Utz Roedig
YOU?
Author Swipe
View article: Surface Acoustic Wave Gas Sensors: Innovations in Functional Materials, Sensing Dynamics, and Signal Analysis
Surface Acoustic Wave Gas Sensors: Innovations in Functional Materials, Sensing Dynamics, and Signal Analysis Open
Surface Acoustic Wave gas sensors have garnered increasing attention as highly sensitive, miniaturized, and wireless compatible platforms for molecular detection. Their unique ability to convert surface perturbations into measurable acoust…
View article: BiLSTM-Based Fault Anticipation for Predictive Activation of FRER in Time-Sensitive Industrial Networks
BiLSTM-Based Fault Anticipation for Predictive Activation of FRER in Time-Sensitive Industrial Networks Open
Frame Replication and Elimination for Reliability (FRER) in Time-Sensitive Networking (TSN) enhances fault tolerance by duplicating critical traffic across disjoint paths. However, always-on FRER configurations introduce persistent redunda…
View article: QoS-Aware Proportional Fairness Scheduling for Multi-Flow 5G UEs: A Smart Factory Perspective
QoS-Aware Proportional Fairness Scheduling for Multi-Flow 5G UEs: A Smart Factory Perspective Open
Private 5G networks are emerging as key enablers for smart factories, where a single device often handles multiple concurrent traffic flows with distinct Quality of Service (QoS) requirements. Existing simulation frameworks, however, lack …
View article: SDAP-based QoS Flow Multiplexing Support in Simu5G for 5G NR Simulation
SDAP-based QoS Flow Multiplexing Support in Simu5G for 5G NR Simulation Open
The Service Data Adaptation Protocol (SDAP) plays a central role in 5G New Radio (NR), acting as a bridge between the core and radio networks, by enabling QoS Flow multiplexing over shared Data Radio Bearers (DRBs). However, most 5G simula…
View article: Resilient Time-Sensitive Networking for Industrial IoT: Configuration and Fault-Tolerance Evaluation
Resilient Time-Sensitive Networking for Industrial IoT: Configuration and Fault-Tolerance Evaluation Open
Time-Sensitive Networking (TSN) is increasingly adopted in industrial systems to meet strict latency, jitter, and reliability requirements. However, evaluating TSN's fault tolerance under realistic failure conditions remains challenging. T…
View article: CATER: A Policy-Based Data Placement Framework for Edge Storage
CATER: A Policy-Based Data Placement Framework for Edge Storage Open
<p>The growing heterogeneity and decentralization in the modern computing paradigm of edge-cloud continuum introduces new constraints on storage systems, such as storage type, associated processors, privacy, scarce resources, complia…
View article: Unhelpful Assumptions in Software Security Research
Unhelpful Assumptions in Software Security Research Open
In the study of software security many factors must be considered. Once venturing beyond the simplest of laboratory experiments, the researcher is obliged to contend with exponentially complex conditions. Software security has been shown t…
View article: Spoofing Detection for Personal Voice Assistants
Spoofing Detection for Personal Voice Assistants Open
Personal Voice Assistants (PVAs) are common acoustic sensing systems that are used as a speech-based controller for critical systems making them vulnerable to speech spoofing attacks. Prior research has focused on the discrimination of gen…
View article: EDT+
EDT+ Open
Narrowband Internet of Things (NB-IoT) is a popular communication standard used to construct IoT applications. To optimise energy consumption of NB-IoT, Early Data Transmission (EDT) is included within the standard. In this work we propose…
View article: Towards Trust-Based Data Weighting in Machine Learning
Towards Trust-Based Data Weighting in Machine Learning Open
In distributed environments, data for Machine Learning (ML) applications may be generated from numerous sources and devices, and traverse a cloud-edge continuum viaa variety of protocols, using multiple security schemes and equipment types…
View article: Dynamic Recognition of Speakers for Consent Management by Contrastive Embedding Replay
Dynamic Recognition of Speakers for Consent Management by Contrastive Embedding Replay Open
Voice assistants overhear conversations, and a consent management mechanism is required. Consent management can be implemented using speaker recognition. Users that do not give consent enroll their voice, and all their further recordings a…
View article: Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon
Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon Open
Software security research has a core problem: it is impossible to prove the security of complex software. A low number of known defects may simply indicate that the software has not been attacked yet, or that successful attacks have not b…
View article: Low-Complexity Speech Spoofing Detection using Instantaneous Spectral Features
Low-Complexity Speech Spoofing Detection using Instantaneous Spectral Features Open
Over the last decade, various detection mechanisms for spoofed speech have been proposed. Thus far the development focus has been on detection accuracy, largely ignoring secondary goals such as computational complexity or storage effort. I…
View article: Dynamic Recognition of Speakers for Consent Management by Contrastive Embedding Replay
Dynamic Recognition of Speakers for Consent Management by Contrastive Embedding Replay Open
Voice assistants overhear conversations and a consent management mechanism is required. Consent management can be implemented using speaker recognition. Users that do not give consent enrol their voice and all their further recordings are …
View article: Personal Voice Assistant Security and Privacy—A Survey
Personal Voice Assistant Security and Privacy—A Survey Open
Personal voice assistants (PVAs) are increasingly used as interfaces to digital environments. Voice commands are used to interact with phones, smart homes, or cars. In the United States alone, the number of smart speakers, such as Amazon's…
View article: Room Identification with Personal Voice Assistants (Extended Abstract)
Room Identification with Personal Voice Assistants (Extended Abstract) Open
Personal Voice Assistants (PVAs) are used to interact with digital environments and computer systems using speech. In this work we describe how to identify the room in which the speaker is located. Only the audio signal is used for identif…
View article: Adversarial Command Detection Using Parallel Speech Recognition Systems
Adversarial Command Detection Using Parallel Speech Recognition Systems Open
Personal Voice Assistants (PVAs) such as Apple's Siri, Amazon's Alexa and Google Home are now commonplace. PVAs are susceptible to adversarial commands; an attacker is able to modify an audio signal such that humans do not notice this modi…
View article: Jamming of NB-IoT synchronisation signals
Jamming of NB-IoT synchronisation signals Open
Narrowband-Internet of Things (NB-IoT) is a relatively novel Low Power Wide Area Network (LPWAN) radio technology used to deploy Internet of Things (IoT) infrastructures at scale. It is important that such deployments are resilient to atta…
View article: Understanding Developer Security Archetypes
Understanding Developer Security Archetypes Open
As software systems penetrate our everyday lives, security has risen to be a key concern. Despite decades of research leading to new tools and practices for writing secure code, achieving security as a key attribute remains highly challeng…
View article: Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods
Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods Open
The convergence of legacy power system components with advanced networking and communication facilities have led towards the development of smart grids. Smart grids are envisioned to be the next generation innovative power systems, guarant…