Vulnerability prediction from source code using machine learning Z Bilgin, MA Ersoy, EU Soykan, E Tomur, P Çomak, L Karaçay IEEE Access 8, 150672-150684, 2020 | 92 | 2020 |
A network-based positioning method to locate false base stations L Karaçay, Z Bilgin, AB Gündüz, P Çomak, E Tomur, EU Soykan, U Gülen, ... IEEE Access 9, 111368-111382, 2021 | 16 | 2021 |
A survey and guideline on privacy enhancing technologies for collaborative machine learning EU Soykan, L Karacay, F Karakoc, E Tomur IEEE Access 10, 97495-97519, 2022 | 14 | 2022 |
Intrusion detection over encrypted network data L Karaçay, E Savaş, H Alptekin The Computer Journal 63 (1), 604-619, 2020 | 11 | 2020 |
The Hexa-X project vision on Artificial Intelligence and Machine Learning-driven Communication and Computation co-design for 6G M Merluzzi, T Borsos, N Rajatheva, AA Benczúr, H Farhadi, T Yassine, ... IEEE Access 11, 65620-65648, 2023 | 10 | 2023 |
On the security of 6G use cases: Threat Analysis of'All-Senses Meeting' Z Laaroussi, EU Soykan, M Liljenstam, U Gülen, L Karaçay, E Tomur 2022 IEEE 19th annual consumer communications & networking conference (CCNC …, 2022 | 8 | 2022 |
SoK: Investigation of security and functional safety in industrial IoT E Tomur, U Gülen, EU Soykan, MA Ersoy, F Karakoç, L Karaçay, P Çomak 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 7 | 2021 |
A practical privacy-preserving targeted advertising scheme for IPTV users LJ Khayati, C Orencik, E Savas, B Ustaoglu International Journal of Information Security 15, 335-360, 2016 | 7 | 2016 |
Practical adversarial attacks against AI-driven power allocation in a distributed MIMO network ÖF Tuna, FE Kadan, L Karaçay ICC 2023-IEEE International Conference on Communications, 759-764, 2023 | 4 | 2023 |
Context-aware authentication with dynamic credentials using electricity consumption data E Ustundag Soykan, L KaraÇay, Z Bilgin, E Tomur, M Akif Ersoy, ... The Computer Journal 65 (10), 2631-2640, 2022 | 4 | 2022 |
A Security-Friendly Privacy Solution for Federated Learning. F Karakoç, L Karaçay, P Çomak, U Gülen, R Fuladi, EU Soykan AI6G@ WCCI, 2022 | 3 | 2022 |
Privacy-preserving targeted advertising scheme for IPTV using the cloud L Javid Khayati | 2 | 2012 |
On the security of 6G use cases: AI/ML-specific threat modeling of All-Senses meeting L Karaçay, Z Laaroussi, S Ujjwal, EU Soykan 2023 2nd International conference on 6g networking (6GNet), 1-8, 2023 | 1 | 2023 |
Technique for Determining a Safety-Critical State E Tomur, Z Bilgin, MA Ersoy, EU Soykan, L Karacay, F Karakoc US Patent App. 18/022,512, 2023 | 1 | 2023 |
Methods of evaluating source code using numeric array representations of source code elements Z Bilgin, EU Soykan, MA Ersoy, E Tomur, P Comak, L Karacay US Patent App. 17/797,747, 2023 | 1 | 2023 |
A security-friendly privacy-preserving solution for federated learning F Karakoç, L Karaçay, PÇ De Cnudde, U Gülen, R Fuladi, EU Soykan Computer Communications 207, 27-35, 2023 | 1 | 2023 |
Network Digital Twins: A Threat Analysis A Raghuramu, M Liljenstam, S Ujjwal, U Gülen, G Phillips, Z Laaroussi, ... 2023 IEEE International Conference on Communications Workshops (ICC …, 2023 | 1 | 2023 |
Intent-Based Security for Functional Safety in cyber-physical Systems E Tomur, Z Bilgin, U Gülen, EU Soykan, L Karaçay, F Karakoç IEEE Transactions on Emerging Topics in Computing, 2023 | 1 | 2023 |
Privacy-Preserving intrusion detection over network data L Karaçay | 1 | 2019 |
Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting L Karaçay, Z Laaroussi, S Ujjwal, EU Soykan Annals of Telecommunications, 1-15, 2024 | | 2024 |