Issue Date | Title | Author(s) |
Mar-2015 | Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
Jan-2015 | Effects of node mobility on energy balancing in wireless networks | Pala, Zeydin; Bıçakcı, Kemal ; Turk, Mustafa |
Mar-2015 | Evaluating energy cost of route diversity for security in wireless sensor networks | İncebacak, Davut; Bıçakcı, Kemal ; Tavlı, Bülent |
Dec-2014 | Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution | Dirik, Ahmet Emir; Sencar, Hüsrev Taha ; Memon, Nasir |
2014 | Why the Names? Anubanini and His Clan in the Cuthaean Legend | Adalı, Selim Ferruh; Demirci, Muhammed Fatih ; Özbayoğlu, Ahmet Murat ; Ergin, Oğuz |
Dec-2017 | Automated Image Matching and New Readings for Cyrus the Great's 547 BC Campaign in the Nabonidus Chronicle (BM 35382 = ABC 7) | Adalı, Selim Ferruh; Demirci, Muhammed Fatih ; Özbayoğlu, Ahmet Murat |
Aug-2016 | Leveraging human computation for pure-text Human Interaction Proofs | Bıçakcı, Kemal ; Kızılöz, Hakan Ezgi |
Dec-2017 | A Closer Look at Pure-Text Human-Interaction Proofs | Kızılöz, Hakan Ezgi; Bıçakcı, Kemal |
Jun-2014 | A preliminary examination technique for audio evidence to distinguish speech from non-speech using objective speech quality measures | Uzun, Erkam; Sencar, Hüsrev Taha |
Nov-2014 | The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks | Cotuk, Hüseyin; Bıçakcı, Kemal ; Tavlı, Bülent ; Uzun, Erkam |
Feb-2016 | Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited | Tezcan, Cihangir; Selçuk, Ali Aydın |
Nov-2014 | The impact of scalable routing on lifetime of smart grid communication networks | Uzun, Erkam; Tavlı, Bülent ; Bıçakcı, Kemal ; İncebacak, Davut |
25-Nov-2016 | A CRT-based verifiable secret sharing scheme secure against unbounded adversaries | Ersoy, Oğuzhan; Pedersen, Thomas Brochmann; Kaya, Kamer; Selçuk, Ali Aydın ; Anarim, Emin |
15-Dec-2016 | Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets | Narang, Pratik; Hota, Chittaranjan; Sencar, Hüsrev Taha |
Nov-2018 | Towards a process management life-cycle model for graduation projects in computer engineering | Yılmaz, Murat; Taşel, Faris Serdar; Güleç, Ulaş; Sopaoğlu, Uğur |
Oct-2018 | Armature Shape Optimization of an Electromagnetic Launcher Including Contact Resistance | Ceylan, Doğa; Güdelek, Mehmet Uğur; Keyşan, Ozan |
30-May-2018 | Will it pass? Predicting the outcome of a source code review | Gerede, Çağdaş Evren ; Mazan, Zeki |
Feb-2018 | Context-Aware Computing, Learning, and Big Data in Internet of Things: A Survey | Sezer, Ömer Berat; Doğdu, Erdoğan; Özbayoğlu, Ahmet Murat |
Aug-2018 | Predicting the pressure losses while the drillstring is buckled and rotating using artificial intelligence methods | Özbayoğlu, Mehmet Evren; Erge, Öney; Özbayoğlu, Ahmet Murat |
Aug-2018 | Deep convolutional autoencoder for radar-based classification of similar aided and unaided human activities | Seyfioğlu, Mehmet Saygın; Özbayoğlu, Ahmet Murat ; Gürbüz, Sevgi Zübeyde |