Curriculum Vitae
Assoc. Prof. Dr. Pascal Schöttle

Assoc. Prof. Dr. Pascal Schöttle
associate professor
+ 43 512 2070 - 4332
pascal.schoettle@mci.edu




Departments

Assoc. Prof. Dr. Pascal Schöttle


Research Interests:

  • Adversarial Machine Learning
  • Steganography and Steganalysis
  • Public-key Cryptography
  • Network Anomaly Detection


2020 - present
Associate Professor - Management Center Innsbruck, Austria

2018 - 2020
Lecturer - Management Center Innsbruck, Austria

2015 - 2018
Post-Doc - University of Innsbruck, Austria

2014 - 2015
Post-Doc - Westfälische Wilhelms-University Münster, Deutschland

2013
Visiting Scholar - Pennsylvania State University, USA

2011 - 2014
Scientific Staff Member (Doctoral Candidate) - Westfälische Wilhelms-University Münster, Germany

2010 - 2011
Scientific Student Assistent - Ruhr-University Bochum, Deutschland

2011 - 2014
Computer Science - Westfälische Wilhelms-University Münster, Germany (Ph. D. (Dr. rer. nat))

2008 - 2011
IT Security / Networks and Systems - Ruhr-University Bochum, Germany (Master of Science)

2003 - 2008
Mathematical Engineering - University of Duisburg-Essen, Germany (Bachelor of Science)

Multimedia Security - Westfälische Wilhelms-University Münster, Germany

Advanced Cryptology - Westfälische Wilhelms-University Münster, Germany

Introduction to Computer Engineering - University of Innsbruck, Austria

Computer Networks and Internet Technology - University of Innsbruck, Austria

Information Security II - University of Innsbruck, Austria

Communication Technology and Computer Networks - University of Innsbruck, Austria

Logic & Computability - Management Center Innsbruck, Austria

Mathematics & Statistics - Management Center Innsbruck, Austria

Algorithms & Data Structures - Management Center Innsbruck, Austria

Management Information Systems - Management Center Innsbruck, Austria

Data Science - Management Center Innsbruck, Austria

2012
IEEE International Workshop on Information Forensics and Security
Best Student Paper Award

2008
CAST - Competence Center for Applied Security Technology
2nd place at CAST Förderpreis in IT security,

  • Pascal Schöttle and Rainer Böhme. "Game Theory and Adaptive Steganography". In: IEEE Transactions on Information Forensics and Security 11.4 (2016), pp. 760-773
  • Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, and Rainer Böhme. "Adaptive Steganography and Steganalysis with Fixed-Size Embedding". In: Transactions on Data Hiding and Multimedia Security 10 (2015), pp. 69-91
  • Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, and Rainer Böhme. "Secure Team Composition to Thwart Insider Threats and Cyberespionage". In: ACM Transactions on Internet Technology 14.2-3 (2014), 19:1-22

  • Pascal Schöttle and Rainer Böhme. "Die totale Transparenz. Facebook, Cookies, RFID etc." In: Ethische Herausforderungen im Web 2.0. Ed. by Martin Dabrowski, Judith Wolf, and Karlies Abmeier. Paderborn: Schöningh, 2014, pp. 11-31

  • Thomas Dilger, Christian Ploder, Wolfgang Haas, Pascal Schöttle, and Reinhard Bernsteiner (2020). Continuous Planning and Forecasting Framework(CPFF) for Agile Project Management: Overcoming the "Agilefall"-BudgetingTrap. 21st Annual Conference on Information Technology Education (SIGITE '20), October 7-9, 2020, Virtual Event, USA
  • Christian Ploder, Thomas Dilger, and Schöttle Pascal. "Agile Project Budgeting - Teaching the Combination of Agile Project Management and Beyond Budgeting Basics". In: Proceedings of the 12th International Conference on Education and New Learning Technologies (EDULEARN). 2020
  • Thomas Baumhauer, Pascal Schöttle, and Matthias Zeppelzauer. "Machine Unlearning: Linear Filtration for Logit-based Classifiers". In: https://arxiv.org/abs/2002.02730
  • Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, and Rainer Böhme. "Detecting Adversarial Examples - A Lesson from Multimedia Security" In: 26th European Signal Processing Conference (EUSIPCO), 2018.
  • Cecilia Pasquini, Pascal Schöttle, and Rainer Böhme. "Decoy Password Vaults: At Least As Hard As Steganography?" In: Proceedings of 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC). 2017, pp. 327-340
  • Svetlana Abramova, Pascal Schöttle, and Rainer Böhme. "Mixing Coins of Different Quality: A Game-Theoretic Approach". In: 4th Workshop on Bitcoin and Blockchain Research, in assocation with Financial Cryptography and Data Security 2017. Malta, 2017
  • Cecilia Pasquini, Pascal Schöttle, Rainer Böhme, Giulia Boato, and Fernando Pèrez- Gonzàlez. "Forensics of High Quality and Nearly Identical JPEG Image Recompression". In: ACM Information Hiding and Multimedia Security Workshop. Vigo, Galicia, Spain, 2016, pp. 11-21
  • Matthias Carnein, Pascal Schöttle, and Rainer Böhme. "Telltale Watermarks for Counting JPEG Compressions". In: Proceedings of IS&T Electronic Imaging: Media Watermarking, Security, and Forensics 2016. San Francisco, CA, 2016
  • Matthias Carnein, Pascal Schöttle, and Rainer Böhme. "Forensics of High-Quality JPEG Images with Color Subsampling". In: IEEE International Workshop on Information Forensics and Security (IEEE WIFS). Rome, Italy, 2015
  • Matthias Kirchner, Pascal Schöttle, and Christian Riess. "Thinking beyond the block: block matching for copy-move forgery detection revisited." Media Watermarking, Security, and Forensics 2015. Vol. 9409. International Society for Optics and Photonics, 2015.
  • Matthias Carnein, Pascal Schöttle, and Rainer Böhme. "Predictable Rain? Steganalysis of Public-Key Steganography using Wet Paper Codes". In: ACM Information Hiding and Multimedia Security Workshop. Salzburg, Austria, 2014, pp. 97-108
  • Erwin Quiring and Pascal Schöttle. "On the Combination of Randomized Thresholds and Non-Parametric Boundaries to Protect Digital Watermarks against Sensitivity Attacks". In: ACM Information Hiding and Multimedia Security Workshop. Salzburg, Austria, 2014, pp. 41-48
  • Aron Laszka, Benjamin Johnson, Pascal Schöttle, and Rainer Böhme. "Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats". In: Computer Security (ESORICS). Ed. by Jason Crampton, Sushil Jajodia, and Keith Mayes. Vol. 8134. Lecture Notes in Computer Science. Berlin Heidelberg: Springer, 2013, pp. 273- 290
  • Pascal Schöttle, Aron Laszka, Benjamin Johnson, Jens Grossklags, and Rainer Böhme. "A Game-Theoretic Analysis of Content-adaptive Steganography with Independent Embed- ding". In: 21st European Signal Processing Conference (EUSIPCO). Marrakech, Morocco: IEEE, 2013, pp. 1-5
  • Pascal Schöttle, Stefan Korff, and Rainer Böhme. "Weighted Stego-Image Steganalysis for Naive Content-Adaptive Embedding". In: IEEE International Workshop on Information Forensics and Security (IEEE WIFS). Best paper award. Tenerife, Spain, 2012, pp. 193- 198
  • Pascal Schöttle and Rainer Böhme. "A Game-Theoretic Approach to Content-Adaptive Steganography". In: Information Hiding (14th International Conference). Ed. by Matthias Kirchner and Dipak Ghosal. Vol. 7692. Lecture Notes in Computer Science. Berlin Heidel- berg: Springer, 2012, pp. 125-141
  • Benjamin Johnson, Pascal Schöttle, and Rainer Böhme. "Where to Hide the Bits?" In: Decision and Game Theory for Security. Ed. by Jens Grossklags and Jean Walrand. Vol. 7638. Lecture Notes in Computer Science. Berlin Heidelberg: Springer, 2012, pp. 1-17

2019 - 2021
Game Over Eva(sion): Securing Deep Learning with Game Theory Keywords: Deep Learning, Security, Game Theory, Evasion Attacks - Game Over Eva(sion): Securing Deep Learning with Game Theory Keywords: Deep Learning, Security, Game Theory, Evasion Attacks - FWF - Austrian Science Fund

2017 - 2019
"Forensic Analysis of Scanned Text Documents" (FASTDoc). - "Forensic Analysis of Scanned Text Documents" (FASTDoc). - Forschungsförderungsmittel der Nachwuchsförderung 2017 (University Innsbruck)

2015
FFG Relocation Grant, for the relocation from Germany to Austria. -

2013
ONR Visiting Researcher Grant, funding the research visit at the Pennsylvania State University, US. -

2018
Programm Committee Co-Chair - ACM Information Hiding & Multimedia Security 2018

2018
Programm Committee Member - IEEEE International Conference on Acoustics, Speech, and Signal Processing

2016 - present
Reviewer - IEEE Transactions of Information Forensics and Security

2015 - 2020
Program Committee Member - ACM Information Hiding & Multimedia Security

2015 - 2018
Programm Committee Member - International Workshop on Digital-forensics and Watermarking

Hofer Nora (2020): On the Robustness of a BERT Model for ABSA against Input Level Adversarial Examples

Merkle Florian (2020): The Impact of Network Pruning on the Adversarial Robustness of Deep Neural Networks

Bleckmann Carl (2020): What‘s next for IoT Forensics? A Proposal for Integration of Multimedia Forensic Methods to IoT Forensic Concepts

Muhr Valentin (2019): Data Deletion in Deep Learning Networks