Publications
2023
-
Towards robust autonomous driving systems through adversarial test set generationISA transactions 2023
-
A Streamlit-based Artificial Intelligence Trust Platform for Next-Generation Wireless NetworksarXiv preprint arXiv:2211.12851 2023
-
Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network SignalsIn 2022 IEEE Globecom Workshops (GC Wkshps) 2023
-
TENET: a new hybrid network architecture for adversarial defenseInternational Journal of Information Security 2023
-
An XAI approach for COVID-19 detection using transfer learning with X-ray imagesHeliyon 2023
-
Digital Twin in Chronic Wound Management2023
-
Digital Twin Applications for Smart and Connected Cities2023
-
Digital Twin in Industry 4.0 and Beyond Applications2023
-
5G-SRNG: 5G Spectrogram-based Random Number Generation for Devices with Low Entropy SourcesarXiv preprint arXiv:2304.09591 2023
2022
-
Human-in-the-loop enhanced COVID-19 detection in Transfer Learning based CNN Models2022
-
On the performance of energy criterion method in wi-fi transient signal detectionElectronics 2022
-
Security concerns on machine learning solutions for 6G networks in mmWave beam predictionPhysical Communication 2022
-
SEIR Based Epidemic Modeling of COVID-19 in TurkeyAvrupa Bilim ve Teknoloji Dergisi 2022
-
Exploiting epistemic uncertainty of the deep learning models to generate adversarial samplesMultimedia Tools and Applications 2022
-
Closeness and uncertainty aware adversarial examples detection in adversarial machine learningComputers and Electrical Engineering 2022
-
The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial RetrainingInternational Journal of Information Security 2022
-
Uncertainty-Aware Prediction Validator in Deep Learning Models for Cyber-Physical System DataACM Transactions on Software Engineering and Methodology 2022
-
Uncertainty as a Swiss army knife: new adversarial attack and defense ideas based on epistemic uncertaintyComplex & Intelligent Systems 2022
-
Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-CaseIn European Interdisciplinary Cybersecurity Conference 2022
-
Unreasonable Effectiveness of Last Hidden Layer Activations for Adversarial RobustnessIn IEEE COMPSAC 2022 2022
-
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN ModelsCryptography 2022
-
Machine learning for the security of healthcare systems based on Internet of Things and edge computing2022
-
Analysis of deceptive data attacks with adversarial machine learning for solar photovoltaic power generation forecastingElectrical Engineering 2022
-
Defensive Distillation-Based Adversarial Attack Mitigation Method for Channel Estimation Using Deep Learning Models in Next-Generation Wireless NetworksIEEE Access 2022
-
Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning AttacksIEEE Access 2022
-
Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit DataarXiv preprint arXiv:2209.12665 2022
-
Customer Segmentation in the Retail Sector: A Data Analytics ApproachIn 2022 14th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC) 2022
-
Anomaly Detection in Power Markets and SystemsarXiv preprint arXiv:2212.02182 2022
2021
-
Transfer Learning Based Convolutional Neural Network For COVID-19 Detection With X-Ray Images2021
-
Data augmentation based malware detection using convolutional neural networksPeerj computer science 2021
-
Internet of Predictable Things (IoPT) Framework to Increase Cyber-Physical System ResiliencyarXiv:2101.07816 2021
-
Malicious url detection using machine learning2021
-
Adversarial Machine Learning Security Problems for 6G: mmWave Beam Prediction Use-CaseIn IEEE BlackSeaCom 2021
-
Deep neural network based malicious network activity detection under adversarial machine learning attacksIn Intelligent Technologies and Applications: Third International Conference, INTAP 2020, Grimstad, Norway, September 28–30, 2020, Revised Selected Papers 3 2021
-
A Generative Model based Adversarial Security of Deep Learning and Linear Classifier ModelsInformatica 2021
-
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryptionFuture Generation Computer Systems 2021
-
Prediction surface uncertainty quantification in object detection models for autonomous drivingIn 2021 IEEE International Conference on Artificial Intelligence Testing (AITest) 2021
-
Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT SystemsarXiv preprint arXiv:2109.14334 2021
2020
-
Practical Implementation of Privacy Preserving Clustering Methods Using a Partially Homomorphic Encryption AlgorithmMDPI Electronics 2020
-
Password-based encryption approach for securing sensitive dataWiley Security and Privacy 2020
-
Deep learning based Sequential model for malware analysis using Windows exe API CallsPEERJ Computer Science 2020
-
A Privacy-Preserving Fully Homomorphic Encryption and Parallel Computation Based Biometric Data Matching2020
2019
-
Classification of Methamorphic Malware with Deep Learning (LSTM)In IEEE (SIU) Signal Processing and Applications Conference 2019
-
Incrementing Adversarial Robustness with Autoencoding for Machine Learning Model AttacksIn IEEE (SIU) Signal Processing and Applications Conference 2019
-
A Benchmark API Call Dataset for Windows PE Malware Classification2019
-
Sensor Based Cyber Attack Detections in Critical Infrastructures Using Deep Learning AlgorithmsComputer Science 2019
-
Distributed denial of service attack detection using autoencoder and deep neural networksJournal of Intelligent & Fuzzy Systems 2019
-
Preventing Data Poisoning Attacks By Using Generative ModelsIn 2019 1st International Informatics and Software Engineering Conference (UBMYK) 2019
2018
-
CPP-ELM: Cryptographically Privacy-Preserving Extreme Learning Machine for Cloud SystemsInternational Journal of Computational Intelligence Systems 2018
-
Two-layer malicious network flow detection system with sparse linear model based feature selectionJournal of the National Science Foundation of Sri Lanka 2018
2017
-
Detection of Attack-Targeted Scans from The Apache HTTP Server Access LogsApplied Computing and Informatics 2017
-
Topluluk Yöntemlerine Dayalı Dağıtık Hizmet Dışı Bırakma Saldırılarının AlgılanmasıSüleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi 2017
-
Derin Öğrenme Teknolojileri Kullanarak Dağıtık Hizmet Dışı Bırakma Saldırılarının Tespit EdilmesiIn The 5th High Performance Computing Conference 2017
-
Classification with boosting of extreme learning machine over arbitrarily partitioned dataSoft Computing 2017
-
Applied Computing and Informatics2017
2016
-
Privacy Preserving Extreme Learning Machine Classification Model for Distributed SystemsIn Signal Processing and Communications Applications Conference (SIU), 2016 2016
-
Privacy Preserving PageRank Algorithm By Using Secure Multi-Party ComputationarXiv preprint arXiv:1611.01907 2016
2015
-
Classification with Extreme Learning Machine and Ensemble Algorithms Over Randomly Partitioned DataIn Signal Processing and Communications Applications Conference (SIU), 2015 23th 2015
-
Secure Multi-Party Computation Based Privacy Preserving Extreme Learning Machine Algorithm Over Vertically Distributed DataIn The 2015 International Data Mining and Cybersecurity Workshop 2015
-
Robust Ensemble Classifier Combination Based on Noise Removal with One-Class SVMIn 22nd International Conference on Neural Information Processing (ICONIP2015) 2015
-
Genetic Algorithm based Feature Selection in High Dimensional Text Dataset ClassificationWSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 2015
2014
-
Polarization Measurement of High Dimensional Social Media Messages With Support Vector Machine Algorithm Using MapreduceIn YBS.2014 Bogazici University 2014
-
Bulut bilişim sistemlerinde eşle/indirge yöntemi uygulanarak veri madenciliği yazılım çatısının geliştirilmesi2014
-
BULUT BİLİŞİM SİSTEMLERİNDE EŞLE/İNDİRGE YÖNTEMİ UYGULANARAK VERİ MADENCİLİĞİ YAZILIM ÇATISININ GELİŞTİRİLMESİ2014
2013
-
A MapReduce based distributed SVM algorithm for binary classificationTurkish Journal of Electrical Engineering & Computer Sciences 2013
-
Information Economics of E-Government Services With Turkish e-Id Card ProjectIn Infonomics in Frame of Informatics 2013
-
CloudSVM: training an SVM classifier in cloud computing systemsIn Pervasive Computing and the Networked World: Joint International Conference, ICPCA/SWS 2012, Istanbul, Turkey, November 28-30, 2012, Revised Selected Papers 2013
2012
-
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Card Management ProjectInternational Journal of Information Sciences and Techniques (IJIST) 2012