Karlsruher Institut für Technologie

1. Karlsruher Mobilitätsdatensymposium

Mobilitätsdaten nutzen – Potenziale, Perspektiven, Partnerschaften Die Mobilität der Zukunft ist datenbasiert – doch wie können Mobilitätsdaten heute schon sinnvoll genutzt werden? Welche innovativen Anwendungen sind möglich, wenn unterschiedliche Akteure gemeinsam an einem Strang ziehen?

LeDiFlow: Learned Distribution-guided Flow Matching to Accelerate Image Generation

Enhancing the efficiency of high-quality image generation using Diffusion Models (DMs) is a significant challenge due to the iterative nature of the process. Flow Matching (FM) is emerging as a powerful generative modeling paradigm based on a …

An Architecture-Based Approach to Mitigate Confidentiality Violations Using Machine Learning

Today’s software systems have become increasingly connected and complex, requiring comprehensive analysis to ensure quality properties like confidentiality. Architecture-based confidentiality analysis enables the early identification of …

Girls’Day | Vom Beauty-Filter bis zum Deep-Fake – Erforsche die Welt der Künstlichen Intelligenz!

Bist du neugierig auf die faszinierende Welt der Künstlichen Intelligenz (KI)? Möchtest du herausfinden, was KI ist, wo du ihr bereits begegnest und wie sie unsere Zukunft gestaltet? Dann laden wir dich herzlich ein, deinen Girls‘Day mit dem TRIANGEL und FZI Forschungszentrum Informatik zu verbringen!

SM-SIM: A Simulator for Analyzing Selfish Mining Attacks in Blockchain Systems

Selfish mining attacks threaten the tamper-resistance of blockchain systems with consensus mechanisms based on proof-of-work and probabilistic finality. Optimizing blockchain system configurations can mitigate these attacks. This, however, requires …

Ergebnisbroschüre

Alle Ergebnisse im Überblick

TRIANGEL Wisssenstransfer

Wissenschaft erlebbar machen

A Formal Treatment of Homomorphic Encryption Based Outsourced Computation in the Universal Composability Framework

The adoption of Homomorphic Encryption (HE) and Secure Function Evaluation (SFE) applications in the real world remains limited, even nearly 50 years after the introduction of HE. This is particularly unfortunate given the strong privacy and …

Context aware Security Patterns

Achieving and maintaining certain quality attributes of software-intensive systems is challenging, especially when these systems undergo change. In particular, information security is more difficult to maintain and degrades more rapidly than other …

Architecture-based Propagation Analyses Regarding Security

In our modern world, the ever-expanding exchange of data and the increased complexity of interconnected software systems make software security challenging. Ideally, security concerns are already addressed early, as discussed with security by design. …