| Issue Date | Title | Author(s) |
1 | 2020 | Analysis and Evaluation of Keystroke Dynamics as a Feature of Contextual Authentication | Bıçakcı, Kemal ; Salman, O.; Uzunay Y.; Tan, M. |
2 | 2020 | Annotator rationales for labeling tasks in crowdsourcing | Kutlu, Mücahid ; McDonnell, T.; Elsayed, T. C.; Lease, M. |
3 | Sep-2020 | Are we secure from bots? Investigating vulnerabilities of botometer | Torusdağ, Buğra M.; Kutlu, Mücahid ; Selçuk, Ali Aydın |
4 | Jul-2020 | ArTest: The First Test Collection for Arabic Web Search with Relevance Rationales | Hasanain, M.; Barkallah, Y.; Suwaileh, R.; Kutlu, Mücahid ; Elsayed, T. |
5 | Jun-2020 | A utility based approach for data stream anonymization | Sopaoğlu, Uğur; Abul, Osman |
6 | Sep-2020 | BERT Modeli ile Türkçe Duygu Analizi | Açıkalın, Utku Umur; Bardak, Benan; Kutlu, Mücahid |
7 | Oct-2020 | Building Test Collections using Bandit Techniques: A Reproducibility Study | Altun, Bahadır; Kutlu, Mücahid |
8 | Sep-2020 | Chemical Induced Differential Gene Expression Prediction on LINCS Database | Işık, R.; Ekşioğlu, I.; Maral, B. C.; Bardak, B.; Tan, Mehmet |
9 | Oct-2020 | Distinguishing True and False Buy/Sell Triggers from Financial Technical Indicators | Tüfekçi, Zeynep; Abul, Osman |
10 | Sep-2020 | Efficient Test Collection Construction via Active Learning | Rahman, M. M.; Kutlu, Mücahid ; Elsayed, T.; Lease, M. |
11 | Jul-2020 | An Experimental Study of Reduced-Voltage Operation in Modern FPGAs for Neural Network Acceleration | Salami, B.; Onural, E. B.; Yüksel, I. E.; Koç, F.; Ergin, Oğuz ; Cristal Kestelman, A.; Ünsal, O.; Sarbazi-Azad, H.; Mutlu, O. |
12 | 2020 | Extending Attribute-Based Access Control Model with Authentication Information for Internet of Things | Burakgazi, Bilgen M.; Bıçakcı, Kemal |
13 | 2020 | JpgScraper : An Advanced Carver for JPEG Files | Uzun, Erkam; Sencar, Hüsrev Taha |
14 | 2020 | Kaynak Seçme Oyunlarında Sosyal YapılaşmalarAltında Denge Hesaplaması [Diğer] | Çaşkurlu, Buğra ; Ekici, Özgün |
15 | Apr-2020 | A Microprocessor Protection Architecture against Hardware Trojans in Memories | Bolat, A.; Cassano, L.; Reviriego, P.; Ergin, Oğuz ; Ottavid, M. |
16 | 2020 | Mitigation of H.264 and H.265 Video Compression for Reliable PRNU Estimation | Altınışık, Enes; Tasdemir, Kasım; Sencar, Hüsrev Taha |
17 | Oct-2020 | On Existence of Equilibrium Under Social Coalition Structures [Conference Object] | Çaşkurlu, Buğra ; Ekici, Özgün; Kızılkaya, Fatih Erdem |
18 | 2020 | On efficient computation of equilibrium under social coalition structures | Çaşkurlu, Buğra ; Ekici, Özgün; Kızılkaya, Fatih Erdem |
19 | 2020 | Post Connection Attacks in MySQL | Kaya, Ahmet Selim; Selçuk, Ali Aydın |
20 | Sep-2020 | Predicting the number of bidders in public procurement | Görgün, Mustafa Kaan; Kutlu, Mücahid ; Taş, Bedri Kamil Onur |