Published
- 2013
- Full Text
- View/download PDF
37. Efficient Pixel-Grouping Based on Dempster’s Theory of Evidence for Image Segmentation
- Author
-
Scheuermann, Björn, primary, Schlosser, Markus, additional, and Rosenhahn, Bodo, additional
- Published
- 2013
- Full Text
- View/download PDF
38. From Earthquake Detection to Traffic Surveillance – About Information and Communication Infrastructures for Smart Cities
- Author
-
Fischer, Joachim, primary, Redlich, Jens-Peter, additional, Scheuermann, Björn, additional, Schiller, Jochen, additional, Günes, Mesut, additional, Nagel, Kai, additional, Wagner, Peter, additional, Scheidgen, Markus, additional, Zubow, Anatolij, additional, Eveslage, Ingmar, additional, Sombrutzki, Robert, additional, and Juraschek, Felix, additional
- Published
- 2013
- Full Text
- View/download PDF
39. A Survey of Automatic Contact Tracing Approaches Using Bluetooth Low Energy
- Author
-
Reichert, Leonie, primary, Brack, Samuel, additional, and Scheuermann, BjÖRN, additional
- Published
- 2021
- Full Text
- View/download PDF
40. Ovid: Message-based Automatic Contact Tracing
- Author
-
Reichert, Leonie, primary, Brack, Samuel, additional, and Scheuermann, Björn, additional
- Published
- 2021
- Full Text
- View/download PDF
41. SlimCuts: GraphCuts for High Resolution Images Using Graph Reduction
- Author
-
Scheuermann, Björn, primary and Rosenhahn, Bodo, additional
- Published
- 2011
- Full Text
- View/download PDF
42. Feature Quarrels: The Dempster-Shafer Evidence Theory for Image Segmentation Using a Variational Framework
- Author
-
Scheuermann, Björn, primary and Rosenhahn, Bodo, additional
- Published
- 2011
- Full Text
- View/download PDF
43. Non-Linear Offline Time Synchronization
- Author
-
Luo, Li, primary and Scheuermann, Björn, additional
- Published
- 2011
- Full Text
- View/download PDF
44. Interactive Image Segmentation Using Level Sets and Dempster-Shafer Theory of Evidence
- Author
-
Scheuermann, Björn, primary and Rosenhahn, Bodo, additional
- Published
- 2011
- Full Text
- View/download PDF
45. N-View Human Silhouette Segmentation in Cluttered, Partially Changing Environments ,
- Author
-
Feldmann, Tobias, primary, Scheuermann, Björn, additional, Rosenhahn, Bodo, additional, and Wörner, Annika, additional
- Published
- 2010
- Full Text
- View/download PDF
46. Analysis of Numerical Methods for Level Set Based Image Segmentation
- Author
-
Scheuermann, Björn, primary and Rosenhahn, Bodo, additional
- Published
- 2009
- Full Text
- View/download PDF
47. CLL: A Cryptographic Link Layer for Local Area Networks
- Author
-
Jerschow, Yves Igor, primary, Lochert, Christian, additional, Scheuermann, Björn, additional, and Mauve, Martin, additional
- Published
- 2008
- Full Text
- View/download PDF
48. Hybrid Hardware/Software Architectures for Network Packet Processing in Security Applications
- Author
-
Scheuermann, Björn, Moore, Andrew W, Carle, Georg, Fießler, Andreas Christoph Kurt, Scheuermann, Björn, Moore, Andrew W, Carle, Georg, and Fießler, Andreas Christoph Kurt
- Abstract
Die Menge an in Computernetzwerken verarbeiteten Daten steigt stetig, was Netzwerkgeräte wie Switches, Bridges, Router und Firewalls vor Herausfordungen stellt. Die Performance der verbreiteten, CPU/softwarebasierten Ansätze für die Implementierung dieser Aufgaben ist durch den inhärenten Overhead in der sequentiellen Datenverarbeitung limitiert, weshalb solche Funktionalitäten vermehrt auf dedizierten Hardwarebausteinen realisiert werden. Diese bieten eine schnelle, parallele Verarbeitung mit niedriger Latenz, sind allerdings aufwendiger in der Entwicklung und weniger flexibel. Nicht jede Anwendung kann zudem für parallele Verarbeitung optimiert werden. Diese Arbeit befasst sich mit hybriden Ansätzen, um eine bessere Ausnutzung der jeweiligen Stärken von Soft- und Hardwaresystemen zu ermöglichen, mit Schwerpunkt auf der Paketklassifikation. Es wird eine Firewall realisiert, die sowohl Flexibilität und Analysetiefe einer Software-Firewall als auch Durchsatz und Latenz einer Hardware-Firewall erreicht. Der Ansatz wird auf einem Standard-Rechnersystem, welches für die Hardware-Klassifikation mit einem rekonfigurierbaren Logikbaustein (FPGA) ergänzt wird, evaluiert. Eine wesentliche Herausforderung einer hybriden Firewall ist die Identifikation von Abhängigkeiten im Regelsatz. Es werden Ansätze vorgestellt, welche den redundanten Klassifikationsaufwand auf ein Minimum reduzieren, wie etwa die Wiederverwendung von Teilergebnissen der hybriden Klassifikatoren oder eine exakte Abhängigkeitsanalyse mittels Header Space Analysis. Für weitere Problemstellungen im Bereich der hardwarebasierten Paketklassifikation, wie dynamisch konfigurierbare Filterungsschaltkreise und schnelle, sichere Hashfunktionen für Lookups, werden Machbarkeit und Optimierungen evaluiert. Der hybride Ansatz wird im Weiteren auf ein System mit einer SDN-Komponente statt einer FPGA-Erweiterung übertragen. Auch hiermit können signifikante Performancegewinne erreicht werden., Network devices like switches, bridges, routers, and firewalls are subject to a continuous development to keep up with ever-rising requirements. As the overhead of software network processing already became the performance-limiting factor for a variety of applications, also former software functions are shifted towards dedicated network processing hardware. Although such application-specific circuits allow fast, parallel, and low latency processing, they require expensive and time-consuming development with minimal possibilities for adaptions. Security can also be a major concern, as these circuits are virtually a black box for the user. Moreover, the highly parallel processing capabilities of specialized hardware are not necessarily an advantage for all kinds of tasks in network processing, where sometimes a classical CPU is better suited. This work introduces and evaluates concepts for building hybrid hardware-software-systems that exploit the advantages of both hardware and software approaches in order to achieve performant, flexible, and versatile network processing and packet classification systems. The approaches are evaluated on standard software systems, extended by a programmable hardware circuit (FPGA) to provide full control and flexibility. One key achievement of this work is the identification and mitigation of challenges inherent when a hybrid combination of multiple packet classification circuits with different characteristics is used. We introduce approaches to reduce redundant classification effort to a minimum, like re-usage of intermediate classification results and determination of dependencies by header space analysis. In addition, for some further challenges in hardware based packet classification like filtering circuits with dynamic updates and fast hash functions for lookups, we describe feasibility and optimizations. At last, the hybrid approach is evaluated using a standard SDN switch instead of the FPGA accelerator to prove portability.
- Published
- 2019
49. Eclipsing Ethereum Peers with False Friends
- Author
-
Henningsen, Sebastian, Teunis, Daniel, Florian, Martin, Scheuermann, Björn, Henningsen, Sebastian, Teunis, Daniel, Florian, Martin, and Scheuermann, Björn
- Abstract
Ethereum is a decentralized Blockchain system that supports the execution of Turing-complete smart contracts. Although the security of the Ethereum ecosystem has been studied in the past, the network layer has been mostly neglected. We show that Go Ethereum (Geth), the most widely used Ethereum implementation, is vulnerable to eclipse attacks, effectively circumventing recently introduced (Geth v1.8.0) security enhancements. We responsibly disclosed the vulnerability to core Ethereum developers; the corresponding countermeasures to our attack where incorporated into the v1.9.0 release of Geth. Our false friends attack exploits the Kademlia-inspired peer discovery logic used by Geth and enables a low-resource eclipsing of long-running, remote victim nodes. An adversary only needs two hosts in distinct /24 subnets to launch the eclipse, which can then be leveraged to filter the victim's view of the Blockchain. We discuss fundamental properties of Geth's node discovery logic that enable the false friends attack, as well as proposed and implemented countermeasures., Comment: Extended version of the original publication in: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
- Published
- 2019
50. Monetary Stabilization in Cryptocurrencies - Design Approaches and Open Questions
- Author
-
Pernice, Ingolf G. A., Henningsen, Sebastian, Proskalovich, Roman, Florian, Martin, Elendner, Hermann, Scheuermann, Björn, Pernice, Ingolf G. A., Henningsen, Sebastian, Proskalovich, Roman, Florian, Martin, Elendner, Hermann, and Scheuermann, Björn
- Abstract
The price volatility of cryptocurrencies is often cited as a major hindrance to their wide-scale adoption. Consequently, during the last two years, multiple so called stablecoins have surfaced---cryptocurrencies focused on maintaining stable exchange rates. In this paper, we systematically explore and analyze the stablecoin landscape. Based on a survey of 24 specific stablecoin projects, we go beyond individual coins for extracting general concepts and approaches. We combine our findings with learnings from classical monetary policy, resulting in a comprehensive taxonomy of cryptocurrency stabilization. We use our taxonomy to highlight the current state of development from different perspectives and show blank spots. For instance, while over 91% of projects promote 1-to-1 stabilization targets to external assets, monetary policy literature suggests that the smoothing of short term volatility is often a more sustainable alternative. Our taxonomy bridges computer science and economics, fostering the transfer of expertise. For example, we find that 38% of the reviewed projects use a combination of exchange rate targeting and specific stabilization techniques that can render them vulnerable to speculative economic attacks - an avoidable design flaw., Comment: Accepted at IEEE Crypto Valley Conference on Blockchain Technology (CVCBT) 2019
- Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.