Dr. rer. nat. Sebastian Berndt
Ratzeburger Allee 160
23562 Lübeck
Email: | s.berndt(at)uni-luebeck.de |
Phone: | +49 451 3101 5323 |
Publikationen
2018
Sebastian
Berndt, and
Kim-Manuel
Klein,
Using Structural Properties for Integer Programs, in CiE , Springer, 2018. pp. 89--96.
Using Structural Properties for Integer Programs, in CiE , Springer, 2018. pp. 89--96.
2017
Sebastian
Berndt, and
Maciej
Liskiewicz,
Algorithm Substitution Attacks from a Steganographic Perspective, in ACM Conference on Computer and Communications Security , ACM, 2017. pp. 1649--1660.
Algorithm Substitution Attacks from a Steganographic Perspective, in ACM Conference on Computer and Communications Security , ACM, 2017. pp. 1649--1660.
Max
Bannach,
Sebastian
Berndt, and
Thorsten
Ehlers,
Jdrasil: A Modular Library for Computing Tree Decompositions, in SEA , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017. pp. 28:1--28:21.
Jdrasil: A Modular Library for Computing Tree Decompositions, in SEA , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017. pp. 28:1--28:21.
Sebastian
Berndt,
Maciej
Liskiewicz,
Matthias
Lutter, and
Rüdiger
Reischuk,
Learning Residual Alternating Automata, in AAAI , AAAI Press, 2017. pp. 1749--1755.
Learning Residual Alternating Automata, in AAAI , AAAI Press, 2017. pp. 1749--1755.
2016
Sebastian
Berndt, and
Maciej
Liskiewicz,
Hard Communication Channels for Steganography, in ISAAC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2016. pp. 16:1--16:13.
Hard Communication Channels for Steganography, in ISAAC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2016. pp. 16:1--16:13.
Sebastian
Berndt, and
Maciej
Liskiewicz,
Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography does not Necessarily Imply One-Way Functions, in IH&MMSec , ACM, 2016. pp. 81--92.
Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography does not Necessarily Imply One-Way Functions, in IH&MMSec , ACM, 2016. pp. 81--92.
Sebastian
Berndt, and
Rüdiger
Reischuk,
Steganography Based on Pattern Languages, in LATA , Springer, 2016. pp. 387--399.
Steganography Based on Pattern Languages, in LATA , Springer, 2016. pp. 387--399.
2015
Sebastian
Berndt,
Klaus
Jansen, and
Kim-Manuel
Klein,
Fully Dynamic Bin Packing Revisited, in APPROX-RANDOM , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2015. pp. 135--151.
Fully Dynamic Bin Packing Revisited, in APPROX-RANDOM , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2015. pp. 135--151.
- Mitarbeiter*innen
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Paula Arnold
- Jeremy Boy
- Finn Burmester
- Till Eifert
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Timothy Imort
- Moritz Kirschte
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Tammo Polle
- Yannik Potdevin
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
- Luca Wilke