default search action
Stefanie Roos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c45]Yushan Yang, Simon Hanisch, Mingyu Ma, Stefanie Roos, Thorsten Strufe, Giang T. Nguyen:
First Steps Towards Game and Activity Inference on Encrypted VR Datastreams. WoWMoM 2025: 105-110 - 2024
- [c44]Rathu I. P. B. B. Siriwardana, Yu Shen, Stefanie Roos:
Secure Communication in Dolphin: Integrating Trusted Execution Environments for Enhanced Caller Privacy. WPES@CCS 2024: 47-58 - [i28]Ben Weintraub, Satwik Prabhu Kumble, Cristina Nita-Rotaru, Stefanie Roos:
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network. CoRR abs/2405.02147 (2024) - [i27]Chi Hong, Jiyue Huang, Robert Birke, Dick H. J. Epema, Stefanie Roos, Lydia Y. Chen:
SFDDM: Single-fold Distillation for Diffusion models. CoRR abs/2405.14961 (2024) - [i26]Jiyue Huang, Chi Hong, Lydia Y. Chen, Stefanie Roos:
Gradient Inversion of Federated Diffusion Models. CoRR abs/2405.20380 (2024) - 2023
- [c43]Jiyue Huang, Zilong Zhao, Lydia Y. Chen, Stefanie Roos:
Fabricated Flips: Poisoning Federated Learning without Data. DSN 2023: 274-287 - [c42]Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos:
Get Me Out of This Payment! Bailout: An HTLC Re-routing Protocol. FC 2023: 92-109 - [c41]Yu Shen, Oguzhan Ersoy, Stefanie Roos:
Extras and Premiums: Local PCN Routing with Redundancy and Fees. FC 2023: 110-127 - [c40]Zilong Zhao, Jiyue Huang, Lydia Y. Chen, Stefanie Roos:
Defending Against Free-Riders Attacks in Distributed Generative Adversarial Networks. FC 2023: 200-217 - [c39]Chaoyi Zhu, Stefanie Roos, Lydia Y. Chen:
LeadFL: Client Self-Defense against Model Poisoning in Federated Learning. ICML 2023: 43158-43180 - [c38]Satwik Prabhu Kumble, Dick H. J. Epema, Stefanie Roos:
Game-Theoretic Analysis of (Non-)Refundable Fees in the Lightning Network. ICPADS 2023: 645-652 - [c37]Jiyue Huang, Chi Hong, Yang Liu, Lydia Y. Chen, Stefanie Roos:
Maverick Matters: Client Contribution and Selection in Federated Learning. PAKDD (2) 2023: 269-282 - [c36]Martijn de Vos, Georgy Ishmaev, Johan Pouwelse, Stefanie Roos:
A Deployment-First Methodology to Mechanism Design and Refinement in Distributed Systems. PerCom Workshops 2023: 472-477 - [i25]Martijn de Vos, Georgy Ishmaev, Johan Pouwelse, Stefanie Roos:
A Deployment-First Methodology to Mechanism Design and Refinement in Distributed Systems. CoRR abs/2301.04508 (2023) - [i24]Naqib Zarin, Isaac Sheff, Stefanie Roos:
Blockchain Nodes are Heterogeneous and Your P2P Overlay Should be Too: PODS. CoRR abs/2306.16153 (2023) - [i23]Satwik Prabhu Kumble, Dick H. J. Epema, Stefanie Roos:
Game-Theoretic Analysis of (Non-)Refundable Fees in the Lightning Network. CoRR abs/2310.04058 (2023) - 2022
- [j3]Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [c35]Oguzhan Ersoy, Jérémie Decouchant, Satwik Prabhu Kumble, Stefanie Roos:
SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony. AFT 2022: 16-29 - [c34]Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings. ICDCN 2022: 107-116 - [i22]Zilong Zhao, Jiyue Huang, Stefanie Roos, Lydia Y. Chen:
Attacks and Defenses for Free-Riders in Multi-Discriminator GAN. CoRR abs/2201.09967 (2022) - [i21]Naqib Zarin, Dirk van Bokkem, Justin Segond, Stefanie Roos:
A Sybil-Resistant and Decentralized Market Place. CoRR abs/2201.10407 (2022) - [i20]Jiyue Huang, Zilong Zhao, Lydia Y. Chen, Stefanie Roos:
Blind leads Blind: A Zero-Knowledge Attack on Federated Learning. CoRR abs/2202.05877 (2022) - [i19]Oguzhan Ersoy, Jérémie Decouchant, Satwik Prabhu Kumble, Stefanie Roos:
SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony. CoRR abs/2207.11615 (2022) - [i18]Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos:
Get Me out of This Payment! Bailout: An HTLC Re-routing Protocol. IACR Cryptol. ePrint Arch. 2022: 958 (2022) - 2021
- [c33]Satwik Prabhu Kumble, Dick H. J. Epema, Stefanie Roos:
How Lightning's Routing Diminishes its Anonymity. ARES 2021: 13:1-13:10 - [c32]Yuup van Engelshoven, Stefanie Roos:
The Merchant: Avoiding Payment Channel Depletion through Incentives. DAPPS 2021: 59-68 - [c31]Satwik Prabhu Kumble, Stefanie Roos:
Comparative Analysis of Lightning's Routing Clients. DAPPS 2021: 79-84 - [i17]Jiyue Huang, Chi Hong, Lydia Y. Chen, Stefanie Roos:
Is Shapley Value fair? Improving Client Selection for Mavericks in Federated Learning. CoRR abs/2106.10734 (2021) - [i16]Satwik Prabhu Kumble, Dick H. J. Epema, Stefanie Roos:
How Lightning's Routing Diminishes its Anonymity. CoRR abs/2107.10070 (2021) - [i15]Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings. CoRR abs/2108.04374 (2021) - 2020
- [c30]Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais:
SoK: Layer-Two Blockchain Protocols. Financial Cryptography 2020: 201-226 - [c29]Oguzhan Ersoy, Stefanie Roos, Zekeriya Erkin:
How to Profit from Payments Channels. Financial Cryptography 2020: 284-303 - [c28]Martin Byrenheid, Thorsten Strufe, Stefanie Roos:
Attack resistant Leader Election in Social Overlay Networks by Leveraging Local Voting. ICDCN 2020: 7:1-7:10 - [c27]Martin Byrenheid, Thorsten Strufe, Stefanie Roos:
Secure Embedding of Rooted Spanning Trees for Scalable Routing in Topology-Restricted Networks. SRDS 2020: 175-184 - [c26]Jiyue Huang, Rania Talbi, Zilong Zhao, Sara Bouchenak, Lydia Y. Chen, Stefanie Roos:
An Exploratory Analysis on Users' Contributions in Federated Learning. TPS-ISA 2020: 20-29 - [i14]Ben Weintraub, Cristina Nita-Rotaru, Stefanie Roos:
Exploiting Centrality: Attacks in Payment Channel Networks with Local Routing. CoRR abs/2007.09047 (2020) - [i13]Jiyue Huang, Rania Talbi, Zilong Zhao, Sara Bouchenak, Lydia Y. Chen, Stefanie Roos:
An Exploratory Analysis on Users' Contributions in Federated Learning. CoRR abs/2011.06830 (2020) - [i12]Yuup van Engelshoven, Stefanie Roos:
The Merchant: Avoiding Payment Channel Depletion through Incentives. CoRR abs/2012.10280 (2020) - [i11]Lisa Eckey, Sebastian Faust, Kristina Hostáková, Stefanie Roos:
Splitting Payments Locally While Routing Interdimensionally. IACR Cryptol. ePrint Arch. 2020: 555 (2020)
2010 – 2019
- 2019
- [c25]Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
Attack-Resistant Spanning Tree Construction in Route-Restricted Overlay Networks. SRDS 2019: 251-260 - [i10]Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
On the Limits of Byzantine-tolerant Spanning Tree Construction in Route-Restricted Overlay Networks. CoRR abs/1901.02729 (2019) - [i9]Oguzhan Ersoy, Stefanie Roos, Zekeriya Erkin:
How to profit from payments channels. CoRR abs/1911.08803 (2019) - [i8]Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais:
SoK: Off The Chain Transactions. IACR Cryptol. ePrint Arch. 2019: 360 (2019) - 2018
- [c24]Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. NDSS 2018 - [c23]Hatem Ismail, Stefanie Roos, Neeraj Suri:
A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems. TrustCom/BigDataSE 2018: 456-464 - [c22]Hatem Ismail, Stefanie Roos, Neeraj Suri:
A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems. WOWMOM 2018: 1-9 - 2017
- [c21]Stefanie Roos, Martin Byrenheid, Clemens Deusser, Thorsten Strufe:
BD-CAT: Balanced dynamic content addressing in trees. INFOCOM 2017: 1-9 - [i7]Stefanie Roos, Martin Byrenheid, Clemens Deusser, Thorsten Strufe:
Balanced Dynamic Content Addressing in Trees. CoRR abs/1701.03522 (2017) - [i6]Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. CoRR abs/1709.05748 (2017) - 2016
- [b1]Stefanie Roos:
Analyzing and Enhancing Routing Protocols for Friend-to-Friend Overlays. Dresden University of Technology, Germany, 2016 - [j2]Stefanie Roos, Thorsten Strufe:
Dealing with Dead Ends: Efficient Routing in Darknets. ACM Trans. Model. Perform. Evaluation Comput. Syst. 1(1): 4:1-4:30 (2016) - [c20]Stefanie Roos, Martin Beck, Thorsten Strufe:
Anonymous addresses for efficient and resilient routing in F2F overlays. INFOCOM 2016: 1-9 - [c19]Giang Nguyen, Stefanie Roos, Benjamin Schiller, Thorsten Strufe:
SWAP: Protecting pull-based P2P video streaming systems from inference attacks. WoWMoM 2016: 1-9 - [p1]Stefanie Roos:
Analyse und Verbesserung von Routingprotokollen für Friend-to-Friend Overlays. Ausgezeichnete Informatikdissertationen 2016: 229-238 - [i5]Stefanie Roos, Martin Beck, Thorsten Strufe:
VOUTE-Virtual Overlays Using Tree Embeddings. CoRR abs/1601.06119 (2016) - 2015
- [c18]Shankar Karuppayah, Stefanie Roos, Christian Rossow, Max Mühlhäuser, Mathias Fischer:
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism. ICDCS 2015: 619-629 - [c17]Stefanie Roos, Thorsten Strufe:
On the impossibility of efficient self-stabilization in virtual overlays with churn. INFOCOM 2015: 298-306 - [c16]Stefanie Roos, Giang T. Nguyen, Thorsten Strufe:
Integrating churn into the formal analysis of routing algorithms. NetSys 2015: 1-5 - [c15]Stefanie Roos, Florian Platzer, Jan-Michael Heller, Thorsten Strufe:
Inferring obfuscated values in Freenet. NetSys 2015: 1-8 - [c14]Giang Nguyen, Stefanie Roos, Thorsten Strufe, Mathias Fischer:
RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streaming. LCN 2015: 261-269 - 2014
- [c13]Daniel Germanus, Stefanie Roos, Thorsten Strufe, Neeraj Suri:
Mitigating Eclipse attacks in Peer-To-Peer networks. CNS 2014: 400-408 - [c12]Frederik Armknecht, Manuel Hauptmann, Stefanie Roos, Thorsten Strufe:
An additional protection layer for confidential OSNs posts. ICC 2014: 3746-3752 - [c11]Hani Salah, Stefanie Roos, Thorsten Strufe:
Characterizing graph-theoretic properties of a large-scale DHT: Measurements vs. simulations. ISCC 2014: 1-7 - [c10]Stefanie Roos, Liang Wang, Thorsten Strufe, Jussi Kangasharju:
Enhancing compact routing in CCN with prefix embedding and topology-aware hashing. MobiArch 2014: 49-54 - [c9]Hani Salah, Stefanie Roos, Thorsten Strufe:
Diversity entails improvement: A new neighbour selection scheme for Kademlia-type systems. P2P 2014: 1-10 - [c8]Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe:
Measuring Freenet in the Wild: Censorship-Resilience under Observation. Privacy Enhancing Technologies 2014: 263-282 - [c7]Patrick Welzel, Stefanie Roos, Andreas Höfer, Thorsten Strufe:
DarknetSim: a simulation framework for social overlays. SpringSim (CNS) 2014: 2 - [i4]Stefanie Roos, Thorsten Strufe:
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings. CoRR abs/1401.2165 (2014) - [i3]Hani Salah, Stefanie Roos, Thorsten Strufe:
A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems. CoRR abs/1408.3079 (2014) - 2013
- [c6]Stefanie Roos, Thorsten Strufe:
A contribution to analyzing and enhancing Darknet routing. INFOCOM 2013: 615-619 - [c5]Andreas Höfer, Stefanie Roos, Thorsten Strufe:
Greedy Embedding, Routing and Content Addressing for Darknets. NetSys 2013: 43-50 - [i2]Stefanie Roos, Hani Salah, Thorsten Strufe:
Comprehending Kademlia Routing - A Theoretical Framework for the Hop Count Distribution. CoRR abs/1307.7000 (2013) - [i1]Frederik Armknecht, Manuel Hauptmann, Stefanie Roos, Thorsten Strufe:
Protecting Public OSN Posts from Unintended Access. CoRR abs/1309.3647 (2013) - 2012
- [c4]Chris Biemann, Stefanie Roos, Karsten Weihe:
Quantifying Semantics using Complex Network Analysis. COLING 2012: 263-278 - [c3]Stefanie Roos, Thorsten Strufe:
Provable Polylog Routing for Darknets. ICDCS Workshops 2012: 140-146 - 2011
- [c2]Benjamin Schiller, Stefanie Roos, Andreas Höfer, Thorsten Strufe:
Attack Resistant Network Embeddings for Darknets. SRDS Workshops 2011: 90-95 - 2010
- [j1]Simone A. Ludwig, Stefanie Roos, Monique Frize, Nicole Yu:
Medical Outcome Prediction for Intensive Care Unit Patients. Int. J. Comput. Model. Algorithms Medicine 1(4): 19-30 (2010) - [c1]Simone A. Ludwig, Stefanie Roos:
Prognosis of Breast Cancer Using Genetic Programming. KES (4) 2010: 536-545
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 22:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint