An android application sandbox system for suspicious software detection T Bläsing, L Batyuk, AD Schmidt, SA Camtepe, S Albayrak 2010 5th International Conference on Malicious and Unwanted Software, 55-62, 2010 | 724 | 2010 |
Key distribution mechanisms for wireless sensor networks: a survey SA Camtepe, B Yener Rensselaer Polytechnic Institute, Troy, New York, Technical Report, 05-07, 2005 | 623 | 2005 |
Splitfed: When federated learning meets split learning C Thapa, MAP Chamikara, S Camtepe, L Sun Association for the Advancement of Artificial Intelligence (AAAI) 2022, 2022 | 471 | 2022 |
Static analysis of executables for collaborative malware detection on android AD Schmidt, R Bye, HG Schmidt, J Clausen, O Kiraz, KA Yuksel, ... 2009 IEEE International Conference on Communications, 1-5, 2009 | 416 | 2009 |
Combinatorial design of key distribution mechanisms for wireless sensor networks SA Çamtepe, B Yener IEEE/ACM Transactions on networking 15 (2), 346-358, 2007 | 385 | 2007 |
Combinatorial design of key distribution mechanisms for wireless sensor networks SA Camtepe, B Yener European Symposium on Research in Computer Security, 293-308, 2004 | 336 | 2004 |
Monitoring smartphones for anomaly detection AD Schmidt, F Peters, F Lamour, C Scheel, SA Camtepe, Ş Albayrak Mobile Networks and Applications 14, 92-106, 2009 | 254 | 2009 |
Local differential privacy for deep learning PCM Arachchige, P Bertok, I Khalil, D Liu, S Camtepe, M Atiquzzaman IEEE Internet of Things Journal 7 (7), 5827-5842, 2019 | 245 | 2019 |
A survey and analysis of the GNSS spoofing threat and countermeasures D Schmidt, K Radke, S Camtepe, E Foo, M Ren ACM Computing Surveys (CSUR) 48 (4), 1-31, 2016 | 222 | 2016 |
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems MAP Chamikara, P Bertok, I Khalil, D Liu, S Camtepe, M Atiquzzaman IEEE Transactions on Industrial Informatics, 2020 | 214* | 2020 |
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications L Batyuk, M Herpich, SA Camtepe, K Raddatz, AD Schmidt, S Albayrak 2011 6th International Conference on Malicious and Unwanted Software, 66-72, 2011 | 201 | 2011 |
Modeling and multiway analysis of chatroom tensors E Acar, SA Camtepe, MS Krishnamoorthy, B Yener Intelligence and Security Informatics: IEEE International Conference on …, 2005 | 193 | 2005 |
Precision health data: Requirements, challenges and existing techniques for data security and privacy C Thapa, S Camtepe Computers in biology and medicine 129, 104130, 2021 | 191 | 2021 |
End-to-end evaluation of federated learning and split learning for internet of things Y Gao, M Kim, S Abuadbba, Y Kim, C Thapa, K Kim, SA Camtepe, H Kim, ... arXiv preprint arXiv:2003.13376, 2020 | 190 | 2020 |
Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics A Messerman, T Mustafić, SA Camtepe, S Albayrak 2011 International Joint Conference on Biometrics (IJCB), 1-8, 2011 | 172 | 2011 |
Identity theft, computers and behavioral biometrics R Moskovitch, C Feher, A Messerman, N Kirschnick, T Mustafic, ... 2009 IEEE International Conference on Intelligence and Security Informatics …, 2009 | 154 | 2009 |
Fuzzing: a survey for roadmap X Zhu, S Wen, S Camtepe, Y Xiang ACM Computing Surveys (CSUR) 54 (11s), 1-36, 2022 | 152 | 2022 |
Smartphone malware evolution revisited: Android next target? AD Schmidt, HG Schmidt, L Batyuk, JH Clausen, SA Camtepe, S Albayrak, ... 2009 4th International conference on malicious and unwanted software …, 2009 | 152 | 2009 |
Key management in wireless sensor networks SA Çamtepe, B Yener Wireless sensor network security (J López, J Zhou) - IOS Press, 2008 | 147* | 2008 |
Enhancing security of linux-based android devices AD Schmidt, HG Schmidt, J Clausen, KA Yuksel, O Kiraz, A Camtepe, ... Proceedings of 15th International Linux Kongress, 1-16, 2008 | 146 | 2008 |