Vulnerability prediction from source code using machine learning Z Bilgin, MA Ersoy, EU Soykan, E Tomur, P Çomak, L Karaçay IEEE Access 8, 150672-150684, 2020 | 89 | 2020 |
A network-based positioning method to locate false base stations L Karaçay, Z Bilgin, AB Gündüz, P Çomak, E Tomur, EU Soykan, U Gülen, ... IEEE Access 9, 111368-111382, 2021 | 14 | 2021 |
A survey and guideline on privacy enhancing technologies for collaborative machine learning EU Soykan, L Karacay, F Karakoc, E Tomur IEEE Access 10, 97495-97519, 2022 | 13 | 2022 |
The Hexa-X project vision on Artificial Intelligence and Machine Learning-driven Communication and Computation co-design for 6G M Merluzzi, T Borsos, N Rajatheva, AA Benczúr, H Farhadi, T Yassine, ... IEEE Access, 2023 | 11 | 2023 |
Intrusion detection over encrypted network data L Karaçay, E Savaş, H Alptekin The Computer Journal 63 (1), 604-619, 2020 | 11 | 2020 |
On the security of 6G use cases: Threat Analysis of'All-Senses Meeting' Z Laaroussi, EU Soykan, M Liljenstam, U Gülen, L Karaçay, E Tomur 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC …, 2022 | 7 | 2022 |
A practical privacy-preserving targeted advertising scheme for IPTV users LJ Khayati, C Orencik, E Savas, B Ustaoglu International Journal of Information Security 15, 335-360, 2016 | 7 | 2016 |
SoK: Investigation of security and functional safety in industrial IoT E Tomur, U Gülen, EU Soykan, MA Ersoy, F Karakoç, L Karaçay, P Çomak 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 6 | 2021 |
Practical adversarial attacks against ai-driven power allocation in a distributed mimo network ÖF Tuna, FE Kadan, L Karaçay ICC 2023-IEEE International Conference on Communications, 759-764, 2023 | 4 | 2023 |
A Security-Friendly Privacy Solution for Federated Learning. F Karakoç, L Karaçay, P Çomak, U Gülen, R Fuladi, EU Soykan AI6G@ WCCI, 2022 | 3 | 2022 |
Context-aware authentication with dynamic credentials using electricity consumption data E Ustundag Soykan, L KaraÇay, Z Bilgin, E Tomur, M Akif Ersoy, ... The Computer Journal 65 (10), 2631-2640, 2022 | 2 | 2022 |
Privacy-preserving targeted advertising scheme for IPTV using the cloud L Javid Khayati | 2 | 2012 |
On the Security of 6G Use Cases: AI/ML-specific Threat Modeling of All-Senses Meeting L Karaçay, Z Laaroussi, S Ujjwal, EU Soykan 2023 2nd International Conference on 6G Networking (6GNet), 1-8, 2023 | 1 | 2023 |
Methods of evaluating source code using numeric array representations of source code elements Z Bilgin, EU Soykan, MA Ersoy, E Tomur, P Comak, L Karacay US Patent App. 17/797,747, 2023 | 1 | 2023 |
A security-friendly privacy-preserving solution for federated learning F Karakoç, L Karaçay, PÇ De Cnudde, U Gülen, R Fuladi, EU Soykan Computer Communications 207, 27-35, 2023 | 1 | 2023 |
Privacy-Preserving intrusion detection over network data L Karaçay | 1 | 2019 |
Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting L Karaçay, Z Laaroussi, EU Soykan Annals of Telecommunications, 1-15, 2024 | | 2024 |
Detecting IP DDoS Attacks Using 3GPP Radio Protocols L Abdelrazek, R Fuladi, J Kövér, L Karaçay, U Gülen IEEE Access 12, 24776-24790, 2024 | | 2024 |
Technique for Determining a Safety-Critical State E Tomur, Z Bilgin, MA Ersoy, EU Soykan, L Karacay, F Karakoc US Patent App. 18/022,512, 2023 | | 2023 |
Handling a request to initiate a call Z Bilgin, F Karakoc, E Tomur, EU Soykan, L Karacay, MA Ersoy, P Comak US Patent App. 18/018,643, 2023 | | 2023 |