Stephan Doerfel
Hinweis: Stephan Doerfel ist seit dem 30.04.2016 nicht mehr im Fachgebiet beschäftigt.

Email: doerfel@cs.uni-kassel.de

Google Scholar BibSonomy LinkedIn

about me

My research at Kassel University includes the investigation of scientometrics and webometrics, correlations thereof and their possible applications for recommendations and rankings. Further interests include formal concept analysis, social network analysis, and machine learning in general.
I am also a senior developer of the blue social bookmark and publication sharing system BibSonomy.

publications

Full list of my publications and posters.

top publications

  1. Doerfel, S., Jäschke, R., Stumme, G.: The Role of Cores in Recommender Benchmarking for Social Bookmarking Systems. ACM Transactions on Intelligent Systems and Technology. 7, 40:1–40:33 (2016).
  2. Zoller, D., Doerfel, S., Jäschke, R., Stumme, G., Hotho, A.: On Publication Usage in a Social Bookmarking System. Proceedings of the 2015 ACM Conference on Web Science (2015).
  3. Doerfel, S., Zoller, D., Singer, P., Niebler, T., Hotho, A., Strohmaier, M.: How Social is Social Tagging? Proceedings of the Companion Publication of the 23rd International Conference on World Wide Web Companion. pp. 251-252. International World Wide Web Conferences Steering Committee, Seoul, Korea (2014).
  4. Doerfel, S., Jäschke, R.: An Analysis of Tag-Recommender Evaluation Procedures. Proceedings of the 7th ACM conference on Recommender systems (RecSys 2013). pp. 343-346. ACM, Hong Kong, China (2013).
  5. Doerfel, S., Hotho, A., Kartal-Aydemir, A., Roßnagel, A., Stumme, G.: Informationelle Selbstbestimmung Im Web 2.0 – Chancen Und Risiken Sozialer Verschlagwortungssysteme. Vieweg + Teubner Verlag (2013).

projects

These are the projects I have mainly worked on. Through my research, I have further been involved with the projects Venus, EveryAware, and PoSTs.

  • PUMA

    In the DFG funded project “Akademisches Publikationsmanagement” (PUMA), we used and extended the BibSonomy software to create a new web portal that is run locally at an institution (library, university, etc.) and that integrates there with the existing eco system by connecting to the local open access repository, the publication discovery service or the eLearning platform.

  • Info 2.0

    In the DFG funded Project “Informationelle Selbstbestimmung im Web 2.0” (Info 2.0), we analyzed opportunities and risks in Web 2.0 systems, regarding issues of privacy. A second aspect that was investigated were consequences of user-generated ratings and reviews of products and particularly of scholarly publications. The project’s results have been published as a book.

  • BibSonomy

    BibSonomy is a scholarly social bookmarking system where researchers manage their collections of publications and web pages. BibSonomy is an open source project, continously developed by researchers in Kassel, Würzburg, and Hannover. Functioning as a test bed for recommendation and ranking algorithms, as well as through the publicly available datasets, containing traces of user behavior on the Web, BibSonomy has been the subject of various scientific studies.

activities

Full list of my reviewing and teaching activities.

recent activities

teaching

Sommersemester 2015

Information on previous courses can be found here at BibSonomy. In each term we offer several student projects in the context of the web 2.0 and of knowledge discovery.

  • Asynchronous Training of Word Embeddings for Large Text Corpora. Anand, Avishek; Khosla, Megha; Singh, Jaspreet; Zab, Jan-Hendrik; Zhang, Zijian J. S. Culpepper, Moffat, A., Bennett, P. N., Lerman, K. (eds.) (2019). 168-176.
    URL
  • Homogenized halides and alkali cation segregation in alloyed organic-inorganic perovskites. Correa-Baena, Juan-Pablo; Luo, Yanqi; Brenner, Thomas M.; Snaider, Jordan; Sun, Shijing; Li, Xueying; Jensen, Mallory A.; Hartono, Noor Titan Putri; Nienhaus, Lea; Wieghold, Sarah; Poindexter, Jeremy R.; Wang, Shen; Meng, Ying Shirley; Wang, Ti; Lai, Barry; Holt, Martin V.; Cai, Zhonghou; Bawendi, Moungi G.; Huang, Libai; Buonassisi, Tonio; Fenning, David P. (2019). 363(6427) 627--631.
    URL
  • Discovering Implicational Knowledge in Wikidata. Hanika, Tom; Marx, Maximilian; Stumme, Gerd (2019).
    URL
  • Expressive Power of Oblivious Consensus Protocols. Blondin, Michael; Esparza, Javier; Jaax, Stefan (2019).
    URL
  • Decentralized Collaborative Flow Monitoring in Distributed SDN Control-Planes (accepted for publication). Hark, Rhaban; Tounsi, Khalil; Rizk, Amr; Steinmetz, Ralf (2019). 1-8.
    URL
  • Self-calibrated Surface Acquisition for Integrated Positioning Verification in Medical Applications. Jörissen, S.; Bleier, M.; Nüchter, A. in Electronic Imaging (2019). 353-1--353-8.
    URL
  • Multi-model seasonal forecasts for the wind energy sector. Lee, Doo Young; Doblas-Reyes, Francisco J.; Torralba, Verónica; Gonzalez-Reviriego, Nube (2019).
    URL
  • The Bayesian New Statistics: Hypothesis testing, estimation, meta-analysis, and power analysis from a Bayesian perspective. Kruschke, John K.; Liddell, Torrin M. (2018). 25(1) 178--206.
    URL
  • Predicting User Knowledge Gain in Informational Search Sessions. Yu, Ran; Gadiraju, Ujwal; Holtz, Peter; Rokicki, Markus; Kemkes, Philipp; Dietze, Stefan K. Collins-Thompson, Mei, Q., Davison, B. D., Liu, Y., Yilmaz, E. (eds.) (2018). 75-84.
    URL
  • Robust Fourier-based Checkerboard Corner Detection for Camera Calibration. Spitschan, Benjamin; Ostermann, Jörn (2018).
    URL
  • Liquid-Crystalline Small Molecules for Nonfullerene Solar Cells with High Fill Factors and Power Conversion Efficiencies. Li, Huan; Wu, Qiong; Zhou, Ruimin; Shi, Yanan; Yang, Chen; Zhang, Yajie; Zhang, Jianqi; Zou, Wenjun; Deng, Dan; Lu, Kun; Wei, Zhixiang (2018). 9(6) 1803175.
    URL
  • PCA of high dimensional random walks with comparison to neural network training. Antognini, Joseph; Sohl-Dickstein, Jascha (2018). 10328--10337.
    URL
  • Investigating users' decision-making process while searching online and their shortcuts towards understanding. Tibau, Marcelo; Siqueira, Sean W. M.; Pereira Nunes, Bernardo; Bortoluzzi, Maria; Marenzi, Ivana; Kemkes, Philipp (2018).
    URL
  • Synthesis of hardware sandboxes for Trojan mitigation in systems on chip. Bobda, Christophe; Whitaker, Taylor J. L.; Kamhoua, Charles A.; Kwiat, Kevin A.; Njilla, Laurent (2017). 172.
    URL
  • New clone-detection approach for RFID-based supply chains. Maleki, Hoda; Rahaeimehr, Reza; Jin, Chenglu; van Dijk, Marten (2017). 122-127.
    URL
  • Efficient configurations for block ciphers with unified ENC/DEC paths. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco (2017). 41-46.
    URL
  • Improving FPGA based SHA-3 structures. Sundal, Magnus; Chaves, Ricardo (2017). 159.
    URL
  • Ag conductive bridge RAMs for physical unclonable functions. Cambou, Bertrand; Afghah, Fatemeh; Sonderegger, Derek; Taggart, Jennifer; Barnaby, Hugh J.; Kozicki, Michael N. (2017). 151.
    URL
  • Threshold voltage defined multi-input complex gates. De, Asmit; Ghosh, Swaroop (2017). 164.
    URL
  • Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet. Sagisi, Joseph; Tront, Joseph G.; Marchany, Randy C. (2017). 165.
    URL
  • Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security. Schaller, André; Xiong, Wenjie; Anagnostopoulos, Nikolaos Athanasios; Saleem, Muhammad Umair; Gabmeyer, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub (2017). 1-7.
    URL
  • AppSAT: Approximately deobfuscating integrated circuits. Shamsi, Kaveh; Li, Meng; Meade, Travis; Zhao, Zheng; Pan, David Z.; Jin, Yier (2017). 95-100.
    URL
  • INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network. Subramani, Kiruba Sankaran; Antonopoulos, Angelos; Abotabl, Ahmed Attia; Nosratinia, Aria; Makris, Yiorgos (2017). 90-94.
    URL
  • Analyzing security vulnerabilities of three-dimensional integrated circuits. Dofe, Jaya; Yu, Qiaoyan (2017). 156.
    URL
  • Circuit recognition with deep learning. Dai, Yu-Yun; Brayton, Robert K. (2017). 162.
    URL
  • Cache timing attacks on recent microarchitectures. Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar (2017). 155.
    URL
  • On secure implementations of quantum-resistant supersingular isogeny Diffie-Hellman. Koziel, Brian; Azarderakhsh, Reza; Jao, David (2017). 160.
    URL
  • A stochastic all-digital weak physically unclonable function for analog/mixed-signal applications. Bryant, Troy; Chowdhury, Sreeja; Forte, Domenic; Tehranipoor, Mark; Maghari, Nima (2017). 140-145.
    URL
  • Detection of counterfeit ICs using public identification sequences. Samarin, Peter; Lemke-Rust, Kerstin (2017). 163.
    URL
  • Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. Bagadia, Krishna; Chatterjee, Urbi; Roy, Debapriya Basu; Mukhopadhyay, Debdeep; Chakraborty, Rajat Subhra (2017). 167.
    URL
  • TTLock: Tenacious and traceless logic locking. Yasin, Muhammad; Mazumdar, Bodhisatwa; Rajendran, Jeyavijayan J. V.; Sinanoglu, Ozgur (2017). 166.
    URL
  • Exploring timing side-channel attacks on path-ORAMs. Bao, Chongxi; Srivastava, Ankur (2017). 68-73.
    URL
  • LWE-based lossless computational fuzzy extractor for the Internet of Things. Huth, Christopher; Becker, Daniela; Guajardo, Jorge; Duplys, Paul; Güneysu, Tim (2017). 154.
    URL
  • Stateless leakage resiliency from NLFSRs. Taha, Mostafa M. I.; Reyhani-Masoleh, Arash; Schaumont, Patrick (2017). 56-61.
    URL
  • Characterising a CPU fault attack model via run-time data analysis. Kelly, Martin S.; Mayes, Keith; Walker, John F. (2017). 79-84.
    URL
  • Malicious CAN-message attack against advanced driving assistant system. Shiozaki, Mitsuru; Kubota, Takaya; Nakano, Masashi; Nakazawa, Yuuki; Fujino, Takeshi (2017). 158.
    URL
  • High efficiency power side-channel attack immunity using noise injection in attenuated signature domain. Das, Debayan; Maity, Shovan; Nasir, Saad Bin; Ghosh, Santosh; Raychowdhury, Arijit; Sen, Shreyas (2017). 62-67.
    URL
  • Take a moment and have some t: Hypothesis testing on raw PUF data. Immler, Vincent; Hiller, Matthias; Obermaier, Johannes; Sigl, Georg (2017). 128-129.
    URL
  • Physical unclonable functions and dynamic partial reconfiguration for security in resource-constrained embedded systems. Pocklassery, Goutham; Kajuruli, Venkata K.; Plusquellic, James F.; Saqib, Fareena (2017). 116-121.
    URL
  • Reviving instruction set randomization. Sinha, Kanad; Kemerlis, Vasileios P.; Sethumadhavan, Simha (2017). 21-28.
    URL
  • Using computational game theory to guide verification and security in hardware designs. Smith, Andrew M.; Mayo, Jackson R.; Kammler, Vivian; Armstrong, Robert C.; Vorobeychik, Yevgeniy (2017). 110-115.
    URL
  • Hermes: Secure heterogeneous multicore architecture design. Kinsy, Michel A.; Khadka, Shreeya; Isakov, Mihailo; Farrukh, Anam (2017). 14-20.
    URL
  • On designing optimal camouflaged layouts. Broadfoot, Thomas; Sechen, Carl; Rajendran, Jeyavijayan J. V. (2017). 169.
    URL
  • Connecting the dots: Privacy leakage via write-access patterns to the main memory. John, Tara Merin; Haider, Syed Kamran; Omar, Hamza; van Dijk, Marten (2017). 170.
    URL
  • Breaking active-set backward-edge CFI. Theodorides, Michael; Wagner, David A. (2017). 85-89.
    URL
  • Challenging on-chip SRAM security with boot-state statistics. McMahan, Joseph; Cui, Weilong; Xia, Liang; Heckey, Jeff; Chong, Frederic T.; Sherwood, Timothy (2017). 101-105.
    URL
  • Parameter biasing obfuscation for analog IP protection. Rao, Vaibhav Venugopal; Savidis, Ioannis (2017). 161.
    URL
  • A novel physiological features-assisted architecture for rapidly distinguishing health problems from hardware Trojan attacks and errors in medical devices. Wehbe, Taimour; Mooney, Vincent John; Javaid, Abdul Qadir; Inan, Omer T. (2017). 106-109.
    URL
  • Correlation power analysis attack against STT-MRAM based cyptosystems. Chakraborty, Abhishek; Mondal, Ankit; Srivastava, Ankur (2017). 171.
    URL
  • Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs. Koppermann, Philipp; Santis, Fabrizio De; Heyszl, Johann; Sigl, Georg (2017). 35-40.
    URL
  • Clustering with t-SNE, provably. Linderman, George C.; Steinerberger, Stefan (2017).
    URL
  • Towards a memristive hardware secure hash function (MemHash). Azriel, Leonid; Kvatinsky, Shahar (2017). 51-55.
    URL
  • Fabrication security and trust of domain-specific ASIC processors. Vai, Michael; Gettings, Karen; Lyszczarz, Theodore (2017). 152.
    URL
  • Cobwebs from the Past and Present: Extracting Large Social Networks using Internet Archive Data. Shaltev, Miroslav; Zab, Jan-Hendrik; Kemkes, Philipp; Siersdorfer, Stefan; Zerr, Sergej (2017). abs/1701.03277
    URL
  • Øzone: Efficient execution with zero timing leakage for modern microarchitectures. Aweke, Zelalem Birhanu; Austin, Todd M. (2017). 153.
    URL
  • A new maskless debiasing method for lightweight physical unclonable functions. Aysu, Aydin; Wang, Ye; Schaumont, Patrick; Orshansky, Michael (2017). 134-139.
    URL
  • Abstract: Characterizing EEPROM for usage as a ubiquitous PUF source. Pavlina, Chris; Torrey, Jacob; Temkin, Kyle (2017). 168.
    URL
  • Memory-constrained implementation of lattice-based encryption scheme on standard Java Card. Yuan, Ye; Fukushima, Kazuhide; Kiyomoto, Shinsaku; Takagi, Tsuyoshi (2017). 47-50.
    URL
  • Photonic side channel attacks against RSA. Carmon, Elad; Seifert, Jean-Pierre; Wool, Avishai (2017). 74-78.
    URL
  • When good protections go bad: Exploiting anti-DoS measures to accelerate rowhammer attacks. Aga, Misiker Tadesse; Aweke, Zelalem Birhanu; Austin, Todd M. (2017). 8-13.
    URL
  • Creating security primitive by nanoscale manipulation of carbon nanotubes. Hu, Zhaoying; Han, Shu-Jen (2017). 29-34.
    URL
  • A novel offset method for improving bitstring quality of a Hardware-Embedded delay PUF. Che, Wenjie; Plusquellic, Jim; Saqib, Fareena (2017). 157.
    URL
  • Improving reliability of weak PUFs via circuit techniques to enhance mismatch. Patil, Vinay C.; Vijayakumar, Arunkumar; Holcomb, Daniel E.; Kundu, Sandip (2017). 146-150.
    URL
  • Verification of untrusted chips using trusted layout and emission measurements. Stellari, Franco; Song, Peilin; Weger, Alan J.; Culp, Jim; Herbert, A.; Pfeiffer, Dirk (2014). 19-24.
    URL
  • A Chaotic Ring oscillator based Random Number Generator. Dhanuskodi, Siva Nishok; Vijayakumar, Arunkumar; Kundu, Sandip (2014). 160-165.
    URL
  • Building trusted ICs using split fabrication. Vaidyanathan, Kaushik; Das, Bishnu P.; Sumbul, H. Ekin; Liu, Renzhi; Pileggi, Larry T. (2014). 1-6.
    URL
  • Countering the effects of silicon aging on SRAM PUFs. Maes, Roel; van der Leest, Vincent (2014). 148-153.
    URL
  • A noise bifurcation architecture for linear additive physical functions. Yu, Meng-Day (Mandel); M'Raïhi, David; Verbauwhede, Ingrid; Devadas, Srinivas (2014). 124-129.
    URL
  • Optimality and beyond: The case of 4×4 S-boxes. Picek, Stjepan; Ege, Baris; Papagiannopoulos, Kostas; Batina, Lejla; Jakobovic, Domagoj (2014). 80-83.
    URL
  • New scan attacks against state-of-the-art countermeasures and DFT. Ali, Sk Subidh; Sinanoglu, Ozgur; Saeed, Samah Mohamed; Karri, Ramesh (2014). 142-147.
    URL
  • A hierarchical formal approach to verifying side-channel resistant cryptographic processors. Okamoto, Kotaro; Homma, Naofumi; Aoki, Takafumi; Morioka, Sumio (2014). 76-79.
    URL
  • Cryptographically secure shields. Cioranesco, Jean-Michel; Danger, Jean-Luc; Graba, Tarik; Guilley, Sylvain; Mathieu, Yves; Naccache, David; Ngo, Xuan Thuy (2014). 25-31.
    URL
  • Efficient and secure intellectual property (IP) design with split fabrication. Vaidyanathan, Kaushik; Liu, Renzhi; Sumbul, H. Ekin; Zhu, Qiuling; Franchetti, Franz; Pileggi, Larry T. (2014). 13-18.
    URL
  • Power supply glitch attacks: Design and evaluation of detection circuits. Gomina, Kamil; Rigaud, Jean-Baptiste; Gendrier, Philippe; Candelier, Philippe; Tria, Assia (2014). 136-141.
    URL
  • A look into SIMON from a side-channel perspective. Bhasin, Shivam; Graba, Tarik; Danger, Jean-Luc; Najm, Zakaria (2014). 56-59.
    URL
  • EM-based detection of hardware trojans on FPGAs. Soll, Oliver; Korak, Thomas; Muehlberghuber, Michael; Hutter, Michael (2014). 84-87.
    URL
  • On design of a highly secure PUF based on non-linear current mirrors. Kumar, Raghavan; Burleson, Wayne (2014). 38-43.
    URL
  • Experimental evaluation of two software countermeasures against fault attacks. Moro, Nicolas; Heydemann, Karine; Dehbaoui, Amine; Robisson, Bruno; Encrenaz, Emmanuelle (2014). 112-117.
    URL
  • Security of SoC firmware load protocols. Krstic, Sava; Yang, Jin; Palmer, David W.; Osborne, Randy B.; Talmor, Eran (2014). 70-75.
    URL
  • Increasing the efficiency of laser fault injections using fast gate level reverse engineering. Courbon, Franck; Loubet-Moundi, Philippe; Fournier, Jacques J. A.; Tria, Assia (2014). 60-63.
    URL
  • Side-channel leakage on silicon substrate of CMOS cryptographic chip. Fujimoto, Daisuke; Tanaka, Daichi; Miura, Noriyuki; Nagata, Makoto; ichi Hayashi, Yu; Homma, Naofumi; Bhasin, Shivam; Danger, Jean-Luc (2014). 32-37.
    URL
  • Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA. Sahoo, Durga Prasad; Saha, Sayandeep; Mukhopadhyay, Debdeep; Chakraborty, Rajat Subhra; Kapoor, Hitesh (2014). 50-55.
    URL
  • Role of the Bering Strait on the hysteresis of the ocean conveyor belt circulation and glacial climate stability. Hu, Aixue; Meehl, Gerald A; Han, Weiqing; Timmermann, Axel; Otto-Bliesner, Bette; Liu, Zhengyu; Washington, Warren M; Large, William; Abe-Ouchi, Ayako; Kimoto, Masahide; Lambeck, Kurt; Wu, Bingyi (2012). 109 6417-6422.
    URL
  • SLICED: Slide-based Concurrent Error Detection Technique for Symmetric Block Ciphers. Rajendran, Jeyavijayan; Borad, Hetal; Mantravadi, Shyam; Karri, Ramesh J. Plusquellic, Mai, K. (eds.) (2010). 70-75.
    URL
  • Anti-tamper JTAG TAP Design Enables DRM to JTAG Registers and P1687 on-chip Instruments. Clark, Christopher J. J. Plusquellic, Mai, K. (eds.) (2010). 19-24.
    URL
  • LISA: Maximizing RO PUF's Secret Extraction. Yin, Chi-En Daniel; Qu, Gang J. Plusquellic, Mai, K. (eds.) (2010). 100-105.
    URL
  • Using Multiple Processors in a Single Reconfigurable Fabric for High-assurance Applications. Newgard, Bruce; Hoffman, Colby J. Plusquellic, Mai, K. (eds.) (2010). 25-29.
    URL
  • Multiplexing Methods for Power Watermarking. Ziener, Daniel; Baueregger, Florian; Teich, Jürgen J. Plusquellic, Mai, K. (eds.) (2010). 36-41.
    URL
  • Low Voltage Fault Attacks to AES. Barenghi, Alessandro; Bertoni, Guido; Breveglieri, Luca; Pellicioli, Mauro; Pelosi, Gerardo J. Plusquellic, Mai, K. (eds.) (2010). 7-12.
    URL
  • Side-channel Attack Resistant ROM-based AES S-Box. Teegarden, Craig; Bhargava, Mudit; Mai, Ken J. Plusquellic, Mai, K. (eds.) (2010). 124-129.
    URL
  • Side-channel based Watermarks for Integrated Circuits. Becker, Georg T.; Kasper, Markus; Moradi, Amir; Paar, Christof J. Plusquellic, Mai, K. (eds.) (2010). 30-35.
    URL
  • Key Predistribution Based Broadcast Authentication Scheme for Wireless Sensor Networks. Liu, Yongsheng; Li, Jie (2009).
    URL
  • Self-consistent field calculations of excited states using the maximum overlap method (MOM). Gilbert, Andrew TB; Besley, Nicholas A; Gill, Peter MW (2008). 112(50) 13164--13171.
    URL
  • Rydberg energies using excited state density functional theory. Cheng, Chiao-Lun; Wu, Qin; Van Voorhis, Troy (2008). 129(12) 124112.
    URL
  • Random Survival Forests. Ishwaran, Hamat; Kogalur, Udaya B.; Blackstone, Eugene H.; Lauer, Michael S. (2008).
    URL
  • Even Small Birds are Unique: Population Protocols with Identifiers. Guerraoui, Rachid; Ruppert, Eric (2007).
    URL
  • Structural Relaxations in Electronically Excited Poly(para-phenylene). Artacho, Emilio; Rohlfing, M; Côté, M; Haynes, PD; Needs, RJ; Molteni, C (2004). 93(11) 116401.
    URL
  • Trapping of excitons at chemical defects in polyethylene. Ceresoli, Davide; Tosatti, Erio; Scandolo, Sandro; Santoro, G; Serra, S (2004). 121(13) 6478--6484.
    URL
  • Arbeitsmarktgesteuerte Zuwanderung: Szenarien der Zuwanderung sowie rechtliche und institutionelle Aspekte ihrer Steuerung Heilemann, Ullrich; Loeffelholz, Hans Dietrich von; Sieveking, Klaus in Schriftenreihe des Rheinisch-Westfälischen Instituts für Wirtschaftsforschung, Teil N.F., H. 68 (2003). Duncker & Humblot, DE-836.
    URL
  • Localized excitons and breaking of chemical bonds at III-V (110) surfaces. Pankratov, Oleg; Scheffler, Matthias (1995). 75(4) 701.
    URL