Issue Date | Title | Author(s) |
2017 | Fast Cloud Detection Using Low-Frequency Components of Satellite Imagery | Ufuk, Derviş Utku; Demirpolat, Caner; Demirci, Muhammed Fatih |
2018 | Automated Generation of Attack Graphs Using Nvd | Aksu, M. Uğur; Bıçakcı, Kemal ; Dilek, M. H.; Özbayoğlu, Ahmet Murat ; Tatlı, E. İ. |
2016 | Skeleton Critical Points for Shape Matching | Bölük, S. Arda; Demirci, Muhammed Fatih |
2016 | Distance Measure Functions With Enhanced Skeletal Points for 2d and 3d | Şirin, Yahya; Demirci, Muhammed Fatih |
2017 | Automatic Image Selection From Images With Similar Contents | Bardak, Batuhan ; Demirci, Muhammed Fatih |
2015 | Charpattern: Rethinking Android Lock Pattern To Adapt To Remote Authentication | Bıçakcı, Kemal ; Satiev, Tashtanbek |
2014 | Trusted3ballot: Improving Security and Usability of Threeballot Voting System Using Trusted Computing | Uzunay, Yusuf; Bıçakcı, Kemal |
2018 | How Safe Is Safety Number? a User Study on Signal’s Fingerprint and Safety Number Methods for Public Key Verification | Bıçakcı, Kemal ; Altuncu, E.; Sahkulubey, M. S.; Kızılöz, H. E.; Uzunay, Y. |
2016 | Analysis of the Effect of Image Resolution on Automatic Face Gender and Age Classification | Cerit, Betül; Bölük, S. Arda; Demirci, Muhammed Fatih |
2016 | Efficient Near-Duplicate Image Detection With Created Feature Subset | Yıldız, Burak; Demirci, Muhammed Fatih |
2017 | Comparison of Three Different Cnn Architectures for Age Classification | Aydoğdu, Mehmet Fatih; Çelik, Vakkas; Demirci, Muhammed Fatih |
2018 | Cifar-10 Image Classification With Convolutional Neural Networks for Embedded Systems | Çalık, Rasim Caner; Demirci, Muhammed Fatih |
2014 | The Impact of Bandwidth Constraints on the Energy Consumption of Wireless Sensor Networks | Cotuk, Hüseyin; Tavlı, Bülent ; Bıçakcı, Kemal ; Akgün, Mehmet Burak |
2014 | Communication / Computation Trade-Offs in Wireless Sensor Networks: Comparing Network-Level and Node-Level Strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent |
2014 | Mobile Authentication Secure Against Man-In Attacks | Bicakci, K. ; Unal, D.; Ascioglu, N.; Adalier, O. |
2014 | Towards Automatic Detection of Child Pornography | Sae-Bae, Napa; Sun, Xiaoxi; Sencar, Hüsrev Taha ; Memon, Nasir D. |
2018 | A Taxonomy of the Emerging Denial-Of Attacks in the Smart Grid and Countermeasures | Huseinovic, Alvin; Mrdovic, Sasa; Bıçakcı, Kemal ; Uludağ, Süleyman |
2017 | A Quantitative Cvss-Based Cyber Security Risk Assessment Methodology for It Systems | Aksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun |
2017 | Undecidable Problems in Malware Analysis | Selçuk, Ali Aydın ; Orhan, Fatih; Batur, Berker |
2016 | Twincloud: Secure Cloud Sharing Without Explicit Key Management | Bıçakcı, Kemal ; Yavuz, Davut Deniz; Gürkan, Sezin |