Skip to main content

Showing 1–7 of 7 results for author: Pohl, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.14000  [pdf, other

    cs.RO

    Visual Imitation Learning of Task-Oriented Object Gras** and Rearrangement

    Authors: Yichen Cai, Jianfeng Gao, Christoph Pohl, Tamim Asfour

    Abstract: Task-oriented object gras** and rearrangement are critical skills for robots to accomplish different real-world manipulation tasks. However, they remain challenging due to partial observations of the objects and shape variations in categorical objects. In this paper, we propose the Multi-feature Implicit Model (MIMO), a novel object representation that encodes multiple spatial features between a… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

  2. arXiv:2402.10778  [pdf, other

    cs.RO cs.AI

    AutoGPT+P: Affordance-based Task Planning with Large Language Models

    Authors: Timo Birr, Christoph Pohl, Abdelrahman Younes, Tamim Asfour

    Abstract: Recent advances in task planning leverage Large Language Models (LLMs) to improve generalizability by combining such models with classical planning algorithms to address their inherent limitations in reasoning capabilities. However, these approaches face the challenge of dynamically capturing the initial state of the task planning problem. To alleviate this issue, we propose AutoGPT+P, a system th… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Comments: 12 pages, 16 pages including references and appendix, 5 figures

    ACM Class: I.2

  3. arXiv:2401.16899  [pdf, other

    cs.RO

    MAkEable: Memory-centered and Affordance-based Task Execution Framework for Transferable Mobile Manipulation Skills

    Authors: Christoph Pohl, Fabian Reister, Fabian Peller-Konrad, Tamim Asfour

    Abstract: To perform versatile mobile manipulation tasks in human-centered environments, the ability to efficiently transfer learned tasks and experiences from one robot to another or across different environments is key. In this paper, we present MAkEable, a versatile uni- and multi-manual mobile manipulation framework that facilitates the transfer of capabilities and knowledge across different tasks, envi… ▽ More

    Submitted 21 March, 2024; v1 submitted 30 January, 2024; originally announced January 2024.

  4. arXiv:1507.03117  [pdf, ps, other

    cs.CR cs.NI

    Apate - A Linux Kernel Module for High Interaction Honeypots

    Authors: Christoph Pohl, Michael Meier, Hans-Joachim Hof

    Abstract: Honeypots are used in IT Security to detect and gather information about ongoing intrusions, e.g., by documenting the approach of an attacker. Honeypots do so by presenting an interactive system that seems just like a valid application to an attacker. One of the main design goals of honeypots is to stay unnoticed by attackers as long as possible. The longer the intruder interacts with the honeypot… ▽ More

    Submitted 11 July, 2015; originally announced July 2015.

    Comments: The Ninth International Conference on Emerging Security Information, Systems and Technologies - SECURWARE 2015, Venice, Italy, 2015

  5. arXiv:1507.02992  [pdf, ps, other

    cs.CR cs.SE

    Secure Scrum: Development of Secure Software with Scrum

    Authors: Christoph Pohl, Hans-Joachim Hof

    Abstract: Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that develo** secure software should be a main concern in all software development projects. In traditional software projects, security issues require detailed planning in an initial planning phase, typically resulting in a detailed secur… ▽ More

    Submitted 10 July, 2015; originally announced July 2015.

    Comments: The Ninth International Conference on Emerging Security Information, Systems and Technologies - SECURWARE 2015, Venice, Italy, 2015

  6. arXiv:1506.07055  [pdf, other

    cs.CR

    The All-Seeing Eye: A Massive-Multi-Sensor Zero-Configuration Intrusion Detection System for Web Applications

    Authors: Christoph Pohl, Hans-Joachim Hof

    Abstract: Timing attacks are a challenge for current intrusion detection solutions. Timing attacks are dangerous for web applications because they may leak information about side channel vulnerabilities. This paper presents a massive-multi-sensor zero-configuration Intrusion Detection System that is especially good at detecting timing attacks. Unlike current solutions, the proposed Intrusion Detection Syste… ▽ More

    Submitted 23 June, 2015; originally announced June 2015.

    Comments: SECURWARE 2013 : The Seventh International Conference on Emerging Security Information, Systems and Technologies

    Journal ref: SECURWARE 2013 : The Seventh International Conference on Emerging Security Information, Systems and Technologies,2013,66-71

  7. arXiv:1506.03325  [pdf, other

    cs.CY

    BREW: A Breakable Web Application for IT-Security Classroom Use

    Authors: Christoph Pohl, Kathrin Schlierkamp, Hans-Joachim Hof

    Abstract: This paper presents BREW (Breakable Web Application), a tool for teaching IT Security. BREWs main teaching targets are identification and exploitation of vulnerabilities, using technologies and methodologies for software auditing and testing, and bug detection, fixation, and writing of secure code. Main advantages of BREW include that it is easy to apply in practice, it is a perfect tool to create… ▽ More

    Submitted 10 June, 2015; originally announced June 2015.

    Comments: 15 pages in European Conference on Software Engineering Education 2014

    Journal ref: European Conference on Software Engineering Education : ECSEE 2014, 27th and 28th November 2014,191-205