Sebastian Reuter

ORCID: 0000-0003-4866-0836
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Modular Robots and Swarm Intelligence
  • Flexible and Reconfigurable Manufacturing Systems
  • Robotic Path Planning Algorithms
  • Multi-Agent Systems and Negotiation
  • Scheduling and Optimization Algorithms
  • Advanced Software Engineering Methodologies
  • Digital Transformation in Industry
  • Advanced Manufacturing and Logistics Optimization
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Steganography and Watermarking Techniques
  • Smart Grid Security and Resilience
  • AI-based Problem Solving and Planning
  • Robot Manipulation and Learning
  • Auction Theory and Applications
  • Network Security and Intrusion Detection
  • Banana Cultivation and Research
  • Underwater Vehicles and Communication Systems
  • Vehicle Dynamics and Control Systems
  • Indoor and Outdoor Localization Technologies
  • Spaceflight effects on biology
  • History and Developments in Astronomy
  • Advanced Control Systems Optimization
  • Spam and Phishing Detection
  • Hate Speech and Cyberbullying Detection
  • Cryptography and Data Security

University of Lübeck
2024

RWTH Aachen University
2012-2021

Website fingerprinting (WFP) aims to infer information about the content of encrypted and anonymized connections by observing patterns data flows based on size direction packets. By collecting traffic traces at a malicious Tor entry node --- one weakest adversaries in attacker model passive eavesdropper can leverage captured meta-data reveal websites visited user. As recently shown, WFP is significantly more effective realistic than assumed. Concurrently, former defenses are either...

10.1145/3372297.3423351 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2020-10-30

Users of an onion routing network, such as Tor, depend on its anonymity properties. However, especially malicious entry nodes, which know the client's identity, can also observe whole communication their link to client and, thus, conduct several de-anonymization attacks. To limit this exposure and impede corresponding attacks, we propose multipath traffic between middle node reduce information attacker obtain at a single vantage point. facilitate deployment, only clients selected nodes need...

10.1109/icnp.2019.8888029 article EN 2019-10-01

The ramp-up of production systems is characterised by situations that arise for the first time. Due to unpredictability system behaviour in such situations, instabilities occur lead reduced effectiveness. In order deal with resulting uncertainty, this paper presents an approach self-directed capable "learning", is, they adapt their depending on signals and changes circumfluent world. advantages are significant, as can react changing products, equipment process constraints, able function...

10.1016/j.procir.2016.05.094 article EN Procedia CIRP 2016-01-01

Within the Enceladus Explorer Initiative of DLR Space Administration navigation technologies for a future space mission are in development. Those basis search extraterrestrial life on Saturn moon Enceladus. An autonomous melting probe, EnEx aims to extract liquid sample from water reservoir below icy crust.

10.1051/epjconf/201713506007 article EN cc-by EPJ Web of Conferences 2017-01-01

This paper describes to which extent the operational envelope of scaled vehicles can be extended by integrating a vehicle dynamics control system using torque vectoring. A detailed description for construction mechatronic basis an autonomous model car in 1:10 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">th</sup> scale is given. The design only uses standardized components and allows most possible flexibility controlling behavior applying...

10.1109/robio.2012.6491211 article EN 2021 IEEE International Conference on Robotics and Biomimetics (ROBIO) 2012-12-01

Website fingerprinting (WFP) attacks on the anonymity network Tor have become ever more effective. Furthermore, research discovered that proposed defenses are insufficient or cause high overhead. In previous work, we presented a new WFP defense for incorporates multipath transmissions to repel malicious nodes from conducting attacks. this demo, showcase operation of our traffic splitting by visually illustrating underlying transmission using LED-equipped Raspberry Pis.

10.14279/tuj.eceasst.80.1151 article EN 2021-09-08
Coming Soon ...