Issue Date | Title | Author(s) |
2017 | Issues blind software developers experience when using software development tools | Gerede, Çağdaş Evren ; Mülayim G. |
2021 | İlaç Kaynaklı Gen İfadesi Değişimlerinin Tahmini ve İlaç Tasarımında Kullanımı | Tan, Mehmet ; Özadali Sari, Keriman |
2008 | İskeletsel Şekil Özeti Oluşturulması ve Sınıf Prototipi Öğrenme | Demirci, Muhammed Fatih ; Bahadır, İsmet; Soyer, Onur |
2011 | Johnny in Internet café: User study and exploration of password autocomplete in web browsers | Bıçakcı, Kemal ; Atalay, N. B.; Kızılöz H. E. |
2020 | JpgScraper : An Advanced Carver for JPEG Files | Uzun, Erkam; Sencar, Hüsrev Taha |
2010 | Kablosuz algılayıcı ağlarda bağlantı sayısının sınırlandırılmasının ağ ömrü üzerindeki etkilerinin incelenmesi | Akgün, Mehmet Burak |
2020 | Kaynak Seçme Oyunlarında Sosyal YapılaşmalarAltında Denge Hesaplaması [Diğer] | Çaşkurlu, Buğra ; Ekici, Özgün |
2012 | Knowledge hiding from tree and graph databases | Abul, Osman ; Gökçe, Harun |
2010 | Knowledge hiding in emerging application domains | Abul, Osman |
2017 | Konum-tabanlı servisler için konum ve konum örüntü mahremiyetinin sağlanması | Abul, Osman |
2016 | Konuşma Yoluyla Etkileşilebilen Mobil Yazılımların Geliştirilmesine Yönelik Anotasyon Yönelimli Bir Yazılım Çerçevesi | Gerede, Çağdaş Evren |
2013 | LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload | Bıçakcı, Kemal ; Crispo, Bruno; Oligeri, Gabriele |
Aug-2016 | Leveraging human computation for pure-text Human Interaction Proofs | Bıçakcı, Kemal ; Kızılöz, Hakan Ezgi |
2011 | Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent |
2022 | Location-privacy preserving partial nearby friends querying in urban areas | Abul, Osman |
2011 | Long Range Correlations Between Nucleotide Triplets | Vitale, D.; Kuruoğlu, E. E.; Abul, Osman |
2023 | A machine learning approach for dyslexia detection using Turkish audio records | Taş, Tuğberk; Bulbul, Muammed Abdullah; Haşimoğlu, Abas; Meral, Yavuz; Çalışkan, Yasin; Budağova, Günay; Kutlu, Mucahid |
2008 | Many-to-Many Matching in l(1) Norm | Demirci, Muhammed Fatih |
2009 | Many-to-Many Matching under the l 1 Norm | Demirci, Muhammed Fatih ; Osmanlıoğlu, Yusuf |
2011 | Maximizing lifetime of event-unobservable wireless sensor networks | Bıçakcı, Kemal ; Gültekin, Hakan ; Tavlı, Bülent ; Bağcı, İbrahim Ethem |
Feb-2016 | Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent ; Gültekin, Hakan ; İncebacak, Davut |
2013 | Methods for Identifying Traces of Compression in Audio | Hiçsönmez, Samet; Uzun, Erkam; Sencar, Hüsrev Taha |
Apr-2020 | A Microprocessor Protection Architecture against Hardware Trojans in Memories | Bolat, A.; Cassano, L.; Reviriego, P.; Ergin, Oğuz ; Ottavid, M. |
2019 | Mikroişlemcilerde Kullanıma Uygun Bir Tek Yön Kaydırmalı Yeniden Adlandırma Tablosu Devresi | Ergin, Oğuz |
2019 | Minimization of Testing Costs in Capacity-Constrained Database Migration | Subramani, Kiruba Sankaran; Çaşkurlu, Buğra ; Velasquez, A. |
2010 | Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks | Tavlı, Bülent ; Özçiloğlu, M. Mikail; Bıçakcı, Kemal |
2020 | Mitigation of H.264 and H.265 Video Compression for Reliable PRNU Estimation | Altınışık, Enes; Tasdemir, Kasım; Sencar, Hüsrev Taha |
2014 | Mobile Authentication Secure Against Man-In-The-Middle Attacks | Bıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay |
2009 | Modifying The Data-Holding Components Of The Microprocessors For Energy Efficiency | Osmanlıoğlu, Yusuf; Hanay, Y. Sinan; Ergin, Oğuz |
2022 | MoRS: An Approximate Fault Modelling Framework for Reduced-Voltage SRAMs | Yüksel, I.E.; Salami, B.; Ergin, Oğuz ; Ünsal, O.S.; Kestelman, A.C. |
2009 | MotifHider: A Knowledge Hiding Approach to Sequence Masking | Abul, Osman |
2016 | Multi-Scale Modularity and Motif Distributional Effect in Metabolic Networks | Gao, Shang; Chen, Alan; Rahmani, Ali; Zeng, Jia; Tan, Mehmet ; Alhajj, Reda; Rokne, Jon; Demetrick, Douglas; Wei, Xiaohui |
2011 | A Multi-Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security Evaluation | Bıçakcı, Kemal ; van Oorschot, Paul C. |
2022 | Multilevel memetic hypergraph partitioning with greedy recombination | Acikalin U.U.; Caskurlu B. |
2013 | Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent ; Pala, Zeydin |
Dec-2019 | Nesnelerin İnternetinin Güvenliğinde İnsan Faktörü | Tok, Mevlüt Serkan; Selçuk, Ali Aydın |
2013 | Network lifetime maximization and localized routing tradeoff in wireless sensor networks | Uzun, Erkam; Aksaç, A.; Öztürk, O.; Kızılöz, H. E.; İncebacak, D.; Tavlı, Bülent ; Bıçakcı, Kemal |
2008 | Never Walk Alone: Uncertainty for anonymity in moving objects databases | Abul, Osman ; Bonchi, Francesco; Nanni, Mirco |
2021 | A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCE | İlter, Murat Burhan; Selçuk, Ali Aydın |
15-Dec-2016 | Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets | Narang, Pratik; Hota, Chittaranjan; Sencar, Hüsrev Taha |
2010 | NoTabNab: Protection against the "tabnabbing attack" | Ünlü, S. A.; Bıçakcı, Kemal |
Jul-2019 | A Novel FPGA-Based High Throughput Accelerator for Binary Search Trees | Melikoğlu, Öykü; Ergin, Oğuz ; Salami, B.; Pavon, J.; Ünsal, O.; Cristal, A. |
2016 | Object Recognition by Distortion-free Graph Embedding and Random Forest | Demirci, Muhammed Fatih ; Kaçka, Serdar |
2019 | Object recognition based on critical nodes | Boluk, Arda; Demirci, Muhammed Fatih |
2022 | On approximate Nash equilibria of the two-source connection game | Caskurlu, Bugra ; Acikalin, Utku Umur; Kizilkaya, Fatih Erdem; Ekici, Ozgun |
1-Jul-2018 | On approximating optimal weight “no”-certificates in weighted difference constraint systems | Çaşkurlu, Buğra ; Williamson, Matthew; Subramani, Kiruba Sankaran; Mkrtchyan, Vahan |
2022 | On existence of equilibrium under social coalition structures | Caskurlu, Bugra ; Ekici, Ozgun; Kizilkaya, Fatih Erdem |
Oct-2020 | On Existence of Equilibrium Under Social Coalition Structures [Conference Object] | Çaşkurlu, Buğra ; Ekici, Özgün; Kızılkaya, Fatih Erdem |
2019 | On Hedonic Games with Common Ranking Property | Çaşkurlu, Buğra ; Kızılkaya, Fatih Erdem |
2014 | On Partial Vertex Cover and Budgeted Maximum Coverage Problems in Bipartite Graphs | Çaşkurlu, Buğra ; Mkrtchyan, V.; Parekh, O; Subramani, Kiruba Sankaran |
2020 | On efficient computation of equilibrium under social coalition structures | Çaşkurlu, Buğra ; Ekici, Özgün; Kızılkaya, Fatih Erdem |
Jul-2018 | Opcode vector: An efficient scheme to detect soft errors in instructions | Martinez, Jorge A.; Atamaner, Mert; Reviriego, Pedro; Ergin, Oğuz ; Ottavi, Marco |
Dec-2019 | Open-TEE is no longer virtual: Towards software-only trusted execution environments using white-box cryptography | Bıçakcı, Kemal ; Ak, I. K.; Özdemir, B. A.; Gözütok, M. |
2008 | Optimal Discretization for High-Entropy Graphical Passwords | Bıçakcı, Kemal |
2013 | Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks | İncebacak, Davut; Tavlı, Bülent ; Bıçakcı, Kemal ; Kayhan, Ayşegül Altın |
2017 | Partial vertex cover and budgeted maximum coverage in bipartite graphs | Çaşkurlu, Buğra ; Mkrtchyan, Vahan; Parekh, Ojas; Subramani, Kiruba Sankaran |
2013 | Pedagogical Analysis and Multifaceted Evaluation of an Engineering Co-op Program | Uludağ, Süleyman; Demirci, Muhammed Fatih ; Doğdu, Erdoğan; Aydos, Fahri |
2022 | PiDRAM: A Holistic End-to-end FPGA-based Framework for Processing-in-DRAM | Olgun, Ataberk; Luna, Juan Gomez; Kanellopoulos, Konstantinos; Salami, Behzad; Hassan, Hasan; Ergin, Oguz ; Mutlu, Onur |
2022 | PiDRAM: An FPGA-based Framework for End-to-end Evaluation of Processing-in-DRAM Techniques | Olgun, A.; Luna, J.G.; Kanellopoulos, K.; Salami, B.; Hassan, H.; Ergin, Oğuz ; Mutlu, O. |
2013 | Pipelining Harris Corner Detection with a Tiny FPGA for a Mobile Robot | Aydoğdu, M. Fatih; Demirci, Muhammed Fatih ; Kasnakoğlu, Coşku |
2020 | Post Connection Attacks in MySQL | Kaya, Ahmet Selim; Selçuk, Ali Aydın |
5-Jul-2018 | Predicting drug activity by image encoded gene expression profiles | Özgül, Ozan Fırat; Bardak, Batuhan ; Tan, Mehmet |
2022 | Predicting Election Results via Social Media: A Case Study for 2018 Turkish Presidential Election | Bayrak, Cansin; Kutlu, Mucahid |
Sep-2020 | Predicting the number of bidders in public procurement | Görgün, Mustafa Kaan; Kutlu, Mücahid ; Taş, Bedri Kamil Onur |
Oct-2016 | Prediction of anti-cancer drug response by kernelized multi-task learning | Tan, Mehmet |
28-Dec-2015 | Prediction of influenza outbreaks by integrating Wikipedia article access logs and Google flu trend data | Bardak, Batuhan ; Tan, Mehmet |
Jun-2014 | A preliminary examination technique for audio evidence to distinguish speech from non-speech using objective speech quality measures | Uzun, Erkam; Sencar, Hüsrev Taha |
2013 | Preserving location privacy for a group of users | Ashouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın |
2022 | Privacy in blockchain systems | Osmanoglu, Murat; Selçuk, Ali Aydın |
2007 | Privacy-aware knowledge discovery from location data | Atzori, M.; Bonchi, F.; Giannotti F.; Pedreschi, D.; Abul, O. |
2015 | Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs | Uludağ, Süleyman; Ballı, Muhammed Fatih; Selçuk, Ali Aydın ; Tavlı, Bülent |
2012 | Privacy-preserving sharing of sensitive semantic locations under road-network constraints | Yiğitoğlu, E.; Damiani, M. L.; Abul, O. ; Silvestri, C. |
2022 | Proactive Metering of Mobile Internet User Experience | Abul, Osman ; Uzun, Mete |
2022 | Processor Security: Detecting Microarchitectural Attacks via Count-Min Sketches | Arikan, Kerem; Palumbo, Alessandro; Cassano, Luca; Reviriego, Pedro; Pontarelli, Salvatore; Bianchi, Giuseppe; Ergin, Oğuz |
2010 | Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks | Bıçakcı, Kemal ; Tavlı, Bülent |
1-Jun-2015 | Punctured interval broadcast encryption scheme with free riders | Ak, Murat; Selçuk, Ali Aydın |
2009 | Pushing the limits of one-time signatures | Bıçakcı, Kemal |
2021 | QUAC-TRNG: High Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips | Olgun, Ataberk; Patel, Minesh; Yağlıkçı, A. Giray; Luo, Haocong; Ergin, Oğuz ; Bostancı, F. Nisa; Vijaykumar, Nandita |
2017 | A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology For IT Systems | Aksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun |
2023 | Re-Think Before You Share: A Comprehensive Study on Prioritizing Check-Worthy Claims | Kartal, Yavuz Selim; Kutlu, Mücahid |
2015 | Recent Advances in Counter PRNU Based Source Attribution and Beyond | Karakucuk, Ahmet; Dirik, Ahmet E.; Sencar, Hüsrev Taha ; Memon, Nasir D. |
2009 | Reducing Parity Generation Latency through Input Value Aware Circuits | Osmanlıoğlu, Yusuf; Koçberber, Y. Onur; Ergin, Oğuz |
2009 | Reducing Soft Errors through Operand Width Aware Policies | Ergin, Oğuz ; Ünsal, Osman S.; vera, Xavier; Gonzalez, Antonio |
2010 | Reducing The Energy Dissipation Of The Issue Queue By Exploiting Narrow Immediate Operands | Kaynak, İlknur Cansu; Koçberber, Yusuf Onur; Ergin, Oğuz |
2015 | REFBSS: Reference Based Similarity Search in Biological Network Databases | Söylev, Arda; Abul, Osman |
2008 | Refueling: Preventing wire degradation due to electromigration | Abella, Jaume; Vera, Xavier; Ünsal, Osman S.; Ergin, Oğuz ; Gonzalez, Antonio; Tschanz, James W.; Kartal, Yavuz Selim |
2009 | The Representation and Matching of Images Using Top Points | Demirci, Muhammed Fatih ; Platel, Bram; Shokoufandeh, Ali; Florack, Luc L. M. J.; Dickinson, Sven J. |
2013 | Retrieving 2D shapes using caterpillar decomposition | Demirci, Muhammed Fatih |
2012 | Revealing miRNA Regulation and miRNA Target Prediction Using Constraint-Based Learning | Alshalalfa, Mohammed; Tan, Mehmet ; Naji, Ghada; Alhajj, Reda; Polat, Faruk; Rokne, Jon |
2013 | Revisiting graphical passwords for augmenting, not replacing, text passwords | Akpulat M.; Bıçakcı, Kemal ; Cil U. |
2015 | RSFQ Tabanlı Entegre Devre tasarım aracı ve Aritmetik Mantık Birimi Geliştirilmesi | Ergin, Oğuz ; Bozbey, Ali ; Tunç, Celal Alp; Çelik, M. Eren; Özer, Murat; Üşenmez, Kübra; Tükel, Yiğit |
2012 | SAWLnet: Sensitivity AWare location cloaking on road-NETworks | Silvestri, C.; Yiğitoğlu, E.; Damiani, M. L.; Abul, O. |
2013 | Sayısal seslerden adli kanıt toplama | Avcıbaş, İsmail; Sencar, Hüsrev Taha |
2013 | Seam-Carving Based Anonymization Against Image & Video Source Attribution | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
2012 | A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset | Uzun, Yasin; Bıçakcı, Kemal |
2020 | Security Analysis of Mobile Authenticator Applications | Özkan, C.; Bıçakcı, Kemal |
2023 | Security-Aware Database Migration Planning | Acikalin, Utku Umur; Caskurlu, Bugra ; Subramani, K. |
Aug-2020 | Security-Aware Database Migration Planning | Subramani, Kiruba Sankaran; Çaşkurlu, Buğra ; Açıkalın, Utku Umur |
2010 | Sensitive knowledge hiding application | Gökçe H.; Abul, O. |
Mar-2015 | Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |