Vulnerability prediction from source code using machine learning Z Bilgin, MA Ersoy, EU Soykan, E Tomur, P Çomak, L Karaçay IEEE Access 8, 150672-150684, 2020 | 92 | 2020 |
A dynamic route optimization mechanism for AODV in MANETs Z Bilgin, B Khan 2010 IEEE International conference on communications, 1-5, 2010 | 46 | 2010 |
Differentially private deep learning for load forecasting on smart grid EU Soykan, Z Bilgin, MA Ersoy, E Tomur 2019 IEEE Globecom Workshops (GC Wkshps), 1-6, 2019 | 34 | 2019 |
A network-based positioning method to locate false base stations L Karaçay, Z Bilgin, AB Gündüz, P Çomak, E Tomur, EU Soykan, U Gülen, ... IEEE Access 9, 111368-111382, 2021 | 16 | 2021 |
Secure aggregation against malicious users F Karakoç, M Önen, Z Bilgin Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021 | 15 | 2021 |
Explaining Inaccurate Predictions of Models through k-Nearest Neighbors. Z Bilgin, M Gunestas ICAART (2), 228-236, 2021 | 9 | 2021 |
Statistical appliance inference in the smart grid by machine learning Z Bilgin, E Tomur, MA Ersoy, EU Soykan 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio …, 2019 | 9 | 2019 |
Code2image: Intelligent code analysis by computer vision techniques and application to vulnerability prediction Z Bilgin arXiv preprint arXiv:2105.03131, 2021 | 7 | 2021 |
A machine learning based management system for network services Y Turk, E Zeydan, Z Bilgin 2019 International Conference on Wireless and Mobile Computing, Networking …, 2019 | 6 | 2019 |
Log analysis using temporal logic and reconstruction approach: web server case M Gunestas, Z Bilgin Journal of Digital Forensics, Security and Law 11 (2), 3, 2016 | 6 | 2016 |
Only the short die old: route optimization in manets by dynamic subconnection shrinking Z Bilgin, B Khan, A Al-Fuqaha Proceedings of the 6th International Wireless Communications and Mobile …, 2010 | 6 | 2010 |
On the identification of thyroid nodules using semi‐supervised deep learning G Turk, M Ozdemir, R Zeydan, Y Turk, Z Bilgin, E Zeydan International Journal for Numerical Methods in Biomedical Engineering 37 (3 …, 2021 | 5 | 2021 |
Context-aware authentication with dynamic credentials using electricity consumption data E Ustundag Soykan, L KaraÇay, Z Bilgin, E Tomur, M Akif Ersoy, ... The Computer Journal 65 (10), 2631-2640, 2022 | 4 | 2022 |
Exploring root causes of CNN-based image classifier failures using 3-nearest neighbors Z Bilgin, M Gunestas SN Computer Science 3 (6), 452, 2022 | 3 | 2022 |
Optimal link deployment for minimizing average path length in chain networks Z Bilgin, M Gunestas, O Demir, S Buyrukbilen Wired/Wireless Internet Communications: 14th IFIP WG 6.2 International …, 2016 | 3 | 2016 |
Using connection expansion to reduce control traffic in MANETs Z Bilgin, B Khan, A Al-Fuqaha Proceedings of the 6th International Wireless Communications and Mobile …, 2010 | 3 | 2010 |
Anomaly Localization in Model Gradients Under Backdoor Attacks against Federated Learning Z Bilgin arXiv preprint arXiv:2111.14683, 2021 | 2 | 2021 |
Performance comparison of two route optimisation schemes for AODV in MANETs B Khan, Z Bilgin International Journal of Communication Networks and Distributed Systems 17 …, 2016 | 2 | 2016 |
Technique for Determining a Safety-Critical State E Tomur, Z Bilgin, MA Ersoy, EU Soykan, L Karacay, F Karakoc US Patent App. 18/022,512, 2023 | 1 | 2023 |
Methods of evaluating source code using numeric array representations of source code elements Z Bilgin, EU Soykan, MA Ersoy, E Tomur, P Comak, L Karacay US Patent App. 17/797,747, 2023 | 1 | 2023 |