02.3. Department of Computer Engineering

Organization name
02.3. Department of Computer Engineering
Director
Parent OrgUnit
City
Ankara
Country
Turkey

OrgUnit's Researchers publications
(Dept/Workgroup Publication)

Refined By:
Type:  Article
Date Issued:  [2010 TO 2020]

Results 1-20 of 86 (Search time: 0.003 seconds).

Issue DateTitleAuthor(s)
1Mar-20172D and 3D shape retrieval using skeleton filling rateŞirin, Yahya; Demirci, Muhammed Fatih 
2Dec-2014Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source AttributionDirik, Ahmet Emir; Sencar, Hüsrev Taha ; Memon, Nasir
32020Annotator rationales for labeling tasks in crowdsourcingKutlu, Mücahid ; McDonnell, T.; Elsayed, T. C.; Lease, M.
42010Anonymization of moving objects databases by clustering and perturbationAbul, Osman ; Bonchi, Francesco; Nanni, Mirco
515-Mar-2014Anonymous trace and revokeAk, Murat; Pehlivanoğlu, Serdar; Selçuk, Ali Aydın 
62013Audio codec identification from coded and transcoded audiosHiçsönmez, Samet; Sencar, Hüsrev Taha ; Avcıbaş, İsmail
7Dec-2017Automated Image Matching and New Readings for Cyrus the Great's 547 BC Campaign in the Nabonidus Chronicle (BM 35382 = ABC 7)Adalı, Selim Ferruh; Demirci, Muhammed Fatih ; Özbayoğlu, Ahmet Murat 
8Jun-2020A utility based approach for data stream anonymizationSopaoğlu, Uğur; Abul, Osman 
92016Biological Network Derivation by Positive Unlabeled Learning AlgorithmsPancaroglu, Doruk; Tan, Mehmet 
10Aug-2014Bit Impact Factor: Towards making fair vulnerability comparisonCan, Serdar Zafer; Yalçın, Gülay; Ergin, Oğuz ; Sabri Ünsal, Osman; Cristal, Adrian
11Sep-2019Can Driving Patterns Predict Identity and Gender?Abul, Osman ; Karatas, B.
12Apr-2014Capacity Allocation Games for Network-Coded Multicast StreamingAnshelevich, Elliot; Çaşkurlu, Buğra ; Kar, Koushik; Zhang, Hang
132015Carving Orphaned JPEG File FragmentsUzun, Erkam; Sencar, Hüsrev Taha 
14Apr-2017Classification of nervous system withdrawn and approved drugs with ToxPrint features via machine learning strategiesOnay, Aytun; Onay, Melih; Abul, Osman 
15Dec-2015The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based servicesAshouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın 
16Dec-2017A Closer Look at Pure-Text Human-Interaction ProofsKızılöz, Hakan Ezgi; Bıçakcı, Kemal 
172012Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signaturesBıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent 
182010Content-based video copy detection - A surveyLian, S.; Nikolaidis, N.; Sencar, Hüsrev Taha 
1925-Nov-2016A CRT-based verifiable secret sharing scheme secure against unbounded adversariesErsoy, Oğuzhan; Pedersen, Thomas Brochmann; Kaya, Kamer; Selçuk, Ali Aydın ; Anarim, Emin
20Sep-2018Distributed Multi-Unit Privacy Assured Bidding (PAB) for Smart Grid Demand Response ProgramsBalli, Muhammed Fatih; Uludağ, Süleyman; Selçuk, Ali Aydın ; Tavlı, Bülent