| Issue Date | Title | Author(s) |
201 | 2020 | Kaynak Seçme Oyunlarında Sosyal YapılaşmalarAltında Denge Hesaplaması [Diğer] | Çaşkurlu, Buğra ; Ekici, Özgün |
202 | 2012 | Knowledge hiding from tree and graph databases | Abul, Osman ; Gökçe, Harun |
203 | 2010 | Knowledge hiding in emerging application domains | Abul, Osman |
204 | 2017 | Konum-tabanlı servisler için konum ve konum örüntü mahremiyetinin sağlanması | Abul, Osman |
205 | 2016 | Konuşma Yoluyla Etkileşilebilen Mobil Yazılımların Geliştirilmesine Yönelik Anotasyon Yönelimli Bir Yazılım Çerçevesi | Gerede, Çağdaş Evren |
206 | 2013 | LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload | Bıçakcı, Kemal ; Crispo, Bruno; Oligeri, Gabriele |
207 | Aug-2016 | Leveraging human computation for pure-text Human Interaction Proofs | Bıçakcı, Kemal ; Kızılöz, Hakan Ezgi |
208 | 2011 | Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent |
209 | 2022 | Location-privacy preserving partial nearby friends querying in urban areas | Abul, Osman |
210 | 2011 | Long Range Correlations Between Nucleotide Triplets | Vitale, D.; Kuruoğlu, E. E.; Abul, Osman |
211 | 2023 | A machine learning approach for dyslexia detection using Turkish audio records | Taş, Tuğberk; Bulbul, Muammed Abdullah; Haşimoğlu, Abas; Meral, Yavuz; Çalışkan, Yasin; Budağova, Günay; Kutlu, Mucahid |
212 | 2008 | Many-to-Many Matching in l(1) Norm | Demirci, Muhammed Fatih |
213 | 2009 | Many-to-Many Matching under the l 1 Norm | Demirci, Muhammed Fatih ; Osmanlıoğlu, Yusuf |
214 | 2011 | Maximizing lifetime of event-unobservable wireless sensor networks | Bıçakcı, Kemal ; Gültekin, Hakan ; Tavlı, Bülent ; Bağcı, İbrahim Ethem |
215 | Feb-2016 | Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent ; Gültekin, Hakan ; İncebacak, Davut |
216 | 2013 | Methods for Identifying Traces of Compression in Audio | Hiçsönmez, Samet; Uzun, Erkam; Sencar, Hüsrev Taha |
217 | Apr-2020 | A Microprocessor Protection Architecture against Hardware Trojans in Memories | Bolat, A.; Cassano, L.; Reviriego, P.; Ergin, Oğuz ; Ottavid, M. |
218 | 2019 | Minimization of Testing Costs in Capacity-Constrained Database Migration | Subramani, Kiruba Sankaran; Çaşkurlu, Buğra ; Velasquez, A. |
219 | 2010 | Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks | Tavlı, Bülent ; Özçiloğlu, M. Mikail; Bıçakcı, Kemal |
220 | 2020 | Mitigation of H.264 and H.265 Video Compression for Reliable PRNU Estimation | Altınışık, Enes; Tasdemir, Kasım; Sencar, Hüsrev Taha |